• No results found

Types of Social Engineering

Vol 15, No 6 (2015)

Vol 15, No 6 (2015)

... a social engineering attack, would you even know? There are countless stories of companies falling victim to sophisticated social engineering attacks by some of the best ...what social ...

9

Popper’s Piecemeal Engineering and Social Reform in Africa

Popper’s Piecemeal Engineering and Social Reform in Africa

... of social engineers is not a diffe rence in the vision that inspires their ...some social engineers but it seems to us misleading to call their approach “utopian” or even ...two types of ...

7

User characteristics that influence judgment of social engineering attacks in social networks

User characteristics that influence judgment of social engineering attacks in social networks

... to social engineering than ...two types of trust have been proposed, trusting SN provider and trusting SN members, which are more specific to the context of social ...two types of trust ...

24

Vulnerability to social engineering in social networks : a proposed user-centric framework

Vulnerability to social engineering in social networks : a proposed user-centric framework

... in social networking sites can be classified into two types: medium trust and members trust ...the social networking site as well as trusting the members of that site leads to greater information ...

6

An Advanced Taxonomy for Social Engineering Attacks

An Advanced Taxonomy for Social Engineering Attacks

... Rootkits are programs, and in some cases a group of software tools, used to activate remote access controls to manage a computer or information systems remotely. This remote access is usually used legitimately to provide ...

11

A Taxonomy for Social Engineering Attacks via Personal Devices

A Taxonomy for Social Engineering Attacks via Personal Devices

... Furthermore, social engineering fraud has been increasing with advancements in ...technology. Social engineering is defined in several studies as manipulating and persuading people to disclose ...

8

Mitigating the risk of social engineering attacks

Mitigating the risk of social engineering attacks

... Randomly generated passwords consisting of a variety of key types (i.e., capitals, special characters, and numbers) and at least 8 characters in length are considered very secure from a technological perspective, ...

68

Social Engineering: Attack, Prevention and Framework

Social Engineering: Attack, Prevention and Framework

... As we have provided a framework to protect users from social engineering attack. Now to test user awareness, we made a fake account on gmail and try to attack on them through mail to different users. Now ...

11

The Essential Characteristics And Varieties Of Modern Training Strategies

The Essential Characteristics And Varieties Of Modern Training Strategies

... consideration will help scholars, teachers and professors to collaborate with pupils and students on a new conceptual basis, taking into account contemporary educational needs. Consideration of teaching strategies ...

10

The effects of social isolation on cognition : social loneliness reduces cognitive performance in older adults : a thesis presented in partial fulfilment of the requirement for the degree of Master of Science in Psychology at Massey University, Palmerston

The effects of social isolation on cognition : social loneliness reduces cognitive performance in older adults : a thesis presented in partial fulfilment of the requirement for the degree of Master of Science in Psychology at Massey University, Palmerston North, New Zealand

... and Social Isolation Measures on ACE-R ...and Social Isolation Measures on Memory ...and Social Isolation Measures on Fluency ...and Social Isolation Measures on Language ...and Social ...

9

The effects of social isolation on cognition : social loneliness reduces cognitive performance in older adults : a thesis presented in partial fulfilment of the requirement for the degree of Master of Science in Psychology at Massey University, Palmerston

The effects of social isolation on cognition : social loneliness reduces cognitive performance in older adults : a thesis presented in partial fulfilment of the requirement for the degree of Master of Science in Psychology at Massey University, Palmerston North, New Zealand

... in social cognition may be automatic or dependent on cognitive resources that are subsumed by the term ‘executive functions’ (Adolphs, 2001; Ybarra et ...of social cognitive neuroscience has documented that ...

128

Editorial: Thematic series on software engineering from a social network perspective

Editorial: Thematic series on software engineering from a social network perspective

... software engineering perspective, social net- works can be extracted from the archives of a software project to be able to better understand the project, the ecosystem, or software engineering as a ...

5

Social Engineering Threat and Defense: A Literature Survey

Social Engineering Threat and Defense: A Literature Survey

... use social engineering to make a convincing impersonation of that individual or gain into a business by using insider ...through social networks. In most cases they have used social ...

8

Social engineering in the context of ensuring information security

Social engineering in the context of ensuring information security

... the social engineer actions ...a social engineer, who is using social engineering techniques for his own benefit consciously and with understanding of the wrongfulness of his actions? After ...

5

Organizational Culture Types as Predictors of Corporate Social Responsibility

Organizational Culture Types as Predictors of Corporate Social Responsibility

... corporate social responsibility and organizational culture, the authors conducted an empirical study in ...corporate social responsibility questionnaire comprising 38 items was developed by the Denki Ringo ...

10

Utilizing Gamification Approaches in Pervasive Health: How Can We Motivate Physical Activity Effectively?

Utilizing Gamification Approaches in Pervasive Health: How Can We Motivate Physical Activity Effectively?

... the social aspects are evaluated as an effective strategy if used correctly and under certain ...some social aspects can involve participants in an active and engaging way, such as socializing and having ...

14

A Comprehensive Study of Social Engineering   The Art of Mind Hacking

A Comprehensive Study of Social Engineering The Art of Mind Hacking

... If we ask any security professional and he will tell you that the weakest link in the security chain is the human who accepts a person or scenario at face value. Why bother developing and planning a sophisticated ...

6

Social debt in software engineering: insights from industry

Social debt in software engineering: insights from industry

... to social debt by providing evidence of its existence and ...and social structure to elicit possible causes and effects for its ...of social networks analysis (SNA) ...of social debt, the ...

17

The Bristol Southville Home Zone: Highway or social engineering?

The Bristol Southville Home Zone: Highway or social engineering?

... clear social inclusion objectives, such as the case of a deprived community needing public investment for environmental regeneration reasons (and here too it is likely that at least part of the property market ...

12

Are social network sites the future of engineering design education?

Are social network sites the future of engineering design education?

... SNSs are highly popular for social communication. Facebook is the world’s most popular social network site with 2.13 billion monthly active users for December 2017 [11]. Because of the popularity and ...

6

Show all 10000 documents...

Related subjects