These are the sources and citations used to research Social Engineering Assignement. This bibliography was generated on Cite This For Me on
In-text: (Airehrour, Nair and Madanian, 2018)
Your Bibliography: Airehrour, D., Nair, N. and Madanian, S., 2018. Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model. Information, [online] 9(5), p.110. Available at: <http://file:///C:/Users/mchll/Downloads/information-09-00110.pdf> [Accessed 26 May 2018].
In-text: (Bakhshi, 2017)
Your Bibliography: Bakhshi, T., 2017. Social engineering: Revisiting end-user awareness and susceptibility to classic attack vectors. 2017 13th International Conference on Emerging Technologies (ICET), [online] p.1. Available at: <https://ieeexplore-ieee-org.ezproxy.aut.ac.nz/stamp/stamp.jsp?tp=&arnumber=8281653> [Accessed 26 May 2018].
In-text: (Chirillo, 2001)
Your Bibliography: Chirillo, J., 2001. Hack Attacks Denied: A Complete Guide to Network Lockdown. New York: John Wiley & Sons, p.186.
In-text: (Cialdini, 2007)
Your Bibliography: Cialdini, R., 2007. INFLUENCE: The Psychology of Persuasion. New York: HarperCollins.
In-text: (Cook, 2016)
Your Bibliography: Cook, F., 2016. Big Read: Kiwis are falling for basic attacks - and it's costing millions. NZ Herald, [online] Available at: <https://www.nzherald.co.nz/business/news/article.cfm?c_id=3&objectid=11595542> [Accessed 26 May 2018].
In-text: (Cornforth, 2009)
Your Bibliography: Cornforth, A., 2009. Behaviour change: insights for environmental policy making from social psychology and behavioural economics. Policy Quarterly, [online] 5(4), p.23. Available at: <http://ips.ac.nz/publications/files/5831f842e9c.pdf> [Accessed 26 May 2018].
In-text: (Ferreira, Coventry and Lenzini, 2015)
Your Bibliography: Ferreira, A., Coventry, L. and Lenzini, G., 2015. Principles of Persuasion in Social Engineering and Their Use in Phishing. Lecture Notes in Computer Science, [online] 9190, pp.36-47. Available at: <https://link.springer.com/chapter/10.1007%2F978-3-319-20376-8_4> [Accessed 26 May 2018].
In-text: (Krombholz, Hobel, Huber and Weippl, 2015)
Your Bibliography: Krombholz, K., Hobel, H., Huber, M. and Weippl, E., 2015. Advanced social engineering attacks. Journal of Information Security and Applications, [online] 22(C), pp.113-122. Available at: <https://doi.org/10.1016/j.jisa.2014.09.005> [Accessed 26 May 2018].
In-text: (Lively, 2003)
Your Bibliography: Lively, C., 2003. Psychological Based Social Engineering. [online] Giac.org. Available at: <https://www.giac.org/paper/gsec/3547/psychological-based-social-engineering/105780> [Accessed 26 May 2018].
In-text: (Mitnick, Simon and Wozniak, 2011)
Your Bibliography: Mitnick, K., Simon, W. and Wozniak, S., 2011. The art of deception: Controlling the human element of security. Hoboken, N.J.: John Wiley & Sons, p.26.
In-text: (Peltier, 2006)
Your Bibliography: Peltier, T., 2006. Social Engineering: Concepts and Solutions. EDPACS, [online] 33(8), pp.1-13. Available at: <https://doi.org/10.1201/1079.07366981/45802.33.8.20060201/91956.1> [Accessed 26 May 2018].
In-text: (Uebelacker and Quiel, 2014)
Your Bibliography: Uebelacker, S. and Quiel, S., 2014. The Social Engineering Personality Framework. 2014 Workshop on Socio-Technical Aspects in Security and Trust, [online] Available at: <https://ieeexplore.ieee.org/document/6978926/> [Accessed 26 May 2018].
In-text: (Workman, 2007)
Your Bibliography: Workman, M., 2007. Gaining Access with Social Engineering: An Empirical Study of the Threat. Information Systems Security, [online] 16(6), p.316. Available at: <https://doi.org/10.1080/10658980701788165> [Accessed 26 May 2018].
10,587 students joined last month!