1. Heikkinen, S.: Social engineering in the world of emerging communication technologies. In: Proceedings of Wireless World Research Forum, pp. 1–10 (2006) [Online]. Available: http://www.cs.tut.fi/~sheikki/docs/WWRF-Heikkinen-SocEng.pdf
2. Luo, X., Brody, R., Seazzu, A., Burd, S.: Social engineering. Inf. Resour. Manag. J. 24 (3), 1–8 (2011)
3. Kvedar, D., Nettis, M., Fulton, S.P.: The use of formal social engineering techniques to identify weaknesses during a computer vulnerability competition. J. Comput. Sci. Coll. 26 (2), 80–87 (2010)
4. Granger, S.: Social engineering fundamentals, part I: hacker tactics. In: SecurityFocus (2001)
5. Mitnick, K.D., Simon, W.L.: The art of deception: controlling the human element in security (2003) [Online]. Available: http://www.bmj.com/content/347/bmj.f5889