To see the other types of publications on this topic, follow the link: Social engineering.

Dissertations / Theses on the topic 'Social engineering'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Social engineering.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Romaniuk, Oleg. "Social engineering." Thesis, Київський національний університет технологій та дизайну, 2019. https://er.knutd.edu.ua/handle/123456789/13157.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Loggarfve, Robin, and Johan Rydell. "Social Engineering : En kvalitativ studie om hur organisationer hanterar social engineering." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37794.

Full text
Abstract:
Traditionellt sett används svagheter i tekniken för att få obehörig tillgång till information, men det finns andra sofistikerade metoder och tillvägagångssätt som kan vara mer effektiva. Social engineering är konsten att bedra, manipulera och utnyttja sociala aspekter. Metoden utnyttjar den svagaste länken i informationssäkerheten, mänskliga faktorn. Syftet med studien är att undersöka hur organisationer hanterar social engineering. Den syftar också till att belysa och informera kring ämnet med ambition att öka medvetenheten om ämnet. Studien har utförts tillsammans med tre organisationer där kvalitativa intervjuer genomförts. Studien undersökte organisationernas medvetenhet, vanligast förekommande social engineering-attackerna och förebyggande arbete. Resultatet visar att medvetenheten var god på IT-avdelningarna medan den var sämre på övriga avdelningar i organisationerna. De främsta hoten social engineering utgör mot organisationer är ekonomisk förlust och informationsläckage. Det vanligaste tillvägagångssättet visade sig vara phishing och spear phishing. Slutligen kan studien fastslå att utbildning och informationsspridning är den mest framgångsrika metod för att förebygga social engineering. Studien konstaterar att det saknas ett fullständigt skydd och att mer utbildning krävs för att öka medvetenheten inom social engineering. Ett säkerhetsskydd är inte starkare än den svagaste länken och därför bör mer resurser läggas på förebyggande arbete.
Traditionally, weaknesses in technology are used to gain unauthorized access to information, but there are other sophisticated methods and approaches that can be more effective. Social engineering is the art of deceiving, manipulating and utilizing social aspects. The method utilizes the weakest link in information security, the human factor. The purpose of the study is to investigate how organizations handle social engineering. It also aims to highlight and inform about the subject with an ambition to raise awareness about the subject. The study has been conducted together with three organizations where qualitative interviews were conducted. The study examined the awareness of the organizations, the most common social engineering attacks and preventive work. The result shows that awareness was good at IT departments while it was worse at other departments in the organizations. The main threats of social engineering to organizations are economic loss and information leakage. The most common approach was phishing and spear phishing. Finally, the study can conclude that education and dissemination of information is the most successful method of preventing social engineering. The study finds that there is no complete protection and that more education is required to raise awareness in social engineering. A security system is not stronger than the weakest link and therefore more resources should be put on preventive work.
APA, Harvard, Vancouver, ISO, and other styles
3

Ericsson, Eric, and Robin Kirkhoff. "Resiliens mot social engineering : En studie om organisationers förmåga att hantera social engineering." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40236.

Full text
Abstract:
Given the major technological development that has been made in the last decades, companies and organizations draw benefit from these technological means to communicate in new ways rather than using old school methods like snail-mail. This has led to many new attack vectors for culprits looking to commit fraud. These attack vectors have proven to be very effective given the fact that culprits can target massive volumes of potential targets. The purpose of this report was divided into two parts, investigate to what extent employees were aware of the phenomena “social engineering” as well as conducting a literature study to gather knowledge about common attacks and defence mechanisms to counter these attacks. To investigate the awareness regarding “social engineering” of employees in different organizations, eight different qualitative interviews were conducted with employees of different organizations. To gather knowledge about common social engineering attacks an extensive literature study was done. The interviews revealed that many employees had low awareness about social engineering and many of them also failed to manage their credentials to IT-systems in a safe way. The interviewed subjects also shared a low awareness regarding their organizations policies regarding IT-security. The literature study revealed that social engineering attacks come in many different forms.Many of the attacks are very similar but regarding who they are targeting, or which mediumis used for the attack they can receive a different name. The social engineering attack called “phishing” was the most recurrent type of social engineering attack and hence a lot of this thesis is focused on this attack. Examples of authentic successful phishing attempts arepresented.
APA, Harvard, Vancouver, ISO, and other styles
4

Anderson, Jonathan. "Privacy engineering for social networks." Thesis, University of Cambridge, 2013. https://www.repository.cam.ac.uk/handle/1810/244239.

Full text
Abstract:
In this dissertation, I enumerate several privacy problems in online social networks (OSNs) and describe a system called Footlights that addresses them. Footlights is a platform for distributed social applications that allows users to control the sharing of private information. It is designed to compete with the performance of today's centralised OSNs, but it does not trust centralised infrastructure to enforce security properties. Based on several socio-technical scenarios, I extract concrete technical problems to be solved and show how the existing research literature does not solve them. Addressing these problems fully would fundamentally change users' interactions with OSNs, providing real control over online sharing. I also demonstrate that today's OSNs do not provide this control: both user data and the social graph are vulnerable to practical privacy attacks. Footlights' storage substrate provides private, scalable, sharable storage using untrusted servers. Under realistic assumptions, the direct cost of operating this storage system is less than one US dollar per user-year. It is the foundation for a practical shared filesystem, a perfectly unobservable communications channel and a distributed application platform. The Footlights application platform allows third-party developers to write social applications without direct access to users' private data. Applications run in a confined environment with a private-by-default security model: applications can only access user information with explicit user consent. I demonstrate that practical applications can be written on this platform. The security of Footlights user data is based on public-key cryptography, but users are able to log in to the system without carrying a private key on a hardware token. Instead, users authenticate to a set of authentication agents using a weak secret such as a user-chosen password or randomly-assigned 4-digit number. The protocol is designed to be secure even in the face of malicious authentication agents.
APA, Harvard, Vancouver, ISO, and other styles
5

Gasser, Stephan, Margarethe Rammerstorfer, and Karl Weinmayer. "Markowitz Revisited: Social Portfolio Engineering." Elsevier, 2017. http://dx.doi.org/10.1016/j.ejor.2016.10.043.

Full text
Abstract:
In recent years socially responsible investing has become an increasingly more popular subject with both private and institutional investors. At the same time, a number of scientific papers have been published on socially responsible investments (SRIs), covering a broad range of topics, from what actually defines SRIs to the financial performance of SRI funds in contrast to non-SRI funds. In this paper, we revisit Markowitz' Portfolio Selection Theory and propose a modification allowing to incorporate not only asset-specific return and risk but also a social responsibility measure into the investment decision making process. Together with a risk-free asset, this results in a three-dimensional capital allocation plane that allows investors to custom-tailor their asset allocations and incorporate all personal preferences regarding return, risk and social responsibility. We apply the model to a set of over 6,231 international stocks and find that investors opting to maximize the social impact of their investments do indeed face a statistically significant decrease in expected returns. However, the social responsibility/risk-optimal portfolio yields a statistically significant higher social responsibility rating than the return/risk-optimal portfolio.
APA, Harvard, Vancouver, ISO, and other styles
6

Lind, Jonas, and Kim Simonsson. "Social Engineering : En studie om medvetenhet och förebyggande åtgärder mot Social Engineering på svenska organisationer." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-12274.

Full text
Abstract:
Abstrakt  Social Engineering är konsten att manipulera människor, för att på så sätt vinna deras förtroende. Med hjälp av detta förtroende kan attackeraren sedan kringgå säkerhetssystem och få tillgång till organisationers information. Vi har i denna uppsats genomfört elva intervjuer på tre stora organisationer med både IT-chefer och övrig personal. Med dessa intervjuer har vi sedan försökt få en bild av hur medvetenheten ser ut samt vilka åtgärder organisationerna tar för att förhindra Social Engineering. Med denna uppsats vill vi belysa den ovisshet som råder kring Social Engineering, men även farorna och hur effektiv en attack av denna typ kan vara. Slutsaten är att medvetenheten om Social Engineering är låg på de organisationer vi intervjuvat och att de åtgärder som finns inte alltid är tillräckliga.  Nyckelord: Social Engineering, Social manipulatör, Phishing, Dumpster diving, Säkerhetspolicy
APA, Harvard, Vancouver, ISO, and other styles
7

Evans, Nathaniel Joseph. "Information technology social engineering an academic definition and study of social engineering - analyzing the human firewall /." [Ames, Iowa : Iowa State University], 2009. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3369832.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Palmqvist, Stefan. "Social-engineering ett hot mot informationssäkerheten?" Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1993.

