ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
35
views
0
references
Top references
cited by
25
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,876
similar
All similar
Record
: found
Abstract
: not found
Conference Proceedings
: not found
Decision strategies and susceptibility to phishing
proceedings-article
Author(s):
Julie S. Downs
,
Mandy B. Holbrook
,
Lorrie Faith Cranor
Publication date
(Print):
2006
Conference name:
the second symposium (SOUPS '06)
Conference date:
August 12, 2006 - August 14, 2006
Read this article at
ScienceOpen
Publisher
Further versions
oa repository (via OAI-PMH title and first author match)
oa repository (via OAI-PMH doi match)
Powered by
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Thermal Imaging in Social Decision Making
Author and article information
Conference
Publication date (Print):
2006
Page
: 79
Article
DOI:
10.1145/1143120.1143131
SO-VID:
9bfba125-eeeb-4ed5-9dd7-917085c524fe
Copyright ©
© 2006
Conference name:
the second symposium
Conference acronym:
SOUPS '06
Conference number:
2
Conference location:
Pittsburgh, Pennsylvania
Conference date:
August 12, 2006 - August 14, 2006
Conference sponsor:
undetermined
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
2,876
Alexa in Phishingland: Empirical Assessment of Susceptibility to Phishing Pretexting in Voice Assistant Environments
Authors:
Filipo Sharevski
,
Peter Jachim
Parameter Setting for Deep Neural Networks Using Swarm Intelligence on Phishing Websites Classification
Authors:
Grega Vrbančič
,
Iztok Fister
,
Vili Podgorelec
…
Life-long phishing attack detection using continual learning
Authors:
Asif Ejaz
,
Adnan Noor Mian
,
Sanaullah Manzoor
See all similar
Cited by
25
Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email
Authors:
Arun Vishwanath
,
H. Rao
,
Rui Hong Chen
…
A game design framework for avoiding phishing attacks
Authors:
Nalin Arachchilage
,
Steve Love
Effective Defense Schemes for Phishing Attacks on Mobile Computing Platforms
Authors:
Longfei Wu
,
Xiaojiang Du
,
Jie Wu
See all cited by