To see the other types of publications on this topic, follow the link: Pretexting.

Journal articles on the topic 'Pretexting'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 19 journal articles for your research on the topic 'Pretexting.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mikhaleva, U. A. "Pretexting and means to counter it." Herald of Dagestan State Technical University. Technical Sciences 50, no. 2 (2023): 109–16. http://dx.doi.org/10.21822/2073-6185-2023-50-2-109-116.

Full text
Abstract:
Objective. Currently, fraud is one of the most pressing problems in modern society. The number of victims of scammers using social engineering methods is growing day by day. Because fraud is a type of crime that is very difficult to prove. The aim of the study is to find a method to counteract pretexting as an increase in the information security of the population.Method. This article uses the following methods: description, analysis, deduction.Result. The analysis of the description of social engineering methods made it possible to classify them according to the way they influence a person. Also, this analysis led to the conclusion that the most effective method to protect against the threats of social engineering, in particular, from pretexting, is the introduction of technical methods of protection.Conclusion. The conclusions made in this work can serve as a basis for further research in this direction, as well as the basis for the development and implementation of technical methods for protecting against pretexting threats.
APA, Harvard, Vancouver, ISO, and other styles
2

Khamdamova, L. K. "PROTECTION AGAINST PRETEXTING-TYPE SOCIAL ENGINEERING ATTACKS BY MEANS OF A SPEECH PATTERN DETECTION SYSTEM." DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES 11, no. 4 (2023): 128–32. http://dx.doi.org/10.25206/2310-9793-2023-11-4-128-132.

Full text
Abstract:
Social engineering is one of the main threats to information security, since it is aimed at human consciousness. In order to protect against pretexting-type social engineering attacks, this article discusses a system for detecting speech patterns through contextual analysis. The scope of application of the developed program can be government organizations, as well as small and medium-sized businesses.
APA, Harvard, Vancouver, ISO, and other styles
3

Potthas, Christine, Patrick Berry, and Hamad Al-Naimi. "Social engineering." Advances in Engineering Innovation 2, no. 1 (2023): 22–25. http://dx.doi.org/10.54254/2977-3903/2/2023016.

Full text
Abstract:
The realm of cybersecurity is replete with challenges, not least among them being the art of social engineering. This form of attack leverages human tendencies such as trust, leading to potential breaches. Though more covert than brute force or technical hacks, social engineering can be insidiously effective. Within this exposition, we probe various manifestations of social engineering: from phishing to pretexting, baiting to tailgating, and the subtle act of shoulder surfing, concluding with mitigation strategies.
APA, Harvard, Vancouver, ISO, and other styles
4

Freeman, Edward H. "Pretexting, Data Mining and Personal Privacy: The Gramm—Leach—Bliley Act." Information Systems Security 11, no. 2 (2002): 4–8. http://dx.doi.org/10.1201/1086/43320.11.2.20020501/36763.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jin, Yan, and Christopher J. Kelsay. "Typology and dimensionality of litigation public relations strategies: The Hewlett-Packard board pretexting scandal case." Public Relations Review 34, no. 1 (2008): 66–69. http://dx.doi.org/10.1016/j.pubrev.2007.11.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Naz, Anam, Madiha Sarwar, Muhammad Kaleem, Muhammad Azhar Mushtaq, and Salman Rashid. "A comprehensive survey on social engineering-based attacks on social networks." International Journal of ADVANCED AND APPLIED SCIENCES 11, no. 4 (2024): 139–54. http://dx.doi.org/10.21833/ijaas.2024.04.016.

Full text
Abstract:
Threats based on social engineering in social networks are becoming a more common problem. Social engineering is a type of attack that relies on trickery and exploiting human psychology to gain access to confidential information or resources. It involves deceptive techniques like phishing, pretexting, and baiting, tricking individuals into revealing sensitive information or performing specific actions. These tactics can lead to unauthorized access to user accounts, identity theft, or the distribution of harmful content. This study offers a detailed review of threats related to social engineering on social networks. It explores various social engineering attacks, the methods used to execute these threats, and measures that can be adopted to minimize the risk of becoming a victim. The research aimed to develop a new, broad classification of social engineering attacks and strategies for responding to them. It also examines the challenges that social engineering poses to algorithms on social media platforms and highlights the need for more research. The study concludes by pointing out the shortcomings of current approaches and suggesting future research directions, stressing the importance of standardized protective measures and increasing awareness among potential victims. This thorough examination improves our understanding of social engineering attacks and encourages the development of innovative solutions and ethical practices, contributing to a more secure digital environment.
APA, Harvard, Vancouver, ISO, and other styles
7

Olaniyi, Oluwaseun Oladeji, Christopher Uzoma Asonze, Samson Abidemi Ajayi, Samuel Oladiipo Olabanji, and Chinasa Susan Adigwe. "A Regressional Study on the Impact of Organizational Security Culture and Transformational Leadership on Social Engineering Awareness among Bank Employees: The Interplay of Security Education and Behavioral Change." Asian Journal of Economics, Business and Accounting 23, no. 23 (2023): 128–43. http://dx.doi.org/10.9734/ajeba/2023/v23i231176.

Full text
Abstract:
Organizations across various sectors are increasingly vulnerable to cybersecurity breaches in an era characterized by unprecedented technological advancements and a rapidly evolving threat landscape. Among the myriad methods employed by malicious actors, social engineering stands out as a particularly insidious and effective means of infiltrating secure systems and obtaining sensitive information. To effectively address these issues, organizations must establish and sustain a principled security process; this process goes beyond installing the latest security technologies. It encompasses the concept of "organizational security culture. This paper investigates the impact of organizational security culture and transformational leadership on bank employees' social engineering awareness, focusing on security education and behavioral change. Social engineering is the unauthorized infiltration of the end user's computer system and network through malware techniques such as tailgating, phishing, vishing, pretexting, and baiting to gain access to companies and individual confidential data; thus, this study aims to analyze the effect of organizational security culture and transformational leadership on social engineering awareness among bank employees while assessing security education's role in driving behavioral change. This research used the Likert scale model to collect primary data through survey questionnaires from 450 bank employees. The data collected was analyzed using linear regression analysis to test the study’s hypothesis. This study recommends that banking institutions should adopt a good organizational security culture and expose their staff to effective security education, as this will cause a change in employees' security behavior and more research should be conducted regarding security culture, security education, and awareness programs within banking institutions due to bank operations' ever-dynamic nature and ensuring preparedness for prevailing cyber threats.
APA, Harvard, Vancouver, ISO, and other styles
8

Kondo, Toshiaki, Sanami Nagao, Takashi Yanagishita, and Hideki Masuda. "Communication—Formation of Porous Anodic TiO2with Square Nanoholes by Pretexturing Process." Journal of The Electrochemical Society 163, no. 7 (2016): E206—E207. http://dx.doi.org/10.1149/2.1241607jes.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Masuda, Hideki, Minoru Tajima, and Kazuyuki Nishio. "Site Control of Tunnel Etching of Al for Electrolytic Capacitors Using Pretexturing by Mold." Chemistry Letters 31, no. 11 (2002): 1150–51. http://dx.doi.org/10.1246/cl.2002.1150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"ANTHROPOLOGY OF PHONE FRAUD USING PRETEXTING: A CRIMINOLOGICAL STUDY." Monitoring of Law Enforcement, no. 2 (2023). http://dx.doi.org/10.21681/2226-0692-2023-2-32-38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Е.В., Зотина,. "PRETEXTING AS A SOCIAL ENGINEERING TECHNIQUE USED BY TELEPHONE SCAMMERS: A CRIMINOLOGICAL VIEW OF THE PROBLEM." Вестник Казанского юридического института МВД России, no. 4(50) (January 10, 2023). http://dx.doi.org/10.37973/kui.2022.55.63.012.

