Publisher
Springer Nature Switzerland
Reference10 articles.
1. Allen, L., O’Connell, A., Kiermer, V.: How can we ensure visibility and diversity in research contributions? How the contributor role taxonomy (CRediT) is helping the shift from authorship to contributorship. Learn. Publishing 32(1), 71–74 (2019). https://doi.org/10.1002/leap.1210
2. Baryshevtsev, M., McGlynn, J.: Persuasive appeals predict credibility judgments of phishing messages. Cyberpsychol. Behav. Soc. Netw. 23(5), 297–302 (2020). https://doi.org/10.1089/cyber.2019.0592
3. Cisco umbrella: cybersecurity threat trends: phishing, crypto top the list (2021). https://umbrella.cisco.com/info/2021-cyber-security-threat-trends-phishing-crypto-top-the-list
4. Furnell, S.: Phishing: can we spot the signs? Comput. Fraud Secur. 2007(3), 10–15 (2007). https://doi.org/10.1016/S1361-3723(07)70035-0
5. Jampen, D., Gür, G., Sutter, T., Tellenbach, B.: Don’t click: towards an effective anti-phishing training. A comparative literature review. Hum.-centric Comput. Inf. Sci. 10 (2020).https://doi.org/10.1186/s13673-020-00237-7