-
1
-
-
33846786596
-
"Spear phishing" tests educate people about online scams
-
Retrieved March 2, 2006, from
-
Bank, D. (2005). "Spear phishing" tests educate people about online scams. The Wall Street Journal. Retrieved March 2, 2006, from http://online.wsj.com/public/article/SB112424042313615131-z_8jLB2WkfcVtgdAWf6LRh733sg_20060817.html?mod=blogs
-
(2005)
The Wall Street Journal
-
-
Bank, D.1
-
2
-
-
33748524092
-
The man who shocked the world
-
Retrieved March 9, 2006, from
-
Blass, T. (2002). The man who shocked the world. Psycology Today. Retrieved March 9, 2006, from http://www.psychologytoday.com/articles/pto-20020301-000037.html
-
(2002)
Psycology Today
-
-
Blass, T.1
-
4
-
-
0035387175
-
Transforming the "weakest link": A human-computer interaction approach to usable and effective security
-
Brostoff, S., Sasse, A., & Weirich, D. (2002). Transforming the "weakest link": A human-computer interaction approach to usable and effective security. BT Technology Journal, 19(3), 122-131.
-
(2002)
BT Technology Journal
, vol.19
, Issue.3
, pp. 122-131
-
-
Brostoff, S.1
Sasse, A.2
Weirich, D.3
-
6
-
-
33845523685
-
Using phishing for user e-mail security awareness
-
In S. Fischer-Hübner, K. Rannenberg, L. Yngström, & S. Lindskog (Eds.), New York: Springer Science + Business Media Inc
-
Dodge, R., & Ferguson, A. (2006). Using phishing for user e-mail security awareness. In S. Fischer-Hübner, K. Rannenberg, L. Yngström, & S. Lindskog (Eds.), Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006) (pp. 454-458). New York: Springer Science + Business Media Inc.
-
(2006)
Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006)
, pp. 454-458
-
-
Dodge, R.1
Ferguson, A.2
-
7
-
-
84901522659
-
-
Retrieved March 11, 2006, from
-
Feer, F. (2004). Thinking about deception. Retrieved March 11, 2006, from http://www.d-n-i.net/fcs/feer_thinking_about_deception.htm
-
(2004)
Thinking About Deception
-
-
Feer, F.1
-
8
-
-
34748849150
-
A multi-level defense against social engineering
-
Retrieved September 17, 2003, from
-
Gragg, D. (2002). A multi-level defense against social engineering. SANS Institute. Retrieved September 17, 2003, from http://www.sans.org/rr/papers/index.php?id=920
-
(2002)
SANS Institute
-
-
Gragg, D.1
-
9
-
-
33745723910
-
Social engineering fundamentals
-
Retrieved September 18, 2003, from
-
Granger, S. (2001). Social engineering fundamentals. Security Focus. Retrieved September 18, 2003, from: http://www.securityfocus.com/printable/infocus/1527
-
(2001)
Security Focus
-
-
Granger, S.1
-
10
-
-
77957015364
-
-
Retrieved March 12, 2006, from
-
Harl (1997). The psychology of social engineering. Retrieved March 12, 2006, from http://searchlores.org/aaatalk.htm
-
(1997)
The Psychology of Social Engineering
-
-
Harl1
-
12
-
-
35048876774
-
Self-efficacy, training effectiveness, and deception detection: A longitudinal study of lie detection training
-
Marett, K., Biros, D., & Knode, M. (2004). Self-efficacy, training effectiveness, and deception detection: A longitudinal study of lie detection training. Lecture Notes in Computer Science, 3073, 187-200.
-
(2004)
Lecture Notes In Computer Science
, vol.3073
, pp. 187-200
-
-
Marett, K.1
Biros, D.2
Knode, M.3
-
13
-
-
79952959590
-
Telling lies for a better world?
-
Martin, B. (2004). Telling lies for a better world? Social Anarchism, 35, 27-39.
-
(2004)
Social Anarchism
, vol.35
, pp. 27-39
-
-
Martin, B.1
-
14
-
-
9544229100
-
-
Indianapolis, Indiana: Wiley Publishing, Inc
-
Mitnick, K. (2002). The art of deception. Indianapolis, Indiana: Wiley Publishing, Inc.
-
(2002)
The Art of Deception
-
-
Mitnick, K.1
|