Social engineering

Known as: Social hacker, Pretexts, Social engineering attack 
Social engineering, in the context of information security, refers to psychological manipulation of people into performing actions or divulging… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1972-2017
05019722017

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2015
Review
2015
Social engineering has emerged as a serious threat in virtual communities and is an effective means to attack information systems… (More)
  • figure 1
  • table 1
Is this relevant?
2014
2014
The field of information security is a fast growing discipline. Even though the effectiveness of security measures to protect… (More)
  • figure 2
  • figure 1
  • figure 3
  • figure 5
  • figure 4
Is this relevant?
Highly Cited
2011
Highly Cited
2011
Social networks are some of the largest and fastest growing online services today. Facebook, for example, has been ranked as the… (More)
  • figure 1
  • table 1
  • table 2
  • table 3
  • figure 2
Is this relevant?
2010
2010
Social engineering is a real threat to industries in this day and age even though the severity of it is extremely downplayed. The… (More)
  • figure 1
Is this relevant?
2009
2009
A growing number of people use social networking sites to foster social relationships among each other. While the advantages of… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2009
2009
Social Engineering (SE) is considered to be one of the most common problems facing information security today. Detecting social… (More)
  • figure 1
  • table 1
  • figure 2
  • figure 2
Is this relevant?
2008
2008
Die Verwundbarkeit durch „Social Engineering“ lässt sich durch klassische Awareness-Maßnahmen allein nicht ausschalten. Was hilft… (More)
Is this relevant?
2005
2005
This paper proposes a theoretical solution to the problem of Social Engineering (SE) attacks perpetrated over the phone lines. As… (More)
Is this relevant?
2004
2004
The key to maintaining the confidentiality, integrity, and availability of an organizations information and information systems… (More)
Is this relevant?
1999
1999
The production of large and complex systems usually requires the coordination and collaboration of many individuals spread among… (More)
Is this relevant?