Cybersecurity Challenges in Social Media Erdal Ozkaya



Yüklə 1,17 Mb.
Pdf görüntüsü
səhifə69/73
tarix10.12.2023
ölçüsü1,17 Mb.
#139643
1   ...   65   66   67   68   69   70   71   72   73
13755 Zeebaree 2020 E R (1)

 Copyright 
& New Media Law Newsletter, 20
(4), 5-7. Retrieved 27 February 2018, from 
https://search.proquest.com/docview/1852966940.
Savage, M. (2003). Former hacker mitnick details the threat of 'social engineering'. Crn, 
(1043), 58. Retrieved 8 March 2018, from 
https://search.proquest.com/docview/227563346.
Sayers, G. G. (2005). Take steps to reduce risks of data theft. Business Insurance, 39(28), 9. 
Retrieved 6 February 2018, from https://search.proquest.com/docview/233518484.
Schaab, P., Beckers, K., & Pape, S. (2017). Social engineering defence mechanisms and 
counteracting training strategies. Information and Computer Security, 25(2), 206-222. 
Retrieved 9 January 2018, from https://search.proquest.com/docview/1908738518. 


137 
Schwartz, M. J. (2012). Facebook social engineering attack strikes NATO. Informationweek - 
Online, Retrieved 15 February 2018, from 
https://search.proquest.com/docview/927676612.
Seda, L. (2014). Identity theft and university students: Do they know, do they care? Journal 
of Financial Crime, 21(4), 461-483. Retrieved 14 February 2018, from 
https://search.proquest.com/docview/1660751510.
Shane, S., Perlroth, N., & Sanger, D. (2018). Security Breach and Spilled Secrets Have 
Shaken the N.S.A. to Its Core. Nytimes.com. Retrieved 14 February 2018, from 
https://www.nytimes.com/2017/11/12/us/nsa-shadow-brokers.html 
Sisk, M. (2008). Social engineering: Plugging the holes in human firewalls ; the intense 
school's one-week e-course helps banks make sure staffers are following security 
procedures. Bank Technology News, 17(6), 46. Retrieved 13 January 2018, from 
https://search.proquest.com/docview/208140513.
Snyder, C. (2015). Handling human hacking: creating a comprehensive defensive strategy 
against modern social engineering. 
Storm, D. (2018). 17 exploits the NSA uses to hack PCs, routers and servers for surveillance. 
Computerworld. Retrieved 14 February 2018, from 
https://www.computerworld.com/article/2474275/cybercrime-hacking/17-exploits-
the-nsa-uses-to-hack-pcs--routers-and-servers-for-surveillance.html 
Talmadge, E. (2018). North Korea announces blocks on Facebook, Twitter and YouTube. the 
Guardian. Retrieved 21 February 2018, from 
https://www.theguardian.com/world/2016/apr/01/north-korea-announces-blocks-on-
facebook-twitter-and-youtube 


138 
Tannam, E. (2018). 
EU warns Facebook, Google and Twitter that they must respect 
consumer rules

Silicon Republic
. Retrieved 21 February 2018, from 
https://www.siliconrepublic.com/companies/facebook-google-twitter-consumer-eu
Tarnoff, B. (2018). How the internet was invented. the Guardian. Retrieved 8 March 2018, 
from https://www.theguardian.com/technology/2016/jul/15/how-the-internet-was-
invented-1976-arpa-kahn-cerf 
Thompson, S. T. C. (2006). Helping the hacker? library information, security, and social 
engineering. Information Technology and Libraries, 25(4), 222-225. Retrieved 5 
February 2018, from https://search.proquest.com/docview/215828364.
W32.Koobface | Symantec. (2018). Symantec.com. Retrieved 15 February 2018, from 
https://www.symantec.com/security_response/writeup.jsp%3Fdocid%3D2008-
080315-0217-99 
Workman, M. (2008). A test of interventions for security threats from social engineering. 
Information Management & Computer Security, 16(5), 463-483. 
http://dx.doi.org/10.1108/09685220810920549
Young, R., Zhang, L., & Prybutok, V. R. (2007). Hacking into the minds of hackers. 
Information Systems Management, 24(4), 281-287. Retrieved 15 February 2018, from 
https://search.proquest.com/docview/214129274.


139 

Yüklə 1,17 Mb.

Dostları ilə paylaş:
1   ...   65   66   67   68   69   70   71   72   73




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©muhaz.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin