Cybersecurity Challenges in Social Media Erdal Ozkaya



Yüklə 1,17 Mb.
Pdf görüntüsü
səhifə67/73
tarix10.12.2023
ölçüsü1,17 Mb.
#139643
1   ...   63   64   65   66   67   68   69   70   ...   73
13755 Zeebaree 2020 E R (1)

References 
Alalawi, N. (2015). Social Networks and Privacy. Management Science and Engineering
9(4), 46-55. 
Albrecht, C., Albrecht, C., & Tzafrir, S. (2011). How to protect and minimize consumer risk 
to identity theft. Journal of Financial Crime, 18(4), 405-414. 
http://dx.doi.org/10.1108/13590791111173722
Algarni, A., Xu, Y., & Chan, T. (2017). An empirical study on the susceptibility to social 
engineering in social networking sites: The case of facebook. European Journal of 
Information Systems, 26(6), 661-687. http://dx.doi.org/10.1057/s41303-017-0057-y
Alkhalisi, Z. (2018). IRS scam alleged ringleader arrested in India. CNNMoney. Retrieved 15 
February 2018, from http://money.cnn.com/2017/04/09/news/tax-scam-india-arrest-
ringleader/index.html 
Bakhshi, T., Papadaki, M., & Furnell, S. (2009). Social engineering: Assessing vulnerabilities 
in practice. Information Management & Computer Security, 17(1), 53-63. 
http://dx.doi.org/10.1108/09685220910944768
Bamberger, K. A., & Mulligan, D. K. (2010). Privacy on the Books and on the Ground. Stan. 
L. Rev., 63, 247. 
Bonanno, R. A., & Hymel, S. (2013). Cyber bullying and internalizing difficulties: Above 
and beyond the impact of traditional forms of bullying. Journal of Youth and 
Adolescence, 42(5), 685-97. doi:http://dx.doi.org/10.1007/s10964-013-9937-1 
Bullée, J. W. H., Montoya, L., Pieters, W., Junger, M., & Hartel, P. H. (2015). The 
persuasion and security awareness experiment: reducing the success of social 
engineering attacks. Journal of experimental criminology, 11(1), 97-115. 


130 
Burgess, M., Canright, G., & Engø-Monsen, K. (2004). A graph-theoretical model of 
computer security. International Journal of Information Security, 3(2), 70-85. 
http://dx.doi.org/10.1007/s10207-004-0044-x
Cao, J., Li, Q., Ji, Y., He, Y., & Guo, D. (2016). Detection of forwarding-based malicious 
URLs in online social networks. International Journal of Parallel Programming, 44(1), 
163-180. http://dx.doi.org/10.1007/s10766-014-0330-9
Castelluccio, M. (2002). Social engineering 101. Strategic Finance, 84(6), 57-58. Retrieved 
11 February 2018, from https://search.proquest.com/docview/229746623.
Drake, J. R. (2016). Asking for facebook logins: An egoist case for privacy.
 Journal of 
Business Ethics, 139
(3), 429-441. http://dx.doi.org/10.1007/s10551-015-2586-4
Edwards, M., Larson, R., Green, B., Rashid, A., & Baron, A. (2017). Panning for gold: 
Automatically analysing online social engineering attack surfaces. Computers & 
Security, 69, 18. Retrieved 17 February 2018, from 
https://search.proquest.com/docview/1942191702.
Employee Training is the Only Way to Prevent Social Engineering. (2018). BAI Security. 
Retrieved 8 March 2018, from http://www.baisecurity.net/2017/04/employee-training-
is-the-only-way-to-prevent-social-engineering/ 
Endicott-Popovsky, B., & Lockwood, D. L. (2006). A SOCIAL ENGINEERING PROJECT 
IN A COMPUTER SECURITY COURSE. Academy of Information and 
Management Sciences Journal, 9(1), 37-44. Retrieved 7 January 2018, from 
https://search.proquest.com/docview/214628148.
Gan, D., & Jenkins, L. R. (2015). Social networking privacy-who's stalking you?dagger]. 
Future Internet, 7(1), 67-93. http://dx.doi.org/10.3390/fi7010067 


131 
Goldman, D. (2018). Hackers siphon $47 million out of tech company's accounts. 
CNNMoney. Retrieved 15 February 2018, from 
http://money.cnn.com/2015/08/10/technology/ubiquiti-hacked/index.html 
Gordhamer, S. (2018). 5 Ways Social Media is Changing Our Daily Lives. Mashable. 
Retrieved 8 March 2018, from https://mashable.com/2009/10/16/social-media-
changing-lives/#B_2H3faDGOqT 
Granger, S. (2001). Social engineering fundamentals, part I: hacker tactics. Retrieved 14 
January 2017 from https://www.symantec.com/connect/articles/social-engineering-
fundamentals-part-i-hacker-tactics 
Greavu-Serban, V., & Serban, O. (2014). Social engineering a general approach. Informatica 
Economica, 18(2), 5-14. Retrieved 9 February 2018, from 
https://search.proquest.com/docview/1547694667.
Greenberg, A. (2018). The Ransomware Hackers Made Some Real Amateur Mistakes. 
WIRED. Retrieved 15 February 2018, from 
https://www.wired.com/2017/05/wannacry-ransomware-hackers-made-real-amateur-
mistakes/ 
Hammer, B. (2013). The mechanisms of interpersonal privacy in social networking websites: 
A study of subconscious processes, social network analysis, and fear of social 
exclusion. University of Arkansas. 
Harris, S., Seetharaman, D., & Tau, B. (2017, Sep 06). Facebook identifies $100,000 in ad 
spending by fake accounts with suspected ties to russia; accounts shared 'divisive 
social and political messages,' social network says. Wall Street Journal (Online) 
Retrieved 1 March 2018, from https://search.proquest.com/docview/1935980831. 


132 
Harrison, B., Svetieva, E., & Vishwanath, A. (2016). Individual processing of phishing 
emails. Online Information Review, 40(2), 265-281. Retrieved 15 February 2018, 
from https://search.proquest.com/docview/1776786039.
Heartfield, R., & Loukas, G. (2016). A taxonomy of attacks and a survey of defence 
mechanisms for semantic social engineering attacks. ACM Computing Surveys 
(CSUR), 48(3), 37. 
Heyman, R., De Wolf, R., & Pierson, J. (2014). Evaluating social media privacy settings for 
personal and advertising purposes. The Journal of Policy, Regulation and Strategy for 
Telecommunications, Information and Media, 16(4), 18. Retrieved 19 February 2018, 
from http://search.proquest.com/docview/1660153046
Ivaturi, K., & Janczewski, L. (2013). Social engineering preparedness of online banks: An 
asia-pacific perspective. Journal of Global Information Technology Management, 
16(4), 21-46. Retrieved 15 February 2018, from 
https://search.proquest.com/docview/1461726484.
Kerkstra, G. (2005). Protecting transaction data. Chain Store Age, 81(6), 100. Retrieved 15 
February 2018, from https://search.proquest.com/docview/222086812.
Kim, E. B. (2014). Recommendations for information security awareness training for college 
students. Information Management & Computer Security, 22(1), 115-126. 
http://dx.doi.org/10.1108/IMCS-01-2013-0005
Krishnamurthy, B., & Wills, C. E. (2009, August). On the leakage of personally identifiable 
information via online social networks. In Proceedings of the 2nd ACM workshop on 
Online social networks (pp. 7-12). ACM. 
Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2015). Advanced social engineering 
attacks. Journal of Information Security and applications, 22, 113-122. 


133 
Krombholz, K., Merkl, D., & Weippl, E. (2012). Fake identities in social media: A case study 
on the sustainability of the facebook business model. Journal of Service Science 
Research, 4(2), 175-212. doi:http://dx.doi.org/10.1007/s12927-012-0008-z 
Larson, S. (2018). 

Yüklə 1,17 Mb.

Dostları ilə paylaş:
1   ...   63   64   65   66   67   68   69   70   ...   73




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin