Why do some people manage phishing e-mails better than others?

Author: Pattinson Malcolm   Jerram Cate   Parsons Kathryn   McCormac Agata   Butavicius Marcus  

Publisher: Emerald Group Publishing Ltd

ISSN: 0968-5227

Source: Information Management & Computer Security, Vol.20, Iss.1, 2012-03, pp. : 18-28

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Previous Menu Next

Abstract