Academic literature on the topic 'Social engineering'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Social engineering.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Social engineering"
Gulenko, Iwan. "Social against social engineering." Information Management & Computer Security 21, no. 2 (June 7, 2013): 91–101. http://dx.doi.org/10.1108/imcs-09-2012-0053.
Full textChauhan, Alok A., Nischal Puri, and Yogesh Narekar. "Social Engineering." IJARCCE 8, no. 5 (May 30, 2019): 38–41. http://dx.doi.org/10.17148/ijarcce.2019.8509.
Full textLuo, Xin, Richard Brody, Alessandro Seazzu, and Stephen Burd. "Social Engineering." Information Resources Management Journal 24, no. 3 (July 2011): 1–8. http://dx.doi.org/10.4018/irmj.2011070101.
Full textMuehleis, Peter. "SOCIAL ENGINEERING." Journal of the American Dental Association 141, no. 5 (May 2010): 500. http://dx.doi.org/10.14219/jada.archive.2010.0207.
Full textMatejko, Alexander J., Adam Podgórecki, Jon Alexander, Rob Shields, and Adam Podgorecki. "Social Engineering." Canadian Public Policy / Analyse de Politiques 22, no. 2 (June 1996): 200. http://dx.doi.org/10.2307/3551924.
Full textRößling, Guido, and Marius Müller. "Social engineering." ACM SIGCSE Bulletin 41, no. 3 (August 25, 2009): 384. http://dx.doi.org/10.1145/1595496.1563026.
Full textMunro, Ken. "Social engineering." Infosecurity Today 2, no. 3 (May 2005): 44. http://dx.doi.org/10.1016/s1742-6847(05)70285-8.
Full textBundey, Jill. "SOCIAL ENGINEERING." Australian Occupational Therapy Journal 18, no. 4 (August 27, 2010): 22–28. http://dx.doi.org/10.1111/j.1440-1630.1971.tb00502.x.
Full textLardschneider, Michael. "Social Engineering." Datenschutz und Datensicherheit - DuD 32, no. 9 (September 2008): 574–78. http://dx.doi.org/10.1007/s11623-008-0137-1.
Full textFox, Dirk. "Social Engineering." Datenschutz und Datensicherheit - DuD 37, no. 5 (May 2013): 318. http://dx.doi.org/10.1007/s11623-013-0115-0.
Full textDissertations / Theses on the topic "Social engineering"
Romaniuk, Oleg. "Social engineering." Thesis, Київський національний університет технологій та дизайну, 2019. https://er.knutd.edu.ua/handle/123456789/13157.
Full textLoggarfve, Robin, and Johan Rydell. "Social Engineering : En kvalitativ studie om hur organisationer hanterar social engineering." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37794.
Full textTraditionally, weaknesses in technology are used to gain unauthorized access to information, but there are other sophisticated methods and approaches that can be more effective. Social engineering is the art of deceiving, manipulating and utilizing social aspects. The method utilizes the weakest link in information security, the human factor. The purpose of the study is to investigate how organizations handle social engineering. It also aims to highlight and inform about the subject with an ambition to raise awareness about the subject. The study has been conducted together with three organizations where qualitative interviews were conducted. The study examined the awareness of the organizations, the most common social engineering attacks and preventive work. The result shows that awareness was good at IT departments while it was worse at other departments in the organizations. The main threats of social engineering to organizations are economic loss and information leakage. The most common approach was phishing and spear phishing. Finally, the study can conclude that education and dissemination of information is the most successful method of preventing social engineering. The study finds that there is no complete protection and that more education is required to raise awareness in social engineering. A security system is not stronger than the weakest link and therefore more resources should be put on preventive work.
Ericsson, Eric, and Robin Kirkhoff. "Resiliens mot social engineering : En studie om organisationers förmåga att hantera social engineering." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40236.
Full textAnderson, Jonathan. "Privacy engineering for social networks." Thesis, University of Cambridge, 2013. https://www.repository.cam.ac.uk/handle/1810/244239.
Full textGasser, Stephan, Margarethe Rammerstorfer, and Karl Weinmayer. "Markowitz Revisited: Social Portfolio Engineering." Elsevier, 2017. http://dx.doi.org/10.1016/j.ejor.2016.10.043.
Full textLind, Jonas, and Kim Simonsson. "Social Engineering : En studie om medvetenhet och förebyggande åtgärder mot Social Engineering på svenska organisationer." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-12274.
Full textEvans, Nathaniel Joseph. "Information technology social engineering an academic definition and study of social engineering - analyzing the human firewall /." [Ames, Iowa : Iowa State University], 2009. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3369832.
Full textPalmqvist, Stefan. "Social-engineering ett hot mot informationssäkerheten?" Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1993.
Full textDen här rapporten tar upp ett annorlunda hot mot informationssäkerheten, som inte hårdvara
eller mjukvara kan stoppa. Detta hot kallas för social-engineering, och det som gör detta hot
farligt är att de anställda och chefer i en organisation, kan hjälpa utövaren av socialengineering
utan att de själva vet om det.
Det går inte att förhindra att dessa attacker sker, men man kan förhindra de negativa
konsekvenserna av en sådan attack. Denna rapport tar upp hur man ska göra för att en
organisation ska kunna fortsätta med sin verksamhet, efter en attack av social-engineering. I
värsta fall kan en attack av social-engineering innebära att ett företag aldrig återhämtar sig.
Detta kan bero på att organisationen har förlorat alla sina kunder, förlorat marknads andelar,
eller för att de ansvariga och viktiga personerna i organisationen har blivit dömda för
oaktsamhet och sitter i fängelse.
Denna rapport ska informera och få er att vara uppmärksamma och medvetna om dessa
hot, som ni kanske inte vet finns. Ni ska få kunskap och lära er känna igen de olika
förklädnaderna en utövare av social-engineering antar.
This paper discusses a different threat against information security, which can not be
prevented by either hardware or software. This Threat is called social engineering and the
main issue that makes this threat so dangerous is that the victims, like executives and the
employees in an organization are not aware that they actually helps the practician of social
engineering.
These attacks can not be avoided, but there is a way to prevent negative consequences of
such an attack. This paper discusses how an organization can manage to continue with the
activity, despite an attack of social engineering. In worse case the scenarios of an attack of
social engineering can mean that an organization never fully recovers. The different scenarios
of this can be as following. The organization could lose all the clients, they could have lost
market share or the responsible important people in the organization could be convicted and
sent to jail.
This paper will make you aware of these threats that you might even don’t know exists.
You will be given the knowledge to be able to recognize de different disguises a practician of
social engineering can assume.
Simon, Peter A. "Social Network Theory In Engineering Education." Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/377.
Full textHor, Joon Suk 1976. "Social interaction in collaborative engineering environments." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80156.
Full textBooks on the topic "Social engineering"
Hadnagy, Christopher. Social Engineering. Indianapolis, Indiana: Wiley Publishing, Inc., 2018. http://dx.doi.org/10.1002/9781119433729.
Full textGarcía-Díaz, César, and Camilo Olaya, eds. Social Systems Engineering. Chichester, UK: John Wiley & Sons, Ltd, 2017. http://dx.doi.org/10.1002/9781118974414.
Full textRiley, Donna. Engineering and Social Justice. Cham: Springer International Publishing, 2008. http://dx.doi.org/10.1007/978-3-031-79940-2.
Full textH L, Gururaj, Janhavi V, and Ambika V. Social Engineering in Cybersecurity. Boca Raton: CRC Press, 2024. http://dx.doi.org/10.1201/9781003406716.
Full textLucena, Juan, ed. Engineering Education for Social Justice. Dordrecht: Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-6350-0.
Full textJakobsson, Markus, ed. Understanding Social Engineering Based Scams. New York, NY: Springer New York, 2016. http://dx.doi.org/10.1007/978-1-4939-6457-4.
Full textWang, Huijiong. Explorations in Social Systems Engineering. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-3390-7.
Full textWang, Huijiong, and Shantong Li. Introduction to Social Systems Engineering. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7040-2.
Full textGorham, Douglas, and Nnamdi Nwulu. Engineering Education through Social Innovation. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-39006-8.