Full text
Abstract:
Введение: в статье рассматриваются криминологические особенности использования преступниками, совершающими мошеннические действия с использованием средств сотовой связи, претекстинга как приема социальной инженерии. Материалы и методы: эмпирическую основу исследования составили «Основные направления развития финансового рынка Российской Федерации на 2022 год и период 2023 – 2024 годов», современные научные публикации по проблемам социальной инженерии, официальные сведения МВД по Республике Татарстан о фактах совершения телефонного мошенничества в 2022 году, а также данные проведенного автором социологического опроса. Методология исследования представлена совокупностью общенаучных, частнонаучных и специальных юридических методов, среди которых системно-структурный, логический, конкретно-социологический, лингвистический методы. Результаты исследования: рассмотрены криминологические аспекты претекстинга, причины, условия его использования, приведены типичные схемы реализации претекстинга в результате совершения телефонного мошенничества, некоторые особенности криминологической характеристики личности преступника. Особое внимание уделено необходимости виктимологической профилактики претекстинга в отношении лиц пенсионного возраста как социально незащищенных граждан и наиболее уязвимой категории населения. Обсуждение и заключение: автор статьи приходит к выводу, что претекстинг как прием социальной инженерии нуждается в комплексном криминологическом описании с позиций криминологии, социологии, психологии, коммуникативной лингвистики; предлагает возможные направления виктимологической профилактики телефонного мошенничества, совершаемого посредством претекстинга.
APA, Harvard, Vancouver, ISO, and other styles
12

V.K., Vibhuti. "PREVENTION OF IDENTITY THEFT: AN ANALYSIS." JOURNAL OF UNIQUE LAWS AND STUDENTS I, no. I (2021). http://dx.doi.org/10.59126/v1i1a2.

Full text
Abstract:
Identity theft is the crime of acquiring other person's private or financial data for the purpose of assuming the name or identification of the victim and commit crimes. Such data can be used in the name of that victim to commit crimes in the name of the victim, to acquire credit or loans, products and services and even provide fake credentials to government authorities. The crime has advanced with the advancement of technology over the past few years in India. To prevent cybercrimes such as identity theft and other computerrelated/internet-based crimes, in the year of 2000, Indian Government enacted The Information Technology Act, 2000, amended in 2008. Identity theft is also governed by few provisions (Section 147A, Section 419, Section 463) of Indian Penal code, 1860. This research paper will analyze the implementation of the Act in India and other preventive measures taken by the Government of India relating to the matter of securing personal data and preventing the theft of identity. Key words: Identity, Identity theft, Data Technology, Cyber-crime, Phishing/vishing, Skimming, Hacking, Shoulder surfing, Dumpster diving, Mail theft, Pretexting.
APA, Harvard, Vancouver, ISO, and other styles
13

Ahmed, Musa Midila. "Social Engineering Attacks in E-Government System: Detection and Prevention." International Journal of Applied Engineering and Management Letters, February 17, 2022, 100–116. http://dx.doi.org/10.47992/ijaeml.2581.7000.0123.

Full text
Abstract:
Purpose: E-Government system emerged as a novel public service provision platform that enables governance in an efficient and transparent manner globally. However, despite the success recorded so far by the increase in the use of information and communication technology (ICT) and E-government for public service provision. Social engineering attack (SEA) is one of the challenging information security attacks that prove to be difficult to tackle. This is because the attackers leverage on peoples’ weakness to exploit the system instead of technical vulnerabilities. Design/Methodology/Approach: This paper uses PESTLE (political, economic, social, technology, legal and environment) analysis to critically evaluate the external factors affecting SEAs in E-government system. Findings/Result: The study identified phishing, Baiting, Pretexting, Quid Pro Quo, Honey Trap, Tail Gating, and Pharming as the major SEA techniques used to exploit E-government systems. Furthermore, the author suggest training and awareness programme as the most effective way to detect as well as prevent SEA in E-government system. Users should be aware of the languages with terms requesting urgent response as well as unusual or unexpected situation in a suspicious messages or attachment as factors to detect SEA. Technical controls using natural language processes (NLP), security policies, multifactor authentication (MFA) as well as secured preservation of confidential information from suspicious users are some of the SEA preventive measures. Originality/Value: A flexible and efficient interaction among citizens, businesses and government organizations is a critical factor for successful E-Government system. SEA is one of major challenges affecting communications in E-government system that requires attention. In conclusion, studies toward technological approach for solution of SEA in E-government is recommended. Paper Type: Conceptual Research.
APA, Harvard, Vancouver, ISO, and other styles
14

