Open Journal of Social Sciences

Open Journal of Social Sciences

ISSN Print: 2327-5952
ISSN Online: 2327-5960
www.scirp.org/journal/jss
E-mail: jss@scirp.org
"A Study of Social Engineering in Online Frauds"
written by Brandon Atkins, Wilson Huang,
published by Open Journal of Social Sciences, Vol.1 No.3, 2013
has been cited by the following article(s):
  • Google Scholar
  • CrossRef
[1] Tackling the Cybersecurity impacts of the coronavirus outbreak as a challenge to internet safety
2020
[2] Orienting the development of crime analysis processes in police organisations covering the digital transformations of fraud mechanisms
2020
[3] Mapping Computer Mediated Communication Theories and Persuasive Strategies in Analysing Online Dating Romance Scam
2020
[4] Phishing Attacks Survey: Types, Vectors, and Technical Approaches
2020
[5] The Identification of a Model Victim for Social Engineering: A Qualitative Analysis
2020
[6] A Survey on Detection and Analysis of Cyber Security Threats Through Monitoring Tools
2020
[7] Spam-Based Scams
2020
[8] İkna Yoluyla Dolandırıcılık: Dolandırıcılık Faaliyetlerinde İkna ve Etkili İletişim Yöntemlerinin Tespiti Üzerine Bir Araştırma
2020
[9] Storytelling im Journalismus
2019
[10] Awareness Case Study for Understanding and Preventing Social Engineering Threats using Kali Linux Penetration Testing Toolkit
2019
[11] Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues
2019
[12] Social Engineering Vulnerability of Small Businesses and Recommended Countermeasures
2019
[13] Living in a Spamster's Paradise: Deceit and Threats in Phishing Emails
2019
[14] Predicting online fraud victimisation in Australia
2019
[15] A Model of Trust Manipulation: Exploiting Communication Mechanisms and Authenticity Cues to Deceive
2019
[16] Digital Citizenship and Education in Turkey: Experiences, the Present and the Future
2019
[17] Storytelling als Betrugsw
2019
[18] Storytelling in Journalismus, Organisations-und Marketingkommunikation
2019
[19] Contemporary Cyber Security Social Engineering Solutions, Measures, Policies, Tools and Applications: A Critical Appraisal
2019
[20] Social Engineering and Organisational Dependencies in Phishing Attacks
2019
[21] Spreading dynamics of SVFR online fraud information model on heterogeneous networks
2019
[22] 7 Cybercrime subcultures
2019
[23] Online fraud victimisation in Australia: risks and protective factors
2019
[24] Challenges of implementing training and awareness programs targeting cyber security social engineering
2019
[25] Online deception and situations conducive to the progression of non-payment fraud
2019
[26] Data Analytics: intelligent anti-phishing techniques based on Machine Learning
2019
[27] Predicting Susceptibility to Social Influence in Phishing Emails
2019
[28] Credulity rather than general trust may increase vulnerability to fraud in older adults: a moderated mediation model
2019
[29] Protection Against Semantic Social Engineering Attacks
2018
[30] Social Engineering Risk Mitigation: Entwicklung & Validierung eines Anti-Phishing-Trainings
2018
[31] A Critical Appraisal of Contemporary Cyber Security Social Engineering Solutions: Measures, Policies, Tools and Applications
2018
[32] Avoiding the Phishing Bait: The Need for Conventional Countermeasures for Mobile Users
2018
[33] Internet Crime and Anti-Fraud Activism: A Hands-On Approach
Security and Privacy Management, Techniques, and Protocols, 2018
[34] A Web Backtracking Technique for Fraud Detection in Financial Applications
Application Development and Design: Concepts, Methodologies, Tools, and Applications, 2018
[35] Exploring Older Adult Susceptibility to Fraudulent Computer Pop-Up Interruptions
Advances in Human Factors in Cybersecurity, 2018
[36] Exploring susceptibility to phishing in the workplace
International Journal of Human-Computer Studies, 2018
[37] How persuasive is phishing email? The role of authentic design, influence and current events in email judgements
Behaviour & Information Technology, 2018
[38] Social engineering: Application of psychology to information security
2018
[39] Social engineering: psychology applied to Information Security
Maestría thesis, 2018
[40] Information security's perception of phishing tactics
2018
[41] Testing an Integrated Self-Control and Routine Activities Framework to Examine Malware Infection Victimization
Social Science Computer Review, 2018
[42] Morgan, P., Williams, EJ, Zook, N., & Christopher, G.(2018). Exploring
2018
[43] 7. Understanding Online Deception: A Review
2018
[44] Mapping of Politically Active Groups on Social Networks of Russian Regions (On the Example of Karachay-Cherkessia Republic)
2018
[45] A machine learning approach for smart computer security audit
2017
[46] Utilising the concept of human-as-a-security-sensor for detecting semantic social engineering attacks
2017
[47] Social Engneering: Humans are the Prominent Reason for the Continuance of These Types of Attacks
ProQuest Dissertations Publishing, 2017
[48] Financial and other frauds in the United States: a panel analysis approach
International Journal of Accounting & Information Management, 2017
[49] You can trust me: a multimethod analysis of the Nigerian email scam
Security Journal, 2017
[50] Press accept to update now: Individual differences in susceptibility to malevolent interruptions
Decision Support Systems, 2017
[51] Individual differences in susceptibility to online influence: A theoretical review
Computers in Human Behavior, 2017
[52] Priming and warnings are not effective to prevent social engineering attacks
Computers in Human Behavior, 2017
[53] Occurrences of online fraud complaints: 2002 through 2015
International Journal of Accounting & Information Management, 2017
[54] Fusing system design and social science to reduce susceptibility to online influence.
Security and Privacy Management, Techniques, and Protocols, 2016
[55] Social Engineering
2016
[56] The Right Stuff? Selective Exposure and Political Misinformation on Facebook
2016
[57] Persuasion Strategies: Use of Negative Forces in Scam E-mails
GEMA Online® Journal of Language Studies, 2016
[58] L'escroquerie sur Internet
2016
[59] Experience in Social Engineering by eCommerce Platforms in Kenya
British Journal of Applied Science & Technology, 2016
[60] A Study on Anti-Phishing Techniques
2016
[61] A Study on Social Engineering Attacks and Defence Mechanisms
2016
[62] Social Engineering in E-commerce Platforms in Kenya
2016
[63] Revealing Passwords: Using Social Engineering Methods to Monitor Scammer Email Communication
Analyzing Art, Culture, and Design in the Digital Age, 2015
[64] Analyzing Art, Culture, and Design in the Digital Age
2015
[65] The design of phishing studies: Challenges for researchers
Computers & Security, 2015
[66] Social Engineering on Social Networking sites
2015
[67] A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks
ACM Computing Surveys (CSUR), 2015
[68] Book Chapter: Revealing passwords: Using Social engineering methods to monitor scammer email communication
Analyzing Art, Communication and Design Technologies, 2015
[69] Social engineering deception susceptibility: Modification of personality traits susceptible to social engineering manipulation to acquire information through attack and …
ProQuest Dissertations Publishing, 2015
[70] A defence scheme against Identity Theft Attack based on multiple social networks
Expert Systems with Applications, 2014
[71] Weapons of Influence Misused: A Social Influence Analysis of Why People Fall Prey to Internet Scams
Social and Personality Psychology Compass, 2014
[72] How to obtain passwords of online scammers by using social engineering methods
2014 International Conference on Cyberworlds (CW), 2014
[73] THE EFFECTS IN HACKING OF SOCIAL MEDIA AMONG COLLEGE STUDENTS IN MALAYSIA
2014
Free SCIRP Newsletters
Copyright © 2006-2021 Scientific Research Publishing Inc. All Rights Reserved.
Top