Articles with "social engineering" as a keyword



Photo from wikipedia

Decrypting Social Engineering: An Analysis of Conceptual Ambiguity

Sign Up to like & get
recommendations!
Published in 2019 at "Critical Criminology"

DOI: 10.1007/s10612-019-09461-9

Abstract: Social engineering is widely considered to be one of the most significant contemporary threats to information security. Despite its ubiquitous use among online criminal subcultures and security practitioners, there exists no single agreed upon conceptualization… read more here.

Keywords: engineering; social engineering; engineering analysis; analysis conceptual ... See more keywords
Photo from wikipedia

An empirical study on the susceptibility to social engineering in social networking sites: the case of Facebook

Sign Up to like & get
recommendations!
Published in 2017 at "European Journal of Information Systems"

DOI: 10.1057/s41303-017-0057-y

Abstract: Research suggests that social engineering attacks pose a significant security risk, with social networking sites (SNSs) being the most common source of these attacks. Recent studies showed that social engineers could succeed even among those… read more here.

Keywords: social networking; engineering; social engineering; source ... See more keywords
Photo by priscilladupreez from unsplash

Analysis and Findings of Social Engineering Industry Experts Explorative Interviews: Perspectives on Measures, Tools, and Solutions

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Access"

DOI: 10.1109/access.2020.2983280

Abstract: Social engineering is one of the biggest threats organizations face today, as more and more organizations are adopting digitalization. In the context of cyber security, social engineering is the practice of taking advantage of human… read more here.

Keywords: analysis findings; engineering; social engineering; findings social ... See more keywords
Photo from wikipedia

Social Engineering in Cybersecurity: Effect Mechanisms, Human Vulnerabilities and Attack Methods

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Access"

DOI: 10.1109/access.2021.3051633

Abstract: Social engineering attacks have posed a serious security threat to cyberspace. However, there is much we have yet to know regarding what and how lead to the success of social engineering attacks. This paper proposes… read more here.

Keywords: attack methods; engineering; social engineering; effect mechanisms ... See more keywords
Photo by thisisengineering from unsplash

Social Engineering Attacks Prevention: A Systematic Literature Review

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3162594

Abstract: Social engineering is an attack on information security for accessing systems or networks. Social engineering attacks occur when victims do not recognize methods, models, and frameworks to prevent them. The current research explains user studies,… read more here.

Keywords: literature review; engineering; engineering attacks; social engineering ... See more keywords
Photo from wikipedia

Utilizing Convolutional Neural Networks and Word Embeddings for Early-Stage Recognition of Persuasion in Chat-Based Social Engineering Attacks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3213681

Abstract: Social engineering is widely recognized as the key to successful cyber-attacks. Chat-based social engineering (CSE) attacks are attracting increasing attention because of recent changes in the digital work environment. Sophisticated CSE attacks target human personality… read more here.

Keywords: chat based; based social; persuasion; cse ... See more keywords
Photo from wikipedia

An Effective Double-Layer Detection System Against Social Engineering Attacks

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Network"

DOI: 10.1109/mnet.105.2100425

Abstract: In recent years, social engineering attacks that use phishing emails as the medium and target specific groups of people have occurred frequently. Current enterprise systems are vulnerable to social engineering attacks. In addition, existing detection… read more here.

Keywords: double layer; detection; engineering; engineering attacks ... See more keywords
Photo by thisisengineering from unsplash

Social Engineering: How Crowdmasters, Phreaks, Hackers, and Trolls Created a New Form of Manipulative Communication—Robert W. Gehl and Sean T. Lawson (Cambridge, MA, USA: MIT Press, 2022, 344 pp.)

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Technology and Society Magazine"

DOI: 10.1109/mts.2023.3240232

Abstract: Spend enough time online and you will inevitably come across a political debate. Within these debates, you can count on accusations that some participants are actually bots. Though the profiles appear to belong to ordinary… read more here.

Keywords: engineering crowdmasters; hackers trolls; crowdmasters phreaks; phreaks hackers ... See more keywords
Photo from wikipedia

An Enhanced Social Engineering Optimizer for Solving an Energy-Efficient Disassembly Line Balancing Problem Based on Bucket Brigades and Cloud Theory

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2022.3193866

Abstract: A disassembly line is an industrialized and automated production line which should be scheduled with high production efficiency. Although many disassembly line balancing optimization studies are contributed recently, they increase or reduce the number of… read more here.

Keywords: bucket brigades; line balancing; line; disassembly line ... See more keywords
Photo from wikipedia

Catch Me if You Can : "Delaying" as a Social Engineering Technique in the Post-Attack Phase

Sign Up to like & get
recommendations!
Published in 2023 at "Proceedings of the ACM on Human-Computer Interaction"

DOI: 10.1145/3579465

Abstract: Much is known about social engineering strategies (SE) during the attack phase, but little is known about the post-attack period. To address this gap, we conducted 17 narrative interviews with victims of cyber fraud. We… read more here.

Keywords: post attack; attack phase; social engineering;
Photo from wikipedia

Social engineering of societal knowledge in livestock science: Can we be more empathetic?

Sign Up to like & get
recommendations!
Published in 2017 at "Veterinary World"

DOI: 10.14202/vetworld.2017.86-91

Abstract: Questions are raised in effective utilization of farmer’s wisdom by communities in their farming. Planners support to livelihood emphasize mostly of inputs from outside and not setting up sustainable goals. Formal institutions and planners of… read more here.

Keywords: social engineering; engineering societal; knowledge; livestock ... See more keywords