Skip to Main Content Area
  • CPS-VO
    • Contact Support
  • Browse
    • Calendar
    • Announcements
    • Repositories
    • Groups
  • Search
    • Search for Content
    • Search for a Group
    • Search for People
    • Search for a Project
    • Tagcloud
      
 
Not a member?
Click here to register!
Forgot username or password?
 
Home
National Science Foundation

Cyber-Physical Systems Virtual Organization

Read-only archive of site from September 29, 2023.

CPS-VO

grounded theory method

biblio

Visible to the public Social Engineering in Social Networking Sites: The Art of Impersonation

Submitted by BrandonB on Thu, 04/30/2015 - 1:50pm
  • social engineering victimization
  • physical crime
  • Receivers
  • security
  • sexual abuse
  • SNS
  • social aspects of automation
  • social engineering
  • social engineering traps
  • Phishing
  • social engineeringtactics
  • social networking (online)
  • Social networking sites
  • source credibility
  • threats
  • Trust management
  • user susceptibility
  • attacker
  • Organizations
  • large information base
  • Interviews
  • information security management
  • impersonation
  • identity theft
  • human behaviors complexity
  • grounded theory method
  • fraudulent people
  • fraud
  • financial abuse
  • Facebook
  • encoding
  • deceptive people
  • Computer crime

Terms of Use  |  ©2023. CPS-VO