1. Acquisti, A., Gross, R., Stutzman, F.: Face recognition and privacy in the age of augmented reality. J. Priv. Confid. 6(2), 1–20 (2014)
2. Rainie, L., Kiesler, S., Kang, R., Madden, M., Duggan, M., Brown, S., Dabbish, L.: Anonymity, Privacy, and Security Online. Pew Research Center (2013)
3. Ball, L.D., Ewan, G., Coull, N.J.: Undermining-social engineering using open source intelligence gathering. In: Proceedings of 4th International Conference on Knowledge Discovery and Information Retrieval (KDIR), pp. 275–280. SciTePress-Science and Technology Publications (2012)
4. Uehara, K., Mukaiyama, K., Fujita, M., Nishikawa, H., Yamamoto, T., Kawauchi, K., Nishigaki, M.: Basic study on targeted e-mail attack method using OSINT. In: International Conference on Advanced Information Networking and Applications, vol. 926, pp. 1329–1341 (2019)
5. Goldberg, L.R.: An alternative “description of personality”: the big-five factor structure. J. Pers. Soc. Psychol. 59, 1216–1229 (1990)