Skip to main content
    • by 
    •   7  
      TechnologyTuring TestSocial EngineeringTask analysis
The objective of this paper is to report back on an organizational framework, which consisted of human, organization and technology (HOT) dimensions in holistically addressing aspects associated with phishing. Most anti-phishing... more
    • by 
    •   3  
      Human FactorsSocial EngineeringPhishing Attacks
Now days, the dependency on the smartphones and the web applications are elevating to huge extent and thereby the need to work on the security and privacy is there. As per the Annual Reports from prominent platforms of antivirus and... more
    • by 
    •   5  
      Social EngineeringDigital Investigation,Computer Forensics, Computer securityCyber SecurityDigital Fingerprinting
While there are no new frauds, internet technology provides new opportunities for fraudsters by facilitating volumes of attacks that law enforcement then struggles to address. Moreover, since context can affect how potential victims... more
    • by 
    •   7  
      AustraliaSocial EngineeringCybercrimeFraud
    • by 
    •   12  
      Computer ScienceInformation SecuritySecurity StudiesBiometrics
The article argues that moder-nity cannot be analyzed as one single entity. Some theorists and historians reduce modernity to political and scientific efforts that are based on discourses of exception, unbounded intervention and some kind... more
    • by 
    •   3  
      Industrial HistoryModernitySocial Engineering
Social engineering has become a menace in our virtual world and is an effectual way to attack our systems. The objective of this study is to discuss different existing social engineering techniques and aspects of social engineering. This... more
    • by 
    •   6  
      Computer ScienceInformation SecurityComputer NetworksComputer Security
Organizations invest heavily in technical controls for their Information Assurance (IA) infrastructure. These technical controls mitigate and reduce the risk of damage caused by outsider attacks. Most organizations rely on training to... more
    • by 
    •   6  
      Computer ScienceSocial EngineeringPhishingSecurity Risks
In 1949, the Communist Party of China pledged that its approach to health care would differ markedly from that of the former Nationalist government and the "imperialist" West. For the next thirty years, under Mao's leadership, the... more
    • by 
    •   13  
      Health CareGlobal HealthCommunism (Revolutions)Oral history
In the early 1990s, a centre-right government declared that they would implement a 'system shift' in Sweden, often perceived as a 'model country' in the context of welfare policy discourse. The neoliberal ideology inspiring this shift had... more
    • by 
    •   5  
      GovernanceNeoliberalismSocial EngineeringGovernmentality Studies
From the Publisher: In this provocative volume, the authors argue that public education is a central part of American civil religion and, thus, gives us an unquestioning faith in the capacity of education to solve all of our social,... more
    • by 
    •   16  
      ReligionAmerican HistoryCultural HistoryPolitical Philosophy
The abstract of my first book.
