Article,

Research Note - Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance.

, , , , and .
Inf. Syst. Res., 25 (2): 385-400 (2014)

Meta data

Tags

Users

  • @dblp

Comments and Reviews