Results 21 to 30 of about 2,216,080 (192)

Engineers and Social Engineering: Professional/Trade Unions and Social Mobility

open access: yesLabour History, 2021
Professions like engineering were a vehicle for social mobility in Australia early in the twentieth century. By the late twentieth century, despite considerable expansions in higher education, it was much harder for young people to enter a trade and then to use their skills and experience to move into professional engineering.
Forsyth, Hannah, Pearson, Michael
openaire   +3 more sources

Applying Systems Thinking to Examine and Reduce Dependency on Food Banks [PDF]

open access: yesInterdisciplinary Description of Complex Systems, 2014
Systems thinking is the art of understanding interconnections between various disciplines thereby unwinding the existing complexity. Most of the real world problems are complex, take for the example the increasing dependency rate on food banks.
Juwaeriah Abdussamad
doaj   +1 more source

PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification

open access: yesIEEE Access, 2023
Recent studies have shown that phishers are using phishing kits to deploy phishing attacks faster, easier and more massive. Detecting phishing kits in deployed websites might help to detect phishing campaigns earlier.
Felipe Castano   +3 more
doaj   +1 more source

Case Study On Social Engineering Techniques for Persuasion [PDF]

open access: yes, 2010
There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working principal of such malware then we can very easily prevent most of them even ...
Hasan, Mosin   +2 more
core   +3 more sources

Aspects of Social Engineering and Its Modalities to Countercharge and Prevent It [PDF]

open access: yesInformatică economică, 2022
In an Information Age that has been subjected to the phenomenon of forced digitalization, human propensity towards false information and the susceptibility to social engineering attacks have become a major concern in the field of information security ...
Valerica GREAVU-SERBAN   +1 more
doaj   +1 more source

Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]

open access: yes, 2010
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher   +3 more
core   +1 more source

Youth Public Associations’ Political Engagement in Russia: The Case of Krasnodar Krai

open access: yesRUDN Journal of Political Science, 2021
The article defines the place and role of youth public associations in the socio-political processes of modern Russia, analyzes the political activity of Russian youth.
Alexander Dmitrievich Pilipenko
doaj   +1 more source

Handling User-Oriented Cyber-Attacks: STRIM, a User-Based Security Training Model

open access: yesFrontiers in Computer Science, 2020
Privacy is an increasingly rare commodity. Once personal information is entered into a social network, it is no longer private. Such networks have become an incubation environment and carrier for cyber-attacks either by providing the necessary ...
Aymen Hamoud, Aymen Hamoud, Esma Aïmeur
doaj   +1 more source

Detecting Social Engineering [PDF]

open access: yes, 2006
This paper focuses on detecting social engineering attacks perpetrated over phone lines. Current methods for dealing with social engineering attacks rely on security policies and employee training, which fail because the root of the problem, people, are still involved.
Michael D. Hoeschele, Marcus K. Rogers
openaire   +2 more sources

Child’s Information Security in Digital Space of the Russian Federation

open access: yesРоссийский технологический журнал, 2019
Our time is the time of rapid technological development. The Internet is becoming available to everyone, and it is expanding its influence in various fields.
S. S. Dubov   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy