<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Human Factor as a Cause of Risks in Electronic 1 Banking Services</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Pavel V. Revenkov</string-name>
          <email>pavel.revenkov@mail.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Information Security Financial University under the Government Moscow</institution>
          ,
          <addr-line>Russian Federation</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2016</year>
      </pub-date>
      <fpage>122</fpage>
      <lpage>126</lpage>
      <abstract>
        <p>- Intended for stealing confidential information, social engineering is manipulation of people's actions without any technical means, playing upon biases of the human factor. In finance and banking, it causes breaches in data protection that threaten to the business continuity and security. This subject arises from the improper preparation of customers using electronic financial services that results in thefts from bank accounts. The research explores the mutual relation of actions undertaken by data generating functions. We also analyze social engineering techniques for swindling a victim, and undertaking appropriate countermeasures. We also devise methods to reinforce cybersecurity. This research involves mathematical computations and methods of a systems analysis of scientific literature on theoretical and applied researches. We also applied a pedagogical approach to studying and summarizing the existing experience. The article analyzes the cause-and-effect relations from cybercriminal-victim perspectives. We refer to particular examples of social engineering crimes and countermeasures and examine these entangled challenges. We substantiate the importance of conventional training for countering cybercrimes. We devise intellectual development methods, organizational and legal methods for countering social engineering. The article describes how the user's social engineering legitimacy correlates with information security violations.</p>
      </abstract>
      <kwd-group>
        <kwd>RBS</kwd>
        <kwd>cybersecurity</kwd>
        <kwd>risks</kwd>
        <kwd>human commercial bank</kwd>
        <kwd>social engineering</kwd>
        <kwd>information protection</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>INTRODUCTION</title>
      <p>
        Successful results of technological development are
actively used for simplify access to savings and improve the
efficiency of financial services. The most significant
achievement in the banking business over the past 20 years can
be called a large-scale introduction of remote banking service
(RBS) technology. RBS allows customers to make banking
transactions with using various telecommunications channels
(network “Internet” in the case of Internet banking and cellular
communication for mobile payment services) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>Banking experience of customers will increasingly integrate
with existing technologies. Instead sign on a paper document,
the client can sign with electronic pen on the tablet, use face
recognition technology or compare a fingerprint for an identity
1 The article follows results of researches financed as part State Job of the
Financial University under the Government of the Russian Federation in 2017.</p>
      <p>TABLE I.</p>
      <p>FINANCIAL LOSSES OF RUSSIA IN 2016, BILLION RUBLES</p>
      <p>Stolen</p>
      <p>Saved
Individuals
Legal
entities
AWS of
BRC3
Total:
1.23
0.38
1.20
2.82
1.24
1.12
1.67
4.04</p>
      <p>Total
2.48
1.51
2.87
6.86</p>
      <p>Effectiveness
of thefts. %
50
26
42
41
II.</p>
      <p>
        Consider the fundamental interpretations of social
engineering in manuscripts of foreign authors. Most
information security researchers provides social engineering as
technique that uses influence and persuasion to deceive people,
manipulate them and convince them that social engineer is
expert in some sphere [
        <xref ref-type="bibr" rid="ref3 ref4">3, 4</xref>
        ]. As a result the victim of social
engineer unwittingly becomes source of confidential
information with or without use of technologies.
      </p>
      <p>
        The article “Advanced social engineering attacks” [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]
social engineering is describes as art of attracting users to
compromise information systems. Instead of technical attacks
on banking systems, social engineers receive private
information through manipulation by users to disclose
confidential information or commit malicious attacks to their
accounts through influence and persuasion. Technical
protection measures are usually ineffective against such
attacks. In addition, people usually believe that they are well
versed in such attacks. However, studies show that victims are
ill-prepared to detect lies and deceit.
      </p>
      <p>
        In other publications, social engineering is a technique used
by intruders to access the desired information by using flaws in
human logic, known as cognitive biases [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ], 7]. This is the use
of social masks, linguistic ruses and psychological tricks that
allow computer users to help hackers in their illegal intrusion
or use of computer systems and networks [
        <xref ref-type="bibr" rid="ref8 ref9">8, 9</xref>
        ].
      </p>
      <p>
        Social engineering is one of the most powerful tools in the
arsenal of hackers and malicious programmers. Because it is
much easier to deceive someone that he furnishes his password
for any positive result than to spend time and efforts on
breaking protected information system [
        <xref ref-type="bibr" rid="ref10 ref11">10, 11</xref>
        ].
      </p>
      <p>
        Illustration of social engineering is such example. English
researchers sent letters to employees of one large corporation
as if from the system administrator of their company. This
letters were contained request to provide their passwords, as
check of equipment is planned. 75% of the company's
employees responded to this letter and reported their password
in the letter [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>This example shows an employee's inattentive can cause
serious insider incident when bank secrecy is at stake.
Information leakage can not only seriously affect, but even
destroy the business of the credit institution, without
exaggeration. Thus, in a number of cases, careless employee
can be called an accomplice of computer criminal.</p>
    </sec>
    <sec id="sec-2">
      <title>PROBLEM FORMULATION</title>
      <p>
        The core of technologies is information. The most
vulnerable link in the automated banking system is a people.
He has flaws and the imagination of fraudster, who specializing
in the search for weaknesses of the human factor, is unlimited
[
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. But all fraudulent scenarios are subject to the same
scheme (see Fig. 1). Information security is of great importance
in optimizing technology and dissemination of Internet
services. Computer crime increases information risks and
stimulates development of information security. But ensuring
security of information is not only prerogative of specialists,
but also the task of users [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Sites of social networks
represent a space where users unconcerned communicate with
friends and relatives. Such media resources cybercriminals use
for their own purposes to steal personal data. To carry out
fraud, not only technological, but also psychological methods
are used [
        <xref ref-type="bibr" rid="ref15 ref16">15, 16</xref>
        ]. Suppose a person places photos of luxurious
interior or purchased car on his personal web-page. Then he
tells the so-called “friends” and “followers” that in a week he
will go on vacation. True friends equate this frankness with
information noise. Attackers gather information sufficient to
create forged documents. After that, the robber disruptions the
security of the target apartment and/or, with credit card
information, to take a large loan in the name of the victim [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ].
      </p>
      <p>
        It is worth emphasizing that the definition of cybersecurity
goes beyond traditional information security and includes
protection not only of information resources, but also of other
assets, including the life of the person. The human factor aspect
has ethical implications for society as a whole, since protection
and attack on certain vulnerable groups (for example, children
and pensioners) represents social responsibility [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ]. Here we
have in mind digital vandalism, cyber espionage, extortion
(through the encryption of the contents of the hard disk) and
propaganda (obsessive mailing of knowingly false
representations). Thus, to the peculiarities of crimes in the
information sphere with using human factor’s errors one can
attribute high latency of cybercrimes (from Latin “latentis” is
hidden, invisible) and, as a consequence of that, impunity of
cybercriminals [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ]. Also insufficient awareness by state
authorities at the federal and especially regional levels of
possible political, economic, moral and legal consequences of
computer crimes also is peculiarity of crimes.
      </p>
      <p>In this way, it is recommended to strengthen measures of
administrative and criminal prosecution for computer crimes
where the human factor and social engineering methods are
used to obtain confidential information.</p>
      <p>IV.</p>
    </sec>
    <sec id="sec-3">
      <title>VIGILANCE AND PROTECTION</title>
      <p>For implementation of many computer crimes, social
engineering techniques are actively used. Scammers are
increasingly attracted by bank accounts with remote access,
opened in credit organizations of Russia. Dynamics of accounts
is shown in statistics of the Bank of Russia4 (Table II).</p>
      <p>There is a tendency to increase of the total number of open
accounts from 27722.6 thousand in January 2008 to 172529.0
thousand in July 2017. Increase of 6.2 times in 9.5 years.</p>
      <p>4 Number of remote access accounts opened with credit organizations.
https://www.cbr.ru/statistics/p_sys/print.aspx?file=sheet009.htm&amp;pid=psrf&amp;si
d=ITM_39338 (circulation date December 4, 2017).</p>
      <p>We perform correlation analysis of tabular data. Number of
values is n = 39. Let’s calculate the mean values of random
variables X and Y:</p>
      <p>Let's find the mean square deviations ϭ2(x) =  (X2) / n – x̅
and ϭ2(y) =  (y2) / n – y̅:


y̅ = 3375462.20 / 39 ≈ 86550.31




ϭ(x) = √ 1426203.57 ≈ 1194.24
</p>
      <p>Its value implies a very high direct connection between the
random variables X and Y, as well as a strong compression of
the data cloud with its main axis.</p>
      <p>The coefficient of variation is ratio Vx = ϭ(x) / x̅  100% and
Vy = ϭ(y) / y̅  100%:</p>
      <p>
        The degree of data dispersion is not uniform in both cases.
Data is far from each other and from its middle axis [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ].
      </p>
      <p>A “digital person” more and more uses devices that
record information about his whereabouts and activities.
Therefore, risks of violating cybersecurity are constantly
increasing. On the diagram is depicted relationship of actions
and services producing new data about the “digital person”
(see Fig. 2). This information can be used by hackers for
computer crimes.</p>
      <p>

Therefore, covariance is Cov(x, y) =  (X  Y) / n – x̅  y̅:</p>
      <p>Positive value of covariance indicates unidirectional change
in the value of number remote access accounts of individuals
and legal entities.</p>
      <p>The correlation coefficient is rxy = Cov(x, y) / (ϭ(x) ϭ(y)).</p>
      <p>For increase of observance level of information security it
is need to bring clients and employees to the history of
cybercrime by financial institutions. After all, as said the
Russian historian V.O. Klyuchevsky “history is not a teacher,
but a warder: she does not teach, but severely punishes for
ignorance of her lessons.” We can explanation of this
phenomenon with words of V.S. Stepin (philosopher and
organizer of science), who believes that a person, beginning
with his birth, is gradually included in the system of
historically established social ties and relations. The higher the
person ascends in his historical development through
civilization's levels, the more he rises above the dominant
influence of direct biological stimuli to regulate his relations
with other people5. Biological needs predominant over moral
norms usually. It is prompt people to violate security (territorial
security, information security, economic security, etc.).</p>
      <p>V.</p>
    </sec>
    <sec id="sec-4">
      <title>CONCLUSIONS</title>
      <p>Conducted research of social engineering in electronic
banking shows that in the long term it is necessary to create not
only system of supervision in the virtual space, but also to raise
culture of behavior in it of all participants of information
exchange to prevent external and internal cyberthreats.</p>
      <p>The value and novelty of this research are that it provides
recommendations for elevating users' literacy with respect to
remote banking so to mitigate cybercrime risks. The findings
can be used by financial and educational institutions to
corroborate the dependence of cybercrimes on the users'
literacy and intellectual development methods. After all
modern banking business will strive to expand RBS.</p>
      <p>Subscriber can trust his interlocutor only if the subscriber is
an active party. If caller did a call, introduced himself as bank
employee and was asked to name any Personal Identification
Number (PIN) or password, then the subscriber is a passive
party. Therefore, the subscriber must not do anything that
interlocutor wants from him. If an interlocutor offered to call
back on some other phone and the subscriber call this phone,
then he is again a passive party. In general, if interlocutors
were presented by the bank's employees, it is necessary to call
back, but only by the official phone number, which is on the
bank card or the official website.</p>
      <p>Scammers use original techniques to weaken human
vigilance, invade his psyche and obtain valuable information.
All these techniques are based on lies6. Therefore, before the
present time there is no perfect way to confront the
information-psychological impact.</p>
      <p>Blogs of information security services of banks and groups
in social networks are excellent source of information about
new cyberthreats, malicious software, methods of fraudulent
and ways to counteract. Often the reason for disclosure of
information is excessive credulity and negligence of people
(customers and employees).</p>
      <p>
        To educate the critical perception of incoming information
in realize of social engineering methods, it is necessary to
improve the teaching of humanitarian disciplines in programs
of secondary and higher education, namely, Russian history,
5 Stepin V.S. History and philosophy of science: Textbook for graduate
students and applicants of the scientific degree of Candidate of Science.
Moscow, Academic Project, 2014, 424 р.
financial literacy and methodology of cybersecurity [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
      </p>
      <p>
        It is necessary to raise financial literacy of citizens and to
explain attractiveness of non-cash transactions for customers.
