Academic literature on the topic 'Social engineering'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Social engineering.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Social engineering"

1

Gulenko, Iwan. "Social against social engineering." Information Management & Computer Security 21, no. 2 (June 7, 2013): 91–101. http://dx.doi.org/10.1108/imcs-09-2012-0053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chauhan, Alok A., Nischal Puri, and Yogesh Narekar. "Social Engineering." IJARCCE 8, no. 5 (May 30, 2019): 38–41. http://dx.doi.org/10.17148/ijarcce.2019.8509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Luo, Xin, Richard Brody, Alessandro Seazzu, and Stephen Burd. "Social Engineering." Information Resources Management Journal 24, no. 3 (July 2011): 1–8. http://dx.doi.org/10.4018/irmj.2011070101.

Full text
Abstract:
Effective information systems security management combines technological measures and managerial efforts. Although various technical means have been employed to cope with security threats, human factors have been comparatively neglected. This article examines human factors that can lead to social engineering intrusions. Social engineering is a technique used by malicious attackers to gain access to desired information by exploiting the flaws in human logic known as cognitive biases. Social engineering is a potential threat to information security and should be considered equally important to its technological counterparts. This article unveils various social engineering attacks and their leading human factors, and discusses several ways to defend against social engineering: education, training, procedure, and policy. The authors further introduce possible countermeasures for social engineering attacks. Future analysis is also presented.
APA, Harvard, Vancouver, ISO, and other styles
4

Muehleis, Peter. "SOCIAL ENGINEERING." Journal of the American Dental Association 141, no. 5 (May 2010): 500. http://dx.doi.org/10.14219/jada.archive.2010.0207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Matejko, Alexander J., Adam Podgórecki, Jon Alexander, Rob Shields, and Adam Podgorecki. "Social Engineering." Canadian Public Policy / Analyse de Politiques 22, no. 2 (June 1996): 200. http://dx.doi.org/10.2307/3551924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rößling, Guido, and Marius Müller. "Social engineering." ACM SIGCSE Bulletin 41, no. 3 (August 25, 2009): 384. http://dx.doi.org/10.1145/1595496.1563026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Munro, Ken. "Social engineering." Infosecurity Today 2, no. 3 (May 2005): 44. http://dx.doi.org/10.1016/s1742-6847(05)70285-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bundey, Jill. "SOCIAL ENGINEERING." Australian Occupational Therapy Journal 18, no. 4 (August 27, 2010): 22–28. http://dx.doi.org/10.1111/j.1440-1630.1971.tb00502.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lardschneider, Michael. "Social Engineering." Datenschutz und Datensicherheit - DuD 32, no. 9 (September 2008): 574–78. http://dx.doi.org/10.1007/s11623-008-0137-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fox, Dirk. "Social Engineering." Datenschutz und Datensicherheit - DuD 37, no. 5 (May 2013): 318. http://dx.doi.org/10.1007/s11623-013-0115-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Social engineering"

1

Romaniuk, Oleg. "Social engineering." Thesis, Київський національний університет технологій та дизайну, 2019. https://er.knutd.edu.ua/handle/123456789/13157.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Loggarfve, Robin, and Johan Rydell. "Social Engineering : En kvalitativ studie om hur organisationer hanterar social engineering." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37794.