Full text
Abstract:

Den här rapporten tar upp ett annorlunda hot mot informationssäkerheten, som inte hårdvara

eller mjukvara kan stoppa. Detta hot kallas för social-engineering, och det som gör detta hot

farligt är att de anställda och chefer i en organisation, kan hjälpa utövaren av socialengineering

utan att de själva vet om det.

Det går inte att förhindra att dessa attacker sker, men man kan förhindra de negativa

konsekvenserna av en sådan attack. Denna rapport tar upp hur man ska göra för att en

organisation ska kunna fortsätta med sin verksamhet, efter en attack av social-engineering. I

värsta fall kan en attack av social-engineering innebära att ett företag aldrig återhämtar sig.

Detta kan bero på att organisationen har förlorat alla sina kunder, förlorat marknads andelar,

eller för att de ansvariga och viktiga personerna i organisationen har blivit dömda för

oaktsamhet och sitter i fängelse.

Denna rapport ska informera och få er att vara uppmärksamma och medvetna om dessa

hot, som ni kanske inte vet finns. Ni ska få kunskap och lära er känna igen de olika

förklädnaderna en utövare av social-engineering antar.


This paper discusses a different threat against information security, which can not be

prevented by either hardware or software. This Threat is called social engineering and the

main issue that makes this threat so dangerous is that the victims, like executives and the

employees in an organization are not aware that they actually helps the practician of social

engineering.

These attacks can not be avoided, but there is a way to prevent negative consequences of

such an attack. This paper discusses how an organization can manage to continue with the

activity, despite an attack of social engineering. In worse case the scenarios of an attack of

social engineering can mean that an organization never fully recovers. The different scenarios

of this can be as following. The organization could lose all the clients, they could have lost

market share or the responsible important people in the organization could be convicted and

sent to jail.

This paper will make you aware of these threats that you might even don’t know exists.

You will be given the knowledge to be able to recognize de different disguises a practician of

social engineering can assume.

APA, Harvard, Vancouver, ISO, and other styles
9

Simon, Peter A. "Social Network Theory In Engineering Education." Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/377.

Full text
Abstract:
Collaborative groups are important both in the learning environment of engineering education and, in the real world, the business of engineering design. Selecting appropriate individuals to form an effective group and monitoring a group’s progress are important aspects of successful task performance. This exploratory study looked at using the concepts of cognitive social structures, structural balance, and centrality from social network analysis as well as the measures of emotional intelligence. The concepts were used to analyze potential team members to examine if an individual's ability to perceive emotion in others and the self and to use, understand, and manage those emotions are a factor in a group’s performance. The students from a capstone design course in computer engineering were used as volunteer subjects. They were formed into groups and assigned a design exercise to determine whether and which of the above mentioned tools would be effective in both selecting teams and predicting the quality of the resultant design. The results were inconclusive with the exception of an individual's ability to accurately perceive emotions. The instruments that were successful were the Self-Monitoring scale and the accuracy scores derived from cognitive social structures and Level IV of network levels of analysis.
APA, Harvard, Vancouver, ISO, and other styles
10

Hor, Joon Suk 1976. "Social interaction in collaborative engineering environments." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80156.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Nguyen, Steve Huy. "Social Media Systems Engineering for Businesses." Digital Commons at Loyola Marymount University and Loyola Law School, 2014. https://digitalcommons.lmu.edu/etd/427.

Full text
Abstract:
Recently, many businesses are finding new ways to reach out to millions of people using a tool known as social media. Utilizing this tool, businesses are able to market their brand as well as instill company pride in their customers and employees. Top Fortune 500 companies like Walmart, Exxon Mobil, Costco, and Apple, to name a few, have a strong social media presence. Top aerospace companies such as Northrop Grumman, Lockheed Martin, and Boeing have taken advantage of the benefits. Interestingly, Loyola Marymount University has graced top social media sites with its presence. Popular social media websites include Facebook, Twitter, YouTube, lnstagram, and many others. When implemented correctly, social media will draw mass population to the brand and institution more than ever before. Businesses are able to advertise, familiarize, poll, and gauge interest with ease using social media. Businesses have gathered ideas or designs from the open public at no cost, or for a relatively cheap cash prize, to generate new products. There are many benefits that businesses can reap through the use of social media. With access to millions of users, businesses must remain ethical and responsible for their actions on social media sites. With posts that take seconds to upload, it is easy to make careless mistakes or create unintentional backlash from users. Ethics are important in social media and companies, such as Walmart, have published a set of social media Code of Ethics on their websites. Although social media is generally available at no cost to businesses, an organized team must be formed and managed. A significant budget is required to fund the labor hours for the media team, publishing department, contributors, and information security. Lean processes can be implemented to increase efficiency and reduce waste while quality ensures a robust process and continuous improvement. This integrative project will describe the System Engineering of the social media system from conception to maintenance. Compiling data found from internet resources, this project will integrate the different elements of social media to produce a system capable of efficiently marketing a company's brand to millions of people while delivering information that users demand. As evident from the above description, many elements of Systems Engineering can be applied to this social media system. This project will demonstrate how the application of the Systems Engineering tools and methodologies can optimize the implementation of the social media system to achieve the expectations of companies and users.
APA, Harvard, Vancouver, ISO, and other styles
12

Björklund, Christoffer. "Deepfakes inom social engineering och brottsutredningar." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42373.

Full text
Abstract:
”Deepfake” är en förkortning av ”deep learning” och ”fake”. Deepfakes är syntetisk audiovisuell media som använder sig av maskininlärning för att generera falska videoklipp, bilder och/eller ljudklipp. Detta projekt fokuserar på deepfakes inom förfalskat videomaterial, där en persons ansikte i en video är utbytt mot en annan persons ansikte. Fokuset för den här rapporten är att undersöka hur enkelt det är att göra en egen deepfake med grundläggande kunskap. Detta är gjort med ett experiment som avser att mäta kvantitativa och kvalitativa resultat från intervjuer. Intervjuobjekten har tittat på två videor där de försökt identifiera författarens egna förfalskade videoklipp blandade med legitima videoklipp. Experimentet visar på att det är möjligt och relativt enkelt att skapa övertygande högkvalitativa deepfakes gjorda för social engineering. Det är däremot svårare, men fortfarande möjligt, att förfalska audiovisuellt material i bildbevis. Vidare undersöks vad det finns för typer av preventiva forensiska verktyg och metoder som utvecklas till att upptäcka deepfakes inom förfalskat videomaterial. I nuläget finns det många tekniker som föreslagits som metoder för att identifiera deepfakes. Denna rapport granskar även deepfakes gjorda för social engineering. Deepfakes anses bli ett av de större hoten i framtiden där de kan användas till att effektivt sprida propaganda och desinformation. Nyhetsmedia står inför stora utmaningar framöver på grund av misstro från konsumenter av audiovisuellt nyhetsmaterial. Utifrån de kvantitativa och kvalitativa resultaten, föreslår författaren att nyhetsmedia och social media kan informera om vad deepfakes är och hur sådana förfalskade videoklipp typiskt ser ut.
’Deepfake’ is an abbreviation of ’deep learning’ and ’fake’. Deepfakes are synthetical audiovisual media that uses machine learning to create fake videos, images and/or audio clips. This project is focused on deepfakes within forged videos, where one person’s face is swapped with another person’s face. This technique is usually referred to as ’face swapping’. However, deepfakes goes beyond what usual face swaps can achieve. The focus for this project is to investigate how easy it is to forge your own deepfakes with basic technical knowledge. This is achieved through an experiment that measures result from fourteen interviews. The interviewees watched two different videos, where each person tried to identify the writers’ own deepfaked video clips, that were mixed with legitimate video clips. The experiment shows that it is possible and relatively easy to create convincing deepfakes aimed at social engineering. It is also possible, but harder, to create deepfakes to forge videos within criminal investigations. This report examines the potential forensic techniques and tools that exists and are developed to identify deepfakes. Furthermore, this report also examines deepfakes made for social engineering. Deepfakes are considered being one of the more significant threats in the future and could be used to effectively spread propaganda and misinformation. The results generated from the experiment in this report, lead to a proposition from the writer that news outlets and social media platforms could aim at an informative approach towards deepfakes. This approach means informing their consumers on what deepfakes are, how they typically look and what consumers can do themselves to identify them.
APA, Harvard, Vancouver, ISO, and other styles
13

Cerovic, Lazar. "Identifying Resilience Against Social Engineering Attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280131.

Full text
Abstract:
Social engineering (SE) attacks are one of the most common cyber attacks and frauds, which causes a large economical destruction to individuals, companies and governments alike. The attacks are hard to protect from, since SE-attacks is based on exploiting human weaknesses. The goal of this study is to identify indicators of resilience against SE-attacks from individual computer space data, such as network settings, social media profiles, web browsing behaviour and more. This study is based on qualitative methods to collect information, analyse and evaluate data. Resilience is evaluated with models such as theory of planned behaviour and the big five personality traits, as well as personal and demographic information. Indicators of resilience were found in network settings such as service set identifiers (SSID) and routers, web history, social media use and more. The framework developed in this study could be expanded with more aspect of individual data and different evaluation criteria. Further studies can be done about this subject with tools such as artificial intelligence and machine learning.
Sociala manipulationer är bland de vanligaste cyber attackerna och bedrägerierna som orsakar enorma ekonomiska skador varje år för individer, företag och myndigheter. Dessa attacker är svåra att skydda ifrån då sociala manipulationer utnyttjar mänskliga svagheter som ett medel till att stjäla pengar eller information. Målet med studien är att identifiera indikatorer av motstånd mot sociala manipulationsattacker, vilket ska göras med hjälp av individuell data, som kan bestå av nätverksinställningar, sociala medieprofiler, webbaktivitet bland annat. Denna studie är baserat på kvalitativa metoder för att samla, analysera och utvärdera data. Motstånd mot social manipulation utvärderas med hjälp av relevanta teorier och modeller som har med beteende och personligheter att göra, sedan används även personlig och demografisk information i utvärderingen. De indikatorer som identifierades var bland annat inställningar i routrar, webbhistorik och social medianvändning. Det teoretiska ramverket som utvecklades för att utvärdera motstånd mot sociala manipulationsattacker kan utökas med fler aspekter av individuell data. Viktiga samhällshändelser och sammanhang kan vara en intressant faktor som är relaterat till ämnet. Framtida studier skulle kunna kombinera detta ramverk med tekniker som maskinlärning och artificiell intelligens.
APA, Harvard, Vancouver, ISO, and other styles
14

Cahill, Christopher L. "Engineering ethics and Catholic social teaching." Theological Research Exchange Network (TREN), 1995. http://www.tren.com.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Asprino, Luigi <1988&gt. "Engineering Background Knowledge for Social Robots." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amsdottorato.unibo.it/9020/1/asprino_luigi_tesi.pdf.

Full text
Abstract:
Social robots are embodied agents that continuously perform knowledge-intensive tasks involving several kinds of information coming from different heterogeneous sources. Providing a framework for engineering robots' knowledge raises several problems like identifying sources of information and modeling solutions suitable for robots' activities, integrating knowledge coming from different sources, evolving this knowledge with information learned during robots' activities, grounding perceptions on robots' knowledge, assessing robots' knowledge with respect humans' one and so on. In this thesis we investigated feasibility and benefits of engineering background knowledge of Social Robots with a framework based on Semantic Web technologies and Linked Data. This research has been supported and guided by a case study that provided a proof of concept through a prototype tested in a real socially assistive context.
APA, Harvard, Vancouver, ISO, and other styles
16

Hadley, Benjamin, Pontus Moell, and Henrik Nilsson. "Social engineering – Ett enkelt sätt att kringå säkerheten? En kvalitativ studie av företags åtgärder mot social engineering." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-48839.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Laribee, Lena. "Development of methodical social engineering taxonomy project." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Jun%5FLaribee.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, June 2006.
Thesis Advisor(s): Craig H. Martell, Neil C. Rowe. "June 2006." Includes bibliographical references (p. 49-52). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
18

Arenas, Miguel Tames. "Social Engineering and Internal Threats in Organizations." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6075.

Full text
Abstract:
Organizations are taking computer security more seriously every day, investing huge amounts of money in creating stronger defenses including firewalls, anti-virus software, biometrics and identity access badges. These measures have made the business world more effective at blocking threats from the outside, and made it increasingly difficult for hackers or viruses to penetrate systems. But there are still threats that put organizations at risk , this threats are not necessary from external attackers, in this paper we will analyze what are the internal threats in organizations, why are we vulnerable and the best methods to protect our organizations from inside threats.
APA, Harvard, Vancouver, ISO, and other styles
19

Sung, Johnny. "The developmental worker : social engineering and worker participation." Thesis, University of Leicester, 2001. http://hdl.handle.net/2381/29344.

Full text
Abstract:
There are four broad aims in this thesis. Firstly, I explore how the developmental state achieves its developmental objectives through collaborative effort with the workers. Secondly, within this context, I examine the significance of the practice of social engineering and nation building, and how social engineering and national building form an integral part of Singapore's economic growth process. These analyses give rise to new perspective in examining the growth process in Singapore - i.e. the 'developmental worker' model. The third aim of this thesis is therefore to establish the theoretical content of the developmental work model. The fourth aim of the thesis is to employ both qualitative and quantitative data to substantiate the developmental worker model in Singapore. The contributions of the developmental worker model are two-fold. Firstly, to my best knowledge, it is the first attempt of its kind to incorporate a workers' perspective into the analysis of the gwoth experience in Singapore. By creating a complementary concept (i.e. the developmental worker model) for the developmental state mode, the thesis makes the developmental state model analytically more 'complete'. Secondly, through the developmental worker model, the thesis also represents the first attempt to examine the empirical content of the workers' interpretative understanding process and the collective beliefs of Singapore workers. The combined effects of these two empirical elements lead to the ultimate social actions on the part of the workers, i.e. a collaborative effort between the state and workers to achieve the 'economic miracle' in Singapore.
APA, Harvard, Vancouver, ISO, and other styles
20

Slonka, Kevin J. "Awareness of malicious social engineering among facebook users." Thesis, Robert Morris University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3620246.

Full text
Abstract:

With the rapid growth of Facebook, the social networking website is becoming a lucrative target for malicious activity. Users of Facebook therefore should be aware of various malicious attacks and know how to identify them. This research analyzed Facebook users' level of understanding in the domain of malicious social engineering on Facebook. The research examined differences in awareness among multiple generational groups; secondary research questions focused on how factors such as age, gender, education, Internet usage, and trust affected users' awareness of malicious activity. Results suggest that the Baby Boomer generation is the least aware of malicious social engineering tactics on Facebook, specifically in regard to the Donation scam category. In addition, education level and educational background are significantly associated with awareness. These findings indicate a need for future work to gain a deeper understanding of Facebook users' awareness of malicious social engineering and generate targeted training in order to increase said awareness.

APA, Harvard, Vancouver, ISO, and other styles
21

Ottosson, Hans Jorgen. "Considering Social Impact when Engineering for Global Development." BYU ScholarsArchive, 2021. https://scholarsarchive.byu.edu/etd/9158.

Full text
Abstract:
Every manufactured product has an environmental impact, a social impact, and an economic impact. As engineers, we should do our best to understand how our design decisions influence these impacts (the three pillars of sustainability), and at the same time make decisions that collectively lead to maximum positive impacts, or minimum negative impacts on the economy, environment, and society. Many times, engineers show interest and want to design for all three pillars of sustainability but are often constrained to focus on the environmental and economic aspects, leaving out social sustainability due to lack of understanding and resources. In practice, this leaves the social dimension of sustainability out of sight and reach for many engineers. So to assist engineers to consider and improve the social impacts of their products, we have created two methods. The first method is focused on meeting customers' unmet needs through the use of collaborative products (a product created by temporarily combining physical components from two or more products to perform new tasks) and the second method is to be used throughout the product development process in order to increase the potential social impacts of the product being designed. It will assist engineers to become aware of social impact categories sometimes overlooked, especially when designing for global engineering. If engineers are able to focus on all three pillars of sustainability early in the design process, including social sustainability, they can add social impact indicators along with technical performance measurements during the product development process and design a product that better meets the requirements for environment, economic, and social sustainability. This is why it is important for engineers to know how to handle the complexity and uncertainty associated with design parameters when creating products for social impacts aimed at global development. In this dissertation, the two methods are outlined and explained. The demonstration of the first method showed that by using the method of collaborative product design to create a brick press, the task-per-cost ratio was improved by 30%. The demonstration of the second method showed that a redesign of the cup seal in the India Mark II/III hand pump system (a product used by approximately 10% of the world's population) could extend the service interval with 12% by replacing the cup seals. Lastly, conclusions related to improving social impacts when engineering for global development and suggestions for future research are outlined.
APA, Harvard, Vancouver, ISO, and other styles
22

PASQUALI, DARIO. "Social Engineering Defense Solutions Through Human-Robot Interaction." Doctoral thesis, Università degli studi di Genova, 2022. http://hdl.handle.net/11567/1092333.

