{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T07:14:21Z","timestamp":1743059661885,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642333316"},{"type":"electronic","value":"9783642333323"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33332-3_22","type":"book-chapter","created":{"date-parts":[[2012,9,21]],"date-time":"2012-09-21T06:43:55Z","timestamp":1348209835000},"page":"237-249","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["The Dark Side of Web 2.0"],"prefix":"10.1007","author":[{"given":"Aubrey","family":"Labuschagne","sequence":"first","affiliation":[]},{"given":"Mariki","family":"Eloff","sequence":"additional","affiliation":[]},{"given":"Namosha","family":"Veerasamy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","volume-title":"Hacking the Human","author":"I. Mann","year":"2008","unstructured":"Mann, I.: Hacking the Human. Gower Publishing, Aldershot (2008)"},{"key":"22_CR2","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.istr.2010.04.004","volume":"14","author":"C. Carl","year":"2009","unstructured":"Carl, C.: Human factors in information security: The insider threat \u2013 Who can you trust these days? Information Security Technical Report\u00a014, 186\u2013196 (2009)","journal-title":"Information Security Technical Report"},{"key":"22_CR3","volume-title":"Social Engineering: The Art of Human Hacking","author":"C. Hadnagy","year":"2010","unstructured":"Hadnagy, C.: Social Engineering: The Art of Human Hacking. Wiley, Indianopolis (2010)"},{"key":"22_CR4","unstructured":"Shinder, D.: Profiling and categorizing cybercriminals (2010)"},{"key":"22_CR5","unstructured":"Evans, D.C., Gosling, S.D., Carroll, A.: What elements of an online social networking profile predict target-rater agreement in personality impressions. In: Proceedings of the International Conference on Weblogs and Social Media, pp. 1\u20136 (2008)"},{"key":"22_CR6","unstructured":"Chung, C.K., Pennebaker, J.W.: The psychological function of function words. Social Communication: Frontiers of Social Psychology, 343\u2013359 (2007)"},{"key":"22_CR7","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1016\/j.jrp.2009.01.006","volume":"43","author":"J.B. Hirsh","year":"2009","unstructured":"Hirsh, J.B., Peterson, J.B.: Personality and language use in self-narratives. Journal of Research in Personality\u00a043, 524\u2013527 (2009)","journal-title":"Journal of Research in Personality"},{"key":"22_CR8","first-page":"1","volume":"17","author":"T. Ryan","year":"2011","unstructured":"Ryan, T., Xenos, S.: Who uses Facebook? An investigation into the relationship between the Big Five, shyness, narcissism, loneliness, and Facebook usage. Journal of Computer Human Behavior\u00a017, 1\u20137 (2011)","journal-title":"Journal of Computer Human Behavior"},{"key":"22_CR9","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/S0191-8869(99)00199-3","volume":"29","author":"M. Vollrath","year":"2000","unstructured":"Vollrath, M., Torgersen, S.: Personality types and coping. Personality and Individual Differences\u00a029, 367\u2013378 (2000)","journal-title":"Personality and Individual Differences"},{"key":"22_CR10","unstructured":"Vergano, D.: Terrorists taunts may tell attack (2011), \n                      http:\/\/www.usatoday.com\/tech\/science\/columnist\/vergano\/2011-02-27-terrorist-words_N.htm\n                    , (last accessed February 27, 2012)"},{"key":"22_CR11","unstructured":"Pennebaker, J.W., Booth, R.J., Booth, M.E.: Linqguistic inquiry and word count (LIWC 2001): A computer-based text analysis program (2001)"},{"key":"22_CR12","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1177\/0146167203029005010","volume":"29","author":"M.L. Newman","year":"2003","unstructured":"Newman, M.L., Pennebaker, J.W., Berry, D.S., Richards, J.M.: Lying words: Predicting deception from linguistic styles. Person. Soc. Psychol. Bull.\u00a029, 665\u2013675 (2003)","journal-title":"Person. Soc. Psychol. Bull."