Full textE, Sladovich Hedy, Hollomon J. Herbert, and National Academy of Engineering. Meeting, eds. Engineering as a social enterprise. Washington, D.C: National Academy Press, 1991.
Find full textBook chapters on the topic "Social engineering"
Rao, Umesh Hodeghatta, and Umesha Nayak. "Social Engineering." In The InfoSec Handbook, 307–23. Berkeley, CA: Apress, 2014. http://dx.doi.org/10.1007/978-1-4302-6383-8_15.
Full textBullée, Jan-Willem, and Marianne Junger. "Social Engineering." In The Palgrave Handbook of International Cybercrime and Cyberdeviance, 849–75. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-319-78440-3_38.
Full textHelfrich, James. "Social Engineering." In Security for Software Engineers, 69–100. Boca Raton : Taylor & Francis, a CRC title, part of the Taylor & Francis imprint, a member of the Taylor & Francis Group, the academic division of T&F Informa, plc, 2018.: Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9780429506475-7.
Full textMcAlaney, John, Peter J. Hills, and Terri Cole. "Social engineering." In Forensic Perspectives on Cybercrime, 26–38. London: Routledge, 2024. http://dx.doi.org/10.4324/9781003300359-2.
Full textZiegler, Manuel. "Social Engineering." In Web Hacking, 125–31. München: Carl Hanser Verlag GmbH & Co. KG, 2014. http://dx.doi.org/10.3139/9783446441125.009.
Full textBöck, Benjamin, Markus D. Klemen, and Edgar R. Weippl. "Social Engineering." In Handbook of Computer Networks, 384–402. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch25.
Full textGreene, Thomas C. "Social Engineering." In Computer Security for the Home and Small Office, 73–93. Berkeley, CA: Apress, 2004. http://dx.doi.org/10.1007/978-1-4302-0711-5_3.
Full textMoseley, Ralph. "Social engineering." In Advanced Cybersecurity Technologies, 95–108. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003096894-6.
Full textThomson, Kerry-Lynn. "Social Engineering." In Encyclopedia of Cryptography, Security and Privacy, 1–4. Berlin, Heidelberg: Springer Berlin Heidelberg, 2021. http://dx.doi.org/10.1007/978-3-642-27739-9_1593-1.
Full textBullée, Jan-Willem, and Marianne Junger. "Social Engineering." In The Palgrave Handbook of International Cybercrime and Cyberdeviance, 1–28. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-319-90307-1_38-1.
Full textConference papers on the topic "Social engineering"
Al-Hakimi, Asma Mahfoudh Hezam, and Muhammad Hassan. "Anti-Social Engineering: The Importance of Social Engineering Awareness Training Web Platform." In 2024 IEEE 15th Control and System Graduate Research Colloquium (ICSGRC), 35–40. IEEE, 2024. http://dx.doi.org/10.1109/icsgrc62081.2024.10691315.
Full textRößling, Guido, and Marius Müller. "Social engineering." In the 14th annual ACM SIGCSE conference. New York, New York, USA: ACM Press, 2009. http://dx.doi.org/10.1145/1562877.1563026.
Full textThornburgh, Tim. "Social engineering." In the 1st annual conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/1059524.1059554.
Full textHussain, Khan Zakir, and Nafis Kazi. "Social engineering." In ICWET '10: International Conference and Workshop on Emerging Trends in Technology. New York, NY, USA: ACM, 2010. http://dx.doi.org/10.1145/1741906.1742184.
Full textJaén-Martínez, Francisco Javier, and Leonidas Rigas. "“Social engineering”." In the 1998 workshop. New York, New York, USA: ACM Press, 1998. http://dx.doi.org/10.1145/324332.324344.
Full textNeupane, Ajaya, Kiavash Satvat, Nitesh Saxena, Despina Stavrinos, and Haley Johnson Bishop. "Do Social Disorders Facilitate Social Engineering?" In ACSAC '18: 2018 Annual Computer Security Applications Conference. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3274694.3274730.