Full text
Abstract:
Social Engineering is the science of using social interaction to influence others on taking computer-related actions of attacker’s interest. It is used to steal credentials, money, or people’s identities. After being left unchecked for a long time, social engineering is raising increasing concerns. Despite its social nature, state-of-the-art defense systems mainly focus on engineering factors. They detect technical features specific to the medium employed in the attack (e.g., phishing emails), or they train final users on detecting them. However, the crucial aspects of social engineering are humans, their vulnerabilities, and how attackers leverage them, gaining victims’ compliance. Recent solutions involved victims’ explicit perception and judgment in technical defenses (Humans-as-a-Security-Sensor paradigm). However, humans also communicate implicitly: gaze, heart rate, sweating, body posture, and voice prosody are physiological and behavioral cues that implicitly disclose humans’ cognitive and emotional state. In literature, expert social engineers reported monitoring such cues from the victims continuously to adapt their strategy (e.g., in face-to-face attacks); also, they stressed the importance of controlling them to avoid revealing the attacker’s malicious intentions. This thesis studies how to leverage such behavioral and physiological cues to defend against social engineering. Moreover, it researches humanoid social robots - more precisely the iCub and Furhat robotic platforms - as novel agents in the cybersecurity field. Humans’ trust in robots and their role are still debated: attackers could hijack and control them to perform face-to-face attacks from a safe distance. However, this thesis speculates robots could be helpers, everyday companions able to warn users against social engineering attacks, better than traditional notification vectors could do. Finally, this thesis explores leveraging game-based entertaining human-robot interactions to collect more realistic, less biased data. For this purpose, I performed four studies concerning different aspects of social engineering. Firstly, I studied how the trust between attackers and victims evolves and can be exploited. In a Treasure Hunt game, players had to decide whether trust the hints of iCub. The robot showed four mechanical failures designed to mine its perceived reliability in the game and could provide transparent motivations for them. The study showed how players’ trust in iCub decreased only if they perceived all the faults or the robot explained them; i.e., they perceived the risk of relying on a faulty robot. Then, I researched novel physiological-based methods to unmask malicious social engineers. In a Magic Trick card game, autonomously led by the iCub robot, players lied or told the truth about gaming card descriptions. ICub leveraged an End-to-end deception detection architecture to identify lies based on players’ pupil dilation alone. The architecture enables iCub to learn customized deception patterns, improving the classification over prolonged interactions. In the third study, I focused on victims’ behavioral and physiological reactions during social engineering attacks; and how to evaluate their awareness. Participants played an interactive storytelling game designed to challenge them against social engineering attacks from virtual agents and the humanoid robot iCub. Post-hoc, I trained three Random Forest classifiers to detect whether participants’ perceived the risk and uncertainty of Social Engineering attacks and predict their decisions. Finally, I explored how social humanoid robots should intervene to prevent victims’ compliance with social engineering. In a refined version of the interactive storytelling, the Furhat robot contrasted players’ decisions with different strategies, changing their minds. Preliminary results suggest the robot effectively affected participants’ decisions, motivating further studies toward closing the social engineering defense loop in human-robot interaction. Summing up, this thesis provides evidence that humans’ implicit cues and social robots could help against social engineering; it offers practical defensive solutions and architectures supporting further research in the field and discusses them aiming for concrete applications.
APA, Harvard, Vancouver, ISO, and other styles
23

Carlander-Reuterfelt, Gallo Matias. "Estimating human resilience to social engineering attacks through computer configuration data : A literature study on the state of social engineering vulnerabilities." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277921.

Full text
Abstract:
Social engineering as a method of attack is increasingly becoming a problem for both corporations and individuals. From identity theft to enormous financial losses, this form of attack is notorious for affecting complex structures, yet often being very simple in its form. Whereas for other forms of cyber- attack, tools like antivirus and antimalware are now industry standard, have proven to be reliable ways to keep safe private and confidential data, there is no such equivalent for social engineering attacks. There is not, as of this day, a trustworthy and precise way of estimating resilience to these attacks, while still keeping the private data private. The purpose of this report is to compile the different aspects of a users computer data that have been proven to significantly indicative of their susceptibility to these kinds of attacks, and with them, devise a system that can, with some degree of precision, estimate the resilience to social engineering of the user. This report is a literature study on the topic of social engineering and how it relates to computer program data, configuration and personality. The different phases of research each led to a more comprehensive way of linking the different pieces of data together and devising a rudimentary way of estimating human resilience to social engineering through the observation of a few configuration aspects. For the purposes of this report, the data had to be reasonably accessible, respecting privacy, and being something that can be easily extrapolated from one user to another. Based on findings, ranging from psychological data and behavioral patterns, to network configurations, we conclude that, even though there is data that supports the possibility of estimating resilience, there is, as of this day, no empirically proven way of doing so in a precise manner. An estimation model is provided by the end of the report, but the limitations of this project did not allow for an experiment to prove its validity beyond the theories it is based upon.
Social Manipulering som attackmetod har blivit ett ökande problem både för företag och individer. Från identitetsstöld till enorma ekonomiska förluster, är denna form av attack känd för att kunna påverka komplexa system, men är ofta i sig mycket enkel i sin form. Medans andra typer av cyberattacker kan skyddas med verktyg som antivirus och antimalware och tillförlitligt hålla privat och konfidentiell information säker så finns det inga motsvarande verktyg för att skydda sig mot Social Manipulering attacker. Det finns alltså inte idag ett pålitligt och säkert sätt att motstå Social Manipulering attacker och skydda personliga uppgifter och privat data. Syftet med denna rapport är att visa olika aspekterna hur datoranvändares data är sårbarhet för dessa typer av attacker, och med dessa utforma ett system som med viss mån av precision kan mäta resiliens mot Social Manipulering. Rapporten är ett resultat av studier av litteratur inom ämnet Social Manipulering och hur den relaterar sig till datorns data, konfiguration och personuppgifter. De olika delarna av utredningen leder var och en till ett mer omfattande sätt att koppla samman de olika uppgifterna och utforma ett rudimentärt sätt att uppskatta en persons resiliens mot Social Manipulering, detta genom att observera olika aspekter av datorns konfiguration. För syftet av rapporten så har uppgifterna varit rimligt tillgängliga, har respekterat integriteten och varit något som lätt kan anpassas från en användare till en annan. Baserat på observationerna av psykologiska data, beteendemönster och nätverkskonfigurationer, så kan vi dra slutsatsen att även om det finns data som stöder möjligheten att uppskatta resiliens, finns det idag inget empiriskt bevisat sätt att göra det på ett exakt sätt. En exempel av modell för att uppskatta resiliens finns i slutet av rapporten. Ramen för detta projekt gjorde det inte möjligt att göra ett praktiskt experiment för att validera teorierna.
APA, Harvard, Vancouver, ISO, and other styles
24

Lipski, Marcus. "Social Engineering der Mensch als Sicherheitsrisiko in der IT." Hamburg Diplomica-Verl, 2009. http://d-nb.info/993473008/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Abbasian, Hosseini Seyed Alireza. "Social and Engineering Aspects of Construction Site Management using Simulation and Social Network Analysis." Thesis, North Carolina State University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10110533.

Full text
Abstract:

The crews/actors/subs during a construction project make relationship and communicate with each other on the jobsite primarily when they work in a task sequence or when they work in the same working area at the same time. These interdependencies can have various impacts on their performance, the decisions their supervisor make and their action from both engineering and social aspects. The main focus of the past research is on the project parties’ relationship based on the information exchange and formal communication, while the research pertaining to the interpretation and investigation of the construction crews/trades’ interdependencies during the construction project is very limited. How are the construction jobsite actors connected in a construction jobsite? How do the existing interdependencies among them affect their performance? And how can understanding these interdependencies be beneficial for construction site managers? The primary goal of this research is to better understand the existing interdependencies among the construction crews/trades/subs and its impact. Particularly, the objectives of this research are to: 1) develop the jobsite social network of construction crews/trades and quantify its impact, 2) investigate the impact of social conformity on the performance of construction crews/trades, 3) identify the improvement direction (benchmarks) for inefficient construction crews/trades, and 4) investigate the cost/benefit of low or high reliable construction crews/trades and to develop a new educational version of Parade Game.