Nevertheless, talking about raising financial literacy in
isolation from general education is completely wrong. An
educational institution must to choose an audience where the
workplaces of “administrators at RBS”, “hackers” and
“customers” will be deployed. This will allow the students to
take training the algorithms of action for provide of
information protection [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. Forewarned is forearmed.
      </p>
      <p>
        After all, being financially literate is a necessity dictated by
time. The invulnerability of human's savings will be reward for
his knowledge and vigilance [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ].
      </p>
    </sec>
    <sec id="sec-5">
      <title>ACKNOWLEDGMENT</title>
      <p>The article follows results of researches financed as part
State Job of the Financial University under the Government of
the Russian Federation in 2017.</p>
      <p>
        Authors would like to express special gratitude to
colleagues and friends for their helpful comments and critical
remarks concerning this article: Sergey Vladimirovich
Dvoryankin [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], Grigory Olegovich Krylov [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ], co-author's
mother Ekaterina Vasilievna Berdyugina, etc.
      </p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Chris</given-names>
            <surname>Skinner</surname>
          </string-name>
          .
          <article-title>Digital bank: Strategies to Launch or Become а Digital Bank</article-title>
          . Singapore, Marshall Cavendish International (Asia),
          <year>2014</year>
          , 300 p.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Dorofeev</surname>
            <given-names>A.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Markov</surname>
            <given-names>A.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tsirlov</surname>
            <given-names>V.L.</given-names>
          </string-name>
          <article-title>Social media in identifying threats to ensure safe life in a modern city</article-title>
          .
          <source>Communications in Computer and Information Science</source>
          .
          <year>2016</year>
          . Vol.
          <volume>674</volume>
          . pp
          <fpage>441</fpage>
          -
          <lpage>449</lpage>
          . DOI:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -49700-6_
          <fpage>44</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Yudenkov</given-names>
            <surname>Yu</surname>
          </string-name>
          .N.
          <article-title>Internet-related technologies in banking business: outlooks and risks: workbook</article-title>
          . Moscow, KnoRus Publ.,
          <year>2014</year>
          , 318 p.
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Travis</surname>
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Wiltshire</surname>
          </string-name>
          , Samantha F. Warta, Daniel Barber,
          <string-name>
            <surname>Stephen</surname>
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Fiore</surname>
          </string-name>
          .
          <article-title>Enabling robotic social intelligence by engineering human socialcognitive mechanisms</article-title>
          .
          <source>Cognitive Systems Research</source>
          , Volume
          <volume>43</volume>
          ,
          <year>June 2017</year>
          , pp.
          <fpage>190</fpage>
          -
          <lpage>207</lpage>
          . DOI: https://doi.org/10.1016/j.cogsys.
          <year>2016</year>
          .
          <volume>09</volume>
          .005.
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>Katharina</given-names>
            <surname>Krombholz</surname>
          </string-name>
          , Heidelinde Hobel, Markus Huber,
          <string-name>
            <given-names>Edgar</given-names>
            <surname>Weippl</surname>
          </string-name>
          .
          <article-title>Advanced social engineering attacks</article-title>
          .
          <source>Journal of Information Security and Applications</source>
          ,
          <year>2015</year>
          , vol.
          <volume>22</volume>
          , pp.
          <fpage>113</fpage>
          -
          <lpage>122</lpage>
          . DOI: https://doi.org/10.1016/j.jisa.
          <year>2014</year>
          .
          <volume>09</volume>
          .005.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Francois</given-names>
            <surname>Mouton</surname>
          </string-name>
          , Louise Leenen,
          <string-name>
            <given-names>H.S.</given-names>
            <surname>Venter</surname>
          </string-name>
          .
          <article-title>Social engineering attack examples, templates and scenarios</article-title>
          .
          <source>Computers &amp; Security</source>
          ,
          <year>2016</year>
          , vol.
          <volume>59</volume>
          , pp.
          <fpage>186</fpage>
          -
          <lpage>209</lpage>
          . DOI: https://doi.org/10.1016/j.cose.
          <year>2016</year>
          .
          <volume>03</volume>
          .004.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Lyamin</surname>
            <given-names>L.V.</given-names>
          </string-name>
          <article-title>Application of electronic banking technologies: riskoriented approach</article-title>
          . Moscow, KnoRus Publ.,
          <year>2011</year>
          , 336 p.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>Nader</given-names>
            <surname>Sohrabi</surname>
          </string-name>
          <string-name>
            <surname>Safa</surname>
          </string-name>
          ,
          <article-title>Rossouw von Solms, Lynn Futcher</article-title>
          .