Full text
Abstract:
Traditionellt sett används svagheter i tekniken för att få obehörig tillgång till information, men det finns andra sofistikerade metoder och tillvägagångssätt som kan vara mer effektiva. Social engineering är konsten att bedra, manipulera och utnyttja sociala aspekter. Metoden utnyttjar den svagaste länken i informationssäkerheten, mänskliga faktorn. Syftet med studien är att undersöka hur organisationer hanterar social engineering. Den syftar också till att belysa och informera kring ämnet med ambition att öka medvetenheten om ämnet. Studien har utförts tillsammans med tre organisationer där kvalitativa intervjuer genomförts. Studien undersökte organisationernas medvetenhet, vanligast förekommande social engineering-attackerna och förebyggande arbete. Resultatet visar att medvetenheten var god på IT-avdelningarna medan den var sämre på övriga avdelningar i organisationerna. De främsta hoten social engineering utgör mot organisationer är ekonomisk förlust och informationsläckage. Det vanligaste tillvägagångssättet visade sig vara phishing och spear phishing. Slutligen kan studien fastslå att utbildning och informationsspridning är den mest framgångsrika metod för att förebygga social engineering. Studien konstaterar att det saknas ett fullständigt skydd och att mer utbildning krävs för att öka medvetenheten inom social engineering. Ett säkerhetsskydd är inte starkare än den svagaste länken och därför bör mer resurser läggas på förebyggande arbete.
Traditionally, weaknesses in technology are used to gain unauthorized access to information, but there are other sophisticated methods and approaches that can be more effective. Social engineering is the art of deceiving, manipulating and utilizing social aspects. The method utilizes the weakest link in information security, the human factor. The purpose of the study is to investigate how organizations handle social engineering. It also aims to highlight and inform about the subject with an ambition to raise awareness about the subject. The study has been conducted together with three organizations where qualitative interviews were conducted. The study examined the awareness of the organizations, the most common social engineering attacks and preventive work. The result shows that awareness was good at IT departments while it was worse at other departments in the organizations. The main threats of social engineering to organizations are economic loss and information leakage. The most common approach was phishing and spear phishing. Finally, the study can conclude that education and dissemination of information is the most successful method of preventing social engineering. The study finds that there is no complete protection and that more education is required to raise awareness in social engineering. A security system is not stronger than the weakest link and therefore more resources should be put on preventive work.
APA, Harvard, Vancouver, ISO, and other styles
3

Ericsson, Eric, and Robin Kirkhoff. "Resiliens mot social engineering : En studie om organisationers förmåga att hantera social engineering." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40236.

Full text
Abstract:
Given the major technological development that has been made in the last decades, companies and organizations draw benefit from these technological means to communicate in new ways rather than using old school methods like snail-mail. This has led to many new attack vectors for culprits looking to commit fraud. These attack vectors have proven to be very effective given the fact that culprits can target massive volumes of potential targets. The purpose of this report was divided into two parts, investigate to what extent employees were aware of the phenomena “social engineering” as well as conducting a literature study to gather knowledge about common attacks and defence mechanisms to counter these attacks. To investigate the awareness regarding “social engineering” of employees in different organizations, eight different qualitative interviews were conducted with employees of different organizations. To gather knowledge about common social engineering attacks an extensive literature study was done. The interviews revealed that many employees had low awareness about social engineering and many of them also failed to manage their credentials to IT-systems in a safe way. The interviewed subjects also shared a low awareness regarding their organizations policies regarding IT-security. The literature study revealed that social engineering attacks come in many different forms.Many of the attacks are very similar but regarding who they are targeting, or which mediumis used for the attack they can receive a different name. The social engineering attack called “phishing” was the most recurrent type of social engineering attack and hence a lot of this thesis is focused on this attack. Examples of authentic successful phishing attempts arepresented.
APA, Harvard, Vancouver, ISO, and other styles
4

Anderson, Jonathan. "Privacy engineering for social networks." Thesis, University of Cambridge, 2013. https://www.repository.cam.ac.uk/handle/1810/244239.

