Dissertations / Theses on the topic 'Social engineering'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Social engineering.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Romaniuk, Oleg. "Social engineering." Thesis, Київський національний університет технологій та дизайну, 2019. https://er.knutd.edu.ua/handle/123456789/13157.
Full textLoggarfve, Robin, and Johan Rydell. "Social Engineering : En kvalitativ studie om hur organisationer hanterar social engineering." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-37794.
Full textTraditionally, weaknesses in technology are used to gain unauthorized access to information, but there are other sophisticated methods and approaches that can be more effective. Social engineering is the art of deceiving, manipulating and utilizing social aspects. The method utilizes the weakest link in information security, the human factor. The purpose of the study is to investigate how organizations handle social engineering. It also aims to highlight and inform about the subject with an ambition to raise awareness about the subject. The study has been conducted together with three organizations where qualitative interviews were conducted. The study examined the awareness of the organizations, the most common social engineering attacks and preventive work. The result shows that awareness was good at IT departments while it was worse at other departments in the organizations. The main threats of social engineering to organizations are economic loss and information leakage. The most common approach was phishing and spear phishing. Finally, the study can conclude that education and dissemination of information is the most successful method of preventing social engineering. The study finds that there is no complete protection and that more education is required to raise awareness in social engineering. A security system is not stronger than the weakest link and therefore more resources should be put on preventive work.
Ericsson, Eric, and Robin Kirkhoff. "Resiliens mot social engineering : En studie om organisationers förmåga att hantera social engineering." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-40236.
Full textAnderson, Jonathan. "Privacy engineering for social networks." Thesis, University of Cambridge, 2013. https://www.repository.cam.ac.uk/handle/1810/244239.
Full textGasser, Stephan, Margarethe Rammerstorfer, and Karl Weinmayer. "Markowitz Revisited: Social Portfolio Engineering." Elsevier, 2017. http://dx.doi.org/10.1016/j.ejor.2016.10.043.
Full textLind, Jonas, and Kim Simonsson. "Social Engineering : En studie om medvetenhet och förebyggande åtgärder mot Social Engineering på svenska organisationer." Thesis, Linnéuniversitetet, Institutionen för datavetenskap, fysik och matematik, DFM, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-12274.
Full textEvans, Nathaniel Joseph. "Information technology social engineering an academic definition and study of social engineering - analyzing the human firewall /." [Ames, Iowa : Iowa State University], 2009. http://gateway.proquest.com/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:3369832.
Full textPalmqvist, Stefan. "Social-engineering ett hot mot informationssäkerheten?" Thesis, Växjö University, School of Mathematics and Systems Engineering, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1993.
Full textDen här rapporten tar upp ett annorlunda hot mot informationssäkerheten, som inte hårdvara
eller mjukvara kan stoppa. Detta hot kallas för social-engineering, och det som gör detta hot
farligt är att de anställda och chefer i en organisation, kan hjälpa utövaren av socialengineering
utan att de själva vet om det.
Det går inte att förhindra att dessa attacker sker, men man kan förhindra de negativa
konsekvenserna av en sådan attack. Denna rapport tar upp hur man ska göra för att en
organisation ska kunna fortsätta med sin verksamhet, efter en attack av social-engineering. I
värsta fall kan en attack av social-engineering innebära att ett företag aldrig återhämtar sig.
Detta kan bero på att organisationen har förlorat alla sina kunder, förlorat marknads andelar,
eller för att de ansvariga och viktiga personerna i organisationen har blivit dömda för
oaktsamhet och sitter i fängelse.
Denna rapport ska informera och få er att vara uppmärksamma och medvetna om dessa
hot, som ni kanske inte vet finns. Ni ska få kunskap och lära er känna igen de olika
förklädnaderna en utövare av social-engineering antar.
This paper discusses a different threat against information security, which can not be
prevented by either hardware or software. This Threat is called social engineering and the
main issue that makes this threat so dangerous is that the victims, like executives and the
employees in an organization are not aware that they actually helps the practician of social
engineering.
