资讯

The study recorded behaviour logs, and applied a pre- and post-test on phishing knowledge and a flow state measurement to analyze the learning process. The study used lag sequential analysis to infer ...