Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 journals/isr/WrightJTDM14
%A Wright, Ryan T.
%A Jensen, Matthew L.
%A Thatcher, Jason Bennett
%A Dinger, Michael
%A Marett, Kent
%D 2014
%J Inf. Syst. Res.
%K dblp
%N 2
%P 385-400
%T Research Note - Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance.
%U http://dblp.uni-trier.de/db/journals/isr/isr25.html#WrightJTDM14
%V 25
@article{journals/isr/WrightJTDM14,
added-at = {2024-02-05T00:00:00.000+0100},
author = {Wright, Ryan T. and Jensen, Matthew L. and Thatcher, Jason Bennett and Dinger, Michael and Marett, Kent},
biburl = {https://www.bibsonomy.org/bibtex/2f8fdbb718bc581a7b8f495713fbe3b23/dblp},
ee = {https://doi.org/10.1287/isre.2014.0522},
interhash = {cc863eb6b0df46f734ae0e5eeaf34357},
intrahash = {f8fdbb718bc581a7b8f495713fbe3b23},
journal = {Inf. Syst. Res.},
keywords = {dblp},
number = 2,
pages = {385-400},
timestamp = {2024-04-08T20:14:26.000+0200},
title = {Research Note - Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance.},
url = {http://dblp.uni-trier.de/db/journals/isr/isr25.html#WrightJTDM14},
volume = 25,
year = 2014
}