Professional Documents
Culture Documents
Findings and Results Chapter 4
Findings and Results Chapter 4
Regions
[Student’s Name]
[Date]
Findings and Results
It has been found out from the research that sociological vulnerabilities have proven to be more
increasing in the society then the technical vulnerabilities. This has directly an impact on the
psychology of the individual and he is forced through some inner power to share vulnerable data
and involve in the activity which he shouldn’t get involved. The other thing which is found out
from the research and studies is that fear play a very important role in such activities as people
sometimes or most of the times have the fear to lose their job, house or money or any asset and
they avoid putting these things on stake and do whatever the trapper wants them to do.
Those who wants to get information with the help of social engineering are highly skilled and
normal human being who isn’t exposed to technology too much and is already struggling and is
in the learning phase its quiet tough for him to judge the acts of such people because he/she
thinks that they don’t have the enough knowledge so whatever the other person is saying is
correct so in this way they are trapped and when they understand the trick, it’s too late.
Those people from low-income families who are seeking jobs or any other source of income also
get trapped because they don’t have much knowledge and their goal is to just earn money. Along
with such guys there come those people too who get trapped in online shopping scams and these
are the brilliant ones because they trap in such a manner that a person can’t think that is this legit
or scam. The scammers have also fake accounts from the names of the original stores and most
of the times when a consumer search for the original account but they find the scam accounts and
they fall in their trap. Some of the scammers trap them for money as much as they can get from
them for the product which they never have to deliver and some of them get their personal
information and then blackmail them that they will reveal this information if they didn’t pay the
certain amount which they are demanding.
Another thing which is found from above research is that there are number of apps in the app
stores which are potentially harmful for the users because they register them as legit sites and
after gaining the trust of users. They perform practices which are harmful and users’ privacy is at
stake without their knowledge. Apple store is safer in such matters but when it comes toward
android stores then there’s no guarantee or surety because anyone can register app here and
registration procedure is easy. Another noticeable thing is that there are number of links that are
1
shared with users through ads or groups and they seek information and ask to complete several
tasks and then after few requirements the users would get paid. These are nothing more than
scam or promotional offers and are potentially harmful for internet users. So, it is necessary for
the users to keep such things in mind and avoid falling in such traps, because they later just
regret nothing more than that.
In countries like UK where literacy rate is high but prior to that those people other then young
ones who are aged also found to be trapped in such traps and fell in phishing attacks.
Unintentionally sharing their passwords and login details and in several cases found that they
shared their credit card passwords and information which led them to financial loss. So, all these
cases and reasons discussed above were found out in the studies and in the coming chapter many
more things regarding this and other matters would be discussed and the minor details regarding
such issues and how to avoid them and not to fall in such traps would be discussed. It would be
discussed that by following the ethics what steps could be taken and how to stop scammers and
such people. It is a digital world and the earth is like global village without internet and online
presence it’s hard to survive for people nowadays so the matter is quiet serious.
2
Analysis and Discussion
1. Discussion
The purpose of this study is to highlight social engineering and how different organizations and
people are working at individual level and mass level to shape the beliefs, emotions and mindset
of people. They are also putting the privacies of people at risks for their short- or long-term goals
and the reasons behind these are beliefs, scams, fraud and many more like these etc. this chapter
is all about discussions upon the findings. Several reasons have been found out in the previous
chapters that why people are putting the privacy of people at risk and what are their goals and
what rewards they get in return. The significance of study is quite noticeable in nowadays world
and how the technology is evolving day by day. The main objectives of the research
To determine and examine cultural traits that are universal and could render people
vulnerable to social engineering vulnerabilities.
To assess how social class and power structures may affect someone's propensity to fall
for social engineering vulnerabilities.
To reduce social engineering risks and enhance overall cybersecurity, provide social
engineering strategy recommendations and guidance.
2. Research Questions
What are the cultural traits that are universal and could render people vulnerable to social
engineering attacks?
How social class and power structures may affect someone's propensity to fall for social
engineering vulnerabilities?
Explain in detail the real-world case studies of social engineering attacks in different
nations, emphasizing cultural distinctions and vulnerability patterns?
3
How to reduce social engineering risks and enhance overall cybersecurity, provide social
engineering vulnerabilities strategy recommendations and guidance?
1. Power Distance (PD): This dimension reflects the extent to which less powerful
members of a society accept and expect an unequal distribution of power. In high power
distance cultures, hierarchical structures are prevalent, and authority is respected
(Hofstede, G., 1980). In low power distance cultures, there's a greater emphasis on
equality and minimizing hierarchical gaps.