These attacks can not be avoided, but there is a way to prevent negative consequences of
such an attack. This paper discusses how an organization can manage to continue with the
activity, despite an attack of social engineering. In worse case the scenarios of an attack of
social engineering can mean that an organization never fully recovers. The different scenarios
of this can be as following. The organization could lose all the clients, they could have lost
market share or the responsible important people in the organization could be convicted and
sent to jail.
This paper will make you aware of these threats that you might even don’t know exists.
You will be given the knowledge to be able to recognize de different disguises a practician of
social engineering can assume.
Simon, Peter A. "Social Network Theory In Engineering Education." Research Showcase @ CMU, 2014. http://repository.cmu.edu/dissertations/377.
Full textHor, Joon Suk 1976. "Social interaction in collaborative engineering environments." Thesis, Massachusetts Institute of Technology, 1999. http://hdl.handle.net/1721.1/80156.
Full textNguyen, Steve Huy. "Social Media Systems Engineering for Businesses." Digital Commons at Loyola Marymount University and Loyola Law School, 2014. https://digitalcommons.lmu.edu/etd/427.
Full textBjörklund, Christoffer. "Deepfakes inom social engineering och brottsutredningar." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42373.
Full text’Deepfake’ is an abbreviation of ’deep learning’ and ’fake’. Deepfakes are synthetical audiovisual media that uses machine learning to create fake videos, images and/or audio clips. This project is focused on deepfakes within forged videos, where one person’s face is swapped with another person’s face. This technique is usually referred to as ’face swapping’. However, deepfakes goes beyond what usual face swaps can achieve. The focus for this project is to investigate how easy it is to forge your own deepfakes with basic technical knowledge. This is achieved through an experiment that measures result from fourteen interviews. The interviewees watched two different videos, where each person tried to identify the writers’ own deepfaked video clips, that were mixed with legitimate video clips. The experiment shows that it is possible and relatively easy to create convincing deepfakes aimed at social engineering. It is also possible, but harder, to create deepfakes to forge videos within criminal investigations. This report examines the potential forensic techniques and tools that exists and are developed to identify deepfakes. Furthermore, this report also examines deepfakes made for social engineering. Deepfakes are considered being one of the more significant threats in the future and could be used to effectively spread propaganda and misinformation. The results generated from the experiment in this report, lead to a proposition from the writer that news outlets and social media platforms could aim at an informative approach towards deepfakes. This approach means informing their consumers on what deepfakes are, how they typically look and what consumers can do themselves to identify them.
Cerovic, Lazar. "Identifying Resilience Against Social Engineering Attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280131.
Full textSociala manipulationer är bland de vanligaste cyber attackerna och bedrägerierna som orsakar enorma ekonomiska skador varje år för individer, företag och myndigheter. Dessa attacker är svåra att skydda ifrån då sociala manipulationer utnyttjar mänskliga svagheter som ett medel till att stjäla pengar eller information. Målet med studien är att identifiera indikatorer av motstånd mot sociala manipulationsattacker, vilket ska göras med hjälp av individuell data, som kan bestå av nätverksinställningar, sociala medieprofiler, webbaktivitet bland annat. Denna studie är baserat på kvalitativa metoder för att samla, analysera och utvärdera data. Motstånd mot social manipulation utvärderas med hjälp av relevanta teorier och modeller som har med beteende och personligheter att göra, sedan används även personlig och demografisk information i utvärderingen. De indikatorer som identifierades var bland annat inställningar i routrar, webbhistorik och social medianvändning. Det teoretiska ramverket som utvecklades för att utvärdera motstånd mot sociala manipulationsattacker kan utökas med fler aspekter av individuell data. Viktiga samhällshändelser och sammanhang kan vara en intressant faktor som är relaterat till ämnet. Framtida studier skulle kunna kombinera detta ramverk med tekniker som maskinlärning och artificiell intelligens.
Cahill, Christopher L. "Engineering ethics and Catholic social teaching." Theological Research Exchange Network (TREN), 1995. http://www.tren.com.
Full textAsprino, Luigi <1988>. "Engineering Background Knowledge for Social Robots." Doctoral thesis, Alma Mater Studiorum - Università di Bologna, 2019. http://amsdottorato.unibo.it/9020/1/asprino_luigi_tesi.pdf.
Full textHadley, Benjamin, Pontus Moell, and Henrik Nilsson. "Social engineering – Ett enkelt sätt att kringå säkerheten? En kvalitativ studie av företags åtgärder mot social engineering." Thesis, Örebro universitet, Handelshögskolan vid Örebro Universitet, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:oru:diva-48839.
Full textLaribee, Lena. "Development of methodical social engineering taxonomy project." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2006. http://library.nps.navy.mil/uhtbin/hyperion/06Jun%5FLaribee.pdf.
Full textThesis Advisor(s): Craig H. Martell, Neil C. Rowe. "June 2006." Includes bibliographical references (p. 49-52). Also available in print.
Arenas, Miguel Tames. "Social Engineering and Internal Threats in Organizations." Thesis, Blekinge Tekniska Högskola, Avdelningen för programvarusystem, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-6075.
Full textSung, Johnny. "The developmental worker : social engineering and worker participation." Thesis, University of Leicester, 2001. http://hdl.handle.net/2381/29344.
Full textSlonka, Kevin J. "Awareness of malicious social engineering among facebook users." Thesis, Robert Morris University, 2014. http://pqdtopen.proquest.com/#viewpdf?dispub=3620246.
Full textWith the rapid growth of Facebook, the social networking website is becoming a lucrative target for malicious activity. Users of Facebook therefore should be aware of various malicious attacks and know how to identify them. This research analyzed Facebook users' level of understanding in the domain of malicious social engineering on Facebook. The research examined differences in awareness among multiple generational groups; secondary research questions focused on how factors such as age, gender, education, Internet usage, and trust affected users' awareness of malicious activity. Results suggest that the Baby Boomer generation is the least aware of malicious social engineering tactics on Facebook, specifically in regard to the Donation scam category. In addition, education level and educational background are significantly associated with awareness. These findings indicate a need for future work to gain a deeper understanding of Facebook users' awareness of malicious social engineering and generate targeted training in order to increase said awareness.
Ottosson, Hans Jorgen. "Considering Social Impact when Engineering for Global Development." BYU ScholarsArchive, 2021. https://scholarsarchive.byu.edu/etd/9158.
Full textPASQUALI, DARIO. "Social Engineering Defense Solutions Through Human-Robot Interaction." Doctoral thesis, Università degli studi di Genova, 2022. http://hdl.handle.net/11567/1092333.
Full textCarlander-Reuterfelt, Gallo Matias. "Estimating human resilience to social engineering attacks through computer configuration data : A literature study on the state of social engineering vulnerabilities." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277921.
Full textSocial Manipulering som attackmetod har blivit ett ökande problem både för företag och individer. Från identitetsstöld till enorma ekonomiska förluster, är denna form av attack känd för att kunna påverka komplexa system, men är ofta i sig mycket enkel i sin form. Medans andra typer av cyberattacker kan skyddas med verktyg som antivirus och antimalware och tillförlitligt hålla privat och konfidentiell information säker så finns det inga motsvarande verktyg för att skydda sig mot Social Manipulering attacker. Det finns alltså inte idag ett pålitligt och säkert sätt att motstå Social Manipulering attacker och skydda personliga uppgifter och privat data. Syftet med denna rapport är att visa olika aspekterna hur datoranvändares data är sårbarhet för dessa typer av attacker, och med dessa utforma ett system som med viss mån av precision kan mäta resiliens mot Social Manipulering. Rapporten är ett resultat av studier av litteratur inom ämnet Social Manipulering och hur den relaterar sig till datorns data, konfiguration och personuppgifter. De olika delarna av utredningen leder var och en till ett mer omfattande sätt att koppla samman de olika uppgifterna och utforma ett rudimentärt sätt att uppskatta en persons resiliens mot Social Manipulering, detta genom att observera olika aspekter av datorns konfiguration. För syftet av rapporten så har uppgifterna varit rimligt tillgängliga, har respekterat integriteten och varit något som lätt kan anpassas från en användare till en annan. Baserat på observationerna av psykologiska data, beteendemönster och nätverkskonfigurationer, så kan vi dra slutsatsen att även om det finns data som stöder möjligheten att uppskatta resiliens, finns det idag inget empiriskt bevisat sätt att göra det på ett exakt sätt. En exempel av modell för att uppskatta resiliens finns i slutet av rapporten. Ramen för detta projekt gjorde det inte möjligt att göra ett praktiskt experiment för att validera teorierna.
Lipski, Marcus. "Social Engineering der Mensch als Sicherheitsrisiko in der IT." Hamburg Diplomica-Verl, 2009. http://d-nb.info/993473008/04.
Full textAbbasian, Hosseini Seyed Alireza. "Social and Engineering Aspects of Construction Site Management using Simulation and Social Network Analysis." Thesis, North Carolina State University, 2016. http://pqdtopen.proquest.com/#viewpdf?dispub=10110533.
Full textThe crews/actors/subs during a construction project make relationship and communicate with each other on the jobsite primarily when they work in a task sequence or when they work in the same working area at the same time. These interdependencies can have various impacts on their performance, the decisions their supervisor make and their action from both engineering and social aspects. The main focus of the past research is on the project parties’ relationship based on the information exchange and formal communication, while the research pertaining to the interpretation and investigation of the construction crews/trades’ interdependencies during the construction project is very limited. How are the construction jobsite actors connected in a construction jobsite? How do the existing interdependencies among them affect their performance? And how can understanding these interdependencies be beneficial for construction site managers? The primary goal of this research is to better understand the existing interdependencies among the construction crews/trades/subs and its impact. Particularly, the objectives of this research are to: 1) develop the jobsite social network of construction crews/trades and quantify its impact, 2) investigate the impact of social conformity on the performance of construction crews/trades, 3) identify the improvement direction (benchmarks) for inefficient construction crews/trades, and 4) investigate the cost/benefit of low or high reliable construction crews/trades and to develop a new educational version of Parade Game.
First, social network analysis (SNA) is implemented to develop a technique to construct the dynamic jobsite social network of crews/trades in a project and quantify its impact through the network centrality analysis. The results of a case study are presented. Then, SNA and social norm analysis are combined as a method to measure conformity, one of the main social network influences types that results in a change of performance/behavior in order to fit in a group, at construction crew/trade level and demonstrate how it can play role in the performance of crews/trades/subs particularly in their work plan reliability through two case studies. Then, inspired by social learning phenomenon, data envelopment analysis and SNA is combined to develop a procedure that can identify the improvement direction for the inefficient crews/trades/subs in a construction project. At the end, the research concentrates on the engineering aspects of the jobsite interdependencies by developing a simulation model, as a new educational version of Parade Game, that uses different variability levels and the corresponding costs at different work stations to investigate the relationship between the interdependencies and crews/trades’ variability/reliability.
Results demonstrate that the performance of construction crews/trades is under the influence of the social aspect of the interdependencies as well as the engineering aspect. They show that there is an association between influences a crew/trade/sub receives from the network and his/her performance. Results of case studies show that the subcontractors follow the performance norm in the project and their tendency to follow the norms of their neighborhood is higher than their willingness to follow the project norm. Parade Game simulation results also show that the production will enhance if the reliability increases and the investment made to improve reliability will return in most of the scenarios.
This research is significant and valuable as it looks at construction jobsite interdependencies from an exclusively analytical perspective, which has not been done previously. Previous research also did not investigate the social aspects of the construction crews/trades/subs interdependencies. Construction personnel at every level of management are constantly planning and trying to figure out how best to manage and coordinate the construction crews/trades/subs. A better understanding of the existing jobsite interdependencies will help project managers to control it through better planning and leadership, consequently increasing jobsite productivity.
Jansson, Kenny. "A model for cultivating resistance to social engineering attacks." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1588.
Full textBank, Mathias. "AIM - A Social Media Monitoring System for Quality Engineering." Doctoral thesis, Universitätsbibliothek Leipzig, 2013. http://nbn-resolving.de/urn:nbn:de:bsz:15-qucosa-115894.
Full textIn den letzten Jahren hat sich das World Wide Web dramatisch verändert. War es vor einigen Jahren noch primär eine Informationsquelle, in der ein kleiner Anteil der Nutzer Inhalte veröffentlichen konnte, so hat sich daraus eine Kommunikationsplattform entwickelt, in der jeder Nutzer aktiv teilnehmen kann. Die dadurch enstehende Datenmenge behandelt jeden Aspekt des täglichen Lebens. So auch Qualitätsthemen. Die Analyse der Daten verspricht Qualitätssicherungsmaßnahmen deutlich zu verbessern. Es können dadurch Themen behandelt werden, die mit klassischen Sensoren schwer zu messen sind. Die systematische und reproduzierbare Analyse von benutzergenerierten Daten erfordert jedoch die Anpassung bestehender Tools sowie die Entwicklung neuer Social-Media spezifischer Algorithmen. Diese Arbeit schafft hierfür ein völlig neues Social Media Monitoring-System, mit dessen Hilfe ein Analyst tausende Benutzerbeiträge mit minimaler Zeitanforderung analysieren kann. Die Anwendung des Systems hat einige Vorteile aufgezeigt, die es ermöglichen, die kundengetriebene Definition von \"Qualität\" zu erkennen
Gopsill, James Anthony. "A social media approach to support engineering design communication." Thesis, University of Bath, 2014. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.619150.
Full textRocha, Flores Waldo. "Shaping information security behaviors related to social engineering attacks." Doctoral thesis, KTH, Elkraftteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186113.
Full textQC 20160503
Kerr, Eric Thomson. "Engineering anti-individualism : a case study in social epistemology." Thesis, University of Edinburgh, 2013. http://hdl.handle.net/1842/9690.
Full textBilodray, Yuriy, and Volodymyr Mesyura. "Using social media technologies for enterprise resource markets engineering." Thesis, ВНТУ, 2012. http://ir.lib.vntu.edu.ua/handle/123456789/6929.
Full textAROYO, ALEXANDER MOIS. "Bringing Human Robot Interaction towards _Trust and Social Engineering." Doctoral thesis, Università degli studi di Genova, 2019. http://hdl.handle.net/11567/940915.
Full textBaistow, Karen Ann. "Behavioural psychology as a social project : from social engineering to the cultivation of competence." Thesis, Goldsmiths College (University of London), 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.264393.
Full textAlgarni, Abdullah Ayed M. "The impact of source characteristics on users' susceptibility to social engineering Victimization in social networks." Thesis, Queensland University of Technology, 2016. https://eprints.qut.edu.au/95604/1/Abdullah%20Ayed%20M_Algarni_Thesis.pdf.
Full textBjörnhed, Joakim. "Using a Chatbot to Prevent Identity Fraud By Social Engineering." Thesis, University of Skövde, School of Humanities and Informatics, 2009. http://urn.kb.se/resolve?urn=urn:nbn:se:his:diva-3396.
Full textSocial engineering is a threat that is expanding and threatens organisations existence. A social engineer can get hold of crucial business information that is vital for the organisation and by this threaten the organisation. To prevent successful fraud attempts the organisations need to educate their employees about social engineering fraud techniques that can be used for gaining information. Hence, information security education needs new educational approaches to cope with the threats.
A solution to the problem is the use of an automated chatbot that gives the employees knowledge about a threat that is difficult to spot. To understand if an automated chatbot is a possible solution to educate the users, an investigation about the applicability is conducted. The investigation is based on a survey that compares traditional security education that is based on reading a written informational text and the use of an automated chatbot that simulates a fraud attempt with the purpose to steal an identity. The education with the automated chatbot is to be exposed to an identity fraud attempt in a controlled environment and then get an explanation of what have happened and way.
The automated chatbot is developed with a fraud attempt that looks like a normal market research approach, the market research where conducted with question that gather information that is important for identity thefts.
The result of the investigation shows that it may be possible to use an automated chatbot for educating in social engineering fraud attacks. However there is still a need to solve several major problems before there are possible to make sure the concept is fully feasible.
Kotze, Sharon Jean. "Social diversity in an engineering workplace: a conflict resolution perspective." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/1638.
Full textNudelman, Gabrielle. "A social realist study of employability development in engineering education." Thesis, Rhodes University, 2018. http://hdl.handle.net/10962/62884.
Full textSadri, Mahnaz. "Social and cultural sustainable development and education and engineering practice." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=114294.
Full textLe développement durable, comme il est compris et accepté présentement, a été adopté par presque tout le monde entier; mais les complexités économiques, environnementales, sociales, culturelles et autres sujets connexes et leurs interactions n'ont pas encore entièrement compris. Les aspects économique et environnemental du développement durable ont reçu assez d'attention depuis l'introduction de l'idée, mais l'aspect socioculturel reste pratiquement moins développé. L'objectif de cette thèse est de découvrir l'idée de durabilité sociale et le rôle de la culture dans le développement durable. On croit que l'élimination des obstacles conceptuels et analytiques de l'aspect socioculturel en développement durable, avec l'intégration de durabilité sociale et l'incorporation de la culture dans le programme du développement durable, sont les clés pour faire face aux défis principaux du développement durable surtout dans les pays en développement. En outre, l'éducation a été identifiée comme une clé stratégique sociale pour promouvoir le développement durable. En changeant foncièrement le système de l'éducation en tous les nivaux pour intégrer les propres principes, valeurs et modes de vie nécessaires pour le développement durable, aussi un avenir plus durable en matière de l'intégrité environnementale, viabilité économique et société juste peut être crée. L'éducation de l'ingénierie, surtout au niveau de prendre des décisions, les chercheurs et les enseignants ont besoin de se diriger vers le développement durable avec le but de renseigner une conscience, des compétences et des habitudes écologiques, ainsi un sens de responsabilité éthique. A travers les deux derniers décennies le monde a témoigne une croissance dans la fréquence et l'impact des catastrophes naturelles et les catastrophes causées par les être-humains. En augmentant la capacité des pays à se préparer contre et faire face aux catastrophes, la commaunite international ne peut pas se limiter aux pertes majeures des vies et alimentations, des dommages économiques et sociales, et les dégâts en l'environnent, mais aussi plus effectivement vers le chemin du développement durable. L'importance de l'aspect socioculturel du développement durable et le rôle de l'éducation pour établir une culture de sécurité et une résistance contre les risques, sont présentés dans l'étude de cas sur la catastrophe en Haïti.
Milks, Andrew E. "Social Support Factors Affecting Engineering Technology Student Intent to Persist." University of Akron / OhioLINK, 2018. http://rave.ohiolink.edu/etdc/view?acc_num=akron1542408042160873.
Full textMeyers, Jared James. "Training Security Professionals in Social Engineering with OSINT and Sieve." BYU ScholarsArchive, 2018. https://scholarsarchive.byu.edu/etd/6863.
Full textBecirovic, Ema. "On Social Choice in Social Networks." Thesis, Linköpings universitet, Kommunikationssystem, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-138578.
