[1] | Ojugo, A.A., Oyemade, D.A., Allenotor, D., Longe, O.B and Anujeonye, C.N., “Comparative Stochastic Study for Credit-Card Fraud Detection Models”, African Journal of Computing & ICT, 2015, Vol 8, No. 1, Issue 2. Pp 15-24. |
|
[2] | Yeboah-Boateng, E.O and Amanor, P.M., Phishing, SMiShing & Vishing: An Assessment of Threats against Mobile Devices, Journal of Emerging Trends in Computing and Information Sciences, 2014, Vol. 5, No. 4, pp297-307. |
|
[3] | Ojugo, A.A and Eboka, A.O., “A Social Engineering Detection Model for Mobile Smartphone Clients”, African Journal of Computing & ICT, 2014, Vol 7, No. 3, Issue 1. Pp 52-64. |
|
[4] | Chanvarasuth, P., “Knowledge on Phishing and Vishing: An Empirical Study on Thai Students”, International Journal of Humanities and Applied Sciences, 2013, Vol. 2, No. 3, pp 58-62, ISSN 2277-4386. |
|
[5] | Pibulyarojana, K. and Jirawannakool, K., “ThaiCERT Annual Report of 2007,”: http://www.ieee.th.org/IEEEConference2008/Proceedings2008 /papers/IEEE_Full_Paper_Komain.doc_Paper_5.pdf. |
|
[6] | Wang, J.R.C., Herath, T., Rao, H. R., “An Empirical Exploration of the Design Pattern of Phishing Attacks”, in: S.J. Upadhyaya, H.R. Rao (Eds.), Annals of Emerging Research in Information Assurance, Security and Privacy Services, Emerald Publishers, 2009. |
|
[7] | Stamm, S., Ramzan, Z., and Jakobsson, M., “Drive-by Pharming,” Technical Report TR641, Indiana University, December 2006. |
|
[8] | Kay, R., “Quick Study: Phishing, Computerworld,” 2004, http://www.computerworld.com/s/article/89096/Phishing. |
|
[9] | Baker, E.M., Baker, W.H., and Tedesco, J.C., “Organizations Respond to Phishing: Exploring the Public Relations Tackle Box”, Communication Research Reports, 2007, vol. 24, no. 4, pp. 327-339. International Journal of Humanities and Applied Sciences (IJHAS) Vol. 2, No. 3, 2013 ISSN 2277- 4386. |
|
[10] | Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L.F., and Downs, J., “Who Falls for Phish? A Demographic Analysis of Phishing Susceptibility and Effectiveness of Interventions”, In the Proceedings of CHI '10, SIGCHI Conference on Human Factors in Computing Systems, 2010, pp. 373-382. |
|
[11] | Colley, A. and Maltby, J., “Impact of the Internet on our lives: Male and Female Personal Perspectives”, Computers in Human Behavior, 2008, vol. 24, no. 5, pp. 2005-2013. |
|
[12] | Jagatic, T., Johnson, N.A., Jakobsson, M., and Menczer, F., “Social Phishing”, Communications of ACM, Vol. 50, No. 10, 2005, pp. 94-100. |
|
[13] | Case, C.J. and King, D.L., “Phishing for Undergraduate Students”, Research in Higher Education Journal, 2006, pp. 100-106. |
|