Full textSillanpää, Miika, and Jari Hautamäki. "Social Engineering Intrusion." In IAIT2020: The 11th International Conference on Advances in Information Technology. New York, NY, USA: ACM, 2020. http://dx.doi.org/10.1145/3406601.3406631.
Full textAriu, Davide, Enrico Frumento, and Giorgio Fumera. "Social Engineering 2.0." In CF '17: Computing Frontiers Conference. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3075564.3076260.
Full textPostnikoff, Brittany, and Ian Goldberg. "Robot Social Engineering." In HRI '18: ACM/IEEE International Conference on Human-Robot Interaction. New York, NY, USA: ACM, 2018. http://dx.doi.org/10.1145/3173386.3176908.
Full textBishnoi, Ayush, Garv, Sagar Bishnoi, and Neha Gupta. "Comprehensive Assessment of Reverse Social Engineering to Understand Social Engineering Attacks." In 2023 5th International Conference on Smart Systems and Inventive Technology (ICSSIT). IEEE, 2023. http://dx.doi.org/10.1109/icssit55814.2023.10061054.
Full textReports on the topic "Social engineering"
Birmingham, Alec. Hackerville: Social Networking and Social Engineering. Ames (Iowa): Iowa State University, January 2020. http://dx.doi.org/10.31274/cc-20240624-809.
Full textFriedrich, Julia, Kristin Gilbert, Andreas Matzke, Christine Mühle, Ulrike Pietrzyk, Vanita Römer, Anne Steputat-Rätze, Christian Zinke-Wehlmann, Romy Wöhlert, and Robert Wolf. Menschengerechte und effiziente Gestaltung von Interaktionsarbeit : Entwicklung des Social-Service Engineering-Ansatzes. Technische Universität Dresden, 2023. http://dx.doi.org/10.25368/2023.90.
Full textSims, Benjamin Hayden, and Christa Brelsford. Resilience: Concepts from Engineering, Ecology, and the Social Sciences. Office of Scientific and Technical Information (OSTI), December 2018. http://dx.doi.org/10.2172/1484612.
Full textRieke, Matthes, Simon Jirka, and Stephane Fellah, eds. OGC Testbed-11 Incorporating Social Media in Emergency Response Engineering Report. Open Geospatial Consortium, Inc., November 2015. http://dx.doi.org/10.62973/15-057r2.
Full textDayanova, G. I., and A. N. Krylova. SOCIAL AND ENGINEERING INFRASTRUCTURE OF THE VILLAGE OF THE REPUBLIC OF SAKHA (YAKUTIA). Индивидуальный предприниматель Мухин Максим Николаевич, 2018. http://dx.doi.org/10.18411/2500-3666-2018-09regekon16.
Full textBreslin, V., S. Reaven, M. Schwartz, L. Swanson, M. Zweig, M. Bortman, and J. Schubel. Secondary materials: Engineering properties, environmental consequences, and social and economic impacts. Final report. Office of Scientific and Technical Information (OSTI), August 1993. http://dx.doi.org/10.2172/10110972.
Full textRudolph, Brian. The Story and Magic of Social Engineering: Cybersecurity at the Intersection of Narrative and Psychology. Ames (Iowa): Iowa State University, August 2023. http://dx.doi.org/10.31274/cc-20240624-1493.
Full textShaneyfelt, Wendy, John T. Feddema, and Conrad D. James. A Surety Engineering Framework and Process to Address Ethical Legal and Social Issues for Artificial Intelligence. Office of Scientific and Technical Information (OSTI), August 2016. http://dx.doi.org/10.2172/1561812.
Full textTucker-Blackmon, Angelicque. Engagement in Engineering Pathways “E-PATH” An Initiative to Retain Non-Traditional Students in Engineering Year Three Summative External Evaluation Report. Innovative Learning Center, LLC, July 2020. http://dx.doi.org/10.52012/tyob9090.
Full textNixon, Jonathan, Rembrandt Koppelaar, Sandy Robinson, and Heaven Crawley. Humanitarian energy interventions: the need and opportunities for systematic decision-making. Coventry University, February 2021. http://dx.doi.org/10.18552/heed/2021/0001.
Full text