-
1
-
-
84870159064
-
Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace
-
Keystone, Colorado, USA
-
C. Dwyer, S. Hiltz, and K. Passerini, "Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace, " in Americas Conference on Information Systems (AMCIS), Keystone, Colorado, USA, 2007.
-
(2007)
Americas Conference on Information Systems (AMCIS)
-
-
Dwyer, C.1
Hiltz, S.2
Passerini, K.3
-
2
-
-
34848911641
-
Social phishing
-
T. Jagatic, N. Johnson, M. Jakobsson, and F. Menczer, "Social phishing, " Communications of the ACM, vol. 50, no. 10, pp. 94-100, 2007.
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Menczer, F.4
-
4
-
-
34250001672
-
What anyone can know: The privacy risks of social networking sites
-
May-June
-
D. Rosenblum, "What Anyone Can Know: The Privacy Risks of Social Networking Sites, " Security & Privacy, IEEE, vol. 5, no. 3, pp. 40-49, May-June 2007.
-
(2007)
Security & Privacy, IEEE
, vol.5
, Issue.3
, pp. 40-49
-
-
Rosenblum, D.1
-
5
-
-
41149139861
-
Who's really in your top 8: Network security in the age of social networking
-
New York, NY, USA: ACM
-
R. Gibson, "Who's really in your top 8: network security in the age of social networking, " in SIGUCCS '07: Proceedings of the 35th annual ACM SIGUCCS conference on User services. New York, NY, USA: ACM, 2007, pp. 131-134.
-
(2007)
SIGUCCS '07: Proceedings of the 35th Annual ACM SIGUCCS Conference on User Services
, pp. 131-134
-
-
Gibson, R.1
-
7
-
-
70849090734
-
-
Master's thesis, DSV SecLab, Stockholm University/Royal Institute of Technology, Mar. [Online]. Available
-
M. Huber, "Automated social engineering, proof of concept, " Master's thesis, DSV SecLab, Stockholm University/Royal Institute of Technology, Mar. 2009. [Online]. Available: http://asebot.nysos.net.
-
(2009)
Automated Social Engineering, Proof of Concept
-
-
Huber, M.1
-
8
-
-
12344297038
-
-
Ph.D. dissertation, University of Stockholm and Royal Institute of Technology, Stockholm, Sweden
-
S. Kowalski, "It insecurity: A multi-disciplinary inquiry, " Ph.D. dissertation, University of Stockholm and Royal Institute of Technology, Stockholm, Sweden, 1994.
-
(1994)
It Insecurity: A Multi-disciplinary Inquiry
-
-
Kowalski, S.1
-
12
-
-
3843130753
-
Where did they go wrong? An analysis of the failure of knowledgeable internet consumers to detect deception over the internet
-
S. Grazioli, "Where Did They Go Wrong? An Analysis of the Failure of Knowledgeable Internet Consumers to Detect Deception Over the Internet, " Group Decision and Negotiation, vol. 13, no. 2, pp. 149-172, 2004.
-
(2004)
Group Decision and Negotiation
, vol.13
, Issue.2
, pp. 149-172
-
-
Grazioli, S.1
-
13
-
-
34748869064
-
An investigation of heuristics of human judgment in detecting deception and potential implications in countering social engineering
-
T. Qin and J. Burgoon, "An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering, " Intelligence and Security Informatics, 2007 IEEE, pp. 152-159, 2007.
-
(2007)
Intelligence and Security Informatics, 2007 IEEE
, pp. 152-159
-
-
Qin, T.1
Burgoon, J.2
-
14
-
-
35048876774
-
Self-efficacy, training effectiveness, and deception detection: A longitudinal study of lie detection training
-
K. Marett, D. Biros, and M. Knode, "Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training, " lecture notes in computer science, vol. 3073, pp. 187-200, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3073
, pp. 187-200
-
-
Marett, K.1
Biros, D.2
Knode, M.3
-
16
-
-
70849099167
-
-
Gartner Inc. Feb., [Retrieved 2008-10-29]. [Online]. Available
-
Gartner Inc., "There Are No Secrets: Social Engineering and Privacy, " Garnter Security webletter, vol. 1, no. 1, Feb. 2002, [Retrieved 2008-10-29]. [Online]. Available: http://www.gartner.com/gc/webletter/security/ issue1/.
-
(2002)
There Are No Secrets: Social Engineering and Privacy
, vol.1
, Issue.1
-
-
-
18
-
-
63749110328
-
-
[Retrieved 2008-06-14]. [Online]. Available
-
Comscore, "Social Networking Goes Global, " 2008, [Retrieved 2008-06-14]. [Online]. Available: http://www.comscore.com/press/release.asp? press=1555.
-
(2008)
Social Networking Goes Global
-
-
-
19
-
-
84879064732
-
-
[Retrieved 2008-12-28]. [Online]. Available
-
Facebook, "Welcome to Facebook, everyone, " 2006, [Retrieved 2008-12-28]. [Online]. Available: http://blog.facebook.com/blog.php?post= 2210227130.
-
(2006)
Welcome to Facebook, Everyone
-
-
-
20
-
-
70349955004
-
Online persuasion in facebook and mixi: A cross-cultural comparison
-
B. J. Fogg and D. Iizawa, "Online Persuasion in Facebook and Mixi: A Cross-Cultural Comparison, " in PERSUASIVE, 2008, pp. 35-46.
-
(2008)
PERSUASIVE
, pp. 35-46
-
-
Fogg, B.J.1
Iizawa, D.2
-
21
-
-
35248831179
-
CAPTCHA: Using hard AI problems for security
-
L. Von Ahn, M. Blum, N. Hopper, and J. Langford, "CAPTCHA: Using hard AI problems for security, " Lecture notes in computer science, pp. 294-311, 2003.
-
(2003)
Lecture Notes in Computer Science
, pp. 294-311
-
-
Ahn, L.V.1
Blum, M.2
Hopper, N.3
Langford, J.4
-
22
-
-
70849091312
-
-
[Retrieved 2009-02-13]. [Online]. Available
-
T. Muller, "13 reasons your facebook account will be disabled, " 2008, [Retrieved 2009-02-13]. [Online]. Available: http:// getsatisfaction.com/facebook/topics/13-reasons-your-facebook-account-will-be- disabled.
-
(2008)
13 Reasons Your Facebook Account Will Be Disabled
-
-
Muller, T.1
-
23
-
-
70849083777
-
Eight friends are enough
-
Social Graph Approximation via Public Listings
-
J. Bonneau, J. Anderson, R. Anderson, and F. Stajano, "Eight Friends Are Enough: Social Graph Approximation via Public Listings, " SNS 09 Nuremberg, Germany, vol. 2009.
-
SNS 09 Nuremberg, Germany
, vol.2009
-
-
Bonneau, J.1
Anderson, J.2
Anderson, R.3
Stajano, F.4
-
24
-
-
34147139319
-
Designing and conducting phishing experiments
-
P. Finn and M. Jakobsson, "Designing and Conducting Phishing Experiments, " IEEE Technology and Society Magazine, Special Issue on Usability and Security, vol. 26, no. 1, pp. 46-58, 2007.
-
(2007)
IEEE Technology and Society Magazine, Special Issue on Usability and Security
, vol.26
, Issue.1
, pp. 46-58
-
-
Finn, P.1
Jakobsson, M.2
-
25
-
-
0002988210
-
Computing machinery and intelligence
-
A. Turing, "Computing machinery and intelligence, " Mind, vol. 59, no. 236, pp. 433-460, 1950.
-
(1950)
Mind
, vol.59
, Issue.236
, pp. 433-460
-
-
Turing, A.1
-
26
-
-
70849122806
-
-
[Retrieved 2009-02-07]. [Online]. Available
-
R. S. Wallace, "The Annotated A.L.I.C.E. AIML, " 2009, [Retrieved 2009-02-07]. [Online]. Available: http://www.alicebot.org/aiml/aaa/.
-
(2009)
The Annotated A.L.I.C.E. AIML
-
-
Wallace, R.S.1
|