To see the other types of publications on this topic, follow the link: Pretexting.

Journal articles on the topic 'Pretexting'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 19 journal articles for your research on the topic 'Pretexting.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Mikhaleva, U. A. "Pretexting and means to counter it." Herald of Dagestan State Technical University. Technical Sciences 50, no. 2 (2023): 109–16. http://dx.doi.org/10.21822/2073-6185-2023-50-2-109-116.

Full text
Abstract:
Objective. Currently, fraud is one of the most pressing problems in modern society. The number of victims of scammers using social engineering methods is growing day by day. Because fraud is a type of crime that is very difficult to prove. The aim of the study is to find a method to counteract pretexting as an increase in the information security of the population.Method. This article uses the following methods: description, analysis, deduction.Result. The analysis of the description of social engineering methods made it possible to classify them according to the way they influence a person. A
APA, Harvard, Vancouver, ISO, and other styles
2

Khamdamova, L. K. "PROTECTION AGAINST PRETEXTING-TYPE SOCIAL ENGINEERING ATTACKS BY MEANS OF A SPEECH PATTERN DETECTION SYSTEM." DYNAMICS OF SYSTEMS, MECHANISMS AND MACHINES 11, no. 4 (2023): 128–32. http://dx.doi.org/10.25206/2310-9793-2023-11-4-128-132.

Full text
Abstract:
Social engineering is one of the main threats to information security, since it is aimed at human consciousness. In order to protect against pretexting-type social engineering attacks, this article discusses a system for detecting speech patterns through contextual analysis. The scope of application of the developed program can be government organizations, as well as small and medium-sized businesses.
APA, Harvard, Vancouver, ISO, and other styles
3

Potthas, Christine, Patrick Berry, and Hamad Al-Naimi. "Social engineering." Advances in Engineering Innovation 2, no. 1 (2023): 22–25. http://dx.doi.org/10.54254/2977-3903/2/2023016.

Full text
Abstract:
The realm of cybersecurity is replete with challenges, not least among them being the art of social engineering. This form of attack leverages human tendencies such as trust, leading to potential breaches. Though more covert than brute force or technical hacks, social engineering can be insidiously effective. Within this exposition, we probe various manifestations of social engineering: from phishing to pretexting, baiting to tailgating, and the subtle act of shoulder surfing, concluding with mitigation strategies.
APA, Harvard, Vancouver, ISO, and other styles
4

Freeman, Edward H. "Pretexting, Data Mining and Personal Privacy: The Gramm—Leach—Bliley Act." Information Systems Security 11, no. 2 (2002): 4–8. http://dx.doi.org/10.1201/1086/43320.11.2.20020501/36763.2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jin, Yan, and Christopher J. Kelsay. "Typology and dimensionality of litigation public relations strategies: The Hewlett-Packard board pretexting scandal case." Public Relations Review 34, no. 1 (2008): 66–69. http://dx.doi.org/10.1016/j.pubrev.2007.11.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Naz, Anam, Madiha Sarwar, Muhammad Kaleem, Muhammad Azhar Mushtaq, and Salman Rashid. "A comprehensive survey on social engineering-based attacks on social networks." International Journal of ADVANCED AND APPLIED SCIENCES 11, no. 4 (2024): 139–54. http://dx.doi.org/10.21833/ijaas.2024.04.016.

Full text
Abstract:
Threats based on social engineering in social networks are becoming a more common problem. Social engineering is a type of attack that relies on trickery and exploiting human psychology to gain access to confidential information or resources. It involves deceptive techniques like phishing, pretexting, and baiting, tricking individuals into revealing sensitive information or performing specific actions. These tactics can lead to unauthorized access to user accounts, identity theft, or the distribution of harmful content. This study offers a detailed review of threats related to social engineeri
APA, Harvard, Vancouver, ISO, and other styles
7

Olaniyi, Oluwaseun Oladeji, Christopher Uzoma Asonze, Samson Abidemi Ajayi, Samuel Oladiipo Olabanji, and Chinasa Susan Adigwe. "A Regressional Study on the Impact of Organizational Security Culture and Transformational Leadership on Social Engineering Awareness among Bank Employees: The Interplay of Security Education and Behavioral Change." Asian Journal of Economics, Business and Accounting 23, no. 23 (2023): 128–43. http://dx.doi.org/10.9734/ajeba/2023/v23i231176.

Full text
Abstract:
Organizations across various sectors are increasingly vulnerable to cybersecurity breaches in an era characterized by unprecedented technological advancements and a rapidly evolving threat landscape. Among the myriad methods employed by malicious actors, social engineering stands out as a particularly insidious and effective means of infiltrating secure systems and obtaining sensitive information. To effectively address these issues, organizations must establish and sustain a principled security process; this process goes beyond installing the latest security technologies. It encompasses the c
APA, Harvard, Vancouver, ISO, and other styles
8

Kondo, Toshiaki, Sanami Nagao, Takashi Yanagishita, and Hideki Masuda. "Communication—Formation of Porous Anodic TiO2with Square Nanoholes by Pretexturing Process." Journal of The Electrochemical Society 163, no. 7 (2016): E206—E207. http://dx.doi.org/10.1149/2.1241607jes.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Masuda, Hideki, Minoru Tajima, and Kazuyuki Nishio. "Site Control of Tunnel Etching of Al for Electrolytic Capacitors Using Pretexturing by Mold." Chemistry Letters 31, no. 11 (2002): 1150–51. http://dx.doi.org/10.1246/cl.2002.1150.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"ANTHROPOLOGY OF PHONE FRAUD USING PRETEXTING: A CRIMINOLOGICAL STUDY." Monitoring of Law Enforcement, no. 2 (2023). http://dx.doi.org/10.21681/2226-0692-2023-2-32-38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Е.В., Зотина,. "PRETEXTING AS A SOCIAL ENGINEERING TECHNIQUE USED BY TELEPHONE SCAMMERS: A CRIMINOLOGICAL VIEW OF THE PROBLEM." Вестник Казанского юридического института МВД России, no. 4(50) (January 10, 2023). http://dx.doi.org/10.37973/kui.2022.55.63.012.

Full text
Abstract:
Введение: в статье рассматриваются криминологические особенности использования преступниками, совершающими мошеннические действия с использованием средств сотовой связи, претекстинга как приема социальной инженерии. Материалы и методы: эмпирическую основу исследования составили «Основные направления развития финансового рынка Российской Федерации на 2022 год и период 2023 – 2024 годов», современные научные публикации по проблемам социальной инженерии, официальные сведения МВД по Республике Татарстан о фактах совершения телефонного мошенничества в 2022 году, а также данные проведенного автором
APA, Harvard, Vancouver, ISO, and other styles
12

V.K., Vibhuti. "PREVENTION OF IDENTITY THEFT: AN ANALYSIS." JOURNAL OF UNIQUE LAWS AND STUDENTS I, no. I (2021). http://dx.doi.org/10.59126/v1i1a2.

Full text
Abstract:
Identity theft is the crime of acquiring other person's private or financial data for the purpose of assuming the name or identification of the victim and commit crimes. Such data can be used in the name of that victim to commit crimes in the name of the victim, to acquire credit or loans, products and services and even provide fake credentials to government authorities. The crime has advanced with the advancement of technology over the past few years in India. To prevent cybercrimes such as identity theft and other computerrelated/internet-based crimes, in the year of 2000, Indian Government
APA, Harvard, Vancouver, ISO, and other styles
13

Ahmed, Musa Midila. "Social Engineering Attacks in E-Government System: Detection and Prevention." International Journal of Applied Engineering and Management Letters, February 17, 2022, 100–116. http://dx.doi.org/10.47992/ijaeml.2581.7000.0123.

Full text
Abstract:
Purpose: E-Government system emerged as a novel public service provision platform that enables governance in an efficient and transparent manner globally. However, despite the success recorded so far by the increase in the use of information and communication technology (ICT) and E-government for public service provision. Social engineering attack (SEA) is one of the challenging information security attacks that prove to be difficult to tackle. This is because the attackers leverage on peoples’ weakness to exploit the system instead of technical vulnerabilities. Design/Methodology/Approach: Th
APA, Harvard, Vancouver, ISO, and other styles
14

Turki, Layla, Leena Khonji, and Magda Bayoumi. "An Exploratory Qualitative Study of Oncology Nurses’ Experience in Providing Care for Terminally Ill Patients in Salmaniya Medical Complex in Bahrain." Qualitative Report, May 8, 2023. http://dx.doi.org/10.46743/2160-3715/2023.5957.

Full text
Abstract:
Oncology nurses are essential in palliative care for cancer patients, especially at end-of-life stages. Caring for terminally ill cancer patients is stressful, accompanied by negative and positive feelings, but oncology nurses have an unavoidable responsibility. However, little is known about oncology nurses' experience in the Kingdom of Bahrain caring for terminally ill cancer patients in their final weeks or days. This study aimed to explore the experience of oncology staff nurses in providing care for terminally ill patients in the Kingdom of Bahrain, and the research answered those questio
APA, Harvard, Vancouver, ISO, and other styles
15

Azaabi, Cletus. "IMPROVING DIGITAL SECURITY AND PRIVACY OF STUDENTS IN COLLEGES OF EDUCATION: AN ATTITUDINAL CHANGE FRAMEWORK BASED ON COMPETENCE LEARNING MATRIX." European Journal of Education Studies 9, no. 10 (2022). http://dx.doi.org/10.46827/ejes.v9i10.4501.

Full text
Abstract:
The information revolution is affecting every aspect of society including education resulting in a concept known as digital learning or e-learning. One problem of digital learning environments and tools is the security and privacy of the learners. How to ensure the security and privacy of digital learners remains a major challenge leading to exposure among naive students. The objective of the study was to explore digital security and privacy culture among students and to propose a novel framework to enhance the security and privacy culture of students using a framework based on the competence
APA, Harvard, Vancouver, ISO, and other styles
16

Ganchenko, M. I. "Human psychological and biometric factor in the development and use of social engineering methods in peacetime and wartime." Modern Information Security 1, no. 49 (2022). http://dx.doi.org/10.31673/2409-7292.2022.011626.

Full text
Abstract:
The subject of this article is the process of influence of social engineers on people by manipulating consciousness, emotions, feelings without and with the use of modern information technology processing and simulation of biological characteristics of mankind in peacetime and wartime. The purpose and objectives are: consideration of existing methods of social engineering such as phishing, trojan, pretexting, watering hole, betting, quid pro quo, persecution, reverse social engineering through the prism of human feelings: naivety, inattention, greed, gullibility, curiosity, belonging fear; Con
APA, Harvard, Vancouver, ISO, and other styles
17

"Pretexturing a cathode sputtering target." Metal Finishing 96, no. 1 (1998): 99. http://dx.doi.org/10.1016/s0026-0576(97)80371-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
18

"Pretexturing a cathode sputtering target." Metal Finishing 96, no. 2 (1998): 111. http://dx.doi.org/10.1016/s0026-0576(97)82905-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Yanagishita, Takashi, Takuya Masuda, Toshiaki Kondo, and Hideki Masuda. "Highly ordered anodic porous oxides of transition metals fabricated by anodization combined with a pretexturing process." Electrochemistry Communications, January 2021, 106916. http://dx.doi.org/10.1016/j.elecom.2020.106916.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!