Article,

Research Note - Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance.

, , , , and .
Information Systems Research, 25 (2): 385-400 (2014)

Meta data

Tags

Users

  • @dblp

Comments and Reviews