暂无分享,去创建一个
[1] Steve Love,et al. Security awareness of computer users: A phishing threat avoidance perspective , 2014, Comput. Hum. Behav..
[2] François Amigorena. The threat from within: how to start taking internal security more seriously , 2014 .
[3] S. Furnell. End-user security culture: A lesson that will never be learnt? , 2008 .
[4] Maumita Bhattacharya,et al. Social Engineering through Social Media: An Investigation on Enterprise Security , 2014 .
[5] M. Pitesky,et al. Clearing the Air: Livestock's Contribution to Climate Change , 2009 .
[6] Melissa Mrachek,et al. Clearing the air , 1992, The Lancet.
[7] Wei Fan,et al. Trust and Privacy Exploitation in Online Social Networks , 2014, IT Professional.
[8] Ehinome Ikhalia. A New Social Media Security Model (SMSM) , 2013 .
[9] Kevin J. Slonka. Awareness of malicious social engineering among facebook users , 2014 .
[10] William L. Simon,et al. The Art of Deception: Controlling the Human Element of Security , 2001 .
[11] Fernando Almeida. Web 2.0 Technologies and Social Networking Security Fears in Enterprises , 2012, ArXiv.
[12] Deveeshree Nayak,et al. Information privacy risk assessment of Facebook Graph Search , 2014, 2014 Science and Information Conference.
[13] Wu He,et al. A review of social media security risks and mitigation techniques , 2012, J. Syst. Inf. Technol..
[14] Carl Colwill,et al. Human factors in information security: The insider threat - Who can you trust these days? , 2009, Inf. Secur. Tech. Rep..
[15] Agostino Poggi,et al. Information Attacks on Online Social Networks , 2014, J. Inf. Technol. Res..
[16] Riaan J. Rudman. Framework to identify and manage risks in Web 2.0 applications , 2010 .