Results 11 to 20 of about 2,195,820 (278)
Applying Systems Thinking to Examine and Reduce Dependency on Food Banks [PDF]
Systems thinking is the art of understanding interconnections between various disciplines thereby unwinding the existing complexity. Most of the real world problems are complex, take for the example the increasing dependency rate on food banks.
Juwaeriah Abdussamad
doaj +1 more source
PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification
Recent studies have shown that phishers are using phishing kits to deploy phishing attacks faster, easier and more massive. Detecting phishing kits in deployed websites might help to detect phishing campaigns earlier.
Felipe Castano +3 more
doaj +1 more source
Action research and democracy [PDF]
This contribution explores the relationship between research and learning democracy. Action research is seen as being compatible with the orientation of educational and social work research towards social justice and democracy.
A Feldman +48 more
core +1 more source
Aspects of Social Engineering and Its Modalities to Countercharge and Prevent It [PDF]
In an Information Age that has been subjected to the phenomenon of forced digitalization, human propensity towards false information and the susceptibility to social engineering attacks have become a major concern in the field of information security ...
Valerica GREAVU-SERBAN +1 more
doaj +1 more source
Youth Public Associations’ Political Engagement in Russia: The Case of Krasnodar Krai
The article defines the place and role of youth public associations in the socio-political processes of modern Russia, analyzes the political activity of Russian youth.
Alexander Dmitrievich Pilipenko
doaj +1 more source
Etyka budowania wizerunku w kodeksach etyki inżynierskiej [PDF]
The article discusses problems of image development in selected professional engineering communities, as expressed in their ethical codes. Specific codified norms are presented and their likely effects discussed on two levels: personal and social.
Wajszczyk, Piotr
core +1 more source
Business Email Compromise (BEC) attacks have emerged as serious threats to organizations in recent years, exploiting social engineering and malware to dupe victims into divulging confidential information and executing fraudulent transactions.
Anastasios Papathanasiou +3 more
doaj +1 more source
Handling User-Oriented Cyber-Attacks: STRIM, a User-Based Security Training Model
Privacy is an increasingly rare commodity. Once personal information is entered into a social network, it is no longer private. Such networks have become an incubation environment and carrier for cyber-attacks either by providing the necessary ...
Aymen Hamoud, Aymen Hamoud, Esma Aïmeur
doaj +1 more source
Exploiting personality traits in social engineering attacks [PDF]
Phishing attacks have become more sophisticated over time, more than any other forms of social engineering attacks, exploiting the end users’ vulnerabilities and weaknesses.
Irina CRISTESCU +2 more
doaj +1 more source
Child’s Information Security in Digital Space of the Russian Federation
Our time is the time of rapid technological development. The Internet is becoming available to everyone, and it is expanding its influence in various fields.
S. S. Dubov +2 more
doaj +1 more source

