To see the other types of publications on this topic, follow the link: Social engineering.

Journal articles on the topic 'Social engineering'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Social engineering.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Gulenko, Iwan. "Social against social engineering." Information Management & Computer Security 21, no. 2 (June 7, 2013): 91–101. http://dx.doi.org/10.1108/imcs-09-2012-0053.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chauhan, Alok A., Nischal Puri, and Yogesh Narekar. "Social Engineering." IJARCCE 8, no. 5 (May 30, 2019): 38–41. http://dx.doi.org/10.17148/ijarcce.2019.8509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Luo, Xin, Richard Brody, Alessandro Seazzu, and Stephen Burd. "Social Engineering." Information Resources Management Journal 24, no. 3 (July 2011): 1–8. http://dx.doi.org/10.4018/irmj.2011070101.

Full text
Abstract:
Effective information systems security management combines technological measures and managerial efforts. Although various technical means have been employed to cope with security threats, human factors have been comparatively neglected. This article examines human factors that can lead to social engineering intrusions. Social engineering is a technique used by malicious attackers to gain access to desired information by exploiting the flaws in human logic known as cognitive biases. Social engineering is a potential threat to information security and should be considered equally important to its technological counterparts. This article unveils various social engineering attacks and their leading human factors, and discusses several ways to defend against social engineering: education, training, procedure, and policy. The authors further introduce possible countermeasures for social engineering attacks. Future analysis is also presented.
APA, Harvard, Vancouver, ISO, and other styles
4

Muehleis, Peter. "SOCIAL ENGINEERING." Journal of the American Dental Association 141, no. 5 (May 2010): 500. http://dx.doi.org/10.14219/jada.archive.2010.0207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Matejko, Alexander J., Adam Podgórecki, Jon Alexander, Rob Shields, and Adam Podgorecki. "Social Engineering." Canadian Public Policy / Analyse de Politiques 22, no. 2 (June 1996): 200. http://dx.doi.org/10.2307/3551924.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Rößling, Guido, and Marius Müller. "Social engineering." ACM SIGCSE Bulletin 41, no. 3 (August 25, 2009): 384. http://dx.doi.org/10.1145/1595496.1563026.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Munro, Ken. "Social engineering." Infosecurity Today 2, no. 3 (May 2005): 44. http://dx.doi.org/10.1016/s1742-6847(05)70285-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bundey, Jill. "SOCIAL ENGINEERING." Australian Occupational Therapy Journal 18, no. 4 (August 27, 2010): 22–28. http://dx.doi.org/10.1111/j.1440-1630.1971.tb00502.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lardschneider, Michael. "Social Engineering." Datenschutz und Datensicherheit - DuD 32, no. 9 (September 2008): 574–78. http://dx.doi.org/10.1007/s11623-008-0137-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Fox, Dirk. "Social Engineering." Datenschutz und Datensicherheit - DuD 37, no. 5 (May 2013): 318. http://dx.doi.org/10.1007/s11623-013-0115-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Pike, M. "Social Engineering." ITNOW 53, no. 2 (February 25, 2011): 6–9. http://dx.doi.org/10.1093/itnow/bwq241.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Potthas, Christine, Patrick Berry, and Hamad Al-Naimi. "Social engineering." Advances in Engineering Innovation 2, no. 1 (October 7, 2023): 22–25. http://dx.doi.org/10.54254/2977-3903/2/2023016.

Full text
Abstract:
The realm of cybersecurity is replete with challenges, not least among them being the art of social engineering. This form of attack leverages human tendencies such as trust, leading to potential breaches. Though more covert than brute force or technical hacks, social engineering can be insidiously effective. Within this exposition, we probe various manifestations of social engineering: from phishing to pretexting, baiting to tailgating, and the subtle act of shoulder surfing, concluding with mitigation strategies.
APA, Harvard, Vancouver, ISO, and other styles
13

