To deceive or not to deceive! : legal implications of phishing covert research
Year of publication: |
2013
|
---|---|
Authors: | El-din, Rasha Salah ; Sugiura, Lisa |
Published in: |
International journal of intellectual property management : IJIPM. - Genève [u.a.] : Inderscience Enterprises, ISSN 1478-9647, ZDB-ID 2451202-3. - Vol. 6.2013, 4, p. 285-293
|
Subject: | phishing | research ethics | deception | IT law | security |
-
Market deficiencies : from Veblen to Akerlof and Shiller
Rutherford, Malcolm, (2018)
-
Influence techniques in phishing attacks : an examination of vulnerability and resistance
Wright, Ryan T., (2014)
-
Viewpoint: The costs and benefits of deception in economic experiments
Lusk, Jayson L., (2019)
- More ...
-
Mobile Users' Strategies for Managing Phishing Attacks
El-Din, Rasha Salah, (2014)
-
Mobile users' strategies for managing phishing attacks
El-din, Rasha Salah, (2014)
- More ...