<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>27</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Zlatogor Minchev</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Cyber Threats in Social Networks and Users’ Response Dynamics</style></title><secondary-title><style face="normal" font="default" size="100%">IT4Sec Reports</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">cyber threats</style></keyword><keyword><style  face="normal" font="default" size="100%">dynamics</style></keyword><keyword><style  face="normal" font="default" size="100%">IT4Sec reports</style></keyword><keyword><style  face="normal" font="default" size="100%">scenario method</style></keyword><keyword><style  face="normal" font="default" size="100%">social networks</style></keyword><keyword><style  face="normal" font="default" size="100%">users response</style></keyword><keyword><style  face="normal" font="default" size="100%">Web 2.0</style></keyword><keyword><style  face="normal" font="default" size="100%">Web 3.0</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">December 2012</style></date></pub-dates></dates><number><style face="normal" font="default" size="100%">105</style></number><publisher><style face="normal" font="default" size="100%">Institute of Information and Communication Technologies</style></publisher><pub-location><style face="normal" font="default" size="100%">Sofia</style></pub-location><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">The report presents first results in a study on the opportunity to identify cyber threats in social networks with the help of experts’ knowledge and application of the scenario method. The process of validation is performed by two focus groups questionnaires-based surveys combined with experiments involving psycho-physiological monitoring. Study results conform with the hypothesis for users’ predisposition to hidden threats in known social network environment, related to social engineering. Additionally, correlated dynamic changes regarding studied users’ brain activity during regular surfing and entertainment activities have been also observed. The study provides a promising methodological framework for identification of obvious and hidden cyber threats in modern social networks, facilitated by already popular Web 2.0 technologies and emerging Web 3.0 solutions.</style></abstract></record><record><source-app name="Biblio" version="7.x">Drupal-Biblio</source-app><ref-type>17</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Velichka Milina</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">Security in a Communications Society: Opportunities and Challenges</style></title><secondary-title><style face="normal" font="default" size="100%">Connections: The Quarterly Journal</style></secondary-title></titles><keywords><keyword><style  face="normal" font="default" size="100%">Arab Spring</style></keyword><keyword><style  face="normal" font="default" size="100%">civil society; policy</style></keyword><keyword><style  face="normal" font="default" size="100%">Communications</style></keyword><keyword><style  face="normal" font="default" size="100%">democracy</style></keyword><keyword><style  face="normal" font="default" size="100%">Egypt</style></keyword><keyword><style  face="normal" font="default" size="100%">public diplomacy</style></keyword><keyword><style  face="normal" font="default" size="100%">revolution</style></keyword><keyword><style  face="normal" font="default" size="100%">social networks</style></keyword><keyword><style  face="normal" font="default" size="100%">Web 2.0</style></keyword></keywords><dates><year><style  face="normal" font="default" size="100%">2012</style></year><pub-dates><date><style  face="normal" font="default" size="100%">Spring 2012</style></date></pub-dates></dates><volume><style face="normal" font="default" size="100%">11</style></volume><pages><style face="normal" font="default" size="100%">53-66</style></pages><language><style face="normal" font="default" size="100%">eng</style></language><issue><style face="normal" font="default" size="100%">2</style></issue></record></records></xml>