Results 11 to 20 of about 2,195,820 (278)

Applying Systems Thinking to Examine and Reduce Dependency on Food Banks [PDF]

open access: yesInterdisciplinary Description of Complex Systems, 2014
Systems thinking is the art of understanding interconnections between various disciplines thereby unwinding the existing complexity. Most of the real world problems are complex, take for the example the increasing dependency rate on food banks.
Juwaeriah Abdussamad
doaj   +1 more source

PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification

open access: yesIEEE Access, 2023
Recent studies have shown that phishers are using phishing kits to deploy phishing attacks faster, easier and more massive. Detecting phishing kits in deployed websites might help to detect phishing campaigns earlier.
Felipe Castano   +3 more
doaj   +1 more source

Action research and democracy [PDF]

open access: yes, 2013
This contribution explores the relationship between research and learning democracy. Action research is seen as being compatible with the orientation of educational and social work research towards social justice and democracy.
A Feldman   +48 more
core   +1 more source

Aspects of Social Engineering and Its Modalities to Countercharge and Prevent It [PDF]

open access: yesInformatică economică, 2022
In an Information Age that has been subjected to the phenomenon of forced digitalization, human propensity towards false information and the susceptibility to social engineering attacks have become a major concern in the field of information security ...
Valerica GREAVU-SERBAN   +1 more
doaj   +1 more source

Youth Public Associations’ Political Engagement in Russia: The Case of Krasnodar Krai

open access: yesRUDN Journal of Political Science, 2021
The article defines the place and role of youth public associations in the socio-political processes of modern Russia, analyzes the political activity of Russian youth.
Alexander Dmitrievich Pilipenko
doaj   +1 more source

Etyka budowania wizerunku w kodeksach etyki inżynierskiej [PDF]

open access: yes, 2014
The article discusses problems of image development in selected professional engineering communities, as expressed in their ethical codes. Specific codified norms are presented and their likely effects discussed on two levels: personal and social.
Wajszczyk, Piotr
core   +1 more source

Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures—A Perspective on the Greek Landscape

open access: yesJournal of Cybersecurity and Privacy, 2023
Business Email Compromise (BEC) attacks have emerged as serious threats to organizations in recent years, exploiting social engineering and malware to dupe victims into divulging confidential information and executing fraudulent transactions.
Anastasios Papathanasiou   +3 more
doaj   +1 more source

Handling User-Oriented Cyber-Attacks: STRIM, a User-Based Security Training Model

open access: yesFrontiers in Computer Science, 2020
Privacy is an increasingly rare commodity. Once personal information is entered into a social network, it is no longer private. Such networks have become an incubation environment and carrier for cyber-attacks either by providing the necessary ...
Aymen Hamoud, Aymen Hamoud, Esma Aïmeur
doaj   +1 more source

Exploiting personality traits in social engineering attacks [PDF]

open access: yesRevista Română de Informatică și Automatică, 2022
Phishing attacks have become more sophisticated over time, more than any other forms of social engineering attacks, exploiting the end users’ vulnerabilities and weaknesses.
Irina CRISTESCU   +2 more
doaj   +1 more source

Child’s Information Security in Digital Space of the Russian Federation

open access: yesРоссийский технологический журнал, 2019
Our time is the time of rapid technological development. The Internet is becoming available to everyone, and it is expanding its influence in various fields.
S. S. Dubov   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy