Works about SOCIAL engineering (Fraud)
Results: 423
The political economy of Berlusconi's tax-benefit policy: rhetoric or reality?
- Published in:
- Contemporary Italian Politics, 2024, v. 16, n. 4, p. 452, doi. 10.1080/23248823.2024.2395168
- By:
- Publication type:
- Article
The Shariatisation of Indonesia: The Politics of the Council of Indonesian Ulama (Majelis Ulama Indonesia, MUI).
- Published in:
- International Quarterly for Asian Studies, 2024, v. 55, n. 4, p. 566
- By:
- Publication type:
- Article
I'll Be There for You: Generating Sustained Student Connectedness from the Beginning. A Practice Report.
- Published in:
- Student Success, 2025, v. 16, n. 1, p. 82, doi. 10.5204/ssj.3527
- By:
- Publication type:
- Article
ШТУЧНИЙ ІНТЕЛЕКТ: КІБЕРБЕЗПЕКА НОВОГО ПОКОЛІННЯ.
- Published in:
- Ukrainian Scientific Journal of Information Security, 2024, v. 30, n. 2, p. 244, doi. 10.18372/2225-5036.30.19235
- By:
- Publication type:
- Article
Understanding the Role of Demographic and Psychological Factors in Users' Susceptibility to Phishing Emails: A Review.
- Published in:
- Applied Sciences (2076-3417), 2025, v. 15, n. 4, p. 2236, doi. 10.3390/app15042236
- By:
- Publication type:
- Article
Understanding Social Engineering Victimisation on Social Networking Sites: A Comprehensive Review of Factors Influencing User Susceptibility to Cyber-Attacks.
- Published in:
- Information (2078-2489), 2025, v. 16, n. 2, p. 153, doi. 10.3390/info16020153
- By:
- Publication type:
- Article
Mathematical Modeling and Clustering Framework for Cyber Threat Analysis Across Industries.
- Published in:
- Mathematics (2227-7390), 2025, v. 13, n. 4, p. 655, doi. 10.3390/math13040655
- By:
- Publication type:
- Article
Controlling Social Engineering and Spear Phishing Attack Security with Technology Solutions in Organizations.
- Published in:
- Jurnal Indonesia Sosial Teknologi, 2025, v. 6, n. 1, p. 277, doi. 10.59141/jist.v6i1.1361
- By:
- Publication type:
- Article
The Path to a Soviet Nation: The Policy of Belarusization.
- Published in:
- 2023
- By:
- Publication type:
- Book Review
Intelligent phishing website detection using machine learning.
- Published in:
- Multimedia Tools & Applications, 2023, v. 82, n. 19, p. 29431, doi. 10.1007/s11042-023-14731-4
- By:
- Publication type:
- Article
RE-IMAGINING ECOLOGICAL SUSTAINABLE DURBAN: A DRIVE TOWARDS ECOLOGICALLY SUSTAINABLE TRANSPORTATION.
- Published in:
- Journal of Public Administration (0036-0767), 2024, v. 59, n. 3, p. 440, doi. 10.53973/jopa.2024.59.3.a7
- By:
- Publication type:
- Article
أثر الهندسة الاجتماعية على مخاطر الأمن السيبراني في البنوك في مدينة الرياض في المملكة العربية السعودية.
- Published in:
- Journal of Economic Administrative & Legal Sciences, 2025, v. 9, n. 1, p. 1, doi. 10.26389/AJSRP.A230624
- By:
- Publication type:
- Article
افتتاحية العدد.
- Published in:
- Journal of Economic Administrative & Legal Sciences, 2025, v. 9, n. 1, p. 1
- By:
- Publication type:
- Article
PROGRAMA DE CONSCIENTIZAÇÃO COMO ESTRATÉGIA PARA COMBATER ATAQUES DE ENGENHARIA SOCIAL NO AMBIENTE CORPORATIVO.
- Published in:
- Revista Foco (Interdisciplinary Studies Journal), 2023, v. 16, n. 11, p. 1, doi. 10.54751/revistafoco.v16n11-086
- By:
- Publication type:
- Article
Client Authentication By Selected Secure Password-Based On Image Using Challenge Handshake Authentication Protocol.
- Published in:
- Iraqi Journal of Information Technology, 2019, v. 9, n. 3, Part 1, p. 39
- By:
- Publication type:
- Article
Uso responsable de Internet y seguridad digital: revisión sistemática de programas educativos.
- Published in:
- Estudios Sobre Educacion, 2024, n. 47, p. 125, doi. 10.15581/004.47.006
- By:
- Publication type:
- Article
Socially Engineering Facebook.
- Published in:
- ISSA Journal, 2024, v. 22, n. 7, p. 14
- By:
- Publication type:
- Article
Central Bank Digital Currency, Cyber Security & Privacy.
- Published in:
- ISSA Journal, 2024, v. 22, n. 5, p. 16
- By:
- Publication type:
- Article
From Encryption to Social Media: The Expanding Battlefield of Cyber Extortion Tactics.
- Published in:
- ISSA Journal, 2024, v. 22, n. 4, p. 15
- By:
- Publication type:
- Article
Smartphones and Dopamine.
- Published in:
- ISSA Journal, 2024, v. 22, n. 1, p. 5
- By:
- Publication type:
- Article
Dangers of the Metaverse Part 1.
- Published in:
- ISSA Journal, 2023, v. 21, n. 4, p. 5
- By:
- Publication type:
- Article
We Are the Front Lines – Protecting Yourself Protects the Organization.
- Published in:
- ISSA Journal, 2019, v. 17, n. 4, p. 9
- By:
- Publication type:
- Article
Evolving Ransomware.
- Published in:
- ISSA Journal, 2016, v. 14, n. 4, p. 39
- By:
- Publication type:
- Article
Protecting against Tomorrow's Malware Attacks Today.
- Published in:
- ISSA Journal, 2016, v. 14, n. 4, p. 19
- By:
- Publication type:
- Article
NETWORK SECURITY: CHALLENGES AND SOLUTIONS.
- Published in:
- Intel Technology Journal, 2009, v. 13, n. 2, p. 112
- By:
- Publication type:
- Article
Evolutionary Approach for DISCO Profit Maximization by Optimal Planning of Distributed Generators and Energy Storage Systems in Active Distribution Networks.
- Published in:
- Mathematics (2227-7390), 2024, v. 12, n. 2, p. 300, doi. 10.3390/math12020300
- By:
- Publication type:
- Article
A Hybrid Algorithm Based on Social Engineering and Artificial Neural Network for Fault Warning Detection in Hydraulic Turbines.
- Published in:
- Mathematics (2227-7390), 2023, v. 11, n. 10, p. 2274, doi. 10.3390/math11102274
- By:
- Publication type:
- Article
Was tun... ... wenn es passiert? Schritt für Schritt beim Hackereintritt.
- Published in:
- IM + io, 2023, n. 3, p. 90
- By:
- Publication type:
- Article
Die Daten an der Angel: Über Social Engineering zum großen Datenfang.
- Published in:
- IM + io, 2023, n. 3, p. 62
- By:
- Publication type:
- Article
TALKING ABOUT FREEDOM: Figurative tropes on the Marginal Revolution blog.
- Published in:
- Lingue e Linguaggi, 2023, v. 58, p. 91, doi. 10.1285/i22390359v58p91
- By:
- Publication type:
- Article
THE IMPACT OF EMPLOYEES' CYBER-AWARENESS TRAINING ON THE EFFECTIVENESS OF PHISHING ATTACKS.
- Published in:
- Contemporary Macedonian Defense / Sovremena Makedonska Odbrana, 2024, v. 24, n. 47, p. 1
- By:
- Publication type:
- Article
A Mathematical Model for Risk Assessment of Social Engineering Attacks.
- Published in:
- TEM Journal, 2022, v. 11, n. 1, p. 334, doi. 10.18421/TEM111-42
- By:
- Publication type:
- Article
A MULTIDISCIPLINARY ANALYSIS ON THE PERVASIVENESS OF BIG DATA, DISINFORMATION, AND MISGUIDANGE.
- Published in:
- Journal of Knowledge Economy & Knowledge Management, 2024, v. 19, n. 1, p. 41, doi. 10.54860/beyder.1319788
- By:
- Publication type:
- Article
Impact of the Security Requirements on Mobile Applications Usability.
- Published in:
- Economy Informatics, 2013, v. 13, n. 1, p. 64
- By:
- Publication type:
- Article
On emergent mobile phone-based social engineering cyberattacks in developing countries: The case of the Zambian ICT sector.
- Published in:
- African Journal of Science, Technology, Innovation & Development, 2024, v. 16, n. 6, p. 774, doi. 10.1080/20421338.2024.2387886
- By:
- Publication type:
- Article
Raffles, the Naskah Kitab Hukum Manuscript and Social Engineering of the Inhabitants of Java in 1814.
- Published in:
- KEMANUSIAAN: The Asian Journal of Humanities, 2020, v. 27, n. 1, p. 69, doi. 10.21315/kajh2020.27.1.4
- By:
- Publication type:
- Article
Increase Phishing Tweets Detection Accuracy with Improved Classification Features.
- Published in:
- Indian Journal of Public Health Research & Development, 2018, v. 9, n. 10, p. 991, doi. 10.5958/0976-5506.2018.01299.8
- By:
- Publication type:
- Article
Role of Attention and Design Cues for Influencing Cyber-Sextortion Using Social Engineering and Phishing Attacks.
- Published in:
- Future Internet, 2023, v. 15, n. 1, p. 29, doi. 10.3390/fi15010029
- By:
- Publication type:
- Article
Investigation of Using CAPTCHA Keystroke Dynamics to Enhance the Prevention of Phishing Attacks.
- Published in:
- Future Internet, 2022, v. 14, n. 3, p. 82, doi. 10.3390/fi14030082
- By:
- Publication type:
- Article
Social Engineering Attacks: A Survey.
- Published in:
- Future Internet, 2019, v. 11, n. 4, p. 89, doi. 10.3390/fi11040089
- By:
- Publication type:
- Article
Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues.
- Published in:
- Future Internet, 2019, v. 11, n. 3, p. 73, doi. 10.3390/fi11030073
- By:
- Publication type:
- Article
Disassembly Sequence Planning for Intelligent Manufacturing Using Social Engineering Optimizer.
- Published in:
- Symmetry (20738994), 2021, v. 13, n. 4, p. 663, doi. 10.3390/sym13040663
- By:
- Publication type:
- Article
A critical approach to Machine Learning forecast capabilities: creating a predictive biography in the age of the Internet of Behaviour (IoB).
- Published in:
- Artnodes, 2023, n. 31, p. 1, doi. 10.7238/artnodes.v0i31.405249
- By:
- Publication type:
- Article
Leveraging Contractive Autoencoder with Fuzzy Lattice Reasoning and Resilient KNN for Detection of multi-level Bitcoin Ransomware.
- Published in:
- Journal of Information Assurance & Security, 2022, v. 17, n. 4, p. 165
- By:
- Publication type:
- Article
Spear-Phishing Emails Verification Method based on Verifiable Secret Sharing Scheme.
- Published in:
- Journal of Information Assurance & Security, 2021, v. 16, n. 3, p. 117
- By:
- Publication type:
- Article
Cybercrime and Social Engineering.
- Published in:
- Advocate (05154987), 2018, v. 61, n. 9, p. 42
- By:
- Publication type:
- Article
"It is Luring You to Click on the Link With False Advertising" - Mental Models of Clickbait and Its Impact on User's Perceptions and Behavior Towards Clickbait Warnings.
- Published in:
- International Journal of Human-Computer Interaction, 2025, v. 41, n. 4, p. 2352, doi. 10.1080/10447318.2024.2323248
- By:
- Publication type:
- Article
A Systematic Deconstruction of Human-Centric Privacy & Security Threats on Mobile Phones.
- Published in:
- International Journal of Human-Computer Interaction, 2025, v. 41, n. 2, p. 1628, doi. 10.1080/10447318.2024.2361519
- By:
- Publication type:
- Article
Socially Engineering a Polarizing Discourse on Facebook through Malware-Induced Misperception.
- Published in:
- International Journal of Human-Computer Interaction, 2022, v. 38, n. 17, p. 1621, doi. 10.1080/10447318.2021.2009671
- By:
- Publication type:
- Article
Cybercrime and Business: How to not Get Caught by the Online Phisherman.
- Published in:
- Journal of International Commercial Law & Technology, 2010, v. 5, n. 4, p. 252
- Publication type:
- Article