    • by 
    •   10  
      Social PsychologyPolitical EconomyNeoliberalismSocial Engineering
    • by 
    •   7  
      Corporate Social ResponsibilityClimate ChangeSocial MediaCapitalism
In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic... more
    • by 
    •   6  
      Information SecurityNetwork SecurityComputer SecuritySocial Engineering
Today, social engineering techniques are the most common way of committing cybercrimes through the intrusion and infection of computer systems. Cyber security experts use the term “social engineering” to highlight the “human factor" in... more
    • by 
    •   11  
      Corporate Social ResponsibilityCybercrimesResilienceSecuritization
    • by 
    •   4  
      TaxonomySocial EngineeringComputersOrganizations
    • by 
    •   6  
      Computer ScienceInformation SecurityComputer NetworksComputer Security
Ever since the evolution of banking, there have always been a number of unscrupulous individuals who have tried to breach its defenses in order to gain access to valuables. In the course of time, the physical attacks have become slowly... more
    • by 
    •   2  
      Social EngineeringInformation Privacy and Security
In 1931, an uprising of Greek Cypriots proclaiming “Enosis” (political union of Cyprus [with Greece]) swept the island of Cyprus, then a British colony. Rapidly recovering from the initial shock, British authorities seized the opportunity... more
    • by 
    •   8  
      Cyprus StudiesColonialismMediterranean StudiesBritish Imperial and Colonial History (1600 - )
The failure of ‘progressivism’ to gain traction in the current political landscape can be diagnosed in many ways. The diagnosis pursued here, partly in response to a set of recent debates, is that social democracy and neoliberalism have... more
    • by 
    •   8  
      MarxismHuman CapitalSocial DemocracySocial Engineering
The article examines the emergence of urban countercultures and social movements in Christiania, Copenhagen, and Haga, Gothenburg in the context of the Scandinavian welfare state, from the 1970s to the present. Specifically, it... more
    • by 
    •   6  
      Social MovementsUrban PlanningGentrificationResistance (Social)
    • by 
    •   4  
      Polish HistorySecond World WarForced MigrationSocial Engineering
... potential malware, and the number of such websites has increased by around 190,0000 since 2008 (see Google's Safe Browsing ... We used the Windows command Ipconfig/displaydns to display the contents of the DNS resolver cache... more
    • by 
    •   10  
      EngineeringSociologyInformation SecurityTechnology and Society
Social Engineer Hacking without Code. It is the act of manipulating a person to take any action that may or may not be in the “target’s” best interest.
    • by 
    •   5  
      CyberpsychologyCybercrimesSociology of Crime and DevianceSocial Engineering
16th century ‘face to face’ persuasion scams adopted to letters, telephone, fax and Internet with the development of new communication technologies. In many of today’s fraud schemes phone numbers play an important role. Various... more
    • by 
    •   13  
      Interactive Digital StorytellingHacktivismReverse EngineeringInteractive Storytelling
Niniejsza praca licencjacka dotyczy analizy działań społecznie odpowiedzialnych na różnych poziomach działania. Autor pracy stawia trzy tezy, które stara się w ciągu całej pracy potwierdzić, są to: nieskuteczność kampanii społecznych oraz... more
    • by 
    •   5  
      Customer Relationship Management (CRM)Social ResponsibilitySocial EngineeringSocial Campaign
The Mighty Wurlitzer : How The CIA Played America by Hugh Wilford This well researched investigation by Hugh Wilford, published in 2008, reveals the extent of the covert front organisation network, which the Central Intelligence Agency... more
    • by 
    •   11  
      Cold War and CultureCultural Cold WarCold WarIntelligence and Espionage
Let me sketch out here my vision of the cloistered cornucopia of AD 2100: Management of Planet Earth is entirely rationalized. Nature still nurtures. Artificial intelligence is history. The Machine has met its Master. The rich are... more
    • by 
    •   20  
      FuturismHuman-Robot InteractionSatire & IronySocial Engineering
A city built in Brazilian midlands by a communist architect in a non-Marxist economy that aspired for social equality had disturbed minds in academia of architecture, sociology, urban planning and other areas for many years. Fascination... more
    • by 
    •   11  
      Brazilian HistoryUtopian StudiesModernist Architecture (Architectural Modernism)Housing
    • by 
    •   12  
      Computer ScienceDistributed ComputingCritical Infrastructure SecuritySocial Engineering
Social engineering has become a menace in our virtual world and is an effectual way to attack our systems. The objective of this study is to discuss different existing social engineering techniques and aspects of social engineering. This... more
