Results 1 to 10 of about 2,195,820 (278)

Review OSINT tool for social engineering [PDF]

open access: yesFrontiers in Big Data, 2023
In recent years, we observed an increase in cyber threats, especially social engineering attacks. By social engineering, we mean a set of techniques and tools to collect information about a person or target to extort sensitive information.
Martina Nobili
doaj   +2 more sources

Financial Fraud Detection on Social Networks Based on a Data Mining Approach [PDF]

open access: yesFinancial Markets, Institutions and Risks, 2022
The article summarizes the arguments and counter-arguments within the scientific debate on the issue of researching financial frauds in the Internet. The main goal of the research is to develop methodological principles for identifying financial cyber ...
Victoria Bozhenko   +2 more
doaj   +1 more source

Psychological Aspects of the Organization’s Information Security in the Context of Socio-engineering Attacks

open access: yesУправленческое консультирование, 2022
The purpose of this review article is to determine approaches to solving existing problems in taking into account the psychological aspects of an organization’s information security in the context of socio-engineering attacks based on the analysis and ...
T. V. Tulupieva
doaj   +1 more source

Oltalama Saldırıları Farkındalık Tatbikatı Örneği

open access: yesDüzce Üniversitesi Bilim ve Teknoloji Dergisi, 2021
Kullanıcılar bilgi güvenliği zincirinde en zayıf halka olarak görülmektedir. Kurumlarda bilgi güvenliğini sağlamaya yönelik pek çok sistem kurulsa da bunlar tam bir güvenlik sağlayamamakta, bazı saldırıların kullanıcılara ulaşmasını engelleyememektedir ...
Yenal Arslan
doaj   +1 more source

MAZEPHISHING: THE COVID-19 PANDEMIC AS CREDIBLE SOCIAL CONTEXT FOR SOCIAL ENGINEERING ATTACKS [PDF]

open access: yesTrames, 2021
The first months of the COVID-19 pandemic witnessed a surge of social engineering attacks. Although the pandemic is certainly not the first occurrence of socially disruptive circumstances that drive cybercrime, relevant academic scholarship has remained ...
Kristjan Kikerpill, Andra Siibak
doaj   +1 more source

Social Engineering

open access: yesSocial engineering
identifier:oai:t2r2.star.titech.ac.jp ...
Kamalakshi Naganna, Chethana R Kariger
  +9 more sources

Asymmetric Information Dissemination in Double-Layer Networks Helps Explain the Emergence of Cooperation

open access: yesIEEE Access, 2023
This paper proposes a double-layer network game model based on asymmetric information, hoping to explore the impact of asymmetric information dissemination on the evolution of cooperation.
Xiaoming Gong
doaj   +1 more source

A Waste Bank Based on the 3R Concept: Student Interest in Waste Management at the Department of Economics, University of Brawijaya

open access: yesCivil and Environmental Engineering, 2021
The establishment of a waste bank could be a social engineering tool for changing the mindset of students. This waste bank can be managed and made useful via the so-called “3R” concept (reduce, reuse, and recycle), which is the main principle used by ...
Muljaningsih Sri
doaj   +1 more source

An Advanced Hybrid Honeypot for Providing Effective Resistance in Automatic Network Generation [PDF]

open access: yesJournal of Electrical and Computer Engineering Innovations, 2019
Background and Objectives: Increasing usage of Internet and computer networks by individuals and organizations and also attackers’ usage of new methods and tools in an attempt to endanger network security, have led to the emergence of a wide range of ...
M. Amiri, A. Barati
doaj   +1 more source

The possibilities of social planning in the aspect of training of children-northerners with special needs to independent adult life [PDF]

open access: yesАрктика и Север, 2016
The problem of lack of training of northerner children with special needs to adulthood is investigated using the definition of independence, and possible solution to this problem is to implement such a technology of social work as social project planning.
Lia A. Melkaya
doaj   +1 more source

Home - About - Disclaimer - Privacy