Science topics: Social ScienceSocial Engineering
Science topic
Social Engineering - Science topic
Explore the latest questions and answers in Social Engineering, and find Social Engineering experts.
Questions related to Social Engineering
All good derives from bad. Disincentives are everything. Deduction is more rigorous than induction.
It is becoming obvious that social component is an important factor in dealing with threats and actual cyberattacks. Even the concept social engineering has acquired relevance among theoretical and practical approaches to cybersecurity. At the same time, social behaviour is strongly linked with individual psychological characteristics.
Do you consider Activity theory as a suitable theory for analyzing and studying attackers'/users' behaviour in cybersecurity research and application?
Preferably about blackmail, social engineering, social media and smart cities
Social Engineering for Social Development is a new area and course that has started in Nepalese Universities. There are very few resources that talk exactly about this topic. If you have any helping resources for this, please share the link with me. Thank you.
Hello everyone
I am interesting on social engineering topic, and I would like to do my PhD thesis in something related to SE. However, I am struggling with defining the state of art and come up with a new research idea.
So, does anyone have a suggestion of a topic or a start point?
Thanks !
I'm currently working on my master thesis in detection of phishing via machine learning. To write the basics I'm looking for reference books in this field.
Until yet I got "Handbook of Information and Communication Security" Chapter 23 from Springer Link but hopefully you can recommend some better ones.
Ideal would be books that are going into the different attack types of phishing e.g. whaling, spear-phishing and so on...
P.S.:
I still looked for Social Engineering and Spam literature but found nothing worth to mention.
Regards,
Tim Klotzbach
In my research i found many problems with this concept of "social engineering", because i only find documents with references to hacking, spywarre, and similar themes, but only a few quantity of papers mention the definition of the term in the perspective of social sciences, a work like Seeing Like a State help in the understand of this concept, but i need new sources to advance in my research....
How do government policy makers and social planners account for the possibility of bringing about the opposite result to what they desire?
Salam Afshin
Your project sounds interesting and it is very related to my works. I am wondering do you use any simulation package to create your model?
Thanks
Mohammad
To minimise online business risks such as hacktivism, malware, DDoS, spear phishing, social engineering, and ransomware for online fraud targeting intellectual property, trademarks, reputational damage, and illegal money transfers. Some of the mitigation measures include patching software regularly; using strong passwords and installing antivirus software. However, the banking business cannot prevent every cyber breach.
When gathering intelligence on human trafficking from law enforcement, boarder agencies, security services, financial intelligence units, terms such as: victim, recovered versus rescued; engaged participant under duress; criminal acts committed by victims; and many others, are inconsistent and make data analysis very challenging. Has anyone seen a taxonomy of human trafficking data that would assist in this area?
By directional communication, I mean if a single ping is sent, the receving system should be able to perceive which direction it is coming from.
EDIT: As for scale, what if we are talking about several robots (tiny bots like thymios for example) in the same room?
I've tried following the directions I see for adding an email and do not find the add email tab... Please add my personal email wetemplin@att.net to my account.
I plan to retire this year and my work email will no longer work after that.
Thanks!
Bill
I forgot my password. Please email it to me at david.cheng@louisville.edu
Thank you.
David
How can one reach reliable definition of the curriculum? All respect to great figures in the field, but the focus in each is bound to one's philosophy. So do we have one philosophy for all nations?
I am preparing to undertake some observational experiments of students [who have volunteered to be part of a Wifi use survey that includes social engineering directives] who will be pushed fake spam [from time to time] that aims to entice them to a webpage which will aim to capture their personal data. We also aim to collect their browser data [url links only] and see if they visit a webpage identified [eg. on VirusTotal or Spamhaus] as being a malware risk. When they do visit such sites or fall for our fake spam scams we contact them and arrange for suitable cybersafety materials to be sent on and/or arrange to discuss cyber-security. Ethics approval for such an observational study seems difficult and I would appreciate suggestions and/or examples of similar sort of research with students that may be cited to the Ethics Committee. THX Rod
I published a paper on e-learning platforms security issues and I just submitted an extensive version.
I am working on password complexity, strength, dictionary attacks and how those things changed over the years, what is the situation today, and what we can do to improve it. I am researching the password strength against dictionary attack based not only on strength and complexitiy but also on social engineering and cultural aspects.
If there is any interest, please contact me.
It seems that not much work - too little in fact, is being done to find solutions to detect SE attacks. I would appreciate any references to the latest SE detection techniques research.
It's often said that computing power and intelligence would exceed the collective intelligence of humans. Can computers form their own societies (with social judgements and emotions) without human intervention?
Cyber crime is the criminal explotation of the internent it is a crime that involves a computer and the internet. The major cause of this crime was found to be graduate unemployment.