Turki, Layla, Leena Khonji, and Magda Bayoumi. "An Exploratory Qualitative Study of Oncology Nurses’ Experience in Providing Care for Terminally Ill Patients in Salmaniya Medical Complex in Bahrain." Qualitative Report, May 8, 2023. http://dx.doi.org/10.46743/2160-3715/2023.5957.

Full text
Abstract:
Oncology nurses are essential in palliative care for cancer patients, especially at end-of-life stages. Caring for terminally ill cancer patients is stressful, accompanied by negative and positive feelings, but oncology nurses have an unavoidable responsibility. However, little is known about oncology nurses' experience in the Kingdom of Bahrain caring for terminally ill cancer patients in their final weeks or days. This study aimed to explore the experience of oncology staff nurses in providing care for terminally ill patients in the Kingdom of Bahrain, and the research answered those questions: (a) What is the experience of oncology staff nurses in providing care for terminally ill patient? And (b) How does the experience of oncology nurses in providing care to terminally ill patients impact the quality of care provided to patients? A qualitative descriptive, interpretive exploratory research design was utilized for this study to explore the experience of oncology staff nurses with terminally ill patients, conducted in two hospital settings at Salmaniya medical complex (inpatient & outpatient) oncology department. The data were collected using a purposive sampling to include 15 oncologist nurses whose experiences were across various characteristics with different professional roles and qualifications. The data were collected through 15 semi-structured interviews guided by a semi-structured interview protocol. Data were analyzed using Braun and Clarke's 2006 thematic analysis model without pretexting. The research findings revealed three key themes that emerged from thematic analysis: (1) exhausting versus rewarding experienced feelings; (2) Factors influencing Nursing care; (3) Moral Distress. End-of-life care in the Kingdom of Bahrain reflects and has been influenced by primary total nursing care. Oncology nurses reported suffering but also benefiting from their experiences. End-of-life cancer care training is needed and urged by oncology nurses, especially those younger and less experienced. Also, future studies are mandated to explore interventions to help overcome the challenges that are impeding nurses from providing high-quality care for terminally ill patients in the kingdom of Bahrain.
APA, Harvard, Vancouver, ISO, and other styles
15

Azaabi, Cletus. "IMPROVING DIGITAL SECURITY AND PRIVACY OF STUDENTS IN COLLEGES OF EDUCATION: AN ATTITUDINAL CHANGE FRAMEWORK BASED ON COMPETENCE LEARNING MATRIX." European Journal of Education Studies 9, no. 10 (2022). http://dx.doi.org/10.46827/ejes.v9i10.4501.

Full text
Abstract:
The information revolution is affecting every aspect of society including education resulting in a concept known as digital learning or e-learning. One problem of digital learning environments and tools is the security and privacy of the learners. How to ensure the security and privacy of digital learners remains a major challenge leading to exposure among naive students. The objective of the study was to explore digital security and privacy culture among students and to propose a novel framework to enhance the security and privacy culture of students using a framework based on the competence learning theory. The Design Science Research (DSR) was adopted as a research paradigm with quantitative and qualitative data gathered from the implementation of the framework. 300 students from a college of education were purposively sampled for the study. A WhatsApp message was sent to the student requesting their confidential information under pretexting and impersonation to assess how security and privacy conscious they were. A framework was developed and implemented based on the theory of competence learning. The results showed high levels of vulnerabilities among students at 67.67% before the Implementation of the Framework in Round 1. This vulnerability reduced to 1.67% in after the implementation of the framework in Round 2 and further reduced to 0% in Round 3. The paper concluded that the lack of security and privacy awareness of the students made them Unconsciously Incompetent (UI). Exposure to the vulnerability made them consciously incompetent (CI), whiles further rounds of exposures led them to be consciously competent (CC). further exposure will eventually result in unconsciously competent (UC) as students become resistant and or immune to security and privacy attacks. The implication of this study is that, as more students converge in the digital space, the need to build their immunity and resistance against cyber-attacks is critical to avoid exposure. Learning to be security conscious should be consistent and routine to ensure that students have renewed behavior changes to become resistant and immune to online attacks.<p> </p><p><strong> Article visualizations:</strong></p><p><img src="/-counters-/edu_01/0697/a.php" alt="Hit counter" /></p>
APA, Harvard, Vancouver, ISO, and other styles
16

Ganchenko, M. I. "Human psychological and biometric factor in the development and use of social engineering methods in peacetime and wartime." Modern Information Security 1, no. 49 (2022). http://dx.doi.org/10.31673/2409-7292.2022.011626.

Full text
Abstract:
The subject of this article is the process of influence of social engineers on people by manipulating consciousness, emotions, feelings without and with the use of modern information technology processing and simulation of biological characteristics of mankind in peacetime and wartime. The purpose and objectives are: consideration of existing methods of social engineering such as phishing, trojan, pretexting, watering hole, betting, quid pro quo, persecution, reverse social engineering through the prism of human feelings: naivety, inattention, greed, gullibility, curiosity, belonging fear; Consideration of modern technologies: handwriting forgery - My Text in your Handwriting algorithm, voice substitution - Descript's Ovrlab service, artificial dialogue - Replika application and face replacement - Deep Fake technology, which can help fraudsters to achieve their own goals of obtaining confidential data and carrying out further attacks based on them, as well as manipulating the consciousness of the real perception of events in wartime. The methods used are: psychological and sociological research methods, such as observation, social engineering methods, forecasting methods based on analysis and conclusions about future trends. The following results were obtained. Associations of methods of social engineering with feelings to which this or that psychological influence of the social engineer is directed are created. The potential of using emerging technologies with social engineering techniques to carry out more effective and sophisticated attacks, taking into account the favorite effects of criminals: haste, surprise, confusion, feelings of pity, anxiety, excitement and so on. The possibility of threats related to the procedures of authentication and authorization of users of biometric data on the basis of the considered modern technologies of imitation of biometric data of mankind: handwriting, voice, face. The scientific novelty of the research results is as follows: the importance and necessity of careful treatment of confidential information that people disseminate about themselves in all aspects of their social life; identified the main feelings on which social engineers play to achieve their own goals and benefit; the potential of development of modern technologies of imitation of biometric data of people in efficiency of carrying out attacks by methods of social engineering is specified, efficiency of use of means and methods of social engineering during information wars for influence on unstable psychological state is proved.
APA, Harvard, Vancouver, ISO, and other styles
17

"Pretexturing a cathode sputtering target." Metal Finishing 96, no. 1 (1998): 99. http://dx.doi.org/10.1016/s0026-0576(97)80371-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

"Pretexturing a cathode sputtering target." Metal Finishing 96, no. 2 (1998): 111. http://dx.doi.org/10.1016/s0026-0576(97)82905-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Yanagishita, Takashi, Takuya Masuda, Toshiaki Kondo, and Hideki Masuda. "Highly ordered anodic porous oxides of transition metals fabricated by anodization combined with a pretexturing process." Electrochemistry Communications, January 2021, 106916. http://dx.doi.org/10.1016/j.elecom.2020.106916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography