Decision strategies and susceptibility to phishing, Proceedings of the second symposium on Usable privacy and security , SOUPS '06, 2006. ,
DOI : 10.1145/1143120.1143131
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.364.8084
Phishing and Pharming: Helping Consumers Avoid Internet Fraud, Communities and Banking, pp.29-31, 2005. ,
Understanding scam victims, Communications of the ACM, vol.54, issue.3, pp.70-75, 2011. ,
DOI : 10.1145/1897852.1897872
Social phishing, Communications of the ACM, vol.50, issue.10, pp.94-100, 2007. ,
DOI : 10.1145/1290958.1290968
Larger prey are targets of phishing, New York Times, vol.1616, 2008. ,
Why have there been so many security breaches recently? Blog@CACM), 2011. ,
Using Phishing for User Email Security Awareness, Proceedings of the 21st IFIP International Information Security Conference, 2006. ,
DOI : 10.1007/0-387-33406-8_41
Phishing Awareness Exercises, Proceedings of the 15th Colloquium for Information Systems Security Education, pp.120-125, 2011. ,