Full text
Abstract:
In this dissertation, I enumerate several privacy problems in online social networks (OSNs) and describe a system called Footlights that addresses them. Footlights is a platform for distributed social applications that allows users to control the sharing of private information. It is designed to compete with the performance of today's centralised OSNs, but it does not trust centralised infrastructure to enforce security properties. Based on several socio-technical scenarios, I extract concrete technical problems to be solved and show how the existing research literature does not solve them. Addressing these problems fully would fundamentally change users' interactions with OSNs, providing real control over online sharing. I also demonstrate that today's OSNs do not provide this control: both user data and the social graph are vulnerable to practical privacy attacks. Footlights' storage substrate provides private, scalable, sharable storage using untrusted servers. Under realistic assumptions, the direct cost of operating this storage system is less than one US dollar per user-year. It is the foundation for a practical shared filesystem, a perfectly unobservable communications channel and a distributed application platform. The Footlights application platform allows third-party developers to write social applications without direct access to users' private data. Applications run in a confined environment with a private-by-default security model: applications can only access user information with explicit user consent. I demonstrate that practical applications can be written on this platform. The security of Footlights user data is based on public-key cryptography, but users are able to log in to the system without carrying a private key on a hardware token. Instead, users authenticate to a set of authentication agents using a weak secret such as a user-chosen password or randomly-assigned 4-digit number. The protocol is designed to be secure even in the face of malicious authentication agents.
APA, Harvard, Vancouver, ISO, and other styles
5

Gasser, Stephan, Margarethe Rammerstorfer, and Karl Weinmayer. "Markowitz Revisited: Social Portfolio Engineering." Elsevier, 2017. http://dx.doi.org/10.1016/j.ejor.2016.10.043.

Full text
Abstract:
In recent years socially responsible investing has become an increasingly more popular subject with both private and institutional investors. At the same time, a number of scientific papers have been published on socially responsible investments (SRIs), covering a broad range of topics, from what actually defines SRIs to the financial performance of SRI funds in contrast to non-SRI funds. In this paper, we revisit Markowitz' Portfolio Selection Theory and propose a modification allowing to incorporate not only asset-specific return and risk but also a social responsibility measure into the investment decision making process. Together with a risk-free asset, this results in a three-dimensional capital allocation plane that allows investors to custom-tailor their asset allocations and incorporate all personal preferences regarding return, risk and social responsibility. We apply the model to a set of over 6,231 international stocks and find that investors opting to maximize the social impact of their investments do indeed face a statistically significant decrease in expected returns. However, the social responsibility/risk-optimal portfolio yields a statistically significant higher social responsibility rating than the return/risk-optimal portfolio.
APA, Harvard, Vancouver, ISO, and other styles
6

Lind, Jonas, and Kim Simonsson. "Social Engineering : En studie om medvetenhet och förebyggande åtgärder mot Social Engineering på svenska organisationer." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-12274.

Full text
Abstract:
Abstrakt  Social Engineering är konsten att manipulera människor, för att på så sätt vinna deras förtroende. Med hjälp av detta förtroende kan attackeraren sedan kringgå säkerhetssystem och få tillgång till organisationers information. Vi har i denna uppsats genomfört elva intervjuer på tre stora organisationer med både IT-chefer och övrig personal. Med dessa intervjuer har vi sedan försökt få en bild av hur medvetenheten ser ut samt vilka åtgärder organisationerna tar för att förhindra Social Engineering. Med denna uppsats vill vi belysa den ovisshet som råder kring Social Engineering, men även farorna och hur effektiv en attack av denna typ kan vara. Slutsaten är att medvetenheten om Social Engineering är låg på de organisationer vi intervjuvat och att de åtgärder som finns inte alltid är tillräckliga.  Nyckelord: Social Engineering, Social manipulatör, Phishing, Dumpster diving, Säkerhetspolicy
APA, Harvard, Vancouver, ISO, and other styles
7

Evans, Nathaniel Joseph. "Information technology social engineering an academic definition and study of social engineering - analyzing the human firewall /." [Ames, Iowa : Iowa State University], 2009. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3369832.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Palmqvist, Stefan. "Social-engineering ett hot mot informationssäkerheten?" Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1993.

Full text
Abstract:

Den här rapporten tar upp ett annorlunda hot mot informationssäkerheten, som inte hårdvara

eller mjukvara kan stoppa. Detta hot kallas för social-engineering, och det som gör detta hot

farligt är att de anställda och chefer i en organisation, kan hjälpa utövaren av socialengineering

utan att de själva vet om det.

Det går inte att förhindra att dessa attacker sker, men man kan förhindra de negativa

konsekvenserna av en sådan attack. Denna rapport tar upp hur man ska göra för att en

organisation ska kunna fortsätta med sin verksamhet, efter en attack av social-engineering. I

värsta fall kan en attack av social-engineering innebära att ett företag aldrig återhämtar sig.

Detta kan bero på att organisationen har förlorat alla sina kunder, förlorat marknads andelar,

eller för att de ansvariga och viktiga personerna i organisationen har blivit dömda för

oaktsamhet och sitter i fängelse.

Denna rapport ska informera och få er att vara uppmärksamma och medvetna om dessa

hot, som ni kanske inte vet finns. Ni ska få kunskap och lära er känna igen de olika

förklädnaderna en utövare av social-engineering antar.


This paper discusses a different threat against information security, which can not be

prevented by either hardware or software. This Threat is called social engineering and the

main issue that makes this threat so dangerous is that the victims, like executives and the

employees in an organization are not aware that they actually helps the practician of social

engineering.

These attacks can not be avoided, but there is a way to prevent negative consequences of

such an attack. This paper discusses how an organization can manage to continue with the

activity, despite an attack of social engineering. In worse case the scenarios of an attack of

social engineering can mean that an organization never fully recovers. The different scenarios

of this can be as following. The organization could lose all the clients, they could have lost

market share or the responsible important people in the organization could be convicted and

sent to jail.

This paper will make you aware of these threats that you might even don’t know exists.

You will be given the knowledge to be able to recognize de different disguises a practician of

social engineering can assume.

APA, Harvard, Vancouver, ISO, and other styles
9

Simon, Peter A. "Social Network Theory In Engineering Education." Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/377.

Full text
Abstract:
Collaborative groups are important both in the learning environment of engineering education and, in the real world, the business of engineering design. Selecting appropriate individuals to form an effective group and monitoring a group’s progress are important aspects of successful task performance. This exploratory study looked at using the concepts of cognitive social structures, structural balance, and centrality from social network analysis as well as the measures of emotional intelligence. The concepts were used to analyze potential team members to examine if an individual's ability to perceive emotion in others and the self and to use, understand, and manage those emotions are a factor in a group’s performance. The students from a capstone design course in computer engineering were used as volunteer subjects. They were formed into groups and assigned a design exercise to determine whether and which of the above mentioned tools would be effective in both selecting teams and predicting the quality of the resultant design. The results were inconclusive with the exception of an individual's ability to accurately perceive emotions. The instruments that were successful were the Self-Monitoring scale and the accuracy scores derived from cognitive social structures and Level IV of network levels of analysis.
APA, Harvard, Vancouver, ISO, and other styles
10

Hor, Joon Suk 1976. "Social interaction in collaborative engineering environments." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Social engineering"

1

Hadnagy, Christopher. Social Engineering. Indianapolis, Indiana: Wiley Publishing, Inc., 2018. http://dx.doi.org/10.1002/9781119433729.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

García-Díaz, César, and Camilo Olaya, eds. Social Systems Engineering. Chichester, UK: John Wiley & Sons, Ltd, 2017. http://dx.doi.org/10.1002/9781118974414.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Riley, Donna. Engineering and Social Justice. Cham: Springer International Publishing, 2008. http://dx.doi.org/10.1007/978-3-031-79940-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

H L, Gururaj, Janhavi V, and Ambika V. Social Engineering in Cybersecurity. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003406716.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Lucena, Juan, ed. Engineering Education for Social Justice. Dordrecht: Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-6350-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Jakobsson, Markus, ed. Understanding Social Engineering Based Scams. New York, NY: Springer New York, 2016. http://dx.doi.org/10.1007/978-1-4939-6457-4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Wang, Huijiong. Explorations in Social Systems Engineering. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3390-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Huijiong, and Shantong Li. Introduction to Social Systems Engineering. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7040-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Gorham, Douglas, and Nnamdi Nwulu. Engineering Education through Social Innovation. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39006-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

E, Sladovich Hedy, Hollomon J. Herbert, and National Academy of Engineering. Meeting, eds. Engineering as a social enterprise. Washington, D.C: National Academy Press, 1991.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Social engineering"

1

Rao, Umesh Hodeghatta, and Umesha Nayak. "Social Engineering." In The InfoSec Handbook, 307–23. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6383-8_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bullée, Jan-Willem, and Marianne Junger. "Social Engineering." In The Palgrave Handbook of International Cybercrime and Cyberdeviance, 849–75. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78440-3_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Helfrich, James. "Social Engineering." In Security for Software Engineers, 69–100. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, 2018.: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9780429506475-7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

McAlaney, John, Peter J. Hills, and Terri Cole. "Social engineering." In Forensic Perspectives on Cybercrime, 26–38. London: Routledge, 2024. http://dx.doi.org/10.4324/9781003300359-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ziegler, Manuel. "Social Engineering." In Web Hacking, 125–31. München: Carl Hanser Verlag GmbH & Co. KG, 2014. http://dx.doi.org/10.3139/9783446441125.009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Böck, Benjamin, Markus D. Klemen, and Edgar R. Weippl. "Social Engineering." In Handbook of Computer Networks, 384–402. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Greene, Thomas C. "Social Engineering." In Computer Security for the Home and Small Office, 73–93. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0711-5_3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Moseley, Ralph. "Social engineering." In Advanced Cybersecurity Technologies, 95–108. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003096894-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Thomson, Kerry-Lynn. "Social Engineering." In Encyclopedia of Cryptography, Security and Privacy, 1–4. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1593-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bullée, Jan-Willem, and Marianne Junger. "Social Engineering." In The Palgrave Handbook of International Cybercrime and Cyberdeviance, 1–28. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-90307-1_38-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Social engineering"

1

Al-Hakimi, Asma Mahfoudh Hezam, and Muhammad Hassan. "Anti-Social Engineering: The Importance of Social Engineering Awareness Training Web Platform." In 2024 IEEE 15th Control and System Graduate Research Colloquium (ICSGRC), 35–40. IEEE, 2024. http://dx.doi.org/10.1109/icsgrc62081.2024.10691315.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rößling, Guido, and Marius Müller. "Social engineering." In the 14th annual ACM SIGCSE conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1562877.1563026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Thornburgh, Tim. "Social engineering." In the 1st annual conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1059524.1059554.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Hussain, Khan Zakir, and Nafis Kazi. "Social engineering." In ICWET '10: International Conference and Workshop on Emerging Trends in Technology. New York, NY, USA: ACM, 2010. http://dx.doi.org/10.1145/1741906.1742184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jaén-Martínez, Francisco Javier, and Leonidas Rigas. "“Social engineering”." In the 1998 workshop. New York, New York, USA: ACM Press, 1998. http://dx.doi.org/10.1145/324332.324344.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Neupane, Ajaya, Kiavash Satvat, Nitesh Saxena, Despina Stavrinos, and Haley Johnson Bishop. "Do Social Disorders Facilitate Social Engineering?" In ACSAC '18: 2018 Annual Computer Security Applications Conference. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3274694.3274730.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Sillanpää, Miika, and Jari Hautamäki. "Social Engineering Intrusion." In IAIT2020: The 11th International Conference on Advances in Information Technology. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3406601.3406631.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Ariu, Davide, Enrico Frumento, and Giorgio Fumera. "Social Engineering 2.0." In CF '17: Computing Frontiers Conference. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3075564.3076260.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Postnikoff, Brittany, and Ian Goldberg. "Robot Social Engineering." In HRI '18: ACM/IEEE International Conference on Human-Robot Interaction. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3173386.3176908.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Bishnoi, Ayush, Garv, Sagar Bishnoi, and Neha Gupta. "Comprehensive Assessment of Reverse Social Engineering to Understand Social Engineering Attacks." In 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT). IEEE, 2023. http://dx.doi.org/10.1109/icssit55814.2023.10061054.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Social engineering"

