共 32 条
[3]
[Anonymous], 2006, P 2 S US PRIV SEC SO, DOI DOI 10.1145/1143120.1143131
[5]
Bada M., 2015, International Conference on Cyber Security for Sustainable Society, pp, P118
[7]
Blythe M, 2011, 29TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, P3469
[8]
Bowen B. M., 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST 2011), P230, DOI 10.1109/THS.2011.6107876
[9]
Bulgurcu B, 2010, MIS QUART, V34, P523
[10]
What Kind of Interventions Can Help Users from Falling for Phishing Attempts: A Research Proposal for Examining Stage-Appropriate Interventions
[J].
PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES,
2013,
:4023-4032