First, social network analysis (SNA) is implemented to develop a technique to construct the dynamic jobsite social network of crews/trades in a project and quantify its impact through the network centrality analysis. The results of a case study are presented. Then, SNA and social norm analysis are combined as a method to measure conformity, one of the main social network influences types that results in a change of performance/behavior in order to fit in a group, at construction crew/trade level and demonstrate how it can play role in the performance of crews/trades/subs particularly in their work plan reliability through two case studies. Then, inspired by social learning phenomenon, data envelopment analysis and SNA is combined to develop a procedure that can identify the improvement direction for the inefficient crews/trades/subs in a construction project. At the end, the research concentrates on the engineering aspects of the jobsite interdependencies by developing a simulation model, as a new educational version of Parade Game, that uses different variability levels and the corresponding costs at different work stations to investigate the relationship between the interdependencies and crews/trades’ variability/reliability.

Results demonstrate that the performance of construction crews/trades is under the influence of the social aspect of the interdependencies as well as the engineering aspect. They show that there is an association between influences a crew/trade/sub receives from the network and his/her performance. Results of case studies show that the subcontractors follow the performance norm in the project and their tendency to follow the norms of their neighborhood is higher than their willingness to follow the project norm. Parade Game simulation results also show that the production will enhance if the reliability increases and the investment made to improve reliability will return in most of the scenarios.

This research is significant and valuable as it looks at construction jobsite interdependencies from an exclusively analytical perspective, which has not been done previously. Previous research also did not investigate the social aspects of the construction crews/trades/subs interdependencies. Construction personnel at every level of management are constantly planning and trying to figure out how best to manage and coordinate the construction crews/trades/subs. A better understanding of the existing jobsite interdependencies will help project managers to control it through better planning and leadership, consequently increasing jobsite productivity.

APA, Harvard, Vancouver, ISO, and other styles
26

Jansson, Kenny. "A model for cultivating resistance to social engineering attacks." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1588.

Full text
Abstract:
The human being is commonly considered as being the weakest link in information security. Subsequently, as information is one of the most critical assets in an organization today, it is essential that the human element is considered in deployments of information security countermeasures. However, the human element is often neglected in this regard. Consequently, many criminals are now targeting the user directly to obtain sensitive information instead of spending days or even months trying to hack through systems. Some criminals are targeting users by utilizing various social engineering techniques to deceive the user into disclosing information. For this reason, the users of the Internet and ICT-related technologies are nowadays very vulnerable to various social engineering attacks. As a contribution to increase users’ social engineering awareness, a model – called SERUM – was devised. SERUM aims to cultivate social engineering resistance within a community through exposing the users of the community to ‘fake’ social engineering attacks. The users that react incorrectly to these attacks are instantly notified and requested to participate in an online social engineering awareness program. Thus, users are educated on-demand. The model was implemented as a software system and was utilized to conduct a phishing exercise on all the students of the Nelson Mandela Metropolitan University. The aim of the phishing exercise was to determine whether SERUM is effective in cultivating social engineering resistant behaviour within a community. This phishing exercise proved to be successful and positive results emanated. This indicated that a model like SERUM can indeed be used to educate users regarding phishing attacks.
APA, Harvard, Vancouver, ISO, and other styles
27

Bank, Mathias. "AIM - A Social Media Monitoring System for Quality Engineering." Doctoral thesis, Universitätsbibliothek Leipzig, 2013. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-115894.

Full text
Abstract:
In the last few years the World Wide Web has dramatically changed the way people are communicating with each other. The growing availability of Social Media Systems like Internet fora, weblogs and social networks ensure that the Internet is today, what it was originally designed for: A technical platform in which all users are able to interact with each other. Nowadays, there are billions of user comments available discussing all aspects of life and the data source is still growing. This thesis investigates, whether it is possible to use this growing amount of freely provided user comments to extract quality related information. The concept is based on the observation that customers are not only posting marketing relevant information. They also publish product oriented content including positive and negative experiences. It is assumed that this information represents a valuable data source for quality analyses: The original voices of the customers promise to specify a more exact and more concrete definition of \"quality\" than the one that is available to manufacturers or market researchers today. However, the huge amount of unstructured user comments makes their evaluation very complex. It is impossible for an analysis protagonist to manually investigate the provided customer feedback. Therefore, Social Media specific algorithms have to be developed to collect, pre-process and finally analyze the data. This has been done by the Social Media monitoring system AIM (Automotive Internet Mining) that is the subject of this thesis. It investigates how manufacturers, products, product features and related opinions are discussed in order to estimate the overall product quality from the customers\\\' point of view. AIM is able to track different types of data sources using a flexible multi-agent based crawler architecture. In contrast to classical web crawlers, the multi-agent based crawler supports individual crawling policies to minimize the download of irrelevant web pages. In addition, an unsupervised wrapper induction algorithm is introduced to automatically generate content extraction parameters which are specific for the crawled Social Media systems. The extracted user comments are analyzed by different content analysis algorithms to gain a deeper insight into the discussed topics and opinions. Hereby, three different topic types are supported depending on the analysis needs. * The creation of highly reliable analysis results is realized by using a special context-aware taxonomy-based classification system. * Fast ad-hoc analyses are applied on top of classical fulltext search capabilities. * Finally, AIM supports the detection of blind-spots by using a new fuzzified hierarchical clustering algorithm. It generates topical clusters while supporting multiple topics within each user comment. All three topic types are treated in a unified way to enable an analysis protagonist to apply all methods simultaneously and in exchange. The systematically processed user comments are visualized within an easy and flexible interactive analysis frontend. Special abstraction techniques support the investigation of thousands of user comments with minimal time efforts. Hereby, specifically created indices show the relevancy and customer satisfaction of a given topic
In den letzten Jahren hat sich das World Wide Web dramatisch verändert. War es vor einigen Jahren noch primär eine Informationsquelle, in der ein kleiner Anteil der Nutzer Inhalte veröffentlichen konnte, so hat sich daraus eine Kommunikationsplattform entwickelt, in der jeder Nutzer aktiv teilnehmen kann. Die dadurch enstehende Datenmenge behandelt jeden Aspekt des täglichen Lebens. So auch Qualitätsthemen. Die Analyse der Daten verspricht Qualitätssicherungsmaßnahmen deutlich zu verbessern. Es können dadurch Themen behandelt werden, die mit klassischen Sensoren schwer zu messen sind. Die systematische und reproduzierbare Analyse von benutzergenerierten Daten erfordert jedoch die Anpassung bestehender Tools sowie die Entwicklung neuer Social-Media spezifischer Algorithmen. Diese Arbeit schafft hierfür ein völlig neues Social Media Monitoring-System, mit dessen Hilfe ein Analyst tausende Benutzerbeiträge mit minimaler Zeitanforderung analysieren kann. Die Anwendung des Systems hat einige Vorteile aufgezeigt, die es ermöglichen, die kundengetriebene Definition von \"Qualität\" zu erkennen
APA, Harvard, Vancouver, ISO, and other styles
28

Gopsill, James Anthony. "A social media approach to support engineering design communication." Thesis, University of Bath, 2014. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.619150.

Full text
Abstract:
Engineers Talk Be it through conversations, meetings, informal discussion, phone calls or E-Mail, Engineering Design Communication is the main tributary for the sharing of knowledge, thoughts and ideas, and therefore, fundamental to Engineering Work. An engineer spends a significant portion of their day communicating as they 'fill in the gaps' left by formal documentation and processes. It is thereby, an inherent source of explicit design rationale that relates to (and very often supplements) Engineering Records and their generation. Engineering Design Communication is not only central for Engineering Work and Records but also offers potential - through aggregation - to reveal underlying features, patterns and signatures that could aid current and future Engineering Project Management. As Engineering Design Communication plays such a pivotal role, it comes as no surprise that there is much extant research. The majority of this is descriptive and has focused on identifying patterns in engineers' communication behaviour as well as analysing the utility of currently employed communication tools/mediums (such as, E-Mail and meetings). However, little prescriptive research - through either a tool or process - has been undertaken. This may be due to the considerable challenges facing research in this field such as the need to maintain a high-level of Engineering Context, ensure the right engineers are able to participate and associate the communication with its respective Engineering Records. All of which, has to be achieved within an Engineering Context where teams are becoming larger, more mobile, multi-disciplinary & distributed, and often performing variant or incremental design. Although, it is argued that Social Media has the potential to militate these challenges through the use of technologies that provide agile development, support for ubiquitous computing and sharing of multimedia. Therefore, this thesis investigates how Social Media can be used to support Engineering Design Communication. This is achieved through the elicitation and synthesis of the requirements for supporting Engineering Design Communication, and consideration of the effective application of the Social Media. This forms the basis from which a Social Media approach to support Engineering Design Communication is created and then instantiated within a tool called PartBook. PartBook has been developed iteratively and involved an industrial study to evaluate and improve functionality. It has since been used within an eleven week Formula Student project involving thirty-four students from multiple engineering disciplines in a distributed working environment. The analysis of which addresses the validation of the requirements that has led to amendments and generation of new requirements as well as evaluation of the Social Media approach that has led to insights into the potential impact such a tool could bring to Engineering Work, Records and Project Management.
APA, Harvard, Vancouver, ISO, and other styles
29

Rocha, Flores Waldo. "Shaping information security behaviors related to social engineering attacks." Doctoral thesis, KTH, Elkraftteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186113.

Full text
Abstract:
Today, few companies would manage to continuously stay competitive without the proper utilization of information technology (IT). This has increased companies’ dependency of IT and created new threats that need to be addressed to mitigate risks to daily business operations. A large extent of these IT-related threats includes hackers attempting to gain unauthorized access to internal computer networks by exploiting vulnerabilities in the behaviors of employees. A common way to exploit human vulnerabilities is to deceive and manipulate employees through the use of social engineering. Although researchers have attempted to understand social engineering, there is a lack of empirical research capturing multilevel factors explaining what drives employees’ existing behaviors and how these behaviors can be improved. This is addressed in this thesis. The contribution of this thesis includes (i) an instrument to measure security behaviors and its multilevel determinants, (ii) identification of multilevel variables that significantly influence employees’ intent for behavior change, (iii) identification of what behavioral governance factors that lay the foundation for behavior change, (iv) identification that national culture has a significant effect on how organizations cope with behavioral information security threats, and (v) a strategy to ensure adequate information security behaviors throughout an organization. This thesis is a composite thesis of eight papers. Paper 1 describes the instrument measuring multilevel determinants. Paper 2 and 3 describes how security knowledge is established in organizations, and the effect on employee information security awareness. In Paper 4 the root cause of employees’ intention to change their behaviors and resist social engineering is described. Paper 5 and 8 describes how the instrument to measure social engineering security behaviors was developed and validated through scenario-based surveys and phishing experiments. Paper 6 and 7 describes experiments performed to understand reason to why employees fall for social engineering. Finally, paper 2, 5 and 6 examines the moderating effect of national culture.

QC 20160503

APA, Harvard, Vancouver, ISO, and other styles
30

Kerr, Eric Thomson. "Engineering anti-individualism : a case study in social epistemology." Thesis, University of Edinburgh, 2013. http://hdl.handle.net/1842/9690.

Full text
Abstract:
This dissertation is a contribution to two fields of study: applied social epistemology and the philosophy of technology. That is, it is a philosophical study, based on empirical fieldwork research, of social and technical knowledge. Social knowledge here is defined as knowledge acquired through the interactions between epistemic agents and social institutions. Technical knowledge is here defined as knowledge about technical artefacts (including how to design, produce, and operate them). I argue that the two must be considered collectively both in the sense that they are best considered in the light of collectivist approaches to knowledge and in the sense that they must be considered together as part of the same analysis. An analysis solely of the interactions between human epistemic agents operating within social institutions does not give adequate credit to the technological artefacts that help to produce knowledge; an analysis of technical knowledge which does not include an analysis of how that technical knowledge is generated within a rich and complex social network would be similarly incomplete. I argue that it is often inappropriate to separate analyses of technical knowledge from social knowledge and that although not all social knowledge is technical knowledge, all technical knowledge is, by definition, social. Further, the influence of technology on epistemic cultures is so pervasive that it also forms or 'envelops' what we consider to be an epistemic agent.
APA, Harvard, Vancouver, ISO, and other styles
31

Bilodray, Yuriy, and Volodymyr Mesyura. "Using social media technologies for enterprise resource markets engineering." Thesis, ВНТУ, 2012. http://ir.lib.vntu.edu.ua/handle/123456789/6929.

Full text
Abstract:
The study evaluates possibility of using social media technologies for implementing a full-fledged artificial market model, called Enterprise Resources Market. The existent model allows real-time resource self-scheduling (information and physical) for Internet-based enterprises employing agent-based peer-to-peer publish and subsribe approach with semantic matching of offers and requests. The market-style self-scheduling systems are complex to design and adopt in real-world for well-established and conservative industries. The new practical model suggests using popular microblogging platforms as global societal communication frameworks, and semantic wikis for collaborative describing resources and services, with aim of building enterprise resource markets specifically for individuals and small enterprises/organizations.
APA, Harvard, Vancouver, ISO, and other styles
32

AROYO, ALEXANDER MOIS. "Bringing Human Robot Interaction towards _Trust and Social Engineering." Doctoral thesis, Università degli studi di Genova, 2019. http://hdl.handle.net/11567/940915.

Full text
Abstract:
Robots started their journey in books and movies; nowadays, they are becoming an important part of our daily lives: from industrial robots, passing through entertainment robots, and reaching social robotics in fields like healthcare or education. An important aspect of social robotics is the human counterpart, therefore, there is an interaction between the humans and robots. Interactions among humans are often taken for granted as, since children, we learn how to interact with each other. In robotics, this interaction is still very immature, however, critical for a successful incorporation of robots in society. Human robot interaction (HRI) is the domain that works on improving these interactions. HRI encloses many aspects, and a significant one is trust. Trust is the assumption that somebody or something is good and reliable; and it is critical for a developed society. Therefore, in a society where robots can part, the trust they could generate will be essential for cohabitation. A downside of trust is overtrusting an entity; in other words, an insufficient alignment of the projected trust and the expectations of a morally correct behaviour. This effect could negatively influence and damage the interactions between agents. In the case of humans, it is usually exploited by scammers, conmen or social engineers - who take advantage of the people's overtrust in order to manipulate them into performing actions that may not be beneficial for the victims. This thesis tries to shed light on the development of trust towards robots, how this trust could become overtrust and be exploited by social engineering techniques. More precisely, the following experiments have been carried out: (i) Treasure Hunt, in which the robot followed a social engineering framework where it gathered personal information from the participants, improved the trust and rapport with them, and at the end, it exploited that trust manipulating participants into performing a risky action. (ii) Wicked Professor, in which a very human-like robot tried to enforce its authority to make participants obey socially inappropriate requests. Most of the participants realized that the requests were morally wrong, but eventually, they succumbed to the robot'sauthority while holding the robot as morally responsible. (iii) Detective iCub, in which it was evaluated whether the robot could be endowed with the ability to detect when the human partner was lying. Deception detection is an essential skill for social engineers and professionals in the domain of education, healthcare and security. The robot achieved 75% of accuracy in the lie detection. There were also found slight differences in the behaviour exhibited by the participants when interacting with a human or a robot interrogator. Lastly, this thesis approaches the topic of privacy - a fundamental human value. With the integration of robotics and technology in our society, privacy will be affected in ways we are not used. Robots have sensors able to record and gather all kind of data, and it is possible that this information is transmitted via internet without the knowledge of the user. This is an important aspect to consider since a violation in privacy can heavily impact the trust. Summarizing, this thesis shows that robots are able to establish and improve trust during an interaction, to take advantage of overtrust and to misuse it by applying different types of social engineering techniques, such as manipulation and authority. Moreover, robots can be enabled to pick up different human cues to detect deception, which can help both, social engineers and professionals in the human sector. Nevertheless, it is of the utmost importance to make roboticists, programmers, entrepreneurs, lawyers, psychologists, and other sectors involved, aware that social robots can be highly beneficial for humans, but they could also be exploited for malicious purposes.
APA, Harvard, Vancouver, ISO, and other styles
33

Baistow, Karen Ann. "Behavioural psychology as a social project : from social engineering to the cultivation of competence." Thesis, Goldsmiths College (University of London), 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.264393.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Algarni, Abdullah Ayed M. "The impact of source characteristics on users' susceptibility to social engineering Victimization in social networks." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/95604/1/Abdullah%20Ayed%20M_Algarni_Thesis.pdf.

Full text
Abstract:
This research investigates the impact of attacker characteristics on users’ susceptibility to social engineering deception in social networks, particularly Facebook. The research starts with a qualitative exploratory study followed by a quantitative experimental study to identify the source characteristics that influence Facebook users to judge an attacker as credible. The results have shown that the perceived sincerity, competence, attraction, and worthiness of a source are significant predictors of susceptibility to social engineering victimization. The results have also explained which, and to which extent, source characteristics influence Facebook users to judge an attacker according to one of the source credibility dimensions.
APA, Harvard, Vancouver, ISO, and other styles
35

Björnhed, Joakim. "Using a Chatbot to Prevent Identity Fraud By Social Engineering." Thesis, University of Skövde, School of Humanities and Informatics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-3396.

Full text
Abstract:

Social engineering is a threat that is expanding and threatens organisations existence. A social engineer can get hold of crucial business information that is vital for the organisation and by this threaten the organisation. To prevent successful fraud attempts the organisations need to educate their employees about social engineering fraud techniques that can be used for gaining information. Hence, information security education needs new educational approaches to cope with the threats.

A solution to the problem is the use of an automated chatbot that gives the employees knowledge about a threat that is difficult to spot. To understand if an automated chatbot is a possible solution to educate the users, an investigation about the applicability is conducted. The investigation is based on a survey that compares traditional security education that is based on reading a written informational text and the use of an automated chatbot that simulates a fraud attempt with the purpose to steal an identity. The education with the automated chatbot is to be exposed to an identity fraud attempt in a controlled environment and then get an explanation of what have happened and way.

The automated chatbot is developed with a fraud attempt that looks like a normal market research approach, the market research where conducted with question that gather information that is important for identity thefts.

The result of the investigation shows that it may be possible to use an automated chatbot for educating in social engineering fraud attacks. However there is still a need to solve several major problems before there are possible to make sure the concept is fully feasible.

 

APA, Harvard, Vancouver, ISO, and other styles
36

Kotze, Sharon Jean. "Social diversity in an engineering workplace: a conflict resolution perspective." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1638.

Full text
Abstract:
The global working environment has altered dramatically over the last decade, with the workforce now consisting of a diverse assortment of individuals. South Africa, in particular, has had to face major challenges as it adapts to the newly conceived "Rainbow Nation". It has also had to make amends for inequalities bred by the past discrimination and the segregation of Apartheid. Prior to this, businesses in general, were inward-looking in that they did not have to comply with or conform to the changing trends found in the international arena. Suddenly, issues such as Black Economic Empowerment, Affirmative Action, gender, age, faith and preferred sexual orientation have had to be accommodated as the new Employment Equity Act of 1998 was promulgated. Each individual coming into the workplace has his or her own cosmological, ontological and epistemological view, and although this facilitates a positive contribution by individuals with regard to varying ideas, skills, talents and expertise, more often than not, the reality is that the differences that exist within a staff complement often result in conflict. Furthermore, South Africa exhibits deep-rooted, social conflict as a result of the oppression of the apartheid years. Unemployment, poverty, poor education and service deliveries are far from being satisfactorily addressed. Therefore, it is assumed that unmet/frustrated basic human needs, as defined in Abraham Maslow‘s "Hierarchy of Needs", play a role in causing conflict both in the workplace and in society. It was felt that basic human needs, as articulated, had not been researched as a cause of workplace conflict and this research will explore the part that frustrated human needs may play in organisational conflict, alongside diversity conflicts.
APA, Harvard, Vancouver, ISO, and other styles
37

Nudelman, Gabrielle. "A social realist study of employability development in engineering education." Thesis, Rhodes University, 2018. http://hdl.handle.net/10962/62884.

Full text
Abstract:
This qualitative case study of a course pairing offered to final-year electrical engineering students at the University of Cape Town in 2015 was undertaken in order to better understand the ways in which participation in undergraduate courses can prepare engineering students for the workplace. The course pairing consisted of New Venture Planning and Professional Communication Studies. While the former aimed to expose students to the knowledge relating to starting a new business, the latter focused on teaching students how to create written and oral texts to support such an endeavour. Using Roy Bhaskar’s critical realism as a theoretical underlabourer, the study develops understandings regarding the generative mechanisms at work during the two courses. In support of this, the study posits an understanding of employability that moves beyond the acquisition of discrete workplace skills. Rather, employability is conceptualised as discursive transformation, with students being deemed “work-ready” when they develop discursive identities as engineers. Data generation took place by means of focus group and individual interviews, ethnographic observation and documentary research. Margaret Archer’s social realist tools – in particular, analytical dualism and the morphogenetic framework were used to trace the students’ transformations over the course pairing. It was argued that those students who developed discursive identities of engineers were those who, in Archer’s terms, emerged as social actors at the end of the course pairing. Two characteristics of the courses were found to enable this transformation: those parts that promoted deepened understanding of what the role of “engineer” entailed and the parts that provided spaces for students to develop their own personal identities. The findings of the study indicated that discursive identities as engineers were more likely to be developed through the group work and spaces for reflection engendered by the courses than as a result of the formal curriculum. The implications of the research are that, while a focus on employability in engineering education is valid and productive, this needs to be supported by opportunities for authentic learning experiences which afford students the opportunity to engage in learning that promotes real-life application of knowledge.
APA, Harvard, Vancouver, ISO, and other styles
38

Sadri, Mahnaz. "Social and cultural sustainable development and education and engineering practice." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=114294.

Full text
Abstract:
Sustainable development, as it is understood and accepted presently, has been embraced by nearly the entire world; however, the complexities of economic, environmental, social, cultural and other related issues and the interactions between them have not yet been fully comprehended. While the economic and environmental aspects of sustainable development have received much attention since the introduction of the concept, the socio-cultural aspects remain conceptually less developed. The objective of this thesis is to explore the notion of social sustainability as well as the role of culture in sustainable development. Elimination of the conceptual and analytical barriers of socio-cultural aspects of sustainable development along with the integration of social sustainability and incorporation of culture into the sustainable development agenda are needed to address the main challenges of sustainable development, especially in developing countries. Furthermore, education has been identified as a key social strategy for promoting sustainable development. By fundamentally changing the educational system at all levels to incorporate the principles, values and lifestyles required for sustainable development, a more sustainable future in terms of environmental integrity, economic viability and a just society can be created. Engineering education, particularly at higher levels for decision-makers, researchers and teachers needs to be reoriented towards sustainable development aimed at cultivating environmentally-aware attitudes, skills and behaviour patterns, as well as a sense of ethical responsibility. Over the last two decades the world has witnessed an increase in frequency and impact of natural and man-made disasters. By increasing the capacity of nations to prepare for or cope with these disasters, the international community can limit the major loss of human lives and livelihoods, the destruction of economic and social infrastructure, as well as environmental damages, It can also progress more effectively towards the achievement of sustainable development. The significance of the socio-cultural aspects of sustainable development as well as the role of education for building a culture of safety and resilience have been presented as a case study of Haiti.
Le développement durable, comme il est compris et accepté présentement, a été adopté par presque tout le monde entier; mais les complexités économiques, environnementales, sociales, culturelles et autres sujets connexes et leurs interactions n'ont pas encore entièrement compris. Les aspects économique et environnemental du développement durable ont reçu assez d'attention depuis l'introduction de l'idée, mais l'aspect socioculturel reste pratiquement moins développé. L'objectif de cette thèse est de découvrir l'idée de durabilité sociale et le rôle de la culture dans le développement durable. On croit que l'élimination des obstacles conceptuels et analytiques de l'aspect socioculturel en développement durable, avec l'intégration de durabilité sociale et l'incorporation de la culture dans le programme du développement durable, sont les clés pour faire face aux défis principaux du développement durable surtout dans les pays en développement. En outre, l'éducation a été identifiée comme une clé stratégique sociale pour promouvoir le développement durable. En changeant foncièrement le système de l'éducation en tous les nivaux pour intégrer les propres principes, valeurs et modes de vie nécessaires pour le développement durable, aussi un avenir plus durable en matière de l'intégrité environnementale, viabilité économique et société juste peut être crée. L'éducation de l'ingénierie, surtout au niveau de prendre des décisions, les chercheurs et les enseignants ont besoin de se diriger vers le développement durable avec le but de renseigner une conscience, des compétences et des habitudes écologiques, ainsi un sens de responsabilité éthique. A travers les deux derniers décennies le monde a témoigne une croissance dans la fréquence et l'impact des catastrophes naturelles et les catastrophes causées par les être-humains. En augmentant la capacité des pays à se préparer contre et faire face aux catastrophes, la commaunite international ne peut pas se limiter aux pertes majeures des vies et alimentations, des dommages économiques et sociales, et les dégâts en l'environnent, mais aussi plus effectivement vers le chemin du développement durable. L'importance de l'aspect socioculturel du développement durable et le rôle de l'éducation pour établir une culture de sécurité et une résistance contre les risques, sont présentés dans l'étude de cas sur la catastrophe en Haïti.
APA, Harvard, Vancouver, ISO, and other styles
39

Milks, Andrew E. "Social Support Factors Affecting Engineering Technology Student Intent to Persist." University of Akron / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=akron1542408042160873.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Meyers, Jared James. "Training Security Professionals in Social Engineering with OSINT and Sieve." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6863.

