Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues

H Aldawood, G Skinner - Future internet, 2019 - mdpi.com
social engineering and how the social engineers actually may operate an attack [58]. Modern
training methods use … whether the message is a social engineering attack or not. However, …

Social engineering attacks: A survey

F Salahdine, N Kaabouch - Future internet, 2019 - mdpi.com
… 84% of cyber-attacks are conducted by social engineers with high success rate [7]. Thus,
these statistics and others show that social engineering attacks can cost more than a natural …

The role of employees' information security awareness on the intention to resist social engineering

T Grassegger, D Nedbal - Procedia Computer Science, 2021 - Elsevier
Social engineers use a pattern of trust by exploiting the need for friendship, creating a sense
of similarity with the potential victim, faking personal connections, or even pretending to be …

Cybersecurity risks, vulnerabilities, and countermeasures to prevent social engineering attacks

NY Conteh, PJ Schmick - Ethical hacking techniques and …, 2021 - igi-global.com
… In this paper social engineering is defined along with the types of social engineering attacks.
… that identify key considerations regarding social engineering testing and training, and point …

[图书][B] Renovating Russia: The human sciences and the fate of liberal modernity, 1880–1930

D Beer - 2019 - degruyter.com
… In the wake of the orgy of violence that swept the Empire in the 1905 Revolution, these
intellectual elites increasingly put their faith in coercive programs of scientific social engineering. …

Social assessment of technology

F Hetman - Natural Resources And Development In Arid Regions, 2019 - taylorfrancis.com
… of technology as a part of overall planning or "social engineering". In its extreme formulation,
it starts by spelling out values, social policies and objectives and works down to technology …

A comprehensive survey of AI-enabled phishing attacks detection techniques

A Basit, M Zafar, X Liu, AR Javed, Z Jalil… - Telecommunication …, 2021 - Springer
… Phishing websites are common entry points of online social engineering attacks, including
… , texts, or social networking. To provide a thorough understanding of phishing attack(s), this …

Applying theory for human betterment

A Bandura - Perspectives on Psychological Science, 2019 - journals.sagepub.com
During this time I was developing a guided-mastery treatment for people with severe snake
phobias who were leading profoundly debilitated lives. Some of them had difficulty …

Rethinking engineering education at the age of industry 5.0

DG Broo, O Kaynak, SM Sait - Journal of Industrial Information Integration, 2022 - Elsevier
… in creating new meaning or concept, enriching the existing ones or improving skills and
abilities in association with each group of learners”. The workforce of the future should have …

Ethical issues in service robotics and artificial intelligence

R Belk - The Service Industries Journal, 2021 - Taylor & Francis
… For example, social engineering applications depend partly on ubiquitous surveillance and
military robots depend partly on the facial recognition technologies from both of these earlier …