Search results for "Social engineering"

showing 5 items of 5 documents

The Broader Linguistic and Cultural Context of Central Europe

2009

Central Europe is an extremely malleable concept. It denotes a region whose political shape has been changing dramatically throughout the last millennium since the emergence of the first polities. This work focuses on the rise and political uses of Czech, Magyar, Polish, and Slovak. But this would mean tearing away the roots of the sociolinguistic reality that surrounds and has deeply interacted with the everyday realities of Slovak-, Polish-, Magyar- and Czech-speakers. The resulting picture would agree with the predominant ethnonational thinking about Central Europe as an area neatly divided among the nation-states that contain the corresponding nations speaking exclusively in their own l…

Czecheducation.field_of_studyPopulationlanguage.human_languageIdeal (ethics)PoliticsPolitical economyPolitical sciencelanguageSlovakSocial engineering (political science)Official languageSlavic languageseducation
researchProduct

From technology engineering to social engineering

2007

Virtual worlds have a long history, and it also includes various technologies. Yet research interest towards them has diverged over the years. It seems that nowadays they are on focus again with the evolution of socially oriented and community-supporting virtual worlds. Instead of technical factors, human factors and the motivation behind the use are highlighted. In this paper, we will briefly review the research efforts made in the 90's, and derive a set of themes that were of interest back then. Next, we will expand the set by arguing for newer themes, identified in the latest information systems literature. These two sets of themes form a basis of a research agenda for studying virtual w…

EngineeringComputer Networks and Communicationsbusiness.industrymedia_common.quotation_subjectSocial engineering (security)Virtual realityMetaverseManagement Information SystemsPleasureWorld Wide WebInformation systemEngineering ethicsComputer-mediated communicationbusinessmedia_commonACM SIGMIS Database: the DATABASE for Advances in Information Systems
researchProduct

Arqueología del futuro en el barrio El Raval de Barcelona: a propósito de tres inercias del urbanismo tecnocrático y sus efectos indeseables

2021

Este artículo es el resultado de nuestro esfuerzo analítico para comprender cómo se han pensado y practicado intervenciones urbanísticas, extremadamente drásticas, contra el barrio El Raval de Barcelona en períodos formalmente democráticos. Lo que consideramos original de nuestra propuesta analítica es la identificación de una suerte de doxa tecnocrática que habría impregnado el urbanismo –también el barcelonés- desde sus inicios, y que acabará caracterizando el aclamado tanto como discutido “Modelo Barcelona”. La metodología utilizada proviene de la antropología histórica y de la sociología urbana. Nuestro prisma teórico entrecruza perspectivas historiográficas como la biopolítica, socioló…

Raval (Barcelona Spain):Urbanisme [Àrees temàtiques de la UPC]Enginyeria socialModern movementmedia_common.quotation_subjectGeography Planning and DevelopmentRaval (Barcelona Catalunya)ArtAntropologia políticaMovimiento modernoBiopolíticaIngeniería socialUrban StudiesUrbanismeSocial normalizationSociologia urbana -- Catalunya -- BarcelonaArchitectureNormalización socialBiopoliticsSociology Urban -- Spain -- BarcelonaNormalització socialSocial engineeringMoