Works matching Social engineering
Results: 5000
21. századi social engineering támadások, védekezés és szervezeti hatások Európában.
- Published in:
- Belügyi Szemle / Academic Journal of Internal Affairs, 2023, v. 71, n. 1, p. 113, doi. 10.38146/BSZ.2023.1.6
- By:
- Publication type:
- Article
A social engineering támadások megelőzésének lehetőségei.
- Published in:
- Military Engineer / Hadmérnök, 2021, v. 16, n. 3, p. 173, doi. 10.32567/hm.2021.3.10
- By:
- Publication type:
- Article
KÁRTÉKONY PROGRAMOK TERJEDÉSE SOCIAL ENGINEERING TECHNIKÁKON KERESZTÜL.
- Published in:
- Military Engineer / Hadmérnök, 2019, v. 14, n. 2, p. 256, doi. 10.32567/hm.2019.2.21
- By:
- Publication type:
- Article
CLASSIFICATION OF SOCIAL ENGINEERING METHODS AND TYPES OF SOCIAL ENGINEERING ATTACKS.
- Published in:
- Brazilian Journal of Law & International Relations / Relações Internacionais no Mundo, 2023, v. 2, n. 40, p. 1
- By:
- Publication type:
- Article
Social engineering alapú információszerzés a kibertérben megvalósuló lélektani műveletek során.
- Published in:
- Military Science Review / Hadtudományi Szemle, 2019, v. 12, n. 3, p. 95, doi. 10.32563/hsz.2019.3.6
- By:
- Publication type:
- Article
Understanding Social Engineering Victimisation on Social Networking Sites: A Comprehensive Review of Factors Influencing User Susceptibility to Cyber-Attacks.
- Published in:
- Information (2078-2489), 2025, v. 16, n. 2, p. 153, doi. 10.3390/info16020153
- By:
- Publication type:
- Article
أثر الهندسة الاجتماعية على مخاطر الأمن السيبراني في البنوك في مدينة الرياض في المملكة العربية السعودية.
- Published in:
- Journal of Economic Administrative & Legal Sciences, 2025, v. 9, n. 1, p. 1, doi. 10.26389/AJSRP.A230624
- By:
- Publication type:
- Article
Reactualising the problem of social engineering and digital security.
- Published in:
- Skhid, 2024, v. 6, n. 1, p. 9, doi. 10.21847/2411-3093.2024.611
- By:
- Publication type:
- Article
Extended classification of methods of social engineering.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2014, v. 20, n. 2, p. 197, doi. 10.18372/2225-5036.20.7308
- By:
- Publication type:
- Article
SOCIAL ENGINEERING AS A PROBLEM IN SMALL ORGANIZATIONS.
- Published in:
- Annals of DAAAM & Proceedings, 2024, v. 35, p. 171, doi. 10.2507/35th.daaam.proceedings.022
- By:
- Publication type:
- Article
THE ROLE OF SOCIAL ENGINEERING IN THE ENERGY BALANCE OF SYSTEMS.
- Published in:
- Interdisciplinary Description of Complex Systems, 2023, v. 21, n. 2, p. 168, doi. 10.7906/indecs.21.2.5
- By:
- Publication type:
- Article
Challenges and Opportunities for Sustainable Engineering: Products, Services, Technologies, and Social Inclusivity with a Gender Approach.
- Published in:
- Sustainability (2071-1050), 2024, v. 16, n. 5, p. 1888, doi. 10.3390/su16051888
- By:
- Publication type:
- Article
Using machine learning algorithms to predict individuals' tendency to be victim of social engineering attacks.
- Published in:
- Information Development, 2024, v. 40, n. 2, p. 298, doi. 10.1177/02666669221116336
- By:
- Publication type:
- Article
Leveraging Dialogue State Tracking for Zero-Shot Chat-Based Social Engineering Attack Recognition.
- Published in:
- Applied Sciences (2076-3417), 2023, v. 13, n. 8, p. 5110, doi. 10.3390/app13085110
- By:
- Publication type:
- Article
A Review Article on Impact of Social Engineering Attacks against Security of IoT.
- Published in:
- Turkish Online Journal of Qualitative Inquiry, 2021, v. 12, n. 7, p. 13552
- By:
- Publication type:
- Article
Engineering concepts by engineering social norms: solving the implementation challenge.
- Published in:
- Inquiry, 2024, v. 67, n. 6, p. 1716, doi. 10.1080/0020174X.2021.1956368
- By:
- Publication type:
- Article
Hadnagy's Lesson Learned: Social Engineering Analysis in Road Development at Mesuji Regency.
