Dissertação para a obtenção do Grau de Mestre em Segurança dos Sistemas de Informação

[1]  InduShobha N. Chengalur-Smith,et al.  An overview of social engineering malware: Trends, tactics, and implications , 2010 .

[2]  Daniel Infante Ferreira Gonçalves Pesquisas de marketing pela internet: as percepções sob a ótica dos entrevistados , 2008 .

[3]  L. Cohen,et al.  Research Methods in Education , 1980 .

[4]  George Kurtz,et al.  Hacking Exposed , 2005 .

[5]  Isabel Loureiro,et al.  Manual de educacao para a saúde em alimentacao , 1993 .

[6]  R. Cialdini Influence: Science and Practice , 1984 .

[7]  Eric Maiwald,et al.  Network Security: A Beginner's Guide , 2001 .

[8]  Douglas P. Twitchell Social engineering in information assurance curricula , 2006, InfoSecCD '06.

[9]  Maria Cecília de Souza Minayo,et al.  Pesquisa social: teoria, método e criatividade , 2015 .

[10]  Thomas Peltier,et al.  Social Engineering: Concepts and Solutions , 2006 .

[11]  Lech J. Janczewski,et al.  Social engineering-based attacks: Model and new zealand perspective , 2010, Proceedings of the International Multiconference on Computer Science and Information Technology.

[12]  Andrea J. Cullen,et al.  Social Engineering Detection Using Neural Networks , 2009, 2009 International Conference on CyberWorlds.

[13]  Sarah Granger,et al.  Social Engineering Fundamentals, Part I: Hacker Tactics , 2003 .

[14]  D. Silverman Qualitative research : theory, method and practice , 2004 .

[15]  Tiantian Qi,et al.  An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering , 2007 .

[16]  William L. Simon,et al.  The Art of Intrusion , 2005 .

[17]  William L. Simon,et al.  The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders & Deceivers , 2005 .

[18]  Roque Moraes,et al.  Analise de conteudo , 1999 .

[19]  Michael Workman,et al.  A test of interventions for security threats from social engineering , 2008, Inf. Manag. Comput. Secur..

[20]  Dong Hwi Lee,et al.  Intelligence Report and the Analysis Against the Phishing Attack Which Uses a Social Engineering Technique , 2007, ICCSA.

[21]  Mohd Faizal Abdollah,et al.  Generic Taxonomy of Social Engineering Attack , 2011 .

[22]  A. C. Gil Métodos e técnicas de pesquisa social , 2008 .

[23]  Miriam H. Baer Corporate Policing and Corporate Governance: What Can We Learn from Hewlett-Packard's Pretexting Scandal? , 2008 .

[24]  William L. Simon,et al.  The Art of Deception: Controlling the Human Element of Security , 2001 .