Results 41 to 50 of about 2,216,080 (192)
This study aims to develop the concept of self-social engineering in the context of tourism, focusing on tourists’ pro-environmental behavior. By integrating psychological theories such as Environmental Psychology Theory, the Theory of Planned Behavior ...
Laila Refiana Said +4 more
doaj +1 more source
Testing the Human Backdoor: Organizational Response to a Phishing Campaign [PDF]
To exploit the human as the "back door" to compromising well-protected information systems of organizations, phishing-type attacks are becoming increasingly sophisticated.
Anže Mihelič +3 more
doaj +3 more sources
Diversion as an alternative to out-of-court settlement faced both theoretical and practical challenges. In the context of traffic offenses committed by minors, the practice of diversion encountered legal uncertainties about whether it could effectively ...
Syawal Abdulajid +3 more
doaj +1 more source
The Design and Evaluation of an Interactive Social Engineering Training Programme [PDF]
Social engineering is a major issue affecting organisational security. Educating employees on how to avoid social engineering attacks is important because social engineering tries to penetrate an organisation by using employees to grant authorized ...
Alkhamis, Esra, Renaud, Karen
core
Cybersecurity remains a key challenge in the development of intelligent telecommunications systems and the Internet of Things (IoT). The growing destructive impact of the digital environment, coupled with high-performance computing (HPC), requires the ...
Aleksandr Chechkin +2 more
doaj +1 more source
The penetration test has many repetitive operations and requires advanced expert knowledge, therefore, the manual penetration test is inefficient. With the development of reinforcement learning, the intelligent penetration test has been a research ...
Yang Li +4 more
doaj +1 more source
Traditional vocations and modern professions among Tamil Brahmans in colonial and post-colonial south India [PDF]
Since the nineteenth century, Tamil Brahmans have been very well represented in the educated professions, especially law and administration, medicine, engineering and nowadays, information technology.
Fuller, C. J., Narasimhan, Haripriya
core +2 more sources
Semantic social engineering attacks are a pervasive threat to computer and communication systems. By employing deception rather than by exploiting technical vulnerabilities, spear-phishing, obfuscated URLs, drive-by downloads, spoofed websites, scareware,
Ryan Heartfield +2 more
doaj +1 more source
Social Embeddedness and Agent Development [PDF]
Two different reasons for using agents are distinguished: the `engineering' perspective and the `social simulation' perspective. It is argued that this entails some differences in approach.
Edmonds, Bruce
core
Sarcasm detection on Twitter [PDF]
State-of-the-art approaches for sarcasm detection in social media combine lexical clues with contextual information surrounding the potentially sarcastic posting including author information.
Lyu, Hao
core +1 more source

