Results 1 to 10 of about 305,938 (168)
Enhanced SVM-based model for predicting cyberspace vulnerabilities: Analyzing the role of user group dynamics and capital influx. [PDF]
Amid substantial capital influx and the rapid evolution of online user groups, the increasing complexity of user behavior poses significant challenges to cybersecurity, particularly in the domain of vulnerability prediction.
Yicheng Long
doaj +2 more sources
Model of Social Influence in Analysis of Socio-engineering Attacks
The purpose of this study is to study the modernization of the model of an attacker’s social engineering attack on a user, taking into account a wider range of factors influencing the success of a social engineering attack associated with the principles ...
T. V. Tulupieva +2 more
doaj +1 more source
The purpose of this review article is to determine approaches to solving existing problems in taking into account the psychological aspects of an organization’s information security in the context of socio-engineering attacks based on the analysis and ...
T. V. Tulupieva
doaj +1 more source
The aim of this article is to highlight a pedagogical function that is not very visible, yet strategic, in the day-to-day actions of professionals in the service sector, particularly in the care and health sectors.
Thierry Piot
doaj +1 more source
Improving attitudes towards vulnerable road users
Some car drivers pass vulnerable road users (VRUs) at too high a speed and leave too little gap. Research suggests that out-group bias and a lack of empathy may relate to these dangerous incidents. To address this problem, four road safety videos were created with the aim of increasing car drivers' empathy toward Vulnerable Road Users (VRUs).
David Crundall, Editha van Loon
openaire +2 more sources
Research of the aviation personnel vulnerability profile to social engineering attacks
In conditions of strengthening the informational component of aviation activity, the task of ensuring aviation cybersecurity becomes extremely urgent. Currently, a regulatory framework is being developed that regulates activities in this area, both on ...
A. K. Volkov +2 more
doaj +1 more source
Structures Surrounding the ‘User’ in User Engagement: Gender-based Violence Design Engagements
User engagement is a dynamic social process influenced by who is involved and how. Here we argue that designers must account for the structural conditions of users’ lives, as they may have safety, accountability, and political implications.
Rute Fiadeiro +2 more
doaj +11 more sources
Nowadays, many users make money by publishing content on social media platforms. In order to attract users' attention, they often take measures to promote themselves.
Hongzhou Yue, Shuilong He, Zhenghui Liu
doaj +1 more source
Vulnerable users' perceptions of transport technologies [PDF]
As the global population continues to grow, age and urbanise, it is vital to provide accessible transport so that neither ageing nor disability constitutes barriers to social inclusion. While technology can enhance urban access, there is a need to study the ways by which transport technologies – real-time information, pedestrian navigation ...
Sochor, Jana, Nikitas, Alexandros
openaire +1 more source
Predicting individuals’ vulnerability to social engineering in social networks
The popularity of social networking sites has attracted billions of users to engage and share their information on these networks. The vast amount of circulating data and information expose these networks to several security risks.
Samar Muslah Albladi, George R. S. Weir
doaj +1 more source

