See how this article has been cited at scite.ai
scite shows how a scientific paper has been cited by providing the context of the citation, a classification describing whether it supports, mentions, or contrasts the cited claim, and a label indicating in which section the citation was made.
K. BeckersS. Pape 2016a A serious game for eliciting social engineering security requirements. Proceedings of the 24th IEEE International Conference on Requirements Engineering RE 16 To Appear IEEE Computer Society
K. BeckersS. Pape 2016b Theoretical foundation for: A serious game for social engineering. Technical report, Technical University Munich (TUM) and Goethe-University Frankfurt http://pape.science/social-engineering/
M. Csikszentmihalyi 2000 Beyond Boredom and Anxiety: Experiencing Flow in Work and Play 25th Anniversary Jossey-Bass
T. DenningA. LernerA. ShostackT. Kohno 2013 Control-alt-hack: The design and evaluation of a card game for computer security awareness and education Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS ’13 New York, NY, USA 915 928 ACM
R. Gulati 2003 The threat of social engineering and your defense against it. SANS Reading Room
C. Hadnagy 2010 Social engineering: The art of human hacking Indianapolis John Wiley & Sons
C. Hadnagy 2016 The social engineering infographic Technical report, Social Engineer, Inc. http://www.social-engineer.org/social-engineering/social-engineering-infographic/
H. A. KrugerW. D. Kearney 2006 A prototype for assessing information security awareness. Comput. Secur 25 4 289 296
K. D. MitnickW. L. Simon 2009 The Art of Deception Wiley
T. R. Peltier 2006 Social engineering: Concepts and solutions. Information Systems Security 15 5 13 21
Proofpoint 2016 The human factor report 2016. https://www.proofpoint.com/us/human-factor-report-2016
F. RheinbergR. VollmeyerS. Engeser 2016 Flow kurz skala. Technical report http://www.psych.uni-potsdam.de/people/rheinberg/messverfahren/FKS-englisch.pdf
A. Shostack 2012 Elevation of privilege: Drawing developers into threat modeling Technical report, Microsoft, Redmond, U.S. http://download.microsoft.com/download/F/A/E/FAE1434F-6D22-4581-9804-8B60C04354E4/EoP_Whitepaper.pdf
A. Shostack 2014 Threat Modeling: Designing for Security 1st John Wiley & Sons Inc
F. StajanoP Wilson 2011 March Understanding scam victims: Seven principles for systems security. Commun ACM 54 3 70 75
L. WilliamsM. GegickA. Meneely 2009 Protection poker: Structuring software security risk assessment and knowledge transfer. Proceedings of International Symposium on Engineering Secure Software and Systems 122 134 Springer
L. WilliamsA. MeneelyG. Shipley 2010 May Protection poker: The new software security “game”. Security Privacy IEEE 8 3 14 20