Full text
Abstract:
This research attempts to create a novel process, Social Engineering Vulnerability Evaluation, SiEVE, to use open source data and open source intelligence (OSINT) to perform efficient and effectiveness spear phishing attacks. It is designed for use by "œred teams" and students learning to conduct a penetration test of an organization, using the vector of their workforce. The SiEVE process includes the stages of identifying targets, profiling the targets, and creating spear phishing attacks for the targets. The contributions of this research include the following: (1) The SiEVE process itself was developed using an iterative process to identify and fix initial shortcomings; (2) Each stage of the final version of the SiEVE process was evaluated in an experiment that compared performance of students using SiEVE against performance of those not using SiEVE in order to test effectiveness of the SiEVE process in a learning environment; Specifically, the study showed that those using the SiEVE process (a) did not identify more targets, (b) did identify more information about targets, and (c) did lead to more effective spear phishing attacks. The findings, limitations, and future work are discussed in order to provide next steps in developing formalized processes for red teams and students learning penetration testing.
APA, Harvard, Vancouver, ISO, and other styles
41

Becirovic, Ema. "On Social Choice in Social Networks." Thesis, Linköpings universitet, Kommunikationssystem, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-138578.

Full text
Abstract:
Kollektiva beslut blir en del av vardagen när grupper av människor står inför val. Vi anpassar ofta våra personliga övertygelser med hänsyn till våra vänner. Vi är naturligt beroende av lyckan hos dem som står oss nära. I det här exjobbet undersöker vi en befintlig empatimodell som används för att välja en vinnare från en uppsättning alternativ genom att använda poängbaserade omröstningsprocedurer. Vi visar att en liten modifikation av modellen är tillräcklig för att kunna använda överlägsna omröstningsprocedurer som bygger på parvisa jämförelser av alternativen. Sammanfattningsvis visar vi att det i grunden inte finns någon anledning att använda poängbaserade omröstningsprocedurer i de föreslagna modellerna, eftersom ett mer önskvärt resultat uppnås genom att använda de överlägsna omröstningsprocedurerna.
Social choice becomes a part of everyday life when groups of people are faced with decisions to make. We often adjust our personal beliefs with the respect to our friends. We are inherently dependent on the happiness of those near us. In this thesis, we investigate an existing empathy model that is used to select a winner in a set of alternatives by using scoring winner selection methods. We show that a slight modification of the model is enough to be able to use superior winner selection methods that are based on pairwise comparisons of alternatives. We show that there is essentially no reason to use scoring winner selection methods in the models proposed as a more desirable result is achieved by using superior winner selection methods.
APA, Harvard, Vancouver, ISO, and other styles
42

Breazeal, Cynthia L. (Cynthia Lynn) 1967. "Sociable machines : expressive social exchange between humans and robots." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/9303.

Full text
Abstract:
Thesis (Sc.D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2000.
Includes bibliographical references (p. 253-264).
Sociable humanoid robots are natural and intuitive for people to communicate with and to teach. We present recent advances in building an autonomous humanoid robot, Kismet, that can engage humans in expressive social interaction. We outline a set of design issues and a framework that we have found to be of particular importance for sociable robots. Having a human-in-the-loop places significant social constraints on how the robot aesthetically appears, how its sensors are configured, its quality of movement, and its behavior. Inspired by infant social development, psychology, ethology, and evolutionary perspectives, this work integrates theories and concepts from these diverse viewpoints to enable Kismet to enter into natural and intuitive social interaction with a human caregiver, reminiscent of parent-infant exchanges. Kismet perceives a variety of natural social cues from visual and auditory channels, and delivers social signals to people through gaze direction, facial expression, body posture, and vocalizations. We present the implementation of Kismet's social competencies and evaluate each with respect to: 1) the ability of naive subjects to read and interpret the robot's social cues, 2) the robot's ability to perceive and appropriately respond to naturally offered social cues, 3) the robot's ability to elicit interaction scenarios that afford rich learning potential, and 4) how this produces a rich, flexible, dynamic interaction that is physical, affective, and social. Numerous studies with naive human subjects are described that provide the data upon which we base our evaluations.
by Cynthia L. Breazeal.
Sc.D.
APA, Harvard, Vancouver, ISO, and other styles
43

Larsson, Andreas. "Engineering know-who : why social connectedness matters to global design teams /." Luleå : Luleå University of Technology, 2005. http://epubl.luth.se/1402-1544/2005/19.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Morris, E. Scott. "Gis, Modeling And Human Civilization: The Birth Of Geo-social Engineering." Thesis, University of North Texas, 2011. https://digital.library.unt.edu/ark:/67531/metadc103362/.

Full text
Abstract:
Computer-based, mathematical models have significant value in describing the processes behind urban development and its inhabitants. The following research describes the theories and concepts behind modeling and offers insight into the potential future of the field. First, the research covers a brief history of applicable modeling strategies. This is followed by a summary of current popular approaches. The numerical background of geo-social engineering is developed through mathematical techniques. Geo-social engineering is the integration of modeling into the basic design human civilization. The mathematical models will be incorporated into a design of a computer program. From this, a possible geo-social model structure is presented and its architecture is described.
APA, Harvard, Vancouver, ISO, and other styles
45

Nohlberg, Marcus. "Securing Information Assets : Understanding, Measuring and Protecting against Social Engineering Attacks." Doctoral thesis, Kista : Department of Computer and Systems Sciences (together with KTH), Stockholm University, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-8379.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Flynn, Damian. "A social networking systems approach to continuous improvement in engineering organisations." Thesis, University of Bristol, 2016. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738521.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Abbasian, Hosseini Seyed Alireza [Verfasser]. "Social and Engineering Aspects of Construction Site Management using Simulation and Social Network Analysis / Seyed Alireza Abbasian Hosseini." Munich : GRIN Verlag, 2015. http://d-nb.info/1097576604/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Fuesting, Melissa A. "Engineering Persistence: Designing and Testing a Communal Strategies Intervention to Increase the Retention of Women in Engineering." Miami University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=miami1556720605030989.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Kennedy, Ann-Marie. "Keep Sunday free: social engineering through shop trading hours in New Zealand." AUT University, 2009. http://hdl.handle.net/10292/888.

Full text
Abstract:
The purpose of this thesis is to explore Social Engineering and how marketing communications may be able to affect it. This research takes a step back from other research in the area and considers the decision makers behind Social Engineering, instead of Social Engineering interventions. One way for stakeholders to influence Social Engineering is through influencing the initial decision of which Social Engineering intervention to use. The influence of marketing communications is considered using diffusion theory, which uncovers how marketing communications diffuse through and influence a decision making group. First, the research uncovers the Social Engineering Decision Making Process. This is the decision making process of Governments for Social Engineering Decisions. The Social Engineering Decision Making Process is the combination of Podgórecki’s Sociotechnical Paradigm (1990) and Roger’s Innovation Diffusion Process (2003). The research then explores this framework through its illustration in a retailing context. The Social Engineering intervention chosen for this research is the shop trading hour legislation in New Zealand. The Social Engineering decision studied is the decision to introduce Sunday trading through the Shop Trading Hours Act Repeal Act (1990). An historical analysis explores the Social Engineering of shop trading hours, in line with an Historical methodology and Constructivist and Hermeneutic viewpoint. This narrative is created through document analysis and semi-structured in-depth interviews with five different stakeholder groups from the decision to introduce Sunday trading. The historical narrative also illustrates the Social Engineering Decision Making Process. Lastly, to uncover the influence of marketing communications and the media on the Social Engineering Decision Making Process, a content analysis of marketing communications and media over the time of the decision to introduce Sunday trading occurs. Government discussions and reports regarding the decision are also analysed. If the communications influence the Government discussions, then their themes would be present in Government documents directly following the communications. The results lend support to the Social Engineering Decision Making Process. Results outline the aspects of the legislative process that reflect each stage of the Social Engineering Decision Making Process. Findings also find support for the influence of Marketing communications and media on the Government’s decision making. The three most effective times for stakeholders to try to influence the process, through either mass or interpersonal communications are also identified.
APA, Harvard, Vancouver, ISO, and other styles
50

Rönkkö, Kari. "Making methods work in software engineering : method deployment - as a social achievement /." Karlskrona : School of Engineering, Blekinge Institute of Technology, 2005. http://www.bth.se/fou/forskinfo.nsf/allfirst2/0878763dec04da60c125702000247cbf?OpenDocument.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography