13
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      On the anatomy of social engineering attacks-A literature-based dissection of successful attacks : On the anatomy of social engineering attacks

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references28

          • Record: found
          • Abstract: found
          • Article: not found

          Self-disclosure and liking: a meta-analytic review.

          Self-disclosure plays a central role in the development and maintenance of relationships. One way that researchers have explored these processes is by studying the links between self-disclosure and liking. Using meta-analytic procedures, the present work sought to clarify and review this literature by evaluating the evidence for 3 distinct disclosure-liking effects. Significant disclosure-liking relations were found for each effect: (a) People who engage in intimate disclosures tend to be liked more than people who disclose at lower levels, (b) people disclose more to those whom they initially like, and (c) people like others as a result of having disclosed to them. In addition, the relation between disclosure and liking was moderated by a number of variables, including study paradigm, type of disclosure, and gender of the discloser. Taken together, these results suggest that various disclosure-liking effects can be integrated and viewed as operating together within a dynamic interpersonal system. Implications for theory development are discussed, and avenues for future research are suggested.
            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Culture and conformity: A meta-analysis of studies using Asch's (1952b, 1956) line judgment task.

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Compliance without pressure: the foot-in-the-door technique.

                Bookmark

                Author and article information

                Journal
                Journal of Investigative Psychology and Offender Profiling
                J Investig Psychol Offender Profil
                Wiley
                15444759
                January 2018
                January 2018
                July 14 2017
                : 15
                : 1
                : 20-45
                Affiliations
                [1 ]Services, Cyber-security, and Safety Group (SCS), Faculty of EEMCS; University of Twente; PO Box 217 Enschede 7500 AE The Netherlands
                [2 ]Faculty of Technology; Policy and Management; Delft University of Technology P.O. Box 5015 2600 GA Delft
                [3 ]Faculty of Faculteit Behavioural; Management and Social Sciences, University of Twente; P.O. Box 217, 7500 AE Enschede
                [4 ]Faculty of Electrical Engineering; Mathematics and Computer Science, Delft University of Technology; P.O. Box 5031 2600 GA Delft
                Article
                10.1002/jip.1482
                bb991db1-6cf7-4130-ac2e-3f7cdf7fff02
                © 2017

                http://doi.wiley.com/10.1002/tdm_license_1.1

                http://creativecommons.org/licenses/by-nc-nd/4.0/

                History

                Comments

                Comment on this article