Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Social engineering (security)

Known as: Social engineering, Social hacker, Pretexts 
Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2020
Review
2020
Ponzi schemes are financial frauds which lure users under the promise of high profits. Actually, users are repaid only with the… Expand
  • figure 1
  • figure 2
  • figure 6
  • figure 7
  • figure 8
Review
2019
Review
2019
Targeted advertising is meant to improve the efficiency of matching advertisers to their customers. However, targeted advertising… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Review
2018
Review
2018
An integrated understanding of both social and ecological aspects of environmental issues is essential to address pressing… Expand
  • table 1
  • figure 1
  • figure 2
  • table 2
  • figure 3
Review
2018
Review
2018
After briefly reviewing key resilience engineering perspectives and summarising some green infrastructure (GI) tools, we present… Expand
  • table 1
Highly Cited
2010
Highly Cited
2010
In this short and deliberately provocative paper I reflect on what seems to be a yawning gulf between the potential contribution… Expand
Highly Cited
2008
Highly Cited
2008
  • M. Workman
  • Inf. Manag. Comput. Secur.
  • 2008
  • Corpus ID: 13246920
– Recently, the role of human behavior has become a focal point in the study of information security countermeasures. However… Expand
Highly Cited
2008
Highly Cited
2008
The collection and dissemination of information about people by businesses and governments is ubiquitous. One of the main threats… Expand
Highly Cited
1995
Highly Cited
1995
Although monitoring borrowers is thought to be a major function of financial institutions, the presence of other claimants… Expand
  • figure 1
  • figure 2
Highly Cited
1992
Highly Cited
1992
Meta-analysis was used to examine findings in 2 related areas: experimental research on the physical attractiveness stereotype… Expand
  • table 1
  • table 2
  • table 3
  • table 4
  • table 5
Highly Cited
1979
Highly Cited
1979
This article develops a corporate social involvement disclosure scale based on a content analysis of the annual reports of the… Expand