Social Engineering and Crime Prevention in Cyberspace
暂无分享,去创建一个
[1] Kim-Kwang Raymond Choo,et al. Criminal Exploitation of Online Systems by Organised Crime Groups , 2008 .
[2] Brad J. Sagarin,et al. Dispelling the illusion of invulnerability: the motivations and mechanisms of resistance to persuasion. , 2002, Journal of personality and social psychology.
[3] R. Petty,et al. INDIVIDUAL VERSUS GROUP INTEREST VIOLATION: SURPRISE AS A DETERMINANT OF ARGUMENT SCRUTINY AND PERSUASION , 2001 .
[4] Ross D. Petty,et al. “It could have been you”: How states exploit counterfactual thought to market lotteries , 2000 .
[5] R. Cialdini,et al. When tactical pronouncements of change become real change : the case of reciprocal persuasion , 1992 .