How social engineers use persuasion principles during vishing attacks.
Keith S. JonesMiriam E. ArmstrongMcKenna K. TornbladAkbar Siami NaminPublished in: Inf. Comput. Secur. (2021)
Keyphrases
- social influence
- social interaction
- social media
- social networks
- computational intelligence
- computer scientists
- social learning
- social networking
- artificial intelligence
- social behavior
- graduate students
- information technology
- countermeasures
- security mechanisms
- social web
- computer security
- security threats
- watermarking scheme
- human behavior
- theoretical framework
- digital images
- social relationships
- data mining
- social capital
- malicious attacks
- chosen plaintext