Hacking the Human, 2008. ,
Human factors in information security: The insider threat ? Who can you trust these days? Information Security, pp.186-196, 2009. ,
Social Engineering: The Art of Human Hacking, 2010. ,
Profiling and categorizing cybercriminals, 2010. ,
What elements of an online social networking profile predict target-rater agreement in personality impressions, Proceedings of the International Conference on Weblogs and Social Media, pp.1-6, 2008. ,
The psychological function of function words. Social Communication: Frontiers of Social Psychology, pp.343-359, 2007. ,
Personality and language use in self-narratives, Journal of Research in Personality, vol.43, issue.3, pp.524-527, 2009. ,
DOI : 10.1016/j.jrp.2009.01.006
Who uses Facebook? An investigation into the relationship between the Big Five, shyness, narcissism, loneliness, and Facebook usage, Computers in Human Behavior, vol.27, issue.5, pp.1-7, 2011. ,
DOI : 10.1016/j.chb.2011.02.004
Personality types and coping, Personality and Individual Differences, vol.29, issue.2, pp.367-378, 2000. ,
DOI : 10.1016/S0191-8869(99)00199-3
Linqguistic inquiry and word count (LIWC2001): A computer-based text analysis program, 2001. ,
Lying Words: Predicting Deception from Linguistic Styles, Personality and Social Psychology Bulletin, vol.29, issue.5, pp.665-675, 2003. ,
DOI : 10.1177/0146167203029005010
Gender Differences in Language Use: An Analysis of 14,000 Text Samples, Discourse Processes, pp.211-236, 2008. ,
DOI : 10.1348/014466601164812
Linguistic styles: Language use as an individual difference., Journal of Personality and Social Psychology, vol.77, issue.6, pp.1296-1312, 1999. ,
DOI : 10.1037/0022-3514.77.6.1296
Linguistic Markers of Psychological Change Surrounding September 11, 2001, Psychological Science, vol.9, issue.10, pp.687-693, 2001. ,
DOI : 10.1111/1467-9280.00329
Framing Social Movement Identity with Cyber-Artifacts: A Case Study of the International Falun Gong Movement, pp.1-23, 2010. ,
DOI : 10.1007/978-1-4419-1325-8_1
Social network analysis as an approach to combat terrorism: Past, present, and future research. Homeland Security Affairs, pp.1-10, 2006. ,
Terrorist Use of the Internet: Exploitation and Support through ICT infrastructure. Leading Issues in Information Warfare & Security Research, pp.172-187, 2011. ,
Cyberspace as a medium for terrorists, Technological Forecasting and Social Change, vol.74, issue.2, pp.193-210, 2007. ,
DOI : 10.1016/j.techfore.2006.07.007
Penetration testing and social engineering, Information Security Technical Report, vol.8, issue.4, pp.56-64, 2003. ,
DOI : 10.1016/S1363-4127(03)00007-4
The secret life of pronouns, New Scientist, vol.211, issue.2828, 2011. ,
DOI : 10.1016/S0262-4079(11)62167-2
Virus of the Mind: The New Science of the Meme, 2011. ,
The development and psychometric properties of LIWC2007, Net, 2007. ,
New survey data from Experian's ProtectMyID? reveals people are making it easy for cybercriminals to steal their identity (2011), http://www.prnewswire.com/news- releases/new-survey-data-from-experians-protectmyid-reveals-people-are-making-it-easy- for-cybercriminals-to-steal-their-identity-131441283, html, 2011. ,
Evil Twin Attacks. Seven Deadliest Social Network Attacks, Syngress, pp.63-82, 2010. ,
DOI : 10.1016/b978-1-59749-545-5.00004-5
Criminal profiling and insider cybercrime, Digital Investigation, pp.261-267, 2005. ,
DOI : 10.1016/j.clsr.2005.07.001