2. Individualism vs. Collectivism (IDV): This dimension highlights the degree to which
individuals prioritize their own interests versus those of the group. Individualistic cultures
emphasize personal achievement and autonomy, while collectivist cultures prioritize
group harmony and interdependence (Triandis, 1994).
4
3. Masculinity vs. Femininity (MAS): This dimension represents the extent to which a
culture values assertiveness, competition, and material success (masculinity) versus
nurturing, cooperation, and quality of life (femininity) (Nisbett, 2003).
6. Indulgence vs. Restraint (IND): Also added later, this dimension reflects the extent to
which a society allows gratification of desires and enjoyment of life versus controlling
desires and enforcing strict social norms (Schwartz, 1994).
3.2. Analysis of How Cultural Factors Impact Security Attitudes and Behaviors:
Cultural dimensions can significantly influence individuals' attitudes and behaviors related to
security:
1. Power Distance: High power distance cultures might be more susceptible to authority-
based social engineering tactics (Smith, P. B., & Bond, M. H. , 1993). Individuals may be
more likely to comply with requests from perceived superiors, which attackers could
exploit.
5
4. Uncertainty Avoidance: High uncertainty avoidance cultures might be more cautious
and conservative in their security practices, whereas low uncertainty avoidance cultures
might adapt more readily to new security measures.
Let's delve into the cultural influences on trust, risk perception, and information sharing,
followed by a discussion of case studies illustrating cultural variations in susceptibility to social
engineering attacks:
2. Risk Perception: Different cultures have varying tolerance levels for risk. High
uncertainty avoidance cultures perceive risks more acutely and are inclined to adopt
cautious behaviors (Oyserman, D., Coon, H. M., & Kemmelmeier, M. , 2002). In
contrast, low uncertainty avoidance cultures might be more open to new experiences and
therefore might not be as vigilant against potential risks.
3. Information Sharing: Cultural norms also shape attitudes toward information sharing.
In high-context cultures, where communication relies heavily on context and nonverbal
cues, sharing sensitive information might be more implicit (Hofstede, G., & Minkov, M. ,
2010). In low-context cultures, communication is more explicit, which could affect how
information is shared.
6
4. Face and Reputation: Certain cultures place a strong emphasis on "saving face" or
maintaining a positive reputation. Attackers can manipulate this by threatening to expose
embarrassing information, leading individuals to comply with demands to protect their
reputation (Hofstede, 1998).
2. Middle East - Authority Exploitation: In cultures with high power distance, such as
some Middle Eastern countries, attackers exploit respect for authority figures. Phishing
emails posing as government officials might be particularly effective in these regions due
to the strong emphasis on obedience (Leung, K., Bhagat, R. S., Buchan, N. R., Erez, M.,
& Gibson, C. B. , 2005).
4. China - Guanxi and Spear Phishing: Guanxi, the concept of building strong
relationships for mutual benefit, is culturally significant in China. Attackers leverage this
by conducting spear-phishing attacks targeting relationships and networks within
organizations (House, R. J., Hanges, P. J., Javidan, M., Dorfman, P. W., & Gupta, V. ,
2004).
5. India - Fear and Social Hierarchies: Hierarchical structures and respect for authority
are crucial in Indian culture. Attackers exploit this by posing as high-ranking executives,
7
using fear tactics to manipulate lower-level employees into providing sensitive
information (Schwartz, 1992).
6. Global Social Media Exploitation: The universality of social media has enabled attacks
that exploit both cultural and individual traits. Attackers create fake profiles that resonate
with cultural and personal interests, making it easier to establish trust and manipulate
victims into sharing sensitive information (Triandis, H. C., 1989).
These case studies demonstrate how social engineering tactics are customized to cultural
nuances, emphasizing the importance of considering cultural factors when designing
cybersecurity strategies and awareness programs. By analyzing the cultural dimensions and
psychological tendencies of different regions, you can gain insights into why certain tactics
might be more successful in specific cultural contexts.
Let's compare social engineering vulnerabilities in different regions (North America, Europe,
Asia, Middle East) and discuss the cultural factors that contribute to vulnerabilities in each
region:
2. Europe:
8
skepticism toward authority-based attacks (Gudykunst, W. B., Ting-Toomey, S., &
Chua, E, 1988).
3. Asia:
4. Middle East:
Vulnerabilities: Spear phishing, pretexting, and baiting attacks are notable. High
power distance cultures may lead to unquestioning compliance with perceived
authority figures.
Cultural Factors: Strong emphasis on trust and loyalty within networks can lead
to exploitation via social engineering. Cultural norms around hospitality might
make individuals more willing to help, even if it involves divulging information
(Smith, P. B., Bond, M. H., & Kagitcibasi, C. , 2006).
2. Europe:
9
Impact: Diversity makes it challenging to identify attacks across languages and
cultures. Cultural differences in risk perception can affect the readiness to identify
threats.
3. Asia:
4. Middle East:
In each region, understanding the cultural factors and how they interact with universal
psychological vulnerabilities is key to creating effective cybersecurity strategies. By tailoring
security awareness initiatives to cultural contexts, organizations can improve resilience against
social engineering attacks.
5. Different Regions
let's highlight the similarities and differences in susceptibility to social engineering attacks across
the regions of North America, Europe, Asia, and the Middle East:
Similarities in Susceptibility:
10
1. Trust Exploitation: Across all regions, attackers exploit the universal trait of trust.
Whether through impersonation, authority exploitation, or building false relationships,
trust is a central vulnerability.
2. Curiosity and Temptation: People's curiosity and desire for rewards are universal traits
that attackers manipulate with enticing offers, freebies, or false promises.
3. Fear and Urgency: Creating a sense of urgency or fear to rush victims into making hasty
decisions is a tactic that transcends cultural boundaries.
2. Power Distance: High power distance cultures (Asia, Middle East) are more susceptible
to authority exploitation due to the strong emphasis on respecting hierarchical positions.
3. Collectivism vs. Individualism: Collectivist cultures (Asia, Middle East) might be more
prone to group-oriented decisions, which could lead to ignoring security measures in
favor of maintaining harmony.
5. Risk Perception: High uncertainty avoidance cultures (Asia, Middle East) might be
more cautious and conservative, potentially leading to a lower risk appetite and greater
susceptibility to fear-based tactics.
6. Cultural Nuances: The specific tactics used in social engineering attacks may vary
based on cultural norms, values, and customs, but the foundational vulnerabilities being
targeted remain similar.
11
5.2. Mitigation Strategies:
1. Awareness and Education: Addressing cultural differences in risk perception and
communication styles is crucial. Customizing training content to resonate with specific
cultural contexts can enhance effectiveness.
3. Tailored Training: Different regions require different emphases. For high power
distance cultures, focusing on critical evaluation of authority-based requests is crucial. In
low-context cultures, training might emphasize explicit communication and skepticism.
Understanding both the common vulnerabilities and the nuanced differences in susceptibility is
essential for designing comprehensive and culturally sensitive cybersecurity strategies. By
identifying and addressing these factors, organizations can better defend against social
engineering attacks in various regions.
7. Specific
let's examine specific social engineering attacks in each region (North America, Europe, Asia,
Middle East) and analyze the cultural nuances and human behaviors that contributed to the
success of these attacks:
12
Attack Description: A phishing attack targeting a technology company in the United States
resulted in several employees divulging their login credentials. Attackers sent convincing emails
disguised as internal IT announcements, prompting employees to log in through a fake portal.
Multilingual Diversity: The diversity of languages and cultures across Europe made it
challenging for employees to distinguish between legitimate and malicious emails.
13
guanxi, emphasizing mutual benefits, to manipulate the company into sharing confidential
specifications (Leung, 2012).
Attack Description: An oil and gas company in the Middle East fell victim to a phone-based
attack where attackers posed as government officials demanding sensitive project information.
Employees complied due to the strong respect for authority figures in the culture (Gudykunst, W.
B., & Hammer, M. R. , 1988).
14
Situational Judgment Training: Promoting situational awareness and encouraging
employees to assess the situation before acting can mitigate urgency-based attacks.
By analyzing these region-specific attacks and understanding how cultural nuances and human
behaviors contribute to susceptibility, organizations can design targeted awareness programs and
strategies to counter the success of social engineering attacks.
7. Learning
Learning from each case study is crucial for improving security awareness and training
strategies. Let's extract the lessons learned from the case studies in North America, Europe, Asia,
and the Middle East:
Action: Educate employees about the importance of verifying login portals and
double-checking URLs before entering credentials.
Rationale: This will help employees avoid falling for fake portals set up by
attackers to steal login information (Gudykunst, 2003).