- Published in:
- KnE Social Sciences, 2023, p. 177, doi. 10.18502/kss.v8i5.12997
- By:
- Publication type:
- Article
Controlling Social Engineering and Spear Phishing Attack Security with Technology Solutions in Organizations.
- Published in:
- Jurnal Indonesia Sosial Teknologi, 2025, v. 6, n. 1, p. 277
- By:
- Publication type:
- Article
PROGRAMA DE CONSCIENTIZAÇÃO COMO ESTRATÉGIA PARA COMBATER ATAQUES DE ENGENHARIA SOCIAL NO AMBIENTE CORPORATIVO.
- Published in:
- Revista Foco (Interdisciplinary Studies Journal), 2023, v. 16, n. 11, p. 1, doi. 10.54751/revistafoco.v16n11-086
- By:
- Publication type:
- Article
On emergent mobile phone-based social engineering cyberattacks in developing countries: The case of the Zambian ICT sector.
- Published in:
- African Journal of Science, Technology, Innovation & Development, 2024, v. 16, n. 6, p. 774, doi. 10.1080/20421338.2024.2387886
- By:
- Publication type:
- Article
Social Engineering Attacks: A Survey.
- Published in:
- Future Internet, 2019, v. 11, n. 4, p. 89, doi. 10.3390/fi11040089
- By:
- Publication type:
- Article
Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues.
- Published in:
- Future Internet, 2019, v. 11, n. 3, p. 73, doi. 10.3390/fi11030073
- By:
- Publication type:
- Article
Disassembly Sequence Planning for Intelligent Manufacturing Using Social Engineering Optimizer.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 4, p. 663, doi. 10.3390/sym13040663
- By:
- Publication type:
- Article
Organizational Characteristics Associated with Vulnerability to Social Engineering Deception: A Qualitative Analysis.
- Published in:
- Victims & Offenders, 2022, v. 17, n. 3, p. 421, doi. 10.1080/15564886.2021.1943092
- By:
- Publication type:
- Article
Social Engineering Preparedness of Online Banks: An Asia-Pacific Perspective.
- Published in:
- Journal of Global Information Technology Management, 2013, p. 21, doi. 10.1080/1097198x.2013.10845647
- By:
- Publication type:
- Article
Human and social reforms in Africa: the piecemeal engineering.
- Published in:
- IKENGA: International Journal of Institute of African Studies, 2022, v. 23, n. 1, p. 1, doi. 10.53836/ijia/2022/23/1/002
- By:
- Publication type:
- Article
A Naturalistic Methodology for Assessing Susceptibility to Social Engineering Through Phishing.
- Published in:
- African Journal of Information Systems, 2019, v. 11, n. 3, p. 157
- By:
- Publication type:
- Article
Exploiting personality traits in social engineering attacks.
- Published in:
- Romanian Journal of Information Technology & Automatic Control / Revista Română de Informatică și Automatică, 2022, v. 32, n. 1, p. 113, doi. 10.33436/v32i1y202209
- By:
- Publication type:
- Article
Social engineering as the new deception game.
- Published in:
- Romanian Journal of Information Technology & Automatic Control / Revista Română de Informatică și Automatică, 2021, v. 31, n. 3, p. 57, doi. 10.33436/v31i3y202105
- By:
- Publication type:
- Article
Producing Ottomans: Internal Colonization and Social Engineering in Ottoman Immigrant Settlement.
- Published in:
- Journal of Genocide Research, 2019, v. 21, n. 1, p. 1, doi. 10.1080/14623528.2018.1518001
- By:
- Publication type:
- Article
A Risk Analysis Framework for Social Engineering Attack Based on User Profiling.
- Published in:
- Journal of Organizational & End User Computing, 2020, v. 32, n. 3, p. N.PAG, doi. 10.4018/JOEUC.2020070104
- By:
- Publication type:
- Article
Managing the Three-Rivers Headwater Region, China: From Ecological Engineering to Social Engineering.
- Published in:
- AMBIO - A Journal of the Human Environment, 2013, v. 42, n. 5, p. 566, doi. 10.1007/s13280-012-0366-2
- By:
- Publication type:
- Article
ІНФОРМАЦІЙНО-ПСИХОЛОГІЧНА ВІЙНА ТА ТЕХНОЛОГІЇ СОЦІАЛЬНОГО ІНЖИНІРИНГУ.
- Published in:
- Science-Based Technologies, 2021, v. 50, n. 2, p. 130, doi. 10.18372/2310-5461.50.15684
- By:
- Publication type:
- Article
MAZEPHISHING: THE COVID-19 PANDEMIC AS CREDIBLE SOCIAL CONTEXT FOR SOCIAL ENGINEERING ATTACKS.
