Can social influence be exploited to compromise security: an online experimental evaluation.
Soumajyoti SarkarPaulo ShakarianMika ArmentaDanielle SanchezKiran LakkarajuPublished in: ASONAM (2019)
Keyphrases
- social influence
- experimental evaluation
- online communities
- online social
- social interaction
- online learning
- social networks
- social psychology
- information security
- user preferences
- network structure
- social relationships
- social networking
- virtual communities
- content analysis
- user interaction
- social relations
- information systems