Results 41 to 50 of about 2,216,080 (192)

Advancing Self-Social Engineering in Tourism-Related Environmental Management: Integrating Environmental Psychology, Planned Behavior, and Norm Activation Theories

open access: yesTourism and Hospitality
This study aims to develop the concept of self-social engineering in the context of tourism, focusing on tourists’ pro-environmental behavior. By integrating psychological theories such as Environmental Psychology Theory, the Theory of Planned Behavior ...
Laila Refiana Said   +4 more
doaj   +1 more source

Testing the Human Backdoor: Organizational Response to a Phishing Campaign [PDF]

open access: yesJournal of Universal Computer Science, 2019
To exploit the human as the "back door" to compromising well-protected information systems of organizations, phishing-type attacks are becoming increasingly sophisticated.
Anže Mihelič   +3 more
doaj   +3 more sources

DIVERSION PRACTICES IN JUVENILE TRAFFIC CRIME INVESTIGATIONS AS A SOCIAL ENGINEERING TOOL: A CASE IN NORTH MALUKU, INDONESIA

open access: yesCepalo
Diversion as an alternative to out-of-court settlement faced both theoretical and practical challenges. In the context of traffic offenses committed by minors, the practice of diversion encountered legal uncertainties about whether it could effectively ...
Syawal Abdulajid   +3 more
doaj   +1 more source

The Design and Evaluation of an Interactive Social Engineering Training Programme [PDF]

open access: yes, 2016
Social engineering is a major issue affecting organisational security. Educating employees on how to avoid social engineering attacks is important because social engineering tries to penetrate an organisation by using employees to grant authorized ...
Alkhamis, Esra, Renaud, Karen
core  

A Hybrid Neural Network Transformer for Detecting and Classifying Destructive Content in Digital Space

open access: yesAlgorithms
Cybersecurity remains a key challenge in the development of intelligent telecommunications systems and the Internet of Things (IoT). The growing destructive impact of the digital environment, coupled with high-performance computing (HPC), requires the ...
Aleksandr Chechkin   +2 more
doaj   +1 more source

An Intelligent Penetration Test Simulation Environment Construction Method Incorporating Social Engineering Factors

open access: yesApplied Sciences, 2022
The penetration test has many repetitive operations and requires advanced expert knowledge, therefore, the manual penetration test is inefficient. With the development of reinforcement learning, the intelligent penetration test has been a research ...
Yang Li   +4 more
doaj   +1 more source

Traditional vocations and modern professions among Tamil Brahmans in colonial and post-colonial south India [PDF]

open access: yes, 2010
Since the nineteenth century, Tamil Brahmans have been very well represented in the educated professions, especially law and administration, medicine, engineering and nowadays, information technology.
Fuller, C. J., Narasimhan, Haripriya
core   +2 more sources

You Are Probably Not the Weakest Link: Towards Practical Prediction of Susceptibility to Semantic Social Engineering Attacks

open access: yesIEEE Access, 2016
Semantic social engineering attacks are a pervasive threat to computer and communication systems. By employing deception rather than by exploiting technical vulnerabilities, spear-phishing, obfuscated URLs, drive-by downloads, spoofed websites, scareware,
Ryan Heartfield   +2 more
doaj   +1 more source

Social Embeddedness and Agent Development [PDF]

open access: yes, 1998
Two different reasons for using agents are distinguished: the `engineering' perspective and the `social simulation' perspective. It is argued that this entails some differences in approach.
Edmonds, Bruce
core  

Sarcasm detection on Twitter [PDF]

open access: yes, 2016
State-of-the-art approaches for sarcasm detection in social media combine lexical clues with contextual information surrounding the potentially sarcastic posting including author information.
Lyu, Hao
core   +1 more source

Home - About - Disclaimer - Privacy