Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 journals/isr/WrightJTDM14
%A Wright, Ryan T.
%A Jensen, Matthew L.
%A Thatcher, Jason Bennett
%A Dinger, Michael
%A Marett, Kent
%D 2014
%J Information Systems Research
%K dblp
%N 2
%P 385-400
%T Research Note - Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance.
%U http://dblp.uni-trier.de/db/journals/isr/isr25.html#WrightJTDM14
%V 25
@article{journals/isr/WrightJTDM14,
added-at = {2014-08-12T00:00:00.000+0200},
author = {Wright, Ryan T. and Jensen, Matthew L. and Thatcher, Jason Bennett and Dinger, Michael and Marett, Kent},
biburl = {https://puma.ub.uni-stuttgart.de/bibtex/278985a8ee9583c3b6e7ca30ac4b83658/dblp},
ee = {http://dx.doi.org/10.1287/isre.2014.0522},
interhash = {cc863eb6b0df46f734ae0e5eeaf34357},
intrahash = {78985a8ee9583c3b6e7ca30ac4b83658},
journal = {Information Systems Research},
keywords = {dblp},
number = 2,
pages = {385-400},
timestamp = {2016-02-02T08:55:52.000+0100},
title = {Research Note - Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance.},
url = {http://dblp.uni-trier.de/db/journals/isr/isr25.html#WrightJTDM14},
volume = 25,
year = 2014
}