Tetri, Pekka, and Jukka Vuorinen. "Dissecting social engineering." Behaviour & Information Technology 32, no. 10 (October 2013): 1014–23. http://dx.doi.org/10.1080/0144929x.2013.763860.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Robert, Ben. "Social Engineering I." Economic Affairs 13, no. 5 (September 1993): 38–39. http://dx.doi.org/10.1111/j.1468-0270.1993.tb01216.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Mortis, Bill. "Social Engineering II." Economic Affairs 13, no. 5 (September 1993): 39–40. http://dx.doi.org/10.1111/j.1468-0270.1993.tb01217.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Marsland, David. "Social Engineering III." Economic Affairs 13, no. 5 (September 1993): 40. http://dx.doi.org/10.1111/j.1468-0270.1993.tb01218.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Cowgill, Bo, and Megan T. Stevenson. "Algorithmic Social Engineering." AEA Papers and Proceedings 110 (May 1, 2020): 96–100. http://dx.doi.org/10.1257/pandp.20201037.

Full text
Abstract:
We examine the microeconomics of using algorithms to nudge decision-makers toward particular social outcomes. We refer to this as “algorithmic social engineering.” In this article, we apply classic strategic communication models to this strategy. Manipulating predictions to express policy preferences strips the predictions of informational content and can lead decision-makers to ignore them. When social problems stem from decision-makers' objectives (rather than their information sets), algorithmic social engineering exhibits clear limitations. Our framework emphasizes separating preferences and predictions in designing algorithmic interventions. This distinction has implications for software architecture, organizational structure, and regulation.
APA, Harvard, Vancouver, ISO, and other styles
18

Hancock, Bill. "Simple social engineering." Network Security 1995, no. 6 (June 1995): 13–14. http://dx.doi.org/10.1016/1353-4858(96)89726-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Jäkälä, Mikko, and Samuli Pekkola. "From technology engineering to social engineering." ACM SIGMIS Database: the DATABASE for Advances in Information Systems 38, no. 4 (October 28, 2007): 11–16. http://dx.doi.org/10.1145/1314234.1314238.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Mandru, Srikanth. "Defending Against Social Engineering: Techniques and Best Practices." International Journal of Science and Research (IJSR) 7, no. 7 (July 5, 2018): 1556–63. http://dx.doi.org/10.21275/sr24820055304.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Phillips, Fred Young. "Social Capital, Social Engineering, and the Technopolis." World Technopolis Review 1, no. 2 (April 10, 2012): 86–91. http://dx.doi.org/10.7165/wtr2012.1.2.86.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Burégio, Vanilson, Ejub Kajan, Mohamed Sellami, Noura Faci, Zakaria Maamar, and Djamal Benslimane. "Revisiting Software Engineering in the Social Era." International Journal of Systems and Service-Oriented Engineering 6, no. 4 (October 2016): 36–46. http://dx.doi.org/10.4018/ijssoe.2016100103.

Full text
Abstract:
This paper discusses the possible changes that software engineering will have to go through in response to the challenges and issues associated with social media. Indeed, people have never been so connected like nowadays by forming spontaneous relations with others (even strangers) and engaging in ad-hoc interactions. The Web is the backbone of this new social era – an open, global, ubiquitous, and pervasive platform for today's society and world - suggesting that “everything” can socialize or be socialized. This paper also analyzes the evolution of software engineering as a discipline, points out the characteristics of social systems, and finally presents how these characteristics could affect software engineering's models and practices. It is expected that social systems' characteristics will make software engineering evolve one more time to tackle and address the social era's challenges and issues, respectively.
APA, Harvard, Vancouver, ISO, and other styles
23

Bakloo, Farooq Ahmad, and Miss Asma. "Islam and Social Engineering." Pakistan Journal of Humanities and Social Sciences 7, no. 1 (March 31, 2019): 159–65. http://dx.doi.org/10.52131/pjhss.2019.0701.0078.

Full text
Abstract:
The man by nature cannot live in the isolation Allah has created the man such a way that he/ she cannot live in the separation. Even when Allah created, the Hazrat Adam Allah created his partner Hazrat Hawa. It is a well-known fact that human being cannot spend the life in separation; a man is by nature is a social and cannot live without the society. Aristotle called society is essential for the development of the of human beings. The biology of the human being is such that it is tough for the humans to live in isolation forever. Islam is the religion, which is calling towards the principles of peace and focuses on all the spheres of the life; it talks about the Religious teachings, Social Teachings, Moral teachings, Economic teachings, and Governance teachings. In this easy, we highlight the Islamic perspective on society. Before moving ahead, it is essential to know the very meaning of word society; the word society means as “aggregate of people living together in a more or less ordered.”
APA, Harvard, Vancouver, ISO, and other styles
24

Thunder, David. "Covid and Social Engineering." Nuevas Tendencias, no. 105 (May 13, 2021): 7–11. http://dx.doi.org/10.15581/022.41522.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Yasin, Affan, Rubia Fatima, Lin Liu, Jianmin Wanga, Raian Ali, and Ziqi Wei. "Counteracting social engineering attacks." Computer Fraud & Security 2021, no. 10 (October 2021): 15–19. http://dx.doi.org/10.1016/s1361-3723(21)00108-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
26

Motru, Vamshi Krishna. "Social Engineering Penetration Testing." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 14, 2021): 821–26. http://dx.doi.org/10.22214/ijraset.2021.35187.

Full text
Abstract:
In this universe of digitalization, the requirement for information protection and information security is very significant. The IT organizations today care for their information over everything. For organizations, information protection is additionally significant for any person. In any case, regardless of how secure the organization is, how cutting-edge is the innovation utilized, or how modern their products are, there's as yet a weakness in each area known as 'Human'.The ability of gathering sensitive information from a person is known as Social Engineering. Social Engineering exceeds a variant security danger as it has demonstrated to be one of the simplest, least expensive, and vigorous and profoundly fruitful ways for criminals to accomplish their finishes. This paper depicts social engineering, progressed techniques utilized,and their effect on associations. This paper can help the security analysts to acquire experiences into social engineering from an alternate point of view, and specifically, upgrade the current and future investigation on social engineering monitor mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
27

Bernabé, Eduardo, and Martin H. Hobdell. "SOCIAL ENGINEERING: Authors' response." Journal of the American Dental Association 141, no. 5 (May 2010): 500–501. http://dx.doi.org/10.14219/jada.archive.2010.0208.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Wilkinson, Barry. "Social engineering in Singapore." Journal of Contemporary Asia 18, no. 2 (January 1988): 165–88. http://dx.doi.org/10.1080/00472338880000131.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Mason, James. "Social Enterprise Systems Engineering." Procedia Computer Science 44 (2015): 135–46. http://dx.doi.org/10.1016/j.procs.2015.03.067.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Weßelmann, Bettina. "Maßnahmen gegen Social Engineering." Datenschutz und Datensicherheit - DuD 32, no. 9 (September 2008): 601–4. http://dx.doi.org/10.1007/s11623-008-0143-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Krombholz, Katharina, Heidelinde Hobel, Markus Huber, and Edgar Weippl. "Advanced social engineering attacks." Journal of Information Security and Applications 22 (June 2015): 113–22. http://dx.doi.org/10.1016/j.jisa.2014.09.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Gordon, Sarah. "Social engineering — Recognizing intruders." Computers & Security 14, no. 5 (January 1995): 424. http://dx.doi.org/10.1016/0167-4048(95)97144-y.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Riley, Donna. "Engineering and Social Justice." Synthesis Lectures on Engineers, Technology and Society 3, no. 1 (January 2008): 1–152. http://dx.doi.org/10.2200/s00117ed1v01y200805ets007.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Olsson, Gunnar. "Logics and Social Engineering*." Geographical Analysis 2, no. 4 (September 3, 2010): 361–75. http://dx.doi.org/10.1111/j.1538-4632.1970.tb00865.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Nanda, Ipseeta, and Rajesh De. "SOCIAL ENGINEERING: AN INTRODUCTION." Information Management And Computer Science 5, no. 2 (2022): 36–37. http://dx.doi.org/10.26480/imcs.02.2022.36.37.

Full text
Abstract:
The phrase “social engineering” can be used to describe a range of computer exploitation techniques used to trick users. It poses a serious risk to people, businesses, organizations, and governments. This essay discusses the idea of social engineering and its effects on society.
APA, Harvard, Vancouver, ISO, and other styles
36

Maßloff, Carsten. "Social Engineering als Angriffsmethode." BWK ENERGIE. 74, no. 11-12 (2022): 16–17. http://dx.doi.org/10.37544/1618-193x-2022-11-12-16.

Full text
Abstract:
Mit der fortschreitenden Digitalisierung, die mit der Verlagerung von Arbeitsplätzen ins Homeoffice nochmals an Fahrt aufgenommen hat, wächst die Angriffsfläche für Cyberkriminelle. Neben technischen Maßnahmen wie Firewall-Lösungen, Multi-Faktor-Authentifizierungen, Pentests, biometrischen Zugangskontrollen oder digitalen Zertifikaten müssen auch Schulungen für Mitarbeitende eingeplant werden.
APA, Harvard, Vancouver, ISO, and other styles
37

Choi, Young. "Social Engineering Cyber Threats." Journal of Global Awareness 4, no. 2 (December 21, 2023): 1–12. http://dx.doi.org/10.24073/jga/4/02/08.

Full text
Abstract:
The article explores the pervasive threat of social engineering in cybersecurity, emphasizing its success in infiltrating information systems by manipulating individuals rather than employing traditional hacking methods. The author underscores the vulnerability arising from human trust, as individuals, especially those lacking technology education, tend to be targets. While cryptography offers partial security, social engineering complicates overall system security. Mitigation strategies include educating employees on threats, risks, and security policies, coupled with enforcing penalties for noncompliance. Additionally, employing two-factor authentication and physical token-based access adds layers of protection. The article delves into semantic attacks, classifying various exploitation methods and emphasizing the critical role of user awareness. It addresses prevalent scams such as phishing, vishing, impersonation, and smishing, noting their impact on individuals and organizations. The study extends its focus globally, highlighting a unique advance fee fraud targeting vulnerable populations. Social engineering remains a significant challenge despite technological advancements, necessitating a multifaceted approach combining technical defenses, education, and public awareness.
APA, Harvard, Vancouver, ISO, and other styles
38

AL-Msloum, Abdulnaser Salem, and Ahmed Ali AL-Johani. "Social engineering and its effective role in knowledge community." International Journal of Academic Research 5, no. 6 (December 10, 2013): 232–38. http://dx.doi.org/10.7813/2075-4124.2013/5-6/a.30.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Kumar, Raushan, and Dr Shikha Tiwari. "Social Engineering: Its Significance and Implications for Future Research." International Journal of Research Publication and Reviews 5, no. 1 (January 24, 2024): 4255–63. http://dx.doi.org/10.55248/gengpi.5.0124.0324.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Kaviraj. "Social Justice and Social Engineering in Uttar Pradesh." Dynamics of Public Administration 31, no. 2 (2014): 244. http://dx.doi.org/10.5958/0976-0733.2014.00800.1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
41

Chetioui, Kaouthar, Birom Bah, Abderrahim Ouali Alami, and Ayoub Bahnasse. "Overview of Social Engineering Attacks on Social Networks." Procedia Computer Science 198 (2022): 656–61. http://dx.doi.org/10.1016/j.procs.2021.12.302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Andrew, Robin Matthew. "Briefing: Civil engineering to social engineering – Newquay Safe." Proceedings of the Institution of Civil Engineers - Municipal Engineer 164, no. 1 (March 2011): 7–10. http://dx.doi.org/10.1680/muen.2011.164.1.7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Sus, Paweł. "Turkey: Social Engineering Secular Project." Polish Political Science Yearbook 38, no. 1 (December 31, 2009): 2–0. http://dx.doi.org/10.15804/ppsy2009016.

Full text
APA, Harvard, Vancouver, ISO, and other styles
44

Argamakova, Alexandra A. "History of Social Engineering Theories." Russian Journal of Philosophical Sciences 64, no. 7 (July 15, 2021): 85–108. http://dx.doi.org/10.30727/0235-1188-2021-64-7-85-108.

Full text
Abstract:
The first mentions of “social engineering” and “social technologies” concepts started from the 19th century. Until the present moment, different lines of this story have been left neglected and insufficiently researched. In the article, initial meanings and authentic contexts of their usage are explained in more details. The investigation reaches the 1920s−1930s and is finished at the intersection of the Soviet and the American contexts concerned with scientific organization of labor, business optimization and economic planning. In conclusion, recent modifications of social engineering are briefly characterized. They are connected with development of information technologies and automation of smart cities. The research appeals toward histories of scientific management in North America and Western Europe, its industrial roots and unexplained foundations. Meanwhile, it is philosophically substantial due to conceptual analysis and explication of presuppositions of our thinking in respect of society and ways of changing social reality. After Sir Karl Popper, social engineering has been associated with the Soviet methods of planning and centralized governance. However, one can be assured that until now this concept has evolved by different, alternative trajectories within the context of industrial modernization of Europe and America. Within post-industrial world, the vision of social engineering has been enriched by IT-analogies, and social practice is interpreted in light of organizational, cultural, mental, or historical algorithms, which are the subject of purposeful manipulation and modification.
APA, Harvard, Vancouver, ISO, and other styles
45

Tjendrawinata, Kevin. "SOCIAL ENGINEERING: CRISIS IN HUMANITY." JATISI (Jurnal Teknik Informatika dan Sistem Informasi) 9, no. 3 (September 13, 2022): 2085–95. http://dx.doi.org/10.35957/jatisi.v9i3.2206.

Full text
Abstract:
Perkembangan digital di Indonesia memberikan dampak serta kontribusi secara signifikan, baik positif maupun negatif. Ketika disalahgunakan, berbagai macam kejahatan dalam dunia siber (cybercrime) mulai bermunculan, salah satunya dengan teknik Social Engineering. Menggunakan berbagai penelitian terdahulu sebagai acuan, dapat disimpulkan bahwa Social Engineering adalah teknik penyerangan mekanisme sosial atau interaksi manusiawi (bujukan, pengaruh, dan interaksi lainnya), bertujuan untuk mengontrol aksi korban dalam melakukan sebuah tindakan, baik secara sadar maupun tidak sadar. Dikarenakan sifat dari kasus Social Engineering adalah kelalaian pengguna, maka tidak seluruh perusahaan memiliki kebijakan untuk mengganti kerugian. Di sisi lain, pengguna/konsumen merasa dirugikan akibat “celah” yang dapat dimanfaatkan oleh fraudster. Alhasil citra perusahaan (public image) akan berkurang atau bahkan menghilang di mata mereka. Penelitian ini ditujukan untuk eksplorasi kasus Social Engineering, mulai dari pengertian, mekanisme, studi kasus Social Engineering terdahulu, beserta perilaku masyarakat Indonesia terkait pengamanan siber dengan menyebarkan e-angket. Kata kunci: rekayasa sosial, keamanan siber, serangan siber, pencegahan penipuan
APA, Harvard, Vancouver, ISO, and other styles
46

Lamanna, Mary Ann, and Burton Mindick. "Social Engineering in Family Matters." Contemporary Sociology 16, no. 3 (May 1987): 384. http://dx.doi.org/10.2307/2070327.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Rota, Andrea, Simon Michel, and Christina Wyttenbach. "Religion und religious-social engineering." Zeitschrift für Religions- und Geistesgeschichte 74, no. 2 (April 8, 2022): 91–109. http://dx.doi.org/10.1163/15700739-07402002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
48

Blinov, Evgeny. "“Social engineering of the future”." Epistemology & Philosophy of Science 50, no. 4 (2016): 187–203. http://dx.doi.org/10.5840/eps201650478.

Full text
APA, Harvard, Vancouver, ISO, and other styles
49

Sales, Tony. "IT's Biggest Risk: Social Engineering." ITNOW 63, no. 3 (August 16, 2021): 44–45. http://dx.doi.org/10.1093/itnow/bwab084.

Full text
Abstract:
Abstract It’s not hackers but ‘nice people’ who unwittingly hand over the keys to the digital kingdom. Tony Sales, co-founder of We Fight Fraud talks to Johanna Hamilton AMBCS about his career and social engineering.
APA, Harvard, Vancouver, ISO, and other styles
50

TAKAHASHI, Koji. "Control Engineering and Social Life." Journal of The Institute of Electrical Engineers of Japan 128, no. 7 (2008): 415–18. http://dx.doi.org/10.1541/ieejjournal.128.415.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography