Journal articles on the topic 'Social engineering'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Social engineering.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Gulenko, Iwan. "Social against social engineering." Information Management & Computer Security 21, no. 2 (June 7, 2013): 91–101. http://dx.doi.org/10.1108/imcs-09-2012-0053.
Full textChauhan, Alok A., Nischal Puri, and Yogesh Narekar. "Social Engineering." IJARCCE 8, no. 5 (May 30, 2019): 38–41. http://dx.doi.org/10.17148/ijarcce.2019.8509.
Full textLuo, Xin, Richard Brody, Alessandro Seazzu, and Stephen Burd. "Social Engineering." Information Resources Management Journal 24, no. 3 (July 2011): 1–8. http://dx.doi.org/10.4018/irmj.2011070101.
Full textMuehleis, Peter. "SOCIAL ENGINEERING." Journal of the American Dental Association 141, no. 5 (May 2010): 500. http://dx.doi.org/10.14219/jada.archive.2010.0207.
Full textMatejko, Alexander J., Adam Podgórecki, Jon Alexander, Rob Shields, and Adam Podgorecki. "Social Engineering." Canadian Public Policy / Analyse de Politiques 22, no. 2 (June 1996): 200. http://dx.doi.org/10.2307/3551924.
Full textRößling, Guido, and Marius Müller. "Social engineering." ACM SIGCSE Bulletin 41, no. 3 (August 25, 2009): 384. http://dx.doi.org/10.1145/1595496.1563026.
Full textMunro, Ken. "Social engineering." Infosecurity Today 2, no. 3 (May 2005): 44. http://dx.doi.org/10.1016/s1742-6847(05)70285-8.
Full textBundey, Jill. "SOCIAL ENGINEERING." Australian Occupational Therapy Journal 18, no. 4 (August 27, 2010): 22–28. http://dx.doi.org/10.1111/j.1440-1630.1971.tb00502.x.
Full textLardschneider, Michael. "Social Engineering." Datenschutz und Datensicherheit - DuD 32, no. 9 (September 2008): 574–78. http://dx.doi.org/10.1007/s11623-008-0137-1.
Full textFox, Dirk. "Social Engineering." Datenschutz und Datensicherheit - DuD 37, no. 5 (May 2013): 318. http://dx.doi.org/10.1007/s11623-013-0115-0.
Full textPike, M. "Social Engineering." ITNOW 53, no. 2 (February 25, 2011): 6–9. http://dx.doi.org/10.1093/itnow/bwq241.
Full textPotthas, Christine, Patrick Berry, and Hamad Al-Naimi. "Social engineering." Advances in Engineering Innovation 2, no. 1 (October 7, 2023): 22–25. http://dx.doi.org/10.54254/2977-3903/2/2023016.
Full textTetri, Pekka, and Jukka Vuorinen. "Dissecting social engineering." Behaviour & Information Technology 32, no. 10 (October 2013): 1014–23. http://dx.doi.org/10.1080/0144929x.2013.763860.
Full textRobert, Ben. "Social Engineering I." Economic Affairs 13, no. 5 (September 1993): 38–39. http://dx.doi.org/10.1111/j.1468-0270.1993.tb01216.x.
Full textMortis, Bill. "Social Engineering II." Economic Affairs 13, no. 5 (September 1993): 39–40. http://dx.doi.org/10.1111/j.1468-0270.1993.tb01217.x.
Full textMarsland, David. "Social Engineering III." Economic Affairs 13, no. 5 (September 1993): 40. http://dx.doi.org/10.1111/j.1468-0270.1993.tb01218.x.
Full textCowgill, Bo, and Megan T. Stevenson. "Algorithmic Social Engineering." AEA Papers and Proceedings 110 (May 1, 2020): 96–100. http://dx.doi.org/10.1257/pandp.20201037.
Full textHancock, Bill. "Simple social engineering." Network Security 1995, no. 6 (June 1995): 13–14. http://dx.doi.org/10.1016/1353-4858(96)89726-1.
Full textJäkälä, Mikko, and Samuli Pekkola. "From technology engineering to social engineering." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 38, no. 4 (October 28, 2007): 11–16. http://dx.doi.org/10.1145/1314234.1314238.
Full textMandru, Srikanth. "Defending Against Social Engineering: Techniques and Best Practices." International Journal of Science and Research (IJSR) 7, no. 7 (July 5, 2018): 1556–63. http://dx.doi.org/10.21275/sr24820055304.
Full textPhillips, Fred Young. "Social Capital, Social Engineering, and the Technopolis." World Technopolis Review 1, no. 2 (April 10, 2012): 86–91. http://dx.doi.org/10.7165/wtr2012.1.2.86.
Full textBurégio, Vanilson, Ejub Kajan, Mohamed Sellami, Noura Faci, Zakaria Maamar, and Djamal Benslimane. "Revisiting Software Engineering in the Social Era." International Journal of Systems and Service-Oriented Engineering 6, no. 4 (October 2016): 36–46. http://dx.doi.org/10.4018/ijssoe.2016100103.
Full textBakloo, Farooq Ahmad, and Miss Asma. "Islam and Social Engineering." Pakistan Journal of Humanities and Social Sciences 7, no. 1 (March 31, 2019): 159–65. http://dx.doi.org/10.52131/pjhss.2019.0701.0078.
Full textThunder, David. "Covid and Social Engineering." Nuevas Tendencias, no. 105 (May 13, 2021): 7–11. http://dx.doi.org/10.15581/022.41522.
Full textYasin, Affan, Rubia Fatima, Lin Liu, Jianmin Wanga, Raian Ali, and Ziqi Wei. "Counteracting social engineering attacks." Computer Fraud & Security 2021, no. 10 (October 2021): 15–19. http://dx.doi.org/10.1016/s1361-3723(21)00108-1.
Full textMotru, Vamshi Krishna. "Social Engineering Penetration Testing." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 14, 2021): 821–26. http://dx.doi.org/10.22214/ijraset.2021.35187.
Full textBernabé, Eduardo, and Martin H. Hobdell. "SOCIAL ENGINEERING: Authors' response." Journal of the American Dental Association 141, no. 5 (May 2010): 500–501. http://dx.doi.org/10.14219/jada.archive.2010.0208.
Full textWilkinson, Barry. "Social engineering in Singapore." Journal of Contemporary Asia 18, no. 2 (January 1988): 165–88. http://dx.doi.org/10.1080/00472338880000131.
Full textMason, James. "Social Enterprise Systems Engineering." Procedia Computer Science 44 (2015): 135–46. http://dx.doi.org/10.1016/j.procs.2015.03.067.
Full textWeßelmann, Bettina. "Maßnahmen gegen Social Engineering." Datenschutz und Datensicherheit - DuD 32, no. 9 (September 2008): 601–4. http://dx.doi.org/10.1007/s11623-008-0143-3.
Full textKrombholz, Katharina, Heidelinde Hobel, Markus Huber, and Edgar Weippl. "Advanced social engineering attacks." Journal of Information Security and Applications 22 (June 2015): 113–22. http://dx.doi.org/10.1016/j.jisa.2014.09.005.
Full textGordon, Sarah. "Social engineering — Recognizing intruders." Computers & Security 14, no. 5 (January 1995): 424. http://dx.doi.org/10.1016/0167-4048(95)97144-y.
Full textRiley, Donna. "Engineering and Social Justice." Synthesis Lectures on Engineers, Technology and Society 3, no. 1 (January 2008): 1–152. http://dx.doi.org/10.2200/s00117ed1v01y200805ets007.
Full textOlsson, Gunnar. "Logics and Social Engineering*." Geographical Analysis 2, no. 4 (September 3, 2010): 361–75. http://dx.doi.org/10.1111/j.1538-4632.1970.tb00865.x.
