Results 31 to 40 of about 2,216,080 (192)

Business Email Compromise (BEC) Attacks: Threats, Vulnerabilities and Countermeasures—A Perspective on the Greek Landscape

open access: yesJournal of Cybersecurity and Privacy, 2023
Business Email Compromise (BEC) attacks have emerged as serious threats to organizations in recent years, exploiting social engineering and malware to dupe victims into divulging confidential information and executing fraudulent transactions.
Anastasios Papathanasiou   +3 more
doaj   +1 more source

Action research and democracy [PDF]

open access: yes, 2013
This contribution explores the relationship between research and learning democracy. Action research is seen as being compatible with the orientation of educational and social work research towards social justice and democracy.
A Feldman   +48 more
core   +1 more source

Exploiting personality traits in social engineering attacks [PDF]

open access: yesRevista Română de Informatică și Automatică, 2022
Phishing attacks have become more sophisticated over time, more than any other forms of social engineering attacks, exploiting the end users’ vulnerabilities and weaknesses.
Irina CRISTESCU   +2 more
doaj   +1 more source

Social Engineering

open access: yesSocial engineering
identifier:oai:t2r2.star.titech.ac.jp ...
Kamalakshi Naganna, Chethana R Kariger
  +7 more sources

Humanities, Discourse Transformations and Development Planning in Iran 1979-2013 [PDF]

open access: yesInterdisciplinary Studies in the Humanities, 2019
Underdevelopment is the main problem in developing countries including Iran. This problem always has been concerned of thinker and policy makers after the Islamic Revolution that has created multiple discourses and has made different relations with ...
Gh. Ghaffary, M. Jafari Moghadam
doaj   +1 more source

CYBERSECURITY IN THE FIELD OF OPEN ACCESS: PRINCIPLES FOR PROTECTING EDUCATIONAL AND SCIENTIFIC RESOURCES

open access: yesАвтоматизация технологических и бизнес-процессов
The modern era is characterized by the rapid development of information and communication technologies (ICT), which are increasingly integrating into all spheres of social life, including science, education, governance, economy, defense, and security ...
Dmytro Dets   +2 more
doaj   +1 more source

LAW IS A TOOL OF SOCIAL ENGINEERING DALAM PENANGANAN TINDAK PIDANA KORUPSI DI INDONESIA DITINJAU DARI HUKUM ISLAM DAN PERUNDANG-UNDANGAN DI INDONESI

open access: yesKodifikasia, 2017
Tindak pidana korupsi merupakan suatu masalah sangat serius dan perlu diperhatikan, karena tindak pidana korupsi dapat membahayakan stabilitas dan keamanan negara dan masyarakatnya, membahayakan pembangunan sosial dan ekonomi masyarakat, politik, bahkan ...
Martha Safira
doaj   +1 more source

Waste Bank Policy as Social Engineering Based on the Green Economy Concept in the Malang City, Indonesia

open access: yesCivil and Environmental Engineering, 2023
On average, each person in Indonesia generates 0.45 kg of waste a day. The country is home to 231.8 million people, so the average daily waste generated is approximately 104.31 million kg.
Muljaningsih Sri   +2 more
doaj   +1 more source

Devising and Detecting Phishing Emails Using Large Language Models

open access: yesIEEE Access
AI programs, built using large language models, make it possible to automatically create phishing emails based on a few data points about a user. The V-Triad is a set of rules for manually designing phishing emails to exploit our cognitive heuristics and
Fred Heiding   +4 more
doaj   +1 more source

Ethical and Social Aspects of Self-Driving Cars

open access: yes, 2018
As an envisaged future of transportation, self-driving cars are being discussed from various perspectives, including social, economical, engineering, computer science, design, and ethics.
Dodig-Crnkovic, Gordana   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy