User talk:HanMiKC/Pretexting/Bibliography

F. L. Greitzer, J. R. Strozer, S. Cohen, A. P. Moore, D. Mundie and J. Cowley, "Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits," 2014 IEEE Security and Privacy Workshops, San Jose, CA, 2014, pp. 236-250, doi: 10.1109/SPW.2014.39.

Workman, M. 2008. “Wisecrackers: A Theory-Grounded Investigation of Phishing and Pretext Social Engineering Threats to Information Security.” Journal of the American Society of Information Science and Technology. 59 (4):662-674.

Ghafir, I., Saleem, J., Hammoudeh, M., Faour, H., Prenosil, V., Jaf, S.,. . . Baker, T. 2018. Security threats to critical infrastructure: The human factor. Journal of Supercomputing, 74(10): 4986-5002.

Oliveira, D. S., Lin, T., Rocha, H., Ellis, D., Dommaraju, S., Yang, H.,. . . Ebner, N. C. 2019. Empirical analysis of weapons of influence, life domains, and demographic-targeting in modern spam: An age-comparative perspective. Crime Science, 8(1):1-14.

Airehrour, David, Nisha Vasudevan Nair and Samaneh Madanian. 2018. “Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model”. Security in the Internet of Things. 9(5):1-18.

Greitzer, Frank L.; Strozer, Jeremy R.; Cohen, Sholom; Moore, Andrew P.; Mundie, David; Cowley, Jennifer (2014-05). "Analysis of Unintentional Insider Threats Deriving from Social Engineering Exploits". 2014 IEEE Security and Privacy Workshops. San Jose, CA: IEEE: 236–250. doi:10.1109/SPW.2014.39. ISBN 978-1-4799-5103-1. Check date values in: |date= (help)

Workman, Michael (2008-02-15). "Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security". Journal of the American Society for Information Science and Technology. 59 (4): 662–674. doi:10.1002/asi.20779.

Ghafir, Ibrahim; Saleem, Jibran; Hammoudeh, Mohammad; Faour, Hanan; Prenosil, Vaclav; Jaf, Sardar; Jabbar, Sohail; Baker, Thar (2018-10). "Security threats to critical infrastructure: the human factor". The Journal of Supercomputing. 74 (10): 4986–5002. doi:10.1007/s11227-018-2337-2. ISSN 0920-8542. Check date values in: |date= (help)

Oliveira, Daniela Seabra; Lin, Tian; Rocha, Harold; Ellis, Donovan; Dommaraju, Sandeep; Yang, Huizi; Weir, Devon; Marin, Sebastian; Ebner, Natalie C. (2019-12). "Empirical analysis of weapons of influence, life domains, and demographic-targeting in modern spam: an age-comparative perspective". Crime Science. 8 (1): 3. doi:10.1186/s40163-019-0098-8. ISSN 2193-7680. PMC 6588014. PMID 31231604. Check date values in: |date= (help)

Airehrour, David; Nair, Nisha Vasudevan; Madanian, Samaneh (2018-05-03). "Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model". Information. 9 (5): 110. doi:10.3390/info9050110. ISSN 2078-2489.