Publisher
Springer Nature Switzerland
Reference21 articles.
1. Amblard, F., Bouadjio-Boulic, A., Gutiérrez, C.S., Gaudou, B.: Which models are used in social simulation to generate social networks? A review of 17 years of publications in jasss. In: 2015 Winter Simulation Conference (WSC), pp. 4021–4032. IEEE (2015)
2. Braidley, S.: Extending our cyber-range cyran with social engineering capabilities. Master’s thesis. De Montfort University, Leicester, England (2016)
3. Colwill, C.: Human factors in information security: the insider threat-who can you trust these days? Inf. Secur. Tech. Rep. 14(4), 186–196 (2009)
4. Denecke, K., et al.: Ethical issues of social media usage in healthcare. Yearb. Med. Inform. 24(01), 137–147 (2015)
5. Drahošová, M., Balco, P.: The analysis of advantages and disadvantages of use of social media in European union. Procedia Comput. Sci. 109, 1005–1009 (2017)