1

Birmingham, Alec. Hackerville: Social Networking and Social Engineering. Ames (Iowa): Iowa State University, January 2020. http://dx.doi.org/10.31274/cc-20240624-809.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Friedrich, Julia, Kristin Gilbert, Andreas Matzke, Christine Mühle, Ulrike Pietrzyk, Vanita Römer, Anne Steputat-Rätze, Christian Zinke-Wehlmann, Romy Wöhlert, and Robert Wolf. Menschengerechte und effiziente Gestaltung von Interaktionsarbeit : Entwicklung des Social-Service Engineering-Ansatzes. Technische Universität Dresden, 2023. http://dx.doi.org/10.25368/2023.90.

Full text
Abstract:
Der Forschungsbericht spiegelt die Ergebnisse der interdisziplinären Zusammenarbeit am Projekt SO-SERVE (“Social Service Engineering – Synergien von Arbeits- und Dienstleistungswissenschaft für die Verbesserung von Arbeit an und mit Menschen nutzen”) wider. Die Publikation spricht nicht nur Wissenschaftler:innen an, sondern gibt auch detaillierte Einblicke in die Arbeit der Praxispartner. Social Service Engineering geht davon aus, dass nachhaltiger Unternehmenserfolg nur durch eine beschäftigtenorientierte, menschenwürdige Arbeitsgestaltung in Verbindung mit einer Dienstleistungsgestaltung möglich ist, die wirtschaftliche Aspekte und die Wünsche der Kund:innen berücksichtigt. Deshalb kombiniert das entwickelte Social Service Engineering theoretische Ansätze, Konzepte und Methoden aus dem Service Engineering und der Arbeitspsychologie, um Synergien aus beiden Disziplinen zu generieren. Der Forschungsbericht beschreibt das Vorgehen bei der Entwicklung und Erprobung des Social Service Engineerings. Ein besonderer Fokus liegt auf der Darstellung der praktischen Anwendung in der Praxis, wobei der Fokus auf der Arbeit der Partner aus den Bereichen der ambulanten Pflege sowie der Kindertagesbetreuung liegt. Ziel des Berichtes ist, die Mehrwerte des Social Service Engineerings weiteren Unternehmen darzustellen und ihnen Möglichkeiten vorzustellen, von diesem Ansatz zu profitieren. In diesem Zusammenhang werden auch der mögliche Umgang mit Herausforderungen des Ergebnistransfers diskutiert.
APA, Harvard, Vancouver, ISO, and other styles
3

Sims, Benjamin Hayden, and Christa Brelsford. Resilience: Concepts from Engineering, Ecology, and the Social Sciences. Office of Scientific and Technical Information (OSTI), December 2018. http://dx.doi.org/10.2172/1484612.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rieke, Matthes, Simon Jirka, and Stephane Fellah, eds. OGC Testbed-11 Incorporating Social Media in Emergency Response Engineering Report. Open Geospatial Consortium, Inc., November 2015. http://dx.doi.org/10.62973/15-057r2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Dayanova, G. I., and A. N. Krylova. SOCIAL AND ENGINEERING INFRASTRUCTURE OF THE VILLAGE OF THE REPUBLIC OF SAKHA (YAKUTIA). Индивидуальный предприниматель Мухин Максим Николаевич, 2018. http://dx.doi.org/10.18411/2500-3666-2018-09regekon16.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Breslin, V., S. Reaven, M. Schwartz, L. Swanson, M. Zweig, M. Bortman, and J. Schubel. Secondary materials: Engineering properties, environmental consequences, and social and economic impacts. Final report. Office of Scientific and Technical Information (OSTI), August 1993. http://dx.doi.org/10.2172/10110972.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rudolph, Brian. The Story and Magic of Social Engineering: Cybersecurity at the Intersection of Narrative and Psychology. Ames (Iowa): Iowa State University, August 2023. http://dx.doi.org/10.31274/cc-20240624-1493.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Shaneyfelt, Wendy, John T. Feddema, and Conrad D. James. A Surety Engineering Framework and Process to Address Ethical Legal and Social Issues for Artificial Intelligence. Office of Scientific and Technical Information (OSTI), August 2016. http://dx.doi.org/10.2172/1561812.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Tucker-Blackmon, Angelicque. Engagement in Engineering Pathways “E-PATH” An Initiative to Retain Non-Traditional Students in Engineering Year Three Summative External Evaluation Report. Innovative Learning Center, LLC, July 2020. http://dx.doi.org/10.52012/tyob9090.

