Protecting people from phishing
- 29 April 2007
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 905-914
- https://doi.org/10.1145/1240624.1240760
Abstract
No abstract availableKeywords
This publication has 14 references indexed in Scilit:
- Don't be a phishPublished by Association for Computing Machinery (ACM) ,2006
- Designing ethical phishing experimentsPublished by Association for Computing Machinery (ACM) ,2006
- Do security toolbars actually prevent phishing attacks?Published by Association for Computing Machinery (ACM) ,2006
- Why phishing worksPublished by Association for Computing Machinery (ACM) ,2006
- Using pop‐up windows to improve multimedia learningJournal of Computer Assisted Learning, 2006
- Decision strategies and susceptibility to phishingPublished by Association for Computing Machinery (ACM) ,2006
- The battle against phishingPublished by Association for Computing Machinery (ACM) ,2005
- Integrating textual and pictorial information via pop-up windows: An experimental studyBehaviour & Information Technology, 1998
- Cognitive Tutors: Lessons LearnedJournal of the Learning Sciences, 1995
- Animations need narrations: An experimental test of a dual-coding hypothesis.Journal of Educational Psychology, 1991