Building an Analysis Model for Social Engineering Based Cyberspace Operations |
Shin, Kyuyong
(Cyber Warfare Research Center at Korea Military Academy)
Kim, Jeewon (Cyber Warfare Research Center at Korea Military Academy) Lim, Hyun-myung (Cyber Warfare Research Center at Korea Military Academy) Kim, Yongju (Cyber Warfare Research Center at Korea Military Academy) Yoo, Jincheol (Cyber Warfare Research Center at Korea Military Academy) |
1 | Wenjun Fan, Kevin Lwakatare, and Rong Rong, "Social Engineering: I-E based Model of Human Weakness for Attack and Defense Investigations," Computer Network and Information Security, vol. 9, pp. 1-11, Jan. 2017. |
2 | J. Piaget, The Language and Thought of the Child. New York: Harcourt, Brace, 1926. |
3 | J.M. Darley and B. Latane, "Bystander Intervention in Emergencies: Diffusion of Responsibility," Journal of Personality and Social Psychology, 8(4), pp. 377, 1986. DOI |
4 | P.G. Zimbardo, "The Human Choice: Individuation, Reason, and Order Versus Deindividuation, Impulse, and Chaos," In Nebraska Symposium on Motivation. University of Nebraska press, 1969 |
5 | S.T. Fiske and S.E. Taylor, Social Cognition. New York: McGraw-Hill, 1991 |
6 | D. Kahneman and A. Tversky, Prospect Theory. Econometrica vol. 47 pp. 263-291, 1979 DOI |
7 | D. Kahneman, P. Slovic, and A. Tversky(eds.), Judgment under Uncertainty: Heuristics and Biases. Cambridge University Press, 1982. |
8 | V.H. Vroom, Work and Motivation. New York: Wiley, 1964 |
9 | M. Sherif, O.J. Harvey, B.J. White, W.R. Hood, and C.W. Sherif, Intergroup Conflict and Cooperation: The Robbers Cave Experiment. Norman, OK: University Book Exchange, 1961. |
10 | Vircom, "18 Cyber Security Trends We Are Watching in 2018," https://www.vircom.com/blog/18-cyber-security-trends-we-are-watching-in-2018/, 12. January, 2018. |
11 | B.F. Skinner, "Superstition' in the Pigeon," Journal of Experimental Psychology, vol. 38, pp. 168-172, 1948. DOI |
12 | Jin A Heo, Seong Bhin Joo, Jung Min Lee, and Chan Hyuk Park, "Countermeasures for Industrial Technology Protection in Social Engineering attack", The Journal of Social Science, vol. 23, no. 1, pp. 279-306, March 2016. |
13 | Kyuyong Shin, Jungho Kang, Jincheol Yoo, Jeewon Kim, Sungrok Kang, Hyunmyung Lim, and Yongju Kim, "A Study on the Concept of Social Engineering based Cyber Operations," Journal of The Korea Institute of Information Security & Cryptology, 28(3), pp. 707-716, June 2018. DOI |
14 | Kyuyong Shin, Kyoung Min Kim, and Jongkwan Lee, "A Study on the Concept of Social Engineering Cyber Kill Chain for Social Engineering based Cyber Operations," Journal of The Korea Institute of Information Security & Cryptology, 28(5), Oct. 2018. |
15 | Jungho Kang, Kyuyong Shin, Jincheol Yoo, Jeewon Kim, Sungrok Kang, Hyunmyung Lim, and Yongju Kim, "A Study on the Relationship between Social Engineering and Cyberspace Operations," Ministry of Defense, Dec. 2017. |