Facebook's new security settings speak a simple language
.
CNNMoney
.
Retrieved 21 February 2018, from
http://money.cnn.com/2017/05/31/technology/facebook-new-security-settings-
page/index.html
Lior, J. S. (2005). A social networks theory of privacy. The University of Chicago Law
Review, 72(3), 919-988. Retrieved 23 February 2018, from
https://search.proquest.com/docview/214807827
Liptak, A. (2018). The WannaCry ransomware attack has spread to 150 countries. The Verge.
Retrieved 14 February 2018, from
https://www.theverge.com/2017/5/14/15637888/authorities-wannacry-ransomware-
attack-spread-150-countries
Liu, Y., Gummadi, K. P., Krishnamurthy, B., & Mislove, A. (2011, November). Analyzing
facebook privacy settings: user expectations vs. reality. In Proceedings of the 2011
ACM SIGCOMM conference on Internet measurement conference (pp. 61-70). ACM.
Locklear, M. (2018).
Facebook clarifies its security settings to curb confusion
.
Engadget
.
Retrieved 21 February 2018, from https://www.engadget.com/2017/05/31/facebook-
clarifies-security-settings/
Loeffler, C. (2012). Privacy issues in social media. The IP Litigator : Devoted to Intellectual
Property Litigation and Enforcement, 18(5), 12-18. Retrieved 1 February 2018, from
http://search.proquest.com/docview/1082016549.
Luo, X., Brody, R., Seazzu, A., & Burd, S. (2011). Social engineering: The neglected human
factor for information security management. Information Resources Management
134
Journal, 24(3), 1. Retrieved 5 January 2018, from
https://search.proquest.com/docview/892604242.
Madden, M. (2016). Public Perceptions of Privacy and Security in the Post-Snowden Era.
Pew Research Center: Internet, Science & Tech. Retrieved 3 November 2016, from
http://www.pewinternet.org/2014/11/12/public-privacy-perceptions/
Madden, M., Lenhart, A., Cortesi, S., Gasser, U., Duggan, M., Smith, A., & Beaton, M.
(2013). Teens, social media, and privacy. Pew Research Center, 21, 2-86.
Magno, G., Comarela, G., Saez-Trumper, D., Cha, M., & Almeida, V. (2012, November).
New kid on the block: Exploring the google+ social graph. In Proceedings of the 2012
ACM conference on Internet measurement conference (pp. 159-170). ACM.
Malik, A., Hiekkanen, K., Dhir, A., & Nieminen, M. (2016). Impact of privacy, trust and user
activity on intentions to share facebook photos. Journal of Information,
Communication & Ethics in Society, 14(4), 364-382. Retrieved 13 December 2017,
from https://search.proquest.com/docview/1844292056.
Martin, K. (2016). Understanding privacy online: Development of a social contract approach
to privacy.
Journal of Business Ethics, 137
(3), 551-569.
http://dx.doi.org/10.1007/s10551-015-2565-9
Milne, G. R., & Culnan, M. J. (2004). Strategies for reducing online privacy risks: Why
consumers read (or don't read) online privacy notices. Journal of Interactive
Marketing, 18(3), 15-29.
Mital, M., & Sarkar, S. (2011). Multihoming behavior of users in social networking web
sites: A theoretical model. Information Technology & People, 24(4), 378-392.
http://dx.doi.org/10.1108/09593841111182250
135
Mouton, Francois & Leenen, Louise & Venter, H.s. (2016). Social engineering attack
examples, templates and scenarios. Computers & Security. 59. 186 - 209.
10.1016/j.cose.2016.03.004.
Mouton, F., Malan, M. M., Kimppa, K. K., & Venter, H. S. (2015). Necessity for ethics in
social engineering research. Computers & Security, 55, 114. Retrieved 25 February
2018, from https://search.proquest.com/docview/1733195513.
Musthaler, L. (2006). How social engineering sinks security. Network World, 23(39), 45.
Retrieved from https://search.proquest.com/docview/215993673.
Nemati, H., Wall, J. D., & Chow, A. (2014). Privacy coping and information-sharing
behaviors in social media: A comparison of chinese and U.S. users. Journal of Global
Information Technology Management, 17(4), 228-249. Retrieved 28 February 2018,
from http://search.proquest.com/docview/1674426345
Oder, U. T. (2008). Two-factor authentication. Hoboken, NJ: John Wiley and Sons.
Papic, M., & Noonan, S. (2011). Social media as a tool for protest. Retrieved 15 February
2018, from https://www.stratfor.com/weekly/20110202-social-media-tool-protest
Parker, D. (2002, Dec 16). A fraudster's tricks of the trade: BOOK REVIEW THE ART OF
DECEPTION: An ex-con reveals how clever manipulation can make employees the
weakest link in a company's security, writes D: Financial Times Retrieved 3 March
2018, from https://search.proquest.com/docview/249487841.
Peltier, T. R. (2006). Social engineering: Concepts and solutions. Information Systems
Security, 15(5), 13-21.
Perri, F. S., & Brody, R. G. (2012). The optics of fraud: Affiliations that enhance offender
credibility. Journal of Financial Crime, 19(4), 355-370.
http://dx.doi.org/10.1108/13590791211266359
136
Roberts, J. J. (2015). Who owns your face? Weak laws give power to Facebook. Retrieved 15
September 2016, from http://fortune.com/2015/06/17/facebook-moments-privacy-
facial-recognition/
Robertson, S. (2018). Digital ‘totalitarian marketing’ threatens privacy and security, former
advertising executive says. The Globe and Mail. Retrieved 24 February 2018, from
https://www.theglobeandmail.com/report-on-business/industry-
news/marketing/digital-totalitarian-marketing-threatens-privacy-and-
security/article37009003/
Russell, R., & Stutz, M. (2014). SOCIAL MEDIA: WHAT EMPLOYERS NEED TO
KNOW. Journal of Internet Law, 17(8), 3-6. Retrieved 25 February 2018, from
https://search.proquest.com/docview/1501615784.
Sableman, M. (2017). Social media privacy: It's a reasonable expectations game.
Dostları ilə paylaş: |