Social Psychology: An under-used tool in Cybersecurity
暂无分享,去创建一个
Jacqui Taylor | John McAlaney | Huseyin Dogan | Christopher Richardson | Helen Thackray | J. McAlaney | Jacqui Taylor | H. Thackray | H. Dogan | Christopher Richardson
[1] Nicolas Chantler,et al. Profile of A Computer Hacker , 2001 .
[2] Gabriella Coleman. Hacker, Hoaxer, Whistleblower, Spy: The Many Faces of Anonymous , 2014 .
[3] Paul A. Taylor,et al. Hackers: Crime in the Digital Sublime , 1999 .
[4] A. Joinson. Disinhibition and the Internet , 2007 .
[5] Ryan Seebruck,et al. A typology of hackers: Classifying cyber malfeasance using a weighted arc circumplex model , 2015, Digit. Investig..
[6] Leonhard Dobusch,et al. Fluidity, Identity, and Organizationality: The Communicative Constitution of Anonymous , 2015 .
[7] Marcus K. Rogers,et al. The Psyche of Cybercriminals: A Psycho-Social Perspective , 2011 .
[8] Peter Krapp. Terror and Play, or What Was Hacktivism? , 2005, Grey Room.
[9] Mary Manjikian,et al. From Global Village to Virtual Battlespace: The Colonizing of the Internet and the Extension of Realpolitik , 2010 .
[10] A. Barak,et al. The benign online disinhibition effect: Could situational factors induce self-disclosure and prosocial behaviors? , 2015 .
[11] Michael S. Bernstein,et al. 4chan and /b/: An Analysis of Anonymity and Ephemerality in a Large Online Community , 2011, ICWSM.
[12] Sumit Ghosh,et al. Cybercrimes: A Multidisciplinary Analysis , 2011 .
[13] J. Gackenbach. Psychology and the Internet : intrapersonal, interpersonal, and transpersonal implications , 1998 .
[14] Carina Gunnarson. Changing the game: Addiopizzo's mobilisation against racketeering in Palermo , 2014 .
[15] Marcus K. Rogers,et al. A two-dimensional circumplex approach to the development of a hacker taxonomy , 2006, Digit. Investig..
[16] Bill Landreth,et al. Out of the inner circle : a hacker's guide to computer security , 1985 .
[17] J. Suler. The Online Disinhibition Effect , 2004, Cyberpsychology, Behavior, and Social Networking.