},{"key":"22_CR13","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1080\/01638530802073712","volume":"45","author":"M.L. Newman","year":"2008","unstructured":"Newman, M.L., Groom, C.J., Handelman, L.D., Pennebaker, J.W.: Gender differences in language use: An analysis of 14,000 text samples. Discourse Processes\u00a045, 211\u2013236 (2008)","journal-title":"Discourse Processes"},{"key":"22_CR14","doi-asserted-by":"publisher","first-page":"1296","DOI":"10.1037\/0022-3514.77.6.1296","volume":"77","author":"J.W. Pennebaker","year":"1999","unstructured":"Pennebaker, J.W., King, L.A.: Linguistic styles: Language use as an individual difference. Journal of Personality and Social Psychology\u00a077, 1296\u20131312 (1999)","journal-title":"Journal of Personality and Social Psychology"},{"key":"22_CR15","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1111\/j.0956-7976.2004.00741.x","volume":"15","author":"M.A. Cohn","year":"2004","unstructured":"Cohn, M.A., Mehl, M.R., Pennebaker, J.W.: Linguistic markers of psychological change surrounding September 11, 2001. Psychological Science\u00a015, 687\u2013693 (2004)","journal-title":"Psychological Science"},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Chen, Y.D., Abbasi, A., Chen, H.: Framing Social Movement Identity with Cyber-Artifacts: A Case Study of the International Falun Gong Movement. Security Informatics, 1\u201323 (2010)","DOI":"10.1007\/978-1-4419-1325-8_1"},{"key":"22_CR17","first-page":"1","volume":"2","author":"S. Ressler","year":"2006","unstructured":"Ressler, S.: Social network analysis as an approach to combat terrorism: Past, present, and future research. Homeland Security Affairs\u00a02, 1\u201310 (2006)","journal-title":"Homeland Security Affairs"},{"key":"22_CR18","unstructured":"Veerasamy, N., Grobler, M.: Terrorist Use of the Internet: Exploitation and Support through ICT infrastructure. Leading Issues in Information Warfare & Security Research, 172\u2013187 (2011)"},{"key":"22_CR19","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.techfore.2006.07.007","volume":"74","author":"S.E. Goodman","year":"2007","unstructured":"Goodman, S.E., Kirk, J.C., Kirk, M.H.: Cyberspace as a medium for terrorists. Technological Forecasting and Social Change\u00a074, 193\u2013210 (2007)","journal-title":"Technological Forecasting and Social Change"},{"key":"22_CR20","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/S1363-4127(03)00007-4","volume":"8","author":"N. Barrett","year":"2003","unstructured":"Barrett, N.: Penetration testing and social engineering: Hacking the weakest link. Information Security Technical Report\u00a08, 56\u201364 (2003)","journal-title":"Information Security Technical Report"},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Pennebaker, J.W.: The Secret Life of Pronouns: What Our Words Say About Us. Bloomsbury Press (2011)","DOI":"10.1016\/S0262-4079(11)62167-2"},{"key":"22_CR22","unstructured":"Brodie, R.: Virus of the Mind: The New Science of the Meme. Hay House Publisher (2011)"},{"key":"22_CR23","unstructured":"Pennebaker, J.W., Chung, C.K., Ireland, M., Gonzales, A., Booth, R.J.: The development and psychometric properties of LIWC 2007. Austin, TX (2007), LIWC. Net"},{"key":"22_CR24","unstructured":"Whitlock, C.: New survey data from Experian\u2019s ProtectMyIDTM reveals people are making it easy for cybercriminals to steal their identity (2011), \n                      http:\/\/www.prnewswire.com\/news-releases\/new-survey-data-from-experians-protectmyid-reveals-people-are-making-it-easy-for-cybercriminals-to-steal-their-identity-131441283.html\n                     (last accessed October 10, 2011)"},{"key":"22_CR25","doi-asserted-by":"crossref","unstructured":"Timm, C.: Evil Twin Attacks. Seven Deadliest Social Network Attacks, Syngress, pp. 63\u201382 (2010)","DOI":"10.1016\/B978-1-59749-545-5.00004-5"},{"key":"22_CR26","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.diin.2005.11.004","volume":"2","author":"N. Nykodym","year":"2005","unstructured":"Nykodym, N., Taylor, R., Vilela, J.: Criminal profiling and insider cybercrime. Digital Investigation\u00a02, 261\u2013267 (2005)","journal-title":"Digital Investigation"},{"key":"22_CR27","unstructured":"Anonymous: The Free On-line Dictionary of Computing (2012)"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Critical Infrastructures and Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33332-3_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,11]],"date-time":"2021-05-11T05:21:34Z","timestamp":1620710494000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-33332-3_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642333316","9783642333323"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33332-3_22","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2012]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}