-
1
-
-
77956906456
-
An overview of social engineering malware: Trends, tactics, and implications
-
Abraham, S. and Chengalur-Smith, I. (2010), "An overview of social engineering malware: trends, tactics, and implications" in Technology in Society, Vol. 32, No. 3, pp. 183-96.
-
(2010)
Technology in Society
, vol.32
, Issue.3
, pp. 183-196
-
-
Abraham, S.1
Chengalur-Smith, I.2
-
2
-
-
84914123837
-
A research model for investigating human behavior related to computer security
-
Aytes, K. and Connolly, T. (2003), "A research model for investigating human behavior related to computer security" in AMCIS 2003 Proceedings, pp. 2027-31.
-
(2003)
AMCIS 2003 Proceedings
, pp. 2027-2031
-
-
Aytes, K.1
Connolly, T.2
-
3
-
-
84861556746
-
-
available at, (accessed 12 November), Ocean Blue
-
Blue Ocean (2011), Social Media Security Policy, available at: www.blueoceantechnologies.net/BlueOceanTechnologiesSocialMediaSecurityPolicy.pdf (accessed 12 November).
-
(2011)
Social Media Security Policy
-
-
-
4
-
-
84861566517
-
-
available at, CDC, (accessed 12 October 2011)
-
CDC (2009), Social Media Security Mitigations, available at: www.cdc.gov/socialmedia/tools/guidelines/pdf/securitymitigations.pdf (accessed 12 October 2011).
-
(2009)
Social Media Security Mitigations
-
-
-
5
-
-
84861550985
-
Security policy and social media use
-
available at, (accessed 9 November)
-
Chi, M. (2011), "Security policy and social media use", available at: www.sans.org/reading_room/whitepapers/policyissues/reducing-risks-social-media-organization_33749 (accessed 9 November).
-
(2011)
-
-
Chi, M.1
-
6
-
-
79952093275
-
Data leakage worldwide: The effectiveness of corporate security policies
-
available at, (accessed 16 November 2011), Systems Cisco
-
Cisco Systems (2008a), "Data leakage worldwide: the effectiveness of corporate security policies", available at: www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/Cisco_STL_Data_Leakage_2008_.pdf (accessed 16 November 2011).
-
(2008)
-
-
-
7
-
-
79952093275
-
Data leakage worldwide: The effectiveness of security policies
-
available at, (accessed 9 November 2011), Systems Cisco
-
Cisco Systems (2008b), "Data leakage worldwide: the effectiveness of security policies", available at: www.cisco.com/en/US/solutions/collateral/ns170/ns896/ns895/white_paper_c11-503131.pdf (accessed 9 November 2011).
-
(2008)
-
-
-
8
-
-
84861538500
-
-
available at, (accessed 26 November 2011), United States Air Force
-
Clavette, L., Faggard, D., Bove, P. and Fordham, J. (2009), New Media and the Air Force, United States Air Force, available at: www.af.mil/shared/media/document/AFD-090406-036.pdf (accessed 26 November 2011).
-
(2009)
New Media and the Air Force
-
-
Clavette, L.1
Faggard, D.2
Bove, P.3
Fordham, J.4
-
9
-
-
84861538502
-
Work life web 2011
-
available at, (accessed 12 November), Clearswift
-
Clearswift (2011), "Work life web 2011", available at: https://info.clearswift.com/express/clients/clearhq/papers/Clearswift_report_WorkLifeWeb_2011.pdf (accessed 12 November).
-
(2011)
-
-
-
10
-
-
84861538501
-
The weakest link is the human link
-
available at, (accessed 16 November)
-
Curry, S. (2011), "The weakest link is the human link", available at: www.securityweek.com/weakest-link-human-link (accessed 16 November).
-
(2011)
-
-
Curry, S.1
-
11
-
-
77956187913
-
It won't happen to me: Promoting secure behaviour among internet users
-
Davinson, N. and Sillence, E. (2010), "It won't happen to me: promoting secure behaviour among internet users" in Computers in Human Behavior, Vol. 26, No. 6, pp. 1739-47.
-
(2010)
Computers in Human Behavior
, vol.26
, Issue.6
, pp. 1739-1747
-
-
Davinson, N.1
Sillence, E.2
-
13
-
-
84861544269
-
Seven social media security best practices
-
available at, (accessed 16 November)
-
Ghosh, S. (2011), "Seven social media security best practices", available at: http://searchsecurity.techtarget.in/tip/Seven-social-media-security-best-practices (accessed 16 November).
-
(2011)
-
-
Ghosh, S.1
-
15
-
-
84861424896
-
Human information security behaviors: Differences across geographies and cultures in a global user survey
-
available at, (accessed 16 November 2011), Vancouver, BC
-
Hayden, L. (2009), "Human information security behaviors: differences across geographies and cultures in a global user survey", Proceedings of the American Society for Information Science and Technology Annual Meeting, Vancouver, BC, available at: www.asis.org/Conferences/AM09/open-proceedings/papers/2.xml (accessed 16 November 2011).
-
(2009)
Proceedings of the American Society for Information Science and Technology Annual Meeting
-
-
Hayden, L.1
-
16
-
-
70849122971
-
Towards automating social engineering using social networking sites
-
Huber, M., Kowalskiy, S., Nohlbergz, M. and Tjoa, S. (2009), "Towards automating social engineering using social networking sites", Proceedings of International Conference on Computational Science and Engineering.
-
(2009)
Proceedings of International Conference on Computational Science and Engineering
-
-
Huber, M.1
Kowalskiy, S.2
Nohlbergz, M.3
Tjoa, S.4
-
17
-
-
84909971501
-
-
available at, (accessed 16 November 2011), Intel
-
Intel (2009), Prioritizing Information Security Risks with Threat Agent Risk, available at: ftp://download.intel.com/it/pdf/Prioritizing_Info_Security_Risks_with_TARA.pdf (accessed 16 November 2011).
-
(2009)
Prioritizing Information Security Risks with Threat Agent Risk
-
-
-
18
-
-
84861556559
-
Top five social media risks for business: New ISACA white paper
-
available at, (accessed 16 November 2011), ISACA
-
ISACA (2010), "Top five social media risks for business: new ISACA white paper", available at: www.isaca.org/About-ISACA/Press-room/News-Releases/2010/Pages/Top-Five-Social-Media-Risks-for-Business-New-ISACA-White-Paper.aspx (accessed 16 November 2011).
-
(2010)
-
-
-
20
-
-
34848911641
-
Social phishing
-
Jagatic, T., Johnson, N., Jakobsson, M. and Menczer, F. (2006), "Social phishing", Communications of the ACM, Vol. 50, No. 10.
-
(2006)
Communications of the ACM
, vol.50
, Issue.10
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Menczer, F.4
-
21
-
-
84889292983
-
-
Wiley, Hoboken, NJ
-
Jakobsson, M. and Myers, S. (2006), Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft, Wiley, Hoboken, NJ.
-
(2006)
Phishing and Countermeasures: Understanding the Increasing Problem of Electronic Identity Theft
-
-
Jakobsson, M.1
Myers, S.2
-
22
-
-
71149088987
-
Users of the world, unite! The challenges and opportunities of social media
-
Kaplan, M. and Haenlein, M. (2010), "Users of the world, unite! The challenges and opportunities of social media" in Business Horizons, Vol. 53, No. 1, pp. 59-68.
-
(2010)
Business Horizons
, vol.53
, Issue.1
, pp. 59-68
-
-
Kaplan, M.1
Haenlein, M.2
-
23
-
-
84861551431
-
-
available at, (accessed 16 November 2011), Labs Kaspersky
-
Kaspersky Labs (2009), Kaspersky Security Bulletin: Malware Evolution 2008, available at: www.securelist.com/en/analysis?pubid=204792051 (accessed 16 November 2011).
-
(2009)
Kaspersky Security Bulletin: Malware Evolution 2008
-
-
-
24
-
-
84861551458
-
-
available at, (accessed 16 November 2011), McAfee
-
McAfee (2010), 2011 Threats Predictions, available at: http://161.69.13.40/us/resources/reports/rp-threat-predictions-2011.pdf (accessed 16 November 2011).
-
(2010)
2011 Threats Predictions
-
-
-
25
-
-
84861534411
-
-
available at, (accessed 23 November), InfoSecurity M.W.R
-
MWR InfoSecurity (2011), Is Social Media One of Your Vulnerabilities?, available at: www.mwrinfosecurity.com/files/Events/mwri_social-media-security_2011-01-28.pdf (accessed 23 November).
-
(2011)
Is Social Media One of Your Vulnerabilities?
-
-
-
26
-
-
84861538043
-
Social engineering: Concepts and solutions
-
Peltier, T.R. (2006), "Social engineering: concepts and solutions" in Information Systems Security, Vol. 15, No. 5, pp. 13-21.
