Social engineering (security)

Known as: Social engineering, Social hacker, Pretexts 
Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
Provides understanding to the risk that organization's face from social engineering Offers examples, research and practical… (More)
Is this relevant?
2016
2016
Social engineering is the acquisition of information about computer systems by methods that deeply include nontechnical means… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
Review
2016
Review
2016
Phishing is a network type attack where the attacker creates the fake of an existing webpage to fool an online user into elicit… (More)
Is this relevant?
2014
2014
The field of information security is a fast growing discipline. Even though the effectiveness of security measures to protect… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Social networks are some of the largest and fastest growing online services today. Facebook, for example, has been ranked as the… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Sustainable development is a widely used term, which has been increasingly infl uential on UK planning, housing and urban policy… (More)
  • table 1
Is this relevant?
Highly Cited
2010
Highly Cited
2010
social engineering the art of human hacking. Book lovers, when you need a new book to read, find the book here. Never worry not… (More)
Is this relevant?
Highly Cited
2010
Highly Cited
2010
In this short and deliberately provocative paper I reflect on what seems to be a yawning gulf between the potential contribution… (More)
Is this relevant?
Highly Cited
1999
Highly Cited
1999
We investigate the causes of civil war, using a new data set of wars during 1960-99. Rebellion may be explained by atypically… (More)
  • table 1
  • table 1
  • table 2
  • table 3
  • table 4
Is this relevant?
1995
1995
Many companies spend hundreds of thousands of dollars to ensure corporate computer security. The security protects company… (More)
Is this relevant?