[[1] Surya NEPAL, Cecile PARIS, Atham BOUGUETTAYA, Trusting the Social Web: issues and challenges, World Wide Web, Vol. 18, No. 1, pp. 1-7, p. 3, 2015.10.1007/s11280-013-0252-2]Search in Google Scholar
[[2] Jared ETTINGER, Cyber Intelligence Tradecraft Report. The State of Cyber Intelligence Practices in the United States, Carnegie Mellon University, Software Engineering Institute, p.113, 2019.]Search in Google Scholar
[[3] Robert M. CLARK, Mark C. OLESON, Cyber Intelligence, Intelligencer: Journal of U.S. Intelligence Studies, Vol. 24, No. 3, pp. 11-23, p.14, 2018.]Search in Google Scholar
[[4] Andreas HEPP, Andreas BREITER, Digital traces in context, International Journal of Communication, No. 12, pp. 439-449, p.439, 2018.]Search in Google Scholar
[[5] Adrian BARBU, Tudor RAȚ, Big data analysis through the lens of Business Intelligence – world conflict incidents case study (1989-2016), Revista Română de Studii de Intelligence Studies, No. 17-18, pp. 157-164, p.159, 2017.]Search in Google Scholar
[[6] Elena SUSNEA, A real-time social media monitoring system as an Open Source Intelligence (OSINT) platform for early warning in crisis situations, International Conference Knowledge-Based Organization, Vol. 24, Issue 2, pp. 427-431, p. 429, 2018.10.1515/kbo-2018-0127]Search in Google Scholar
[[7] Marat Rashitovich SAFIULLIN, Polina Olegovna ERMOLAEVA, Oleg Petrovich YERMOLAEV, Renat Nailevich SELIANOV, Current Perspectives on Social Mapping of Urban Territories, Asian Social Science, Vol. 11, No. 6, pp. 207-213, p. 207, 2015.10.5539/ass.v11n6p207]Search in Google Scholar
[[8] Ana BADEA-MIHALCEA, People and Machines: Dealing with Human Factor in Cyber-Security, Considerations on Challenges and Future Directions in Cybersecurity, pp. 143-154, p. 207, 2019.]Search in Google Scholar
[[9] https://www.dogana-project.eu/index.php/social-engineering-blog/11-social-engineering/42-persuasion-techniques, accessed 21.02.2020, 15:45.]Search in Google Scholar
[[10] Neetu BANSLA, Swati KUNWAR, Khushboo JAIN, Social Engineering: A Technique for Managing Human Behavior, Journal of Information Technology and Sciences, Vol. 5, Issue 1, pp. 18-22, p. 10, 2019.]Search in Google Scholar
[[11] https://www.social-engineer.org/framework/influencing-others/influence-tactics/social-proof/, accessed 21.02.2020, 14:45.]Search in Google Scholar
[[12] Keith Gregory LOGAN, Homeland Security and Intelligence, Second Edition, p. 161, 2018.10.4324/9780429499685-9]Search in Google Scholar