Full textNanda, Ipseeta, and Rajesh De. "SOCIAL ENGINEERING: AN INTRODUCTION." Information Management And Computer Science 5, no. 2 (2022): 36–37. http://dx.doi.org/10.26480/imcs.02.2022.36.37.
Full textMaßloff, Carsten. "Social Engineering als Angriffsmethode." BWK ENERGIE. 74, no. 11-12 (2022): 16–17. http://dx.doi.org/10.37544/1618-193x-2022-11-12-16.
Full textChoi, Young. "Social Engineering Cyber Threats." Journal of Global Awareness 4, no. 2 (December 21, 2023): 1–12. http://dx.doi.org/10.24073/jga/4/02/08.
Full textAL-Msloum, Abdulnaser Salem, and Ahmed Ali AL-Johani. "Social engineering and its effective role in knowledge community." International Journal of Academic Research 5, no. 6 (December 10, 2013): 232–38. http://dx.doi.org/10.7813/2075-4124.2013/5-6/a.30.
Full textKumar, Raushan, and Dr Shikha Tiwari. "Social Engineering: Its Significance and Implications for Future Research." International Journal of Research Publication and Reviews 5, no. 1 (January 24, 2024): 4255–63. http://dx.doi.org/10.55248/gengpi.5.0124.0324.
Full textKaviraj. "Social Justice and Social Engineering in Uttar Pradesh." Dynamics of Public Administration 31, no. 2 (2014): 244. http://dx.doi.org/10.5958/0976-0733.2014.00800.1.
Full textChetioui, Kaouthar, Birom Bah, Abderrahim Ouali Alami, and Ayoub Bahnasse. "Overview of Social Engineering Attacks on Social Networks." Procedia Computer Science 198 (2022): 656–61. http://dx.doi.org/10.1016/j.procs.2021.12.302.
Full textAndrew, Robin Matthew. "Briefing: Civil engineering to social engineering – Newquay Safe." Proceedings of the Institution of Civil Engineers - Municipal Engineer 164, no. 1 (March 2011): 7–10. http://dx.doi.org/10.1680/muen.2011.164.1.7.
Full textSus, Paweł. "Turkey: Social Engineering Secular Project." Polish Political Science Yearbook 38, no. 1 (December 31, 2009): 2–0. http://dx.doi.org/10.15804/ppsy2009016.
Full textArgamakova, Alexandra A. "History of Social Engineering Theories." Russian Journal of Philosophical Sciences 64, no. 7 (July 15, 2021): 85–108. http://dx.doi.org/10.30727/0235-1188-2021-64-7-85-108.
Full textTjendrawinata, Kevin. "SOCIAL ENGINEERING: CRISIS IN HUMANITY." JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 9, no. 3 (September 13, 2022): 2085–95. http://dx.doi.org/10.35957/jatisi.v9i3.2206.
Full textLamanna, Mary Ann, and Burton Mindick. "Social Engineering in Family Matters." Contemporary Sociology 16, no. 3 (May 1987): 384. http://dx.doi.org/10.2307/2070327.
Full textRota, Andrea, Simon Michel, and Christina Wyttenbach. "Religion und religious-social engineering." Zeitschrift für Religions- und Geistesgeschichte 74, no. 2 (April 8, 2022): 91–109. http://dx.doi.org/10.1163/15700739-07402002.
Full textBlinov, Evgeny. "“Social engineering of the future”." Epistemology & Philosophy of Science 50, no. 4 (2016): 187–203. http://dx.doi.org/10.5840/eps201650478.
Full textSales, Tony. "IT's Biggest Risk: Social Engineering." ITNOW 63, no. 3 (August 16, 2021): 44–45. http://dx.doi.org/10.1093/itnow/bwab084.
Full textTAKAHASHI, Koji. "Control Engineering and Social Life." Journal of The Institute of Electrical Engineers of Japan 128, no. 7 (2008): 415–18. http://dx.doi.org/10.1541/ieejjournal.128.415.
Full text