Open Journal of Social Sciences

Open Journal of Social Sciences

ISSN Print: 2327-5952
ISSN Online: 2327-5960
www.scirp.org/journal/jss
E-mail: jss@scirp.org
"A Study of Social Engineering in Online Frauds"
written by Brandon Atkins, Wilson Huang,
published by Open Journal of Social Sciences, Vol.1 No.3, 2013
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Simulated phishing attack and embedded training campaign
Journal of Computer …, 2022
[2] The effect of signal icon and persuasion strategy on warning design in online fraud
Computers & …, 2022
[3] A Quantitative Field Study of a Persuasive Security Technology in the Wild
International Conference on …, 2022
[4] How Frauds in Times of Crisis Target People
Victims & Offenders, 2022
[5] A study on the discourse strategy of telecommunication fraud based on proximization theory
Discourse & Communication, 2022
[6] Motivation for deception.
2022
[7] Exposing the Phish: The Effect of Persuasion Techniques in Phishing E-Mails
DG. O 2022: The 23rd Annual International Conference …, 2022
[8] In the Light and in the Shadows: Human-Centered Analysis in Cybercrime
2022
[9] Sentiment Analysis on the Effect of Online Fraud on E-Commerce Users' Perspective
2022
[10] Individual's motivation in responding to phishing emails: a Saudi Arabian Case Study
2022
[11] The psychology of the internet fraud victimization of older adults: A systematic review
Frontiers in psychology, 2022
[12] Social engineering on different types of online frauds
Asian Journal of Multidimensional Research, 2021
[13] Impact Of Habit On Online Fraud Mitigation
Jurnal Riset Akuntansi & …, 2021
[14] Phishing Attack Detection Using Deep Learning
International Journal of Computer Science & …, 2021
[15] Factors affecting awareness of phishing among generation Y
Asia-Pacific Management …, 2021
[16] Machine Learning for Multiple Stage Phishing URL Prediction
… International Conference on …, 2021
[17] Intelligent Phishing Url Detection: A Solution Based On Deep Learning Framework
2021 18th International …, 2021
[18] Development of a Social Engineering eXposure Index (SEXI) Using Open-Source Personal Information
2021
[19] Executing Effective Social Engineering Penetration Tests: A Qualitative Analysis
Journal of Applied Security Research, 2021
[20] Designing an Autoresponder for Phishing Email Reports
2021
[21] Cybersecurity Awareness: A Critical Analysis of Education and Law Enforcement Methods
Informatica, 2021
[22] Cybersecurity in the COVID-19 Pandemic
2021
[23] Mazephishing: The COVID-19 pandemic as credible social context for social engineering attacks
Trames: A Journal of the Humanities and …, 2021
[24] Performing social engineering: A qualitative study of information security deceptions
2021
[25] Quantification of Multimillion Offers in 'Next-of-Kin'Unsolicited Bulk Emails
2021
[26] COVID-19 in International Media: Global Pandemic Perspectives
2021
[27] Abusing the COVID-19 pan (dem) ic: A perfect storm for online scams
COVID-19 in International Media, 2021
[28] Lifting The Grey Curtain: A First Look at the Ecosystem of CULPRITWARE
2021
[29] Having Your Cake and Eating It: An Analysis of Concession-Abuse-as-a-Service
2021
[30] An examination of email fraudsters' modus operandi
2020
[31] Mapping of Politically Active Groups on Social Networks of Russian Regions (On the Example
2020
[32] Spam-Based Scams
2020
[33] İkna Yoluyla Dolandırıcılık: Dolandırıcılık Faaliyetlerinde İkna ve Etkili İletişim Yöntemlerinin Tespiti Üzerine Bir Araştırma
2020
[34] Tackling the cybersecurity impacts of the corona virus outbreak as a challenge to internet safety
2020
[35] Understanding cybersecurity challenges of telecommuting and video conferencing applications in the COVID-19 pandemic
2020
[36] Phishing Attacks Survey: Types, Vectors, and Technical Approaches
2020
[37] The Identification of a Model Victim for Social Engineering: A Qualitative Analysis
2020
[38] A Survey on Detection and Analysis of Cyber Security Threats Through Monitoring Tools
2020
[39] Tackling the Cybersecurity impacts of the coronavirus outbreak as a challenge to internet safety
2020
[40] Orienting the development of crime analysis processes in police organisations covering the digital transformations of fraud mechanisms
2020
[41] Mapping Computer Mediated Communication Theories and Persuasive Strategies in Analysing Online Dating Romance Scam
2020
[42] Understanding the Expertise Required by Law Enforcement Investigating Cybercrime: An Exploration of Social Engineering Techniques
2020
[43] An Awareness Policy Framework for Cyber Security Social Engineering Threats
2020
[44] Factor Humano: La Teoría de las Actividades Cotidianas en la Ciberseguridad
2020
[45] The Relationship Between Social Persuasion Strategies, Phishing Features and Email Exposure Time on Phishing Susceptibility
2020
[46] Social Engineering Attacks and Prevention: A Mirror Review
Think India Journal, 2019
[47] PSIKOLOGI KEMANGSAAN JENAYAH PENIPUAN KOMERSIL: TINJAUAN LITERATUR
Jurnal Psikologi …, 2019
[48] Cybercrime subcultures: Contextualizing offenders and the nature of the offence
The Human Factor of Cybercrime, 2019
[49] Living in a Spamster's Paradise: Deceit and Threats in Phishing Emails
2019
[50] Predicting online fraud victimisation in Australia
2019
[51] A Model of Trust Manipulation: Exploiting Communication Mechanisms and Authenticity Cues to Deceive
2019
[52] Digital Citizenship and Education in Turkey: Experiences, the Present and the Future
2019
[53] Storytelling als Betrugsw
2019
[54] Contemporary Cyber Security Social Engineering Solutions, Measures, Policies, Tools and Applications: A Critical Appraisal
2019
[55] Social Engineering and Organisational Dependencies in Phishing Attacks
2019
[56] Spreading dynamics of SVFR online fraud information model on heterogeneous networks
2019
[57] 7 Cybercrime subcultures
2019
[58] Online fraud victimisation in Australia: risks and protective factors
2019
[59] Challenges of implementing training and awareness programs targeting cyber security social engineering
2019
[60] Online deception and situations conducive to the progression of non-payment fraud
2019
[61] Awareness Case Study for Understanding and Preventing Social Engineering Threats using Kali Linux Penetration Testing Toolkit
2019
[62] Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues
2019
[63] Social Engineering Vulnerability of Small Businesses and Recommended Countermeasures
2019
[64] On social engineering
2019
[65] Data Analytics: intelligent anti-phishing techniques based on Machine Learning
2019
[66] Predicting Susceptibility to Social Influence in Phishing Emails
2019
[67] Credulity rather than general trust may increase vulnerability to fraud in older adults: a moderated mediation model
2019
[68] Protection Against Semantic Social Engineering Attacks
2018
[69] Social Engineering Risk Mitigation: Entwicklung & Validierung eines Anti-Phishing-Trainings
2018
[70] A Critical Appraisal of Contemporary Cyber Security Social Engineering Solutions: Measures, Policies, Tools and Applications
2018
[71] Avoiding the Phishing Bait: The Need for Conventional Countermeasures for Mobile Users
2018
[72] Internet Crime and Anti-Fraud Activism: A Hands-On Approach
Security and Privacy Management, Techniques, and Protocols, 2018
[73] A Web Backtracking Technique for Fraud Detection in Financial Applications
Application Development and Design: Concepts, Methodologies, Tools, and Applications, 2018
[74] Exploring Older Adult Susceptibility to Fraudulent Computer Pop-Up Interruptions
Advances in Human Factors in Cybersecurity, 2018
[75] Exploring susceptibility to phishing in the workplace
International Journal of Human-Computer Studies, 2018
[76] How persuasive is phishing email? The role of authentic design, influence and current events in email judgements
Behaviour & Information Technology, 2018
[77] Social engineering: Application of psychology to information security
2018
[78] Social engineering: psychology applied to Information Security
Maestría thesis, 2018
[79] Information security's perception of phishing tactics
2018
[80] Testing an Integrated Self-Control and Routine Activities Framework to Examine Malware Infection Victimization
Social Science Computer Review, 2018
[81] 7. Understanding Online Deception: A Review
2018
[82] Morgan, P., Williams, EJ, Zook, N., & Christopher, G.(2018). Exploring
2018
[83] Mapping of Politically Active Groups on Social Networks of Russian Regions (On the Example of Karachay-Cherkessia Republic)
2018
[84] Utilising the concept of human-as-a-security-sensor for detecting semantic social engineering attacks
2017
[85] A machine learning approach for smart computer security audit
2017
[86] Social Engneering: Humans are the Prominent Reason for the Continuance of These Types of Attacks
ProQuest Dissertations Publishing, 2017
[87] Financial and other frauds in the United States: a panel analysis approach
International Journal of Accounting & Information Management, 2017
[88] You can trust me: a multimethod analysis of the Nigerian email scam
Security Journal, 2017
[89] Press accept to update now: Individual differences in susceptibility to malevolent interruptions
Decision Support Systems, 2017
[90] Individual differences in susceptibility to online influence: A theoretical review
Computers in Human Behavior, 2017
[91] Priming and warnings are not effective to prevent social engineering attacks
Computers in Human Behavior, 2017
[92] Occurrences of online fraud complaints: 2002 through 2015
International Journal of Accounting & Information Management, 2017
[93] Fusing system design and social science to reduce susceptibility to online influence.
Security and Privacy Management, Techniques, and Protocols, 2016
[94] Social Engineering
2016
[95] The Right Stuff? Selective Exposure and Political Misinformation on Facebook
2016
[96] Persuasion Strategies: Use of Negative Forces in Scam E-mails
GEMA Online® Journal of Language Studies, 2016
[97] L'escroquerie sur Internet
2016
[98] Experience in Social Engineering by eCommerce Platforms in Kenya
British Journal of Applied Science & Technology, 2016
[99] A Study on Anti-Phishing Techniques
2016
[100] Social Engineering in E-commerce Platforms in Kenya
2016
[101] A Study on Social Engineering Attacks and Defence Mechanisms
2016
[102] Social engineering deception susceptibility: Modification of personality traits susceptible to social engineering manipulation to acquire information through attack and …
2015
[103] Revealing Passwords: Using Social Engineering Methods to Monitor Scammer Email Communication
Analyzing Art, Culture, and Design in the Digital Age, 2015
[104] Analyzing Art, Culture, and Design in the Digital Age
2015
[105] The design of phishing studies: Challenges for researchers
Computers & Security, 2015
[106] Social Engineering on Social Networking sites
2015
[107] A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks
ACM Computing Surveys (CSUR), 2015
[108] Book Chapter: Revealing passwords: Using Social engineering methods to monitor scammer email communication
Analyzing Art, Communication and Design Technologies, 2015
[109] Social engineering deception susceptibility: Modification of personality traits susceptible to social engineering manipulation to acquire information through attack and …
ProQuest Dissertations Publishing, 2015
[110] A defence scheme against Identity Theft Attack based on multiple social networks
Expert Systems with Applications, 2014
[111] Weapons of Influence Misused: A Social Influence Analysis of Why People Fall Prey to Internet Scams
Social and Personality Psychology Compass, 2014
[112] How to obtain passwords of online scammers by using social engineering methods
2014 International Conference on Cyberworlds (CW), 2014
[113] Contour localization based on matching dense hexhog descriptors
2014
[114] THE EFFECTS IN HACKING OF SOCIAL MEDIA AMONG COLLEGE STUDENTS IN MALAYSIA
2014
[115] (Preprint for https//doi. org/10.3176/tr. 2021.4. 01) Mazephishing: The COVID-19 pandemic as credible social context for social engineering attacks Kristjan …
[116] SINCE 1997
[117] How the Presence of Cognitive Biases in Phishing Emails Affects Human Decision-making?
[118] MAZEPHISHING: THE COVID-19 PANDEMIC AS CREDIBLE SOCIAL CONTEXT FOR SOCIAL ENGINEERING ATTACKS; pp. 371–393
Free SCIRP Newsletters
Copyright © 2006-2024 Scientific Research Publishing Inc. All Rights Reserved.
Top