Full textSocial choice becomes a part of everyday life when groups of people are faced with decisions to make. We often adjust our personal beliefs with the respect to our friends. We are inherently dependent on the happiness of those near us. In this thesis, we investigate an existing empathy model that is used to select a winner in a set of alternatives by using scoring winner selection methods. We show that a slight modification of the model is enough to be able to use superior winner selection methods that are based on pairwise comparisons of alternatives. We show that there is essentially no reason to use scoring winner selection methods in the models proposed as a more desirable result is achieved by using superior winner selection methods.
Breazeal, Cynthia L. (Cynthia Lynn) 1967. "Sociable machines : expressive social exchange between humans and robots." Thesis, Massachusetts Institute of Technology, 2000. http://hdl.handle.net/1721.1/9303.
Full textIncludes bibliographical references (p. 253-264).
Sociable humanoid robots are natural and intuitive for people to communicate with and to teach. We present recent advances in building an autonomous humanoid robot, Kismet, that can engage humans in expressive social interaction. We outline a set of design issues and a framework that we have found to be of particular importance for sociable robots. Having a human-in-the-loop places significant social constraints on how the robot aesthetically appears, how its sensors are configured, its quality of movement, and its behavior. Inspired by infant social development, psychology, ethology, and evolutionary perspectives, this work integrates theories and concepts from these diverse viewpoints to enable Kismet to enter into natural and intuitive social interaction with a human caregiver, reminiscent of parent-infant exchanges. Kismet perceives a variety of natural social cues from visual and auditory channels, and delivers social signals to people through gaze direction, facial expression, body posture, and vocalizations. We present the implementation of Kismet's social competencies and evaluate each with respect to: 1) the ability of naive subjects to read and interpret the robot's social cues, 2) the robot's ability to perceive and appropriately respond to naturally offered social cues, 3) the robot's ability to elicit interaction scenarios that afford rich learning potential, and 4) how this produces a rich, flexible, dynamic interaction that is physical, affective, and social. Numerous studies with naive human subjects are described that provide the data upon which we base our evaluations.
by Cynthia L. Breazeal.
Sc.D.
Larsson, Andreas. "Engineering know-who : why social connectedness matters to global design teams /." Luleå : Luleå University of Technology, 2005. http://epubl.luth.se/1402-1544/2005/19.
Full textMorris, E. Scott. "Gis, Modeling And Human Civilization: The Birth Of Geo-social Engineering." Thesis, University of North Texas, 2011. https://digital.library.unt.edu/ark:/67531/metadc103362/.
Full textNohlberg, Marcus. "Securing Information Assets : Understanding, Measuring and Protecting against Social Engineering Attacks." Doctoral thesis, Kista : Department of Computer and Systems Sciences (together with KTH), Stockholm University, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-8379.
Full textFlynn, Damian. "A social networking systems approach to continuous improvement in engineering organisations." Thesis, University of Bristol, 2016. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.738521.
Full textAbbasian, Hosseini Seyed Alireza [Verfasser]. "Social and Engineering Aspects of Construction Site Management using Simulation and Social Network Analysis / Seyed Alireza Abbasian Hosseini." Munich : GRIN Verlag, 2015. http://d-nb.info/1097576604/34.
Full textFuesting, Melissa A. "Engineering Persistence: Designing and Testing a Communal Strategies Intervention to Increase the Retention of Women in Engineering." Miami University / OhioLINK, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=miami1556720605030989.
Full textKennedy, Ann-Marie. "Keep Sunday free: social engineering through shop trading hours in New Zealand." AUT University, 2009. http://hdl.handle.net/10292/888.
Full textRönkkö, Kari. "Making methods work in software engineering : method deployment - as a social achievement /." Karlskrona : School of Engineering, Blekinge Institute of Technology, 2005. http://www.bth.se/fou/forskinfo.nsf/allfirst2/0878763dec04da60c125702000247cbf?OpenDocument.
Full text