15
Rationale: Attacker tactics exploit the tech-centric culture's desire for speed, so
encouraging cautious verification can mitigate such risks (Gudykunst, W. B.,
Ting-Toomey, S., & Chua, E, 1988).
Action: Develop training modules that specifically address spear phishing and
emphasize the importance of scrutinizing personalized emails.
Rationale: Highlighting the tactics used in this attack can make employees more
vigilant against sophisticated attempts (Hofstede, G., 1980).
Rationale: This ensures that language barriers don't hinder employees' ability to
recognize and report suspicious communications.
Action: Incorporate training that educates employees about guanxi culture and its
potential impact on security decisions (Markus, H. R., & Kitayama, S., 1991).
Rationale: This will help employees identify situations where attackers might
exploit relationships for unauthorized access.
16
Action: Promote a balance between group harmony and individual security
consciousness.
Action: Illustrate how attackers might manipulate cultural values to create a sense
of mutual benefit.
Rationale: This awareness can make employees more cautious about sharing
sensitive information, even in seemingly beneficial scenarios.
17
By implementing these lessons learned, organizations can enhance their security awareness and
training efforts, making employees more resilient against the various social engineering tactics
that exploit cultural nuances and human behaviors.
8. Practical Implications
let's delve into the practical implications for organizations operating in culturally diverse
environments and strategies for tailoring security awareness programs to different cultural
contexts:
Action: Conduct cultural assessments to identify the key cultural dimensions and
tendencies that might influence security behaviors.
Action: Customize training materials, messages, and content to resonate with the
cultural values, norms, and language of different groups.
18
Action: Collaborate with cultural experts or consultants to integrate cultural
nuances into security policies, procedures, and incident response plans.
Rationale: Relatable examples resonate better with employees and make security
concepts more tangible.
Rationale: This approach provides relatable figures for employees to look up to,
fostering a sense of belonging in security practices.
19
Strategy: Organize workshops and discussions to address security concerns
within specific cultural contexts.
7. Storytelling Approach:
Rationale: Stories resonate deeply and evoke emotions, making the importance
of security more impactful.
By applying these practical implications and strategies, organizations can build a stronger
security culture in culturally diverse environments, making security awareness efforts more
relatable, effective, and inclusive.
20
1. Understanding Cultural Nuances: Security professionals often work with diverse teams
and client bases. Cross-cultural training equips them with insights into cultural norms,
communication styles, and behavioral patterns that influence security practices.
6. Minimizing Bias and Stereotypes: Unconscious biases and stereotypes can negatively
impact security decision-making. Cross-cultural training raises awareness about these
biases, enabling security professionals to make more objective judgments (Gudykunst, W.
B., & Hammer, M. R. , 1988).
21
9. Preventing Insider Threats: Insider threats can be influenced by cultural factors. Cross-
cultural training aids in identifying signs of disgruntlement, dissatisfaction, or behavioral
changes in individuals that might signal potential insider threats.
11. Crisis Management: During crises, security professionals must manage situations that
involve individuals from different cultures. Cross-cultural training prepares them to
handle crises with cultural sensitivity and minimize panic or misunderstanding.
12. Promoting Inclusivity: Inclusive security practices are essential for employee morale
and compliance. Cross-cultural training helps security professionals develop security
strategies that consider cultural diversity and create a sense of inclusivity (Earley, P. C., &
Gibson, C. B. , 1998).
22
Conclusion and Recommendation
2. Cultural Diversity: Cultural diversity within regions might not have been fully
represented, leading to generalizations that don't account for intraregional variations.
3. Contextual Factors: The study might not have considered specific contextual factors
within each region that could influence social engineering vulnerabilities.
4. Temporal Considerations: Cultural norms and vulnerabilities can change over time. The
study might not have accounted for evolving cultural dynamics.
5. Psychological Individuality: The study might not have fully addressed the individual
psychological variations within cultural groups, which can influence susceptibility.
23
Integration of Psychological Theories:
1. Cognitive Dissonance Theory: Investigate how individuals from collectivist cultures
manage cognitive dissonance between group values and security-related behaviors.
2. Social Identity Theory: Explore how group identity and intergroup dynamics influence
attitudes toward cybersecurity practices within organizations.
3. Health Belief Model: Apply the model to understand how cultural factors impact
individuals' perceived susceptibility to social engineering attacks and their perceived
benefits of security measures.
4. Elaboration Likelihood Model: Investigate how cultural context affects the central and
peripheral routes of information processing when it comes to security awareness.
5. Cultural Intelligence Theory: Examine how security professionals with higher cultural
intelligence are more adept at tailoring awareness programs to different cultural contexts.
Integrating these psychological theories into future research can provide a richer understanding
of how cultural dimensions intersect with individual psychology to shape responses to social
engineering vulnerabilities. This holistic approach can lead to more effective strategies for
improving security awareness and mitigating risks across diverse cultural settings.
2. Universal Vulnerabilities: Certain vulnerabilities, like trust, curiosity, and fear, are
universal, but their expressions are influenced by cultural contexts. Attackers exploit
these vulnerabilities across regions.
24
4. Mitigation Challenges: Cultural differences affect risk perception, communication
styles, and decision-making. One-size-fits-all security awareness approaches might not be
effective in diverse environments.
1. Enhanced Security Awareness Strategies: The study provides insights into how cultural
factors influence susceptibility to social engineering attacks. This knowledge can guide
organizations in developing tailored security awareness strategies that consider cultural
dynamics.
5. Cross-Disciplinary Insights: The study bridges the gap between cybersecurity and
cultural studies, showcasing the relevance of cultural insights in understanding and
mitigating cybersecurity risks.
6. Tailored Training Programs: Organizations can leverage the study's findings to design
training programs that resonate with employees from diverse cultural backgrounds,
fostering better engagement and awareness.
25
Overall, the study enriches the understanding of how cultural dimensions intersect with social
engineering vulnerabilities, providing a foundation for more context-aware, culturally sensitive,
and effective cybersecurity practices in today's interconnected world.
Conclusion
Understanding cultural influences on security behaviors is no longer just an academic pursuit it's
a critical imperative for organizations, individuals, and policymakers alike. In a world
interconnected by technology and traversed by cyber threats, recognizing the impact of culture
on security behaviors is paramount. Here are some final thoughts on its importance:
5. Mitigating Bias: Cultural insights help mitigate biases that can lead to security lapses.
Recognizing that cultural values might influence perceptions helps individuals approach
security with a more open and objective mindset.
6. Tailored Strategies: What works in one cultural context might not in another. Tailored
strategies acknowledge these differences, making security awareness and practices more
relatable and effective.
26
7. Respect and Trust: Promoting security measures that respect cultural norms enhances
trust between employees and the organization. Respecting cultural values fosters a sense
of partnership in maintaining security.
9. Continuous Learning: Cultures evolve, and with them, security dynamics change.
Embracing a culture-aware approach means staying attuned to these shifts and adapting
security measures accordingly.
10. Harmonious Coexistence: Cultures coexist in the global cyber landscape. Recognizing
and understanding these cultures enriches cybersecurity efforts and contributes to a
harmonious and secure digital environment.
In summary, understanding the role of culture in security behaviors elevates cybersecurity from a
technical concern to a holistic effort that accounts for the diversity of human behavior. It
empowers individuals to be proactive defenders of their digital lives, organizations to be
adaptable in the face of evolving threats, and society to collectively safeguard the digital world
we share.
Recommendations
Here are some recommendations for individuals, organizations, and policymakers to better
understand and address the influence of cultural factors on security behaviors:
For Individuals:
1. Cultural Awareness: Take the initiative to educate yourself about the cultural norms and
practices of colleagues, clients, and partners from diverse backgrounds. This awareness
can enhance communication and foster respect.
27
3. Continuous Learning: Stay informed about evolving cybersecurity threats and cultural
dynamics. Attend workshops, webinars, or seminars that offer insights into the
intersection of culture and security.
4. Open Communication: Discuss security concerns and potential threats openly with
colleagues. Encourage a culture where everyone feels comfortable raising security-related
questions or reporting suspicious activities.
5. Cultural Sensitivity: When interacting with individuals from different cultures, practice
empathy and adapt your communication style to ensure mutual understanding and avoid
misunderstandings.
For Organizations:
1. Cultural Diversity Training: Implement cross-cultural training for employees,
especially those in security and IT roles. Teach them to recognize cultural nuances and
adapt their approaches accordingly.
28
For Policymakers:
1. Cultural Research Funding: Allocate resources for research that examines the interplay
between cultural factors and cybersecurity vulnerabilities. This research can guide policy
formulation and strategy development.
4. Education and Public Awareness: Launch campaigns that educate the public about the
role of cultural factors in cybersecurity. Raise awareness about how cultural awareness
can contribute to a safer online environment.
5. Promote Diversity in Tech: Encourage initiatives that promote diversity and inclusivity
in the tech industry. A diverse workforce brings varied perspectives that can contribute to
more culturally aware security practices.
Implementing these recommendations can lead to a more culturally sensitive, effective, and
collaborative approach to cybersecurity, resulting in a safer digital landscape for individuals,
organizations, and societies worldwide.
29
References
Brislin, R. W. , 1993. Understanding culture's influence on behavior. , s.l.: Harcourt Brace
Jovanovich College Publishers..
Earley, P. C., & Gibson, C. B. , 1998. Taking stock in our progress on individualism-
collectivism: 100 years of solidarity and community.. Journal of Management, Volume
24(3), pp. 265-304.
Gelfand, M. J., Bhawuk, D. P., Nishii, L. H., & Bechtold, D. J. , 2004. Individualism and
collectivism.. Handbook of multicultural perspectives on stress and coping, Volume 3, pp.
107-123.
Gudykunst, W. B., & Hammer, M. R. , 1988. Strangers and hosts: An uncertainty reduction based
theory of intercultural adaptation.. Communication Theory, Volume 1(4), pp. 311-321.
Gudykunst, W. B., 2003. Bridging differences: Effective intergroup communication. , s.l.: Sage
Publications.
Gudykunst, W. B., Ting-Toomey, S., & Chua, E, 1988. Culture and interpersonal communication,
s.l.: Sage Publications.
Hofstede, G., & Minkov, M. , 2010. Long-versus short-term orientation: New perspectives. Asia
Pacific Business Review, Volume 16(4), pp. 493-504.
30
Hofstede, G., Hofstede, G. J., & Minkov, M. , 2010. Cultures and organizations: Software of the
mind. , s.l.: McGraw-Hill..
House, R. J., Hanges, P. J., Javidan, M., Dorfman, P. W., & Gupta, V. , 2004. Culture, leadership,
and organizations: The GLOBE study of 62 societies., s.l.: Sage Publications..
Kim, Y. Y., 2005. Communication and cross-cultural adaptation: An integrative theory., s.l.:
Routledge..
Leung, K., Bhagat, R. S., Buchan, N. R., Erez, M., & Gibson, C. B. , 2005. Culture and
international business: Recent advances and their implications for future research..
Journal of International Business Studies, Volume 36(4), pp. 357-378.
Markus, H. R., & Conner, A. , (2019). Clash! How to thrive in a multicultural world. , s.l.:
Penguin.
Markus, H. R., & Conner, A. , 2013. Clash! 8 cultural conflicts that make us who we are., s.l.:
Penguin..
Markus, H. R., & Kitayama, S., 1991. Culture and the self: Implications for cognition, emotion,
and motivation. Psychological Review,, Volume 98(2), pp. 224-253..
Nisbett, R. E., 2003. The geography of thought: How Asians and Westerners think
differently...and why., s.l.: Simon and Schuster..
Oetzel, J. G., Ting-Toomey, S., Masumoto, T., Yokochi, Y., Pan, X., Takai, J., ... & Wilcox, R. ,
2001. Face and facework in conflict: A cross-cultural comparison of China, Germany,
Japan, and the United States.. Communication Monographs, Volume 68(3), pp. 235-258.
Oyserman, D., Coon, H. M., & Kemmelmeier, M. , 2002. Rethinking individualism and
collectivism: Evaluation of theoretical assumptions and meta-analyses.. Psychological
Bulletin, Volume 128(1), pp. 3-72.
31
Schwartz, S. H., 1992. Universals in the content and structure of values: Theoretical advances
and empirical tests in 20 countries.. Advances in Experimental Social Psychology,
Volume 25, pp. 1-65.
Smith, P. B., & Bond, M. H. , 1993. Social psychology across cultures: Analysis and
perspectives. , s.l.: Harvester Wheatsheaf..
Smith, P. B., Bond, M. H., & Kagitcibasi, C. , 2006. Understanding social psychology across
cultures: Engaging with others in a changing world. , s.l.: Sage Publications..
Triandis, H. C., 1989. The self and social behavior in differing cultural contexts.. Psychological
Review, Volume 96(3), pp. 506-520.
Trompenaars, F., & Hampden-Turner, C. , 2012. Riding the waves of culture: Understanding
diversity in global business. , s.l.: Nicholas Brealey Publishing.
32