Cited By
View all- Purkait S(2013)Open Proxy: A road block for Phishing investigationsi-manager's Journal on Information Technology10.26634/jit.2.1.21422:1(22-33)Online publication date: 15-Feb-2013
- Bose ILeung A(2013)The impact of adoption of identity theft countermeasures on firm valueDecision Support Systems10.1016/j.dss.2013.03.00155:3(753-763)Online publication date: Jun-2013
- Purkait S(2012)Phishing counter measures and their effectiveness – literature reviewInformation Management & Computer Security10.1108/0968522121128654820:5(382-420)Online publication date: 23-Nov-2012
- Show More Cited By