- Published in:
- TRAMES: A Journal of the Humanities & Social Sciences, 2021, v. 25, n. 4, p. 371, doi. 10.3176/tr.2021.4.01
- By:
- Publication type:
- Article
Measuring Awareness of Social Engineering in the Educational Sector in the Kingdom of Saudi Arabia.
- Published in:
- Information (2078-2489), 2021, v. 12, n. 5, p. 208, doi. 10.3390/info12050208
- By:
- Publication type:
- Article
What Message Characteristics Make Social Engineering Successful on Facebook: The Role of Central Route, Peripheral Route, and Perceived Risk.
- Published in:
- Information (2078-2489), 2019, v. 10, n. 6, p. 211, doi. 10.3390/info10060211
- By:
- Publication type:
- Article
Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model.
- Published in:
- Information (2078-2489), 2018, v. 9, n. 5, p. 110, doi. 10.3390/info9050110
- By:
- Publication type:
- Article
A Conceptual Model of Social Engineering.
- Published in:
- Journal of Information System Security, 2011, v. 7, n. 2, p. 3
- By:
- Publication type:
- Article
SPEAR-PHISHING AND ITS SPECIFICS WITHIN SOCIAL ENGINEERING.
- Published in:
- Annals of DAAAM & Proceedings, 2023, v. 34, p. 379, doi. 10.2507/34th.daaam.proceedings.052
- By:
- Publication type:
- Article
Falling for Social Engineering: A Qualitative Analysis of Social Engineering Policy Recommendations.
- Published in:
- Social Science Computer Review, 2023, v. 41, n. 2, p. 592, doi. 10.1177/08944393221117501
- By:
- Publication type:
- Article
Social engineering in cybersecurity: a domain ontology and knowledge graph application examples.
- Published in:
- Cybersecurity (2523-3246), 2021, v. 4, n. 1, p. 1, doi. 10.1186/s42400-021-00094-6
- By:
- Publication type:
- Article
الوعي بثقافة الهندسة الاجتماعية لدى طلبة كليات التعليم التقني بسلطنة عمان: دراسة حالة لطلبة الكلية التقنية بالمصنعة.
- Published in:
- Journal of Arts & Social Sciences (JASS), 2021, v. 12, n. 2, p. 71
- By:
- Publication type:
- Article
Encountering social engineering activities with a novel honeypot mechanism.
- Published in:
- International Journal of Electrical & Computer Engineering (2088-8708), 2023, v. 13, n. 6, p. 7056, doi. 10.11591/ijece.v13i6.pp7056-7064
- By:
- Publication type:
- Article
Ingeniería Social, Comunicología e Historia Oral.
- Published in:
- Estudios Sobre las Culturas Contemporáneas, 2009, v. 15, n. 30, p. 105
- By:
- Publication type:
- Article
Piecemeal Social Engineering and Possibility of Scientific Sociology: A Critique of Popper's Method of Social Science.
- Published in:
- Dialogue (Pakistan), 2021, v. 16, n. 4, p. 39
- By:
- Publication type:
- Article
Methodological Review of Social Engineering Policy Model for Digital Marketing.
- Published in:
- International Journal of Advanced Computer Science & Applications, 2025, v. 16, n. 1, p. 874, doi. 10.14569/ijacsa.2025.0160184
- By:
- Publication type:
- Article
Rwandan developmental ‘social engineering’: What does it imply and how is it displayed?
- Published in:
- Progress in Development Studies, 2015, v. 15, n. 2, p. 154, doi. 10.1177/1464993414565533
- By:
- Publication type:
- Article
CYBERSECURITY INERTIA AND SOCIAL ENGINEERING: WHO'S WORSE, EMPLOYEES OR HACKERS?
- Published in:
- Issues in Information Systems, 2019, v. 20, n. 3, p. 139
- By:
- Publication type:
- Article
SOCIAL ENGINEERING – MAJOR COMPONENT OF COGNITIVE WARFARE –.
- Published in:
- Romanian Military Thinking, 2022, n. 3, p. 50, doi. 10.55535/RMT.2022.3.03
- By:
- Publication type:
- Article
IŠŠŪKIAI KIBERNETINIAM SAUGUMUI: SOCIALINĖ INŽINERIJA INSTITUCINIO IZOMORFIZMO KONTEKSTE.
- Published in:
- Public Security & Public Order / Visuomenes Saugumas ir Viesoji Tvarka, 2020, n. 25, p. 389, doi. 10.13165/PSPO-20-25-26
- By:
- Publication type:
- Article