References
Alalawi, N. (2015). Social Networks and Privacy. Management Science and Engineering,
9(4), 46-55.
Albrecht, C., Albrecht, C., & Tzafrir, S. (2011). How to protect and minimize consumer risk
to identity theft. Journal of Financial Crime, 18(4), 405-414.
http://dx.doi.org/10.1108/13590791111173722
Algarni, A., Xu, Y., & Chan, T. (2017). An empirical study on the susceptibility to social
engineering in social networking sites: The case of facebook. European Journal of
Information Systems, 26(6), 661-687. http://dx.doi.org/10.1057/s41303-017-0057-y
Alkhalisi, Z. (2018). IRS scam alleged ringleader arrested in India. CNNMoney. Retrieved 15
February 2018, from http://money.cnn.com/2017/04/09/news/tax-scam-india-arrest-
ringleader/index.html
Bakhshi, T., Papadaki, M., & Furnell, S. (2009). Social engineering: Assessing vulnerabilities
in practice. Information Management & Computer Security, 17(1), 53-63.
http://dx.doi.org/10.1108/09685220910944768
Bamberger, K. A., & Mulligan, D. K. (2010). Privacy on the Books and on the Ground. Stan.
L. Rev., 63, 247.
Bonanno, R. A., & Hymel, S. (2013). Cyber bullying and internalizing difficulties: Above
and beyond the impact of traditional forms of bullying. Journal of Youth and
Adolescence, 42(5), 685-97. doi:http://dx.doi.org/10.1007/s10964-013-9937-1
Bullée, J. W. H., Montoya, L., Pieters, W., Junger, M., & Hartel, P. H. (2015). The
persuasion and security awareness experiment: reducing the success of social
engineering attacks. Journal of experimental criminology, 11(1), 97-115.
130
Burgess, M., Canright, G., & Engø-Monsen, K. (2004). A graph-theoretical model of
computer security. International Journal of Information Security, 3(2), 70-85.
http://dx.doi.org/10.1007/s10207-004-0044-x
Cao, J., Li, Q., Ji, Y., He, Y., & Guo, D. (2016). Detection of forwarding-based malicious
URLs in online social networks. International Journal of Parallel Programming, 44(1),
163-180. http://dx.doi.org/10.1007/s10766-014-0330-9
Castelluccio, M. (2002). Social engineering 101. Strategic Finance, 84(6), 57-58. Retrieved
11 February 2018, from https://search.proquest.com/docview/229746623.
Drake, J. R. (2016). Asking for facebook logins: An egoist case for privacy.
Journal of
Business Ethics, 139
(3), 429-441. http://dx.doi.org/10.1007/s10551-015-2586-4
Edwards, M., Larson, R., Green, B., Rashid, A., & Baron, A. (2017). Panning for gold:
Automatically analysing online social engineering attack surfaces. Computers &
Security, 69, 18. Retrieved 17 February 2018, from
https://search.proquest.com/docview/1942191702.
Employee Training is the Only Way to Prevent Social Engineering. (2018). BAI Security.
Retrieved 8 March 2018, from http://www.baisecurity.net/2017/04/employee-training-
is-the-only-way-to-prevent-social-engineering/
Endicott-Popovsky, B., & Lockwood, D. L. (2006). A SOCIAL ENGINEERING PROJECT
IN A COMPUTER SECURITY COURSE. Academy of Information and
Management Sciences Journal, 9(1), 37-44. Retrieved 7 January 2018, from
https://search.proquest.com/docview/214628148.
Gan, D., & Jenkins, L. R. (2015). Social networking privacy-who's stalking you?dagger].
Future Internet, 7(1), 67-93. http://dx.doi.org/10.3390/fi7010067
131
Goldman, D. (2018). Hackers siphon $47 million out of tech company's accounts.
CNNMoney. Retrieved 15 February 2018, from
http://money.cnn.com/2015/08/10/technology/ubiquiti-hacked/index.html
Gordhamer, S. (2018). 5 Ways Social Media is Changing Our Daily Lives. Mashable.
Retrieved 8 March 2018, from https://mashable.com/2009/10/16/social-media-
changing-lives/#B_2H3faDGOqT
Granger, S. (2001). Social engineering fundamentals, part I: hacker tactics. Retrieved 14
January 2017 from https://www.symantec.com/connect/articles/social-engineering-
fundamentals-part-i-hacker-tactics
Greavu-Serban, V., & Serban, O. (2014). Social engineering a general approach. Informatica
Economica, 18(2), 5-14. Retrieved 9 February 2018, from
https://search.proquest.com/docview/1547694667.
Greenberg, A. (2018). The Ransomware Hackers Made Some Real Amateur Mistakes.
WIRED. Retrieved 15 February 2018, from
https://www.wired.com/2017/05/wannacry-ransomware-hackers-made-real-amateur-
mistakes/
Hammer, B. (2013). The mechanisms of interpersonal privacy in social networking websites:
A study of subconscious processes, social network analysis, and fear of social
exclusion. University of Arkansas.
Harris, S., Seetharaman, D., & Tau, B. (2017, Sep 06). Facebook identifies $100,000 in ad
spending by fake accounts with suspected ties to russia; accounts shared 'divisive
social and political messages,' social network says. Wall Street Journal (Online)
Retrieved 1 March 2018, from https://search.proquest.com/docview/1935980831.
132
Harrison, B., Svetieva, E., & Vishwanath, A. (2016). Individual processing of phishing
emails. Online Information Review, 40(2), 265-281. Retrieved 15 February 2018,
from https://search.proquest.com/docview/1776786039.
Heartfield, R., & Loukas, G. (2016). A taxonomy of attacks and a survey of defence
mechanisms for semantic social engineering attacks. ACM Computing Surveys
(CSUR), 48(3), 37.
Heyman, R., De Wolf, R., & Pierson, J. (2014). Evaluating social media privacy settings for
personal and advertising purposes. The Journal of Policy, Regulation and Strategy for
Telecommunications, Information and Media, 16(4), 18. Retrieved 19 February 2018,
from http://search.proquest.com/docview/1660153046
Ivaturi, K., & Janczewski, L. (2013). Social engineering preparedness of online banks: An
asia-pacific perspective. Journal of Global Information Technology Management,
16(4), 21-46. Retrieved 15 February 2018, from
https://search.proquest.com/docview/1461726484.
Kerkstra, G. (2005). Protecting transaction data. Chain Store Age, 81(6), 100. Retrieved 15
February 2018, from https://search.proquest.com/docview/222086812.
Kim, E. B. (2014). Recommendations for information security awareness training for college
students. Information Management & Computer Security, 22(1), 115-126.
http://dx.doi.org/10.1108/IMCS-01-2013-0005
Krishnamurthy, B., & Wills, C. E. (2009, August). On the leakage of personally identifiable
information via online social networks. In Proceedings of the 2nd ACM workshop on
Online social networks (pp. 7-12). ACM.
Krombholz, K., Hobel, H., Huber, M., & Weippl, E. (2015). Advanced social engineering
attacks. Journal of Information Security and applications, 22, 113-122.
133
Krombholz, K., Merkl, D., & Weippl, E. (2012). Fake identities in social media: A case study
on the sustainability of the facebook business model. Journal of Service Science
Research, 4(2), 175-212. doi:http://dx.doi.org/10.1007/s12927-012-0008-z
Larson, S. (2018).
Dostları ilə paylaş: |