Full text
Abstract:
The summative external evaluation report described the program's impact on faculty and students participating in recitation sessions and active teaching professional development sessions over two years. Student persistence and retention in engineering courses continue to be a challenge in undergraduate education, especially for students underrepresented in engineering disciplines. The program's goal was to use peer-facilitated instruction in core engineering courses known to have high attrition rates to retain underrepresented students, especially women, in engineering to diversify and broaden engineering participation. Knowledge generated around using peer-facilitated instruction at two-year colleges can improve underrepresented students' success and participation in engineering across a broad range of institutions. Students in the program participated in peer-facilitated recitation sessions linked to fundamental engineering courses, such as engineering analysis, statics, and dynamics. These courses have the highest failure rate among women and underrepresented minority students. As a mixed-methods evaluation study, student engagement was measured as students' comfort with asking questions, collaboration with peers, and applying mathematics concepts. SPSS was used to analyze pre-and post-surveys for statistical significance. Qualitative data were collected through classroom observations and focus group sessions with recitation leaders. Semi-structured interviews were conducted with faculty members and students to understand their experiences in the program. Findings revealed that women students had marginalization and intimidation perceptions primarily from courses with significantly more men than women. However, they shared numerous strategies that could support them towards success through the engineering pathway. Women and underrepresented students perceived that they did not have a network of peers and faculty as role models to identify within engineering disciplines. The recitation sessions had a positive social impact on Hispanic women. As opportunities to collaborate increased, Hispanic womens' social engagement was expected to increase. This social engagement level has already been predicted to increase women students' persistence and retention in engineering and result in them not leaving the engineering pathway. An analysis of quantitative survey data from students in the three engineering courses revealed a significant effect of race and ethnicity for comfort in asking questions in class, collaborating with peers outside the classroom, and applying mathematical concepts. Further examination of this effect for comfort with asking questions in class revealed that comfort asking questions was driven by one or two extreme post-test scores of Asian students. A follow-up ANOVA for this item revealed that Asian women reported feeling excluded in the classroom. However, it was difficult to determine whether these differences are stable given the small sample size for students identifying as Asian. Furthermore, gender differences were significant for comfort in communicating with professors and peers. Overall, women reported less comfort communicating with their professors than men. Results from student metrics will inform faculty professional development efforts to increase faculty support and maximize student engagement, persistence, and retention in engineering courses at community colleges. Summative results from this project could inform the national STEM community about recitation support to further improve undergraduate engineering learning and educational research.
APA, Harvard, Vancouver, ISO, and other styles
10

Nixon, Jonathan, Rembrandt Koppelaar, Sandy Robinson, and Heaven Crawley. Humanitarian energy interventions: the need and opportunities for systematic decision-making. Coventry University, February 2021. http://dx.doi.org/10.18552/heed/2021/0001.

Full text
Abstract:
This briefing paper highlights the potential benefits of humanitarian decision-making tools through the application of a decision support tool developed as part of the EPSRC-funded Humanitarian Engineering and Energy for Displacement (HEED) project led by Coventry University in partnership with Practical Action and Scene Connect. HEED draws upon social science and engineering expertise to better understand energy needs and identify solutions which produce socio-technical systems that encourage community resilience and capacity building.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography