메뉴 건너뛰기




Volumn , Issue , 2007, Pages 159-161

Managing phishing threats in an organization

Author keywords

Phishing; Security

Indexed keywords

ELECTRONIC MAIL; MESSAGE PASSING; MULTIMEDIA SYSTEMS; PROBABILITY; SOCIETIES AND INSTITUTIONS; WEBSITES;

EID: 34748869631     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1231047.1231083     Document Type: Conference Paper
Times cited : (12)

References (9)
  • 1
    • 34748873699 scopus 로고    scopus 로고
    • 419earter (2003). What is the 419 scam? Retrieved July 6, 2006, from. 419earter Web site: http://www.419eater.com/htm.1/419faq.htm
    • 419earter (2003). What is the 419 scam? Retrieved July 6, 2006, from. 419earter Web site: http://www.419eater.com/htm.1/419faq.htm
  • 2
    • 34748836280 scopus 로고    scopus 로고
    • Anti-Phishing Work Group Archive
    • Anti-Phishing Work Group Archive (2005). Retrieved July 3, 2006, from Anti-phishing archive Web site: http://anti-phishing.org/phishing_archive/03-30- 05_Huntington/03-30-05_Huntington.html
    • (2005) Retrieved July 3, 2006, from Anti-phishing archive Web site
  • 3
    • 34748835152 scopus 로고    scopus 로고
    • Retrieved July 3, 2006, from
    • Anti-Phishing Work Group
    • Anti-Phishing Work Group (2006). Retrieved July 3, 2006, from. Anti-phishing Web site: http://anti-ph.ishing.org
    • (2006) Anti-phishing Web site
  • 4
    • 34748877099 scopus 로고    scopus 로고
    • Retrieved July 3, 2006, from Web site
    • Dhamija, R. (2006). Why phishing works. Retrieved July 3, 2006, from Web site: http://people.deas.harvard.edu/~rachna/papers/why_phishing_works. pdf#search=%22Why%20Phishing%20Works%20and%20Dhamija%22
    • (2006) Why phishing works
    • Dhamija, R.1
  • 5
    • 34748923419 scopus 로고    scopus 로고
    • Are You A Big Corporate Phish?
    • Leadford, J.L. (2004). Are You A Big Corporate Phish?. Intelligent Enterprise. 7, 1-10.
    • (2004) Intelligent Enterprise , vol.7 , pp. 1-10
    • Leadford, J.L.1
  • 6
    • 34748829035 scopus 로고    scopus 로고
    • Phishing attack victims likley targets for identity theft
    • Retrieved August 14, 2006 from
    • Litan, J.L. (2004). Phishing attack victims likley targets for identity theft. Gartner Research, FT-22-8873, Retrieved August 14, 2006 from http://www.gartner.com/DisplayDocument?id=431660
    • (2004) Gartner Research, FT-22-8873
    • Litan, J.L.1
  • 8
    • 34748902768 scopus 로고    scopus 로고
    • Retrieved July 6, 2006, from Informationweek Web site
    • Pipline, M. (2005). 'WiPhishing' said to threaten wi-fi users. Retrieved July 6, 2006, from Informationweek Web site: http://www.inform.ationweek.com./ story/showArticle.jhtml?articleID-59301241
    • (2005) WiPhishing' said to threaten wi-fi users
    • Pipline, M.1
  • 9
    • 34748919967 scopus 로고    scopus 로고
    • US Department of Justice (2006). Special report on PHISHING. Retrieved July 3, 2006, from US Department of Justice Web Site: http://www.usdoj.gov/criminal/fraud/Phishing.pdf
    • US Department of Justice (2006). Special report on "PHISHING". Retrieved July 3, 2006, from US Department of Justice Web Site: http://www.usdoj.gov/criminal/fraud/Phishing.pdf


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.