-
(2006)
Information Systems Security
, vol.15
, Issue.5
, pp. 13-21
-
-
Peltier, T.R.1
-
27
-
-
84861544270
-
Top 8 web 2.0 security threats
-
available at, (accessed 25 November 2011)
-
Perez, S. (2009), "Top 8 web 2.0 security threats", available at: www.readwriteweb.com/enterprise/2009/02/top-8-web-20-security-threats.php (accessed 25 November 2011).
-
(2009)
-
-
Perez, S.1
-
30
-
-
75149166819
-
-
Wiley, Hoboken, NJ
-
Safko, L. and Brake, D. (2009), The Social Media Bible: Tactics, Tools, and Strategies for Business Success, Wiley, Hoboken, NJ.
-
(2009)
The Social Media Bible: Tactics, Tools, and Strategies for Business Success
-
-
Safko, L.1
Brake, D.2
-
31
-
-
84861547513
-
-
available at, (accessed 23 November), Institute S.A.N.S
-
SANS Institute (2011), Password Policy, available at: www.sans.org/security-resources/policies/Password_Policy.pdf (accessed 23 November).
-
(2011)
Password Policy
-
-
-
32
-
-
84861560461
-
The US air force: Armed with social media
-
available at, (accessed 23 November 2011)
-
Scott, D.M. (2008), "The US air force: armed with social media", available at: www.webinknow.com/2008/12/the-us-air-force-armed-with-social-media.html (accessed 23 November 2011).
-
(2008)
-
-
Scott, D.M.1
-
33
-
-
84861543392
-
How to implement and enforce a social networking security policy
-
available at, (accessed 23 November 2011)
-
Sherry, D. (2008), "How to implement and enforce a social networking security policy", available at: http://searchsecurity.techtarget.com/tip/How-to-implement-and-enforce-a-social-networking-security-policy (accessed 23 November 2011).
-
(2008)
-
-
Sherry, D.1
-
34
-
-
80054707541
-
Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies
-
Son, J.Y. (2011), "Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies" in Information & Management, Vol. 48, No. 7, pp. 296-302.
-
(2011)
Information & Management
, vol.48
, Issue.7
, pp. 296-302
-
-
Son, J.Y.1
-
35
-
-
84861569163
-
Example social media security policy
-
available at, (accessed 23 November), Sophos
-
Sophos (2011), "Example social media security policy", available at: www.sophos.com/sophos/docs/eng/smst/sophos-example-social-media-security-policy.pdf (accessed 23 November).
-
(2011)
-
-
-
36
-
-
17844366573
-
Analysis of end user security behaviors
-
Stanton, J.M., Stam, K.R., Mastrangelo, P. and Jolton, J. (2005), "Analysis of end user security behaviors" in Computers and Security, Vol. 24, No. 2, pp. 124-33.
-
(2005)
Computers and Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.M.1
Stam, K.R.2
Mastrangelo, P.3
Jolton, J.4
-
37
-
-
84861544272
-
Social media protection flash poll global results
-
available at, (accessed 23 November), Symantec
-
Symantec (2011a), "Social media protection flash poll global results", available at: www.slideshare.net/symantec/symantec-2011-social-media-protection-flash-poll-global-results (accessed 23 November).
-
(2011)
-
-
-
38
-
-
84861552269
-
Symantec enterprise vault 10 reduces the risks of using social media tools for business
-
available at, (accessed 23 November), Symantec
-
Symantec (2011b), "Symantec enterprise vault 10 reduces the risks of using social media tools for business", available at: www.symantec.com/about/news/release/article.jsp?prid=20110801_02 (accessed 23 November).
-
(2011)
-
-
-
39
-
-
84861453131
-
Towards information security behavioral compliance
-
Vroom, C. and von Solms, R. (2004), "Towards information security behavioral compliance" in Information Management & Computer Security, Vol. 6, No. 4, pp. 167-73.
-
(2004)
Information Management & Computer Security
, vol.6
, Issue.4
, pp. 167-173
-
-
Vroom, C.1
von Solms, R.2
-
40
-
-
84861569164
-
Monitoring social media for security references to your organization
-
available at, (accessed 23 November)
-
Zeltser, L. (2011), "Monitoring social media for security references to your organization", available at: http://isc.sans.edu/diary.html?storyid=10921 (accessed 23 November).
-
(2011)
-
-
Zeltser, L.1
-
41
-
-
84861540398
-
Social media: A hacker's secret weapon for accessing your network
-
available at, (accessed 23 November)
-
Zhang, H. (2011), "Social media: a hacker's secret weapon for accessing your network", available at: http://esj.com/Articles/2011/10/31/Social-Media-Hackers-Secret-Weapon.aspx?Page=1 (accessed 23 November).
-
(2011)
-
-
Zhang, H.1
|