Social engineering (security)

Known as: Social engineering, Social hacker, Pretexts 
Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1972-2017
02040608019722017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Social engineering is the acquisition of information about computer systems by methods that deeply include nontechnical means… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
2014
2014
The field of information security is a fast growing discipline. Even though the effectiveness of security measures to protect… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Social networks are some of the largest and fastest growing online services today. Facebook, for example, has been ranked as the… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
2011
2011
Effective information systems security management combines technological measures and managerial efforts. Although various… (More)
  • figure 1
Is this relevant?
2009
2009
A growing number of people use social networking sites to foster social relationships among each other. While the advantages of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
Social Engineering (SE) is considered to be one of the most common problems facing information security today. Detecting social… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 2
Is this relevant?
2008
2008
people by businesses and governments is ubiquitous. One of the main threats to people's privacy comes from human carelessness… (More)
  • table 1
  • table 3
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Security toolbars in a web browser show security-related information about a website to help users detect phishing attacks… (More)
  • figure 1
  • figure 2
Is this relevant?
2004
2004
The key to maintaining the confidentiality, integrity, and availability of an organizations information and information systems… (More)
Is this relevant?
1995
1995
Many companies spend hundreds of thousands of dollars to ensure corporate computer security. The security protects company… (More)
Is this relevant?