Science topic

Social Engineering - Science topic

Explore the latest questions and answers in Social Engineering, and find Social Engineering experts.
Questions related to Social Engineering
  • asked a question related to Social Engineering
Question
24 answers
All good derives from bad. Disincentives are everything. Deduction is more rigorous than induction.
Relevant answer
Answer
L.D. Edmonds Indeed. I regard that as an implicit feature since the comparatives (more, less) can apply adverbially to the adjectives "good" and "bad".
  • asked a question related to Social Engineering
Question
1 answer
Relevant answer
Answer
War with palestine terrorists not with normal mass 🕉✝️☪️👍🙏
  • asked a question related to Social Engineering
Question
5 answers
It is becoming obvious that social component is an important factor in dealing with threats and actual cyberattacks. Even the concept social engineering has acquired relevance among theoretical and practical approaches to cybersecurity. At the same time, social behaviour is strongly linked with individual psychological characteristics.
Do you consider Activity theory as a suitable theory for analyzing and studying attackers'/users' behaviour in cybersecurity research and application?
Relevant answer
Answer
@Rey Segundo Guerrero-Proenza. Thank you for your response. In my study I did not use the activity theory, instead constructivist approach is embedded in my theoretical framework of study wherein the dispersion of innovations theory is applicable. According to previous researchers, the constructivist inquiry is consistent with qualitative methods. And since my study is Qualitative research it aims to understand what people believe and feel as well as how they interpret events. You may read Rogers Dispersion and Diffusion Innovation Theory somehow might be related to your study. Thank you.
  • asked a question related to Social Engineering
Question
5 answers
Preferably about blackmail, social engineering, social media and smart cities
Relevant answer
Answer
Enterprise architecture and Information Systems
Software Agents and Internet Computing
  • asked a question related to Social Engineering
Question
7 answers
Social Engineering for Social Development is a new area and course that has started in Nepalese Universities. There are very few resources that talk exactly about this topic. If you have any helping resources for this, please share the link with me. Thank you.
Relevant answer
Answer
Purposeful social change and social development is a concept that governments can shape and manage essential features of society. The economy is managed similarly. We can assume that adequate information on spontaneous trends is available through social indicators. Thus, social trends.
  • asked a question related to Social Engineering
Question
2 answers
Hello everyone
I am interesting on social engineering topic, and I would like to do my PhD thesis in something related to SE. However, I am struggling with defining the state of art and come up with a new research idea.
So, does anyone have a suggestion of a topic or a start point?
Thanks !
Relevant answer
Answer
Dear Rafeef Baamer,
One of easily observable phenomenon in social engineering is a cardinal change of information offered in internet portals of various types and directions from textual information to a boiling mixtures of photo and/or video materials involving a visitor into a labyrinth of juicy titles, photo, video info up to sometimes openly nude ones playing on the most low-lying primitive and vulgar senses of visitors / viewers.
The advanced technologies used to cook such products aren't a culprit. Whereas social engineering methodology and goals are a clear intent to suppress conscience of unsophisticated everyman, and especially children of all ages, who are especially vulnerable to this sort of mental and spiritual pressure.
I think, this complex issue certainly deserve a thorough research attention to better understand the amount of dimensions, and the levels of threat to the entire society.
  • asked a question related to Social Engineering
Question
2 answers
I'm currently working on my master thesis in detection of phishing via machine learning. To write the basics I'm looking for reference books in this field.
Until yet I got "Handbook of Information and Communication Security" Chapter 23 from Springer Link but hopefully you can recommend some better ones.
Ideal would be books that are going into the different attack types of phishing e.g. whaling, spear-phishing and so on...
P.S.:
I still looked for Social Engineering and Spam literature but found nothing worth to mention.
Regards,
Tim Klotzbach
Relevant answer
Answer
I am not an expert in the field, but I often get recommendation for these two books:
  1. https://www.elsevier.com/books/phishing-exposed/james/978-1-59749-030
  2. Social Engineering: The Art of Human Hacking By Christopher Hadnagy, Paul Wilson (Foreword by)
  • asked a question related to Social Engineering
Question
8 answers
In my research i found many problems with this concept of "social engineering", because i only find documents with references to hacking, spywarre, and similar themes, but only a few quantity of papers mention the definition of the term in the perspective of social sciences, a work like Seeing Like a State help in the understand of this concept, but i need new sources to advance in my research....
Relevant answer
Answer
Thanks, i´m very grateful with all of you
  • asked a question related to Social Engineering
Question
3 answers
How do government policy makers and social planners account for the possibility of bringing about the opposite result to what they desire?
Relevant answer
Answer
Good question and informative answers thank you all!
  • asked a question related to Social Engineering
Question
2 answers
Salam Afshin
Your project sounds interesting and it is very related to my works. I am wondering do you use any simulation package to create your model?
Thanks
Mohammad
  • asked a question related to Social Engineering
Question
5 answers
To minimise online business risks such as hacktivism, malware, DDoS, spear phishing, social engineering, and ransomware for online fraud targeting intellectual property, trademarks, reputational damage, and illegal money transfers.  Some of the mitigation measures include patching software regularly; using strong passwords and installing antivirus software. However, the banking business  cannot prevent every cyber breach.
Relevant answer
Answer
very pertinent question in field of online retailing. online retailing is growing in leaps and bounds due to advances in technology and versatile tools to efficiently and effectively conduct transactions at customers' convenience and superior experiences . The online transactions need a interactive website storefront, secure payment, and logistic delivery system. The information communication technology(ICT) system has inherent vulnerabilities that are often exploited by cyber-criminals for Rasnsomware, denial of competitive advantage, theft of intellectual property, loss of customers trust and privacy. Therefore, should have secure server and secure payment system complemented by compliance, regular parchment updates, antivirus updates, next general firewall, end-to-end encryption; all backed by intrusion detection system (IDS) and intrusion prevention system (IPS). IPS will alert the teller of unusual external intrusions possible fraud and'or data breach.
  • asked a question related to Social Engineering
Question
4 answers
When gathering intelligence on human trafficking from law enforcement, boarder agencies, security services, financial intelligence units, terms such as: victim, recovered versus rescued; engaged participant under duress; criminal acts committed by victims; and many others, are inconsistent and make data analysis very challenging.  Has anyone seen a taxonomy of human trafficking data that would assist in this area?
Relevant answer
Answer
Hooray! Good luck!
  • asked a question related to Social Engineering
Question
4 answers
By directional communication, I mean if a single ping is sent, the receving system should be able to perceive which direction it is coming from.
EDIT: As for scale, what if we are talking about several robots (tiny bots like thymios for example) in the same room?
Relevant answer
Answer
Microwave or mm-wave would be perfectly good - broadband best.  It is not speed that matters but wavelength.  Look up monopulse accuracy, for instance.  You will need a spread of wavelengths or a spread of antennas to get accurate direction in a room.  You will need some kind of range discrimination otherwise you also locate the directions of the reflections of things in walls,  like being in a hall of mirrors.  Range discrimination requires either a spread of wavelength or widely separated antennas or a bit of both.
  • asked a question related to Social Engineering
Question
1 answer
I've tried following the directions I see for adding an email and do not find the add email tab...  Please add my personal email wetemplin@att.net to my account.
I plan to retire this year and my work email will no longer work after that.
Thanks!
Bill
Relevant answer
Answer
When you are logged in, at the top right on every researchgate page, there is your photograph, and to the right of your photograph, there is a grey downwards arrow. Click on it, then click on "settings", then click on "account settings". Click on "Add additional email". After that, you can also set your newly entered e-mail-address as primary and, if you wish, you could then delete your institutional address.
  • asked a question related to Social Engineering
Question
3 answers
I forgot my password.  Please email it to me at david.cheng@louisville.edu
Thank you.
David
Relevant answer
Answer
Can anyone tell me how to get my password from NSA?
  • asked a question related to Social Engineering
Question
6 answers
How can one reach reliable definition of the curriculum? All respect to great figures in the field, but the focus in each is bound to one's philosophy. So do we have one philosophy for all nations? 
Relevant answer
A simple research conducted on teachers' conception of curriculum on eight images provided by Schubert (1985) show that teachers do not hold any specific biased view of curriculum.  Beside social engineering, curriculum is also a "currere,", i.e., a course of experiences that students are engaged in. Other images are curriculum as subject matter or content, curriculum as a program of planned activities, curriculum as intended learning outcome, curriculum as cultural reproduction, curriculum as experience, curriculum as discrete tasks and concept.
That means to say that educators hold a 'balanced' view of curriculum.
  • asked a question related to Social Engineering
Question
12 answers
I  am preparing to undertake some observational experiments of students [who have volunteered to be part of a Wifi use survey that includes social engineering directives] who will be pushed fake spam [from time to time] that aims to entice them to a webpage which will aim to capture their personal data.  We also aim to collect their browser data [url links only] and see if they visit a webpage identified [eg. on VirusTotal or Spamhaus] as being a malware risk. When they do visit such sites or fall for our fake spam scams we contact them and arrange for suitable cybersafety materials to be sent on and/or arrange to discuss cyber-security. Ethics approval for such an observational study seems difficult and I would appreciate suggestions and/or examples of similar sort of research with students that may be cited to the Ethics Committee. THX Rod
Relevant answer
Answer
Hi Rod.
It depends from to which ethical perspective you and your institution subscribes to. I have actually done a full study on how social engineering can be measured on the three popular ethical perspectives namely deontological ethics, utilitarianism and virtue ethics. I have found that using a utilitarianism allows one to perform research on students, as the research is aimed to benefit group as a whole and thus this outweighs the impact of the harm done to the participants. However, in the same light, if you follow a deontological approach you will not be allowed to deceive the participants without their knowledge and informed consent (Which nullifies the ability to deceive them as they must be informed about it).
I have also linked the research paper to this answer. I am busy expanding this research by proposing more examples, but this is still undergoing publication. I can share with you some specific examples from it if it is required.I
I would also be really interested to know what the other respondents on this question think about the ethical views and how they influence the decision of the ethics panel. I think ethics approval is very dependent on the ethical viewpoint the panel subscribes to.
Kind Regards,
Francois
  • asked a question related to Social Engineering
Question
12 answers
I published a paper on e-learning platforms security issues and I just submitted an extensive version.
I am working on password complexity, strength, dictionary attacks and how those things changed over the years, what is the situation today, and what we can do to improve it. I am researching the password strength against dictionary attack based not only on strength and complexitiy but also on social engineering and cultural aspects.
If there is any interest, please contact me.
Relevant answer
Answer
I have sent email......
  • asked a question related to Social Engineering
Question
5 answers
It seems that not much work - too little in fact, is being done to find solutions to detect SE attacks. I would appreciate any references to the latest SE detection techniques research.
Relevant answer
Answer
Thank you Belai for linking my conference paper. I am currently busy doing new work within the field of Social Engineering detection. I have recently published two new papers which first of all better defines the field of Social Engineering and Social Engineering Attacks. https://www.researchgate.net/publication/263588276_Towards_an_Ontological_Model_Defining_the_Social_Engineering_Domain and https://www.researchgate.net/publication/263588935_Social_Engineering_Attack_Framework . I also have a student whom is currently investigating voice stress analysis and layered voice analysis for Social Engineering detection.
  • asked a question related to Social Engineering
Question
22 answers
It's often said that computing power and intelligence would exceed the collective intelligence of humans. Can computers form their own societies (with social judgements and emotions) without human intervention?
Relevant answer
Answer
As someone actively involved in AI research, machine learning, and natural language semantics, I'm fairly confident that all this AI/technological singularity stuff is complete pseudo-scientific whack. I am not discounting the idea/dream of creating an independently thinking machine some day, but I'm fairly confident we are a long, long way off. The state of the art in AI-related topics is weak, especially when it comes to general information processing and language. We can train systems to perform SOME specific tasks very well, but most AI researchers quickly fall out of their comfort zone as the complexity of problems increases, even for simple cases where humans can perform similar tasks with few problems or little training.
  • asked a question related to Social Engineering
Question
1 answer
Cyber crime is the criminal explotation of the internent it is a crime that involves a computer and the internet. The major cause of this crime was found to be graduate unemployment.
Relevant answer
Answer
Ride on Emeka. it time the youth speak out and make their world a better place for living.