Engineers and Social Engineering: Professional/Trade Unions and Social Mobility
Professions like engineering were a vehicle for social mobility in Australia early in the twentieth century. By the late twentieth century, despite considerable expansions in higher education, it was much harder for young people to enter a trade and then to use their skills and experience to move into professional engineering.
Forsyth, Hannah, Pearson, Michael
openaire +3 more sources
Applying Systems Thinking to Examine and Reduce Dependency on Food Banks [PDF]
Systems thinking is the art of understanding interconnections between various disciplines thereby unwinding the existing complexity. Most of the real world problems are complex, take for the example the increasing dependency rate on food banks.
Juwaeriah Abdussamad
doaj +1 more source
PhiKitA: Phishing Kit Attacks Dataset for Phishing Websites Identification
Recent studies have shown that phishers are using phishing kits to deploy phishing attacks faster, easier and more massive. Detecting phishing kits in deployed websites might help to detect phishing campaigns earlier.
Felipe Castano +3 more
doaj +1 more source
Case Study On Social Engineering Techniques for Persuasion [PDF]
There are plenty of security software in market; each claiming the best, still we daily face problem of viruses and other malicious activities. If we know the basic working principal of such malware then we can very easily prevent most of them even ...
Hasan, Mosin +2 more
core +3 more sources
Aspects of Social Engineering and Its Modalities to Countercharge and Prevent It [PDF]
In an Information Age that has been subjected to the phenomenon of forced digitalization, human propensity towards false information and the susceptibility to social engineering attacks have become a major concern in the field of information security ...
Valerica GREAVU-SERBAN +1 more
doaj +1 more source
Experimental Case Studies for Investigating E-Banking Phishing Techniques and Attack Strategies [PDF]
Phishing is a form of electronic identity theft in which a combination of social engineering and web site spoofing techniques are used to trick a user into revealing confidential information with economic value.
Aburrous, Maher +3 more
core +1 more source
Youth Public Associations’ Political Engagement in Russia: The Case of Krasnodar Krai
The article defines the place and role of youth public associations in the socio-political processes of modern Russia, analyzes the political activity of Russian youth.
Alexander Dmitrievich Pilipenko
doaj +1 more source
Handling User-Oriented Cyber-Attacks: STRIM, a User-Based Security Training Model
Privacy is an increasingly rare commodity. Once personal information is entered into a social network, it is no longer private. Such networks have become an incubation environment and carrier for cyber-attacks either by providing the necessary ...
Aymen Hamoud, Aymen Hamoud, Esma Aïmeur
doaj +1 more source
Detecting Social Engineering [PDF]
This paper focuses on detecting social engineering attacks perpetrated over phone lines. Current methods for dealing with social engineering attacks rely on security policies and employee training, which fail because the root of the problem, people, are still involved.
Michael D. Hoeschele, Marcus K. Rogers
openaire +2 more sources
Child’s Information Security in Digital Space of the Russian Federation
Our time is the time of rapid technological development. The Internet is becoming available to everyone, and it is expanding its influence in various fields.
S. S. Dubov +2 more
doaj +1 more source