    • by 
    •   6  
      Computer ScienceInformation SecurityComputer NetworksComputer Security
This article considers selective transfers of knowledge between Swedish and German architects and urban planners from the early 1930s to the mid-1940s. It contextualizes such transfers with regard to transnational practices of social... more
    • by 
    •   7  
      German HistoryContemporary HistorySwedish HistoryNazi Germany
The interactive human components of serious cybersecurity breaches continue to be a problem for every organization. Helping people identify social engineering attempts over the phone will be cheaper and more effective than yet another... more
    • by 
    •   3  
      Forensic LinguisticsSocial EngineeringCyber Security
Howard Gruber, a founder member of Psychologists for Social Action, reviewed the dissertation. His review, dated May 7, 1978, as Parkovnick (2015) points out, "... is worth quoting in full, as it captures the very essence of the... more
    • by 
    •   174  
      Critical TheoryOrganizational BehaviorCultural HistoryPsychology
The paper aims to outline the transformation of the institutional system of what the communist official discourse called the “bourgeois justice” into the “people's justice”, as well as the cadres policy accompanying this transformation... more
    • by 
    •   3  
      Criminal JusticeSocial EngineeringHistory of Communism
    • by 
    •   7  
      Information SecurityComputer SecurityDeceptionSocial Engineering
This article summarizes my explorations of the ideology of the Book of Lord Shang 商君書. In my eyes, this text presents the boldest ever attempt to engineer society according to the ruler’s wishes. The authors (a Qin 秦 statesman Shang Yang... more
    • by 
    •   9  
      Chinese PhilosophyPolitical TheoryHistory of Political ThoughtEarly China
The aim of this research was to develop a critical understanding of how social engineering has developed, its uses within penetration testing approach as part of a security audit and to ascertain how people can reduce their risk of social... more
    • by 
    •   3  
      Computer ScienceSocial EngineeringCyber Security
Cybercrime represents a significant threat for the 21st century, a threat that traditional methods of policing cannot adequately manage. Consequently, new ways of policing utilising specialised teams have been implemented to address... more
    • by 
    •   10  
      Forensic PsychologyQualitative ResearchPolice PsychologyThematic Analysis
Social-Engineering ist eine Angriffsstrategie, die nicht die Technik als Opfer auserkorenhat. Stattdessen wird hier viel lieber – und vor allem effizienter – der Mensch, bzw.sein Verhalten angegriffen. Dieser Artikel zeigt, wie... more
    • by 
    •   5  
      PsychologySocial PsychologyInformation TechnologyInformation Security
    • by 
    •   6  
      Social GeographyUrban GeographyGentrificationSocial Control
I have discussed the work of public relations guru Edward Bernays before. I specifically focused on his 1928 book "Propaganda", in which he laid out his initial ideas in the formation of public attitudes, facilitated by a technocratic... more
    • by 
    •   20  
      MarketingSociologyPolitical SociologyPsychology
ABSTRACT. Working out reliable scientific – not ideologically-biased - model of social evolution, defining the criteria for Natural Selection any any level of complexity or Universal Darwinism, and sociobiology theoretical rethinking... more
    • by 
    •   11  
      SociologySociobiologySustainable DevelopmentEvolution
This is an introduction of an issue of the journal Zeithistorische Forschungen.  The  essay gives an overview about the effects and impacts of social engineering during the 20th century.
    • by 
    • Social Engineering
As the digital era matures, cyber security evolves and software vulnerabilities diminish, people however, as individuals, are more exposed today than ever before. Presently, one of the most practised and effective penetration attacks are... more
    • by  and +2
    •   6  
      Network SecurityHackingSocial EngineeringCyber Security
The martial arts industry is experiencing immense growth, creating a highly competitive environment where challenges in attracting and retaining customers cause substantial losses and an inability to compete effectively. Customer... more
    • by 
    •   4  
      MarketingInformation SecurityConsumer BehaviorSocial Engineering
    • by 
    •   4  
      EthicsPersuasionSocial InfluenceSocial Engineering
    • by 
    •   6  
      PsychologyMalware AnalysisOPERATING SYSTEMSocial Engineering
    • by  and +1
    •   8  
      SociologyInformation SecurityTechnology and SocietySocial Software
    • by 
    •   6  
      Information SecurityNetwork SecurityComputer SecuritySocial Engineering