          <article-title>Human aspects of information security in organisations</article-title>
          .
          <source>Computer Fraud &amp; Security</source>
          ,
          <year>2016</year>
          , vol.
          <year>2016</year>
          , no.
          <issue>2</issue>
          , pp.
          <fpage>15</fpage>
          -
          <lpage>18</lpage>
          . DOI: https://doi.org/10.1016/S1361-
          <volume>3723</volume>
          (
          <issue>16</issue>
          )
          <fpage>30017</fpage>
          -
          <lpage>3</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>Hossein</given-names>
            <surname>Siadati</surname>
          </string-name>
          , Toan Nguyen, Payas Gupta, Markus Jakobsson,
          <string-name>
            <given-names>Nasir</given-names>
            <surname>Memon</surname>
          </string-name>
          .
          <article-title>Mind your SMSes: Mitigating social engineering in second factor authentication</article-title>
          .
          <source>Computers &amp; Security</source>
          , Volume
          <volume>65</volume>
          ,
          <string-name>
            <surname>March</surname>
            <given-names>2017</given-names>
          </string-name>
          , Pages
          <fpage>14</fpage>
          -
          <lpage>28</lpage>
          . DOI: https://doi.org/10.1016/j.cose.
          <year>2016</year>
          .
          <volume>09</volume>
          .009.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>David</given-names>
            <surname>Tayouri</surname>
          </string-name>
          .
          <article-title>The Human Factor in the Social Media Security - Combining Education and Technology to Reduce Social Engineering Risks and Damages</article-title>
          .
          <source>Procedia Manufacturing</source>
          . Volume
          <volume>3</volume>
          ,
          <year>2015</year>
          , Pages
          <fpage>1096</fpage>
          -
          <lpage>1100</lpage>
          . DOI: https://doi.org/10.1016/j.promfg.
          <year>2015</year>
          .
          <volume>07</volume>
          .181.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Joseph</surname>
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Hatfield</surname>
          </string-name>
          .
          <article-title>Social engineering in cybersecurity: The evolution of a concept</article-title>
          .
          <source>Computers &amp; Security</source>
          , Volume
          <volume>73</volume>
          ,
          <string-name>
            <surname>March</surname>
            <given-names>2018</given-names>
          </string-name>
          , Pages
          <fpage>102</fpage>
          -
          <lpage>113</lpage>
          . DOI: https://doi.org/10.1016/j.cose.
          <year>2017</year>
          .
          <volume>10</volume>
          .008.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>Christopher</given-names>
            <surname>Hadnagy</surname>
          </string-name>
          , Paul Wilson. Social Engineering:
          <article-title>The Art of Human Hacking</article-title>
          . Indianapolis, Wiley Publishing, Inc.,
          <year>2011</year>
          , 416 p.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Minaev</surname>
            <given-names>V.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dvoryankin S</surname>
          </string-name>
          .V.
          <article-title>Modeling the dynamics of information and psychological influence on mass consciousness</article-title>
          .
          <source>Voprosy kiberbezopasnosti [Cybersecurity issues]</source>
          ,
          <year>2016</year>
          , iss.
          <volume>5</volume>
          (
          <issue>18</issue>
          ), pp.
          <fpage>56</fpage>
          -
          <lpage>64</lpage>
          . DOI:
          <volume>10</volume>
          .21681/
          <fpage>2311</fpage>
          -3456-2016-5-
          <fpage>56</fpage>
          -64.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Revenkov</surname>
            <given-names>P.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Berdyugin</surname>
            <given-names>A.A.</given-names>
          </string-name>
          <string-name>
            <surname>Social</surname>
          </string-name>
          <article-title>Engineering as a Source of Risks in Online Banking Services</article-title>
          .
          <source>National Interests: Priorities and Security</source>
          ,
          <year>2017</year>
          , vol.
          <volume>13</volume>
          ,
          <issue>iss</issue>
          . 9, pp.
          <fpage>1747</fpage>
          -
          <lpage>1760</lpage>
          . DOI: https://doi.org/10.24891/ni.13.9.1747.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Francois</surname>
            <given-names>Mouton</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mercia M. Malan</surname>
          </string-name>
          ,
          <string-name>
            <surname>Kai K. Kimppa</surname>
            ,
            <given-names>H.S.</given-names>
          </string-name>
          <string-name>
            <surname>Venter</surname>
          </string-name>
          .
          <article-title>Necessity for ethics in social engineering research</article-title>
          .
          <source>Computers &amp; Security</source>
          ,
          <year>2015</year>
          , vol.
          <volume>55</volume>
          , pp.
          <fpage>114</fpage>
          -
          <lpage>127</lpage>
          . DOI: https://doi.org/10.1016/j.cose.
          <year>2015</year>
          .
          <volume>09</volume>
          .001
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Shamraev</surname>
            <given-names>A.V.</given-names>
          </string-name>
          <article-title>International and foreign financial regulation: institutes, transactions, infrastructure: monograph</article-title>
          . Moscow, KnoRus Publ.,
          <year>2014</year>
          , 640 p.
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Matthew</surname>
            <given-names>Edwards</given-names>
          </string-name>
          , Robert Larson, Benjamin Green, Awais Rashid,
          <string-name>
            <given-names>Alistair</given-names>
            <surname>Baron</surname>
          </string-name>
          .
          <article-title>Panning for gold: Automatically analysing online social engineering attack surfaces</article-title>
          .
          <source>Computers &amp; Security</source>
          ,
          <year>2017</year>
          , vol.
          <volume>69</volume>
          , pp.
          <fpage>18</fpage>
          -
          <lpage>34</lpage>
          . DOI: https://doi.org/10.1016/j.cose.
          <year>2016</year>
          .
          <volume>12</volume>
          .013.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Shailendra</surname>
            <given-names>Rathore</given-names>
          </string-name>
          , Pradip Kumar Sharma, Vincenzo Loia,
          <string-name>
            <surname>Young-Sik</surname>
            <given-names>Jeong</given-names>
          </string-name>
          , Jong Hyuk Park.
          <article-title>Social network security: Issues, challenges, threats, and solutions</article-title>
          .
          <source>Information Sciences</source>
          , Volume
          <volume>421</volume>
          ,
          <year>December 2017</year>
          , Pp.
          <fpage>43</fpage>
          -
          <lpage>69</lpage>
          .DOI: https://doi.org/10.1016/j.ins.
          <year>2017</year>
          .
          <volume>08</volume>
          .063.
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Denisenko</surname>
            <given-names>A.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Krylov</surname>
            <given-names>G.O.</given-names>
          </string-name>
          <article-title>Application of principal components analysis results in visual network analysis</article-title>
          .
          <source>Biosciences Biotechnology Research Asia</source>
          .
          <year>2015</year>
          . Vol.
          <volume>12</volume>
          . Iss 1. Pp.
          <volume>609</volume>
          -
          <fpage>617</fpage>
          . DOI:
          <volume>10</volume>
          .13005/bbra/1704.
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Sveta</surname>
            <given-names>K.</given-names>
          </string-name>
          <string-name>
            <surname>Berdibayeva</surname>
          </string-name>
          ,
          <string-name>
            <surname>Aiman M. Kalmatayeva</surname>
          </string-name>
          , Sholpan A. Tulebayeva.
          <article-title>Research of Formation of Personal-Professional Capacities at Higher Education Institutes Students of Pedagogical Specialties</article-title>
          .
          <source>Procedia - Social and Behavioral Sciences</source>
          , Volume
          <volume>69</volume>
          ,
          <issue>24</issue>
          <year>December 2012</year>
          , Pages
          <fpage>1174</fpage>
          -
          <lpage>1177</lpage>
          . DOI: https://doi.org/10.1016/j.sbspro.
          <year>2012</year>
          .
          <volume>12</volume>
          .048.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Sheremet</surname>
            <given-names>I. A.</given-names>
          </string-name>
          <string-name>
            <surname>Augmented Post</surname>
          </string-name>
          <article-title>Systems: The Mathematical Framework for Data and Knowledge Engineering in Network-centric Environment</article-title>
          . Berlin,
          <year>2013</year>
          . 395 p.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>