I. Mann, Hacking the Human, 2008.

C. Carl, Human factors in information security: The insider threat ? Who can you trust these days? Information Security, pp.186-196, 2009.

C. Hadnagy, Social Engineering: The Art of Human Hacking, 2010.

D. Shinder, Profiling and categorizing cybercriminals, 2010.

D. C. Evans, S. D. Gosling, and A. Carroll, What elements of an online social networking profile predict target-rater agreement in personality impressions, Proceedings of the International Conference on Weblogs and Social Media, pp.1-6, 2008.

C. K. Chung and J. W. Pennebaker, The psychological function of function words. Social Communication: Frontiers of Social Psychology, pp.343-359, 2007.

J. B. Hirsh and J. B. Peterson, Personality and language use in self-narratives, Journal of Research in Personality, vol.43, issue.3, pp.524-527, 2009.
DOI : 10.1016/j.jrp.2009.01.006

T. Ryan and S. Xenos, Who uses Facebook? An investigation into the relationship between the Big Five, shyness, narcissism, loneliness, and Facebook usage, Computers in Human Behavior, vol.27, issue.5, pp.1-7, 2011.
DOI : 10.1016/j.chb.2011.02.004

M. Vollrath and S. Torgersen, Personality types and coping, Personality and Individual Differences, vol.29, issue.2, pp.367-378, 2000.
DOI : 10.1016/S0191-8869(99)00199-3

J. W. Pennebaker, R. J. Booth, and M. E. Booth, Linqguistic inquiry and word count (LIWC2001): A computer-based text analysis program, 2001.

M. L. Newman, J. W. Pennebaker, D. S. Berry, and J. M. Richards, Lying Words: Predicting Deception from Linguistic Styles, Personality and Social Psychology Bulletin, vol.29, issue.5, pp.665-675, 2003.
DOI : 10.1177/0146167203029005010

M. L. Newman, C. J. Groom, L. D. Handelman, and J. W. Pennebaker, Gender Differences in Language Use: An Analysis of 14,000 Text Samples, Discourse Processes, pp.211-236, 2008.
DOI : 10.1348/014466601164812

J. W. Pennebaker and L. A. King, Linguistic styles: Language use as an individual difference., Journal of Personality and Social Psychology, vol.77, issue.6, pp.1296-1312, 1999.
DOI : 10.1037/0022-3514.77.6.1296

M. A. Cohn, M. R. Mehl, and J. W. Pennebaker, Linguistic Markers of Psychological Change Surrounding September 11, 2001, Psychological Science, vol.9, issue.10, pp.687-693, 2001.
DOI : 10.1111/1467-9280.00329

Y. D. Chen, A. Abbasi, and H. Chen, Framing Social Movement Identity with Cyber-Artifacts: A Case Study of the International Falun Gong Movement, pp.1-23, 2010.
DOI : 10.1007/978-1-4419-1325-8_1

S. Ressler, Social network analysis as an approach to combat terrorism: Past, present, and future research. Homeland Security Affairs, pp.1-10, 2006.

N. Veerasamy and M. Grobler, Terrorist Use of the Internet: Exploitation and Support through ICT infrastructure. Leading Issues in Information Warfare & Security Research, pp.172-187, 2011.

S. E. Goodman, J. C. Kirk, and M. H. Kirk, Cyberspace as a medium for terrorists, Technological Forecasting and Social Change, vol.74, issue.2, pp.193-210, 2007.
DOI : 10.1016/j.techfore.2006.07.007

N. Barrett, Penetration testing and social engineering, Information Security Technical Report, vol.8, issue.4, pp.56-64, 2003.
DOI : 10.1016/S1363-4127(03)00007-4

J. W. Pennebaker, The secret life of pronouns, New Scientist, vol.211, issue.2828, 2011.
DOI : 10.1016/S0262-4079(11)62167-2

R. Brodie, Virus of the Mind: The New Science of the Meme, 2011.

J. W. Pennebaker, C. K. Chung, M. Ireland, A. Gonzales, and R. J. Booth, The development and psychometric properties of LIWC2007, Net, 2007.

C. Whitlock, New survey data from Experian's ProtectMyID? reveals people are making it easy for cybercriminals to steal their identity (2011), http://www.prnewswire.com/news- releases/new-survey-data-from-experians-protectmyid-reveals-people-are-making-it-easy- for-cybercriminals-to-steal-their-identity-131441283, html, 2011.

C. Timm, Evil Twin Attacks. Seven Deadliest Social Network Attacks, Syngress, pp.63-82, 2010.
DOI : 10.1016/b978-1-59749-545-5.00004-5

N. Nykodym, R. Taylor, and J. Vilela, Criminal profiling and insider cybercrime, Digital Investigation, pp.261-267, 2005.
DOI : 10.1016/j.clsr.2005.07.001