<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Challenges to Human Factor for Advance Persistent Threats Proactive Identification in Modern Social Networks</style></title><secondary-title><style face="normal" font="default" size="100%">Information &amp; Security: An International Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">advanced persistent threats</style></keyword><keyword><style  face="normal" font="default" size="100%">cyber space</style></keyword><keyword><style  face="normal" font="default" size="100%">human factor</style></keyword><keyword><style  face="normal" font="default" size="100%">proactive identification</style></keyword><keyword><style  face="normal" font="default" size="100%">social networks</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2016</style></year></dates><volume><style face="normal" font="default" size="100%">34</style></volume><pages><style face="normal" font="default" size="100%">123-136</style></pages><abstract><style face="normal" font="default" size="100%">&lt;p&gt;The paper looks into the issue of proactive advanced persistent threats (APTs) identification in modern social networks. As these threats are quite unnoticeable and require a long-term, comprehensive monitoring of both technologies and users, a hybrid methodological framework is proposed. A combination of: experts&amp;rsquo; knowledge and beliefs, system analysis and real environment interactive validation is presented to meet practical APT challenges. The obtained results provide an explanatory foundation for a better understanding the interaction process of the human factor with future technological developments and resulting threats advances in the evolving cyber space.&lt;/p&gt;</style></abstract><issue><style face="normal" font="default" size="100%">2</style></issue><section><style face="normal" font="default" size="100%">123</style></section></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Threats in Social Networks and Users’ Response Dynamics</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber threats</style></keyword><keyword><style  face="normal" font="default" size="100%">dynamics</style></keyword><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword><keyword><style  face="normal" font="default" size="100%">scenario method</style></keyword><keyword><style  face="normal" font="default" size="100%">social networks</style></keyword><keyword><style  face="normal" font="default" size="100%">users response</style></keyword><keyword><style  face="normal" font="default" size="100%">Web 2.0</style></keyword><keyword><style  face="normal" font="default" size="100%">Web 3.0</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">105</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The report presents first results in a study on the opportunity to identify cyber threats in social networks with the help of experts’ knowledge and application of the scenario method. The process of validation is performed by two focus groups questionnaires-based surveys combined with experiments involving psycho-physiological monitoring. Study results conform with the hypothesis for users’ predisposition to hidden threats in known social network environment, related to social engineering. Additionally, correlated dynamic changes regarding studied users’ brain activity during regular surfing and entertainment activities have been also observed. The study provides a promising methodological framework for identification of obvious and hidden cyber threats in modern social networks, facilitated by already popular Web 2.0 technologies and emerging Web 3.0 solutions.</style></abstract></record></records></xml>