-
1
-
-
9944264153
-
FTC Pulls Plug on Infomercial Giant
-
September 8
-
Ahrens, F. (2004, September 8). FTC Pulls Plug on Infomercial Giant. Washington Post, p. E1.
-
(2004)
Washington Post
-
-
Ahrens, F.1
-
3
-
-
0030201356
-
Interpersonal deception theory
-
Buller, D. B., & Burgoon, J. K. (1996). Interpersonal Deception Theory. Communication Theory, 6(3), 203-242.
-
(1996)
Communication Theory
, vol.6
, Issue.3
, pp. 203-242
-
-
Buller, D.B.1
Burgoon, J.K.2
-
4
-
-
84898146982
-
Social engineering's threat to public privacy
-
Paper Presented At the The 6th Security Conference, Las Vegas, Nevada
-
Cazier, J. A., & Botelho, C. M. (2007). Social Engineering's Threat to Public Privacy. Paper presented at the the 6th Security Conference, Las Vegas, Nevada.
-
(2007)
-
-
Cazier, J.A.1
Botelho, C.M.2
-
5
-
-
0001229241
-
Organizational information, media richness and structural design
-
Daft, R. L., & Lengel, R. H. (1986). Organizational information, media richness and structural design. Management Science, 32, 554-571.
-
(1986)
Management Science
, vol.32
, pp. 554-571
-
-
Daft, R.L.1
Lengel, R.H.2
-
6
-
-
3242808612
-
-
Gordan, L. A., Loeb, M. P., Lucyshyn, W., & Richardson, R. (2007). 2006 CSI/FBI Computer Crime and Security Survey: Computer Security Institute.
-
(2007)
2006 CSI/FBI Computer Crime and Security Survey: Computer Security Institute
-
-
Gordan, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
9
-
-
33747798304
-
Information battleground
-
Herbert, A. J. (2005, December). Information Battleground. Air Force Magazine, 88.
-
(2005)
Air Force Magazine
, pp. 88
-
-
Herbert, A.J.1
-
10
-
-
0000125532
-
Prospect theory: An analysis of decision under risk
-
Kahneman, D., & Tversky, A. (1979). Prospect Theory: An Analysis of Decision under Risk. Econometrica, 47(2), 263-292.
-
(1979)
Econometrica
, vol.47
, Issue.2
, pp. 263-292
-
-
Kahneman, D.1
Tversky, A.2
-
11
-
-
84898342130
-
Reporters' records accessed in hp probe
-
Retrieved May, 2007, from
-
Kersetter, J. (2006). Reporters' records accessed in HP probe. CNET News.com Retrieved May, 2007, from http://news.com.com/Reporters+records+accessed+in+HP+probe/2100-1014_3-6113362.html
-
(2006)
CNET News.com
-
-
Kersetter, J.1
-
13
-
-
84864173673
-
How to Protect Insiders From Social Engineering Threats
-
Microsoft, Retrieved May, 2007, from
-
Microsoft. (2006>). How to Protect Insiders from Social Engineering Threats. Retrieved May, 2007, from http://www.microsoft.com/technet/security/midsizebusiness/topics/complianceandpolicies/socialengineeringthreats.mspx
-
(2006)
-
-
-
15
-
-
2342548557
-
The art of deception: Controlling the human element of security
-
Indiana, Wiley
-
Mitnick, K. D., & Simon, W. L. (2002). The Art of Deception: Controlling the Human Element of Security. Indianapolis, Indiana: Wiley.
-
(2002)
Indianapolis
-
-
Mitnick, K.D.1
Simon, W.L.2
-
16
-
-
33750944680
-
-
Indianapolis, Indiana, Wiley
-
Mitnick, K. D., & Simon, W. L. (2005). The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers. Indianapolis, Indiana: Wiley.
-
(2005)
The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders, and Deceivers
-
-
Mitnick, K.D.1
Simon, W.L.2
-
17
-
-
84898105081
-
-
New e-mail virus preys on Anna Kournikova fans, Retrieved May, 2007, from
-
New e-mail virus preys on Anna Kournikova fans. (2001). CNN.com. Retrieved May, 2007, from http://archives.cnn.com/2001/TECH/inter-net/02/12/anna.worm/index.html
-
(2001)
CNN.com
-
-
-
20
-
-
84898230953
-
Hp chairman: Use of pretexting 'embarrassing'
-
Retrieved May, 2007, from
-
Shankland, S. (2006). HP chairman: Use of pretexting 'embarrassing'. CNET News.com Retrieved May, 2007, from http://news.com.com/HP+chairman+Use+of+pretexting+embarrassing/2100-1014_3-6113715.html
-
(2006)
CNET News.com
-
-
Shankland, S.1
-
21
-
-
84898218389
-
-
Retrieved April, 2007, from
-
Silltow, J. (2001). Social Engineering, Part 1. Retrieved April, 2007, from http://www.theiia.org/ITAudit/index.cfm?act=itaudit.archivefid=339
-
(2001)
Social Engineering, Part 1
-
-
Silltow, J.1
-
22
-
-
84973820746
-
-
Stiff, J. B., Kim, H., & Ramesh, C. N. (1992). Truth Biases and Aroused Suspicion in Relational Deception. 19(3), 326.
-
(1992)
Truth Biases and Aroused Suspicion in Relational Deception
, vol.19
, Issue.3
, pp. 326
-
-
Stiff, J.B.1
Kim, H.2
Ramesh, C.N.3
-
23
-
-
0016264378
-
Judgment under uncertainty: Heuristics and biases
-
Tversky, A., & Kahneman, D. (1974). Judgment under Uncertainty: Heuristics and Biases. Science, 185(4157), 1124.
-
(1974)
Science
, vol.185
, Issue.4157
, pp. 1124
-
-
Tversky, A.1
Kahneman, D.2
-
24
-
-
84896264894
-
Augmenting detection of social engineering attacks using deception detection technology
-
Paper Presented At the International Conference On I-Warfare and Security, Princess Anne, Maryland
-
Twitchell, D. P. (2006). Augmenting Detection of Social Engineering Attacks Using Deception Detection Technology. Paper presented at the International Conference on i-Warfare and Security, Princess Anne, Maryland.
-
(2006)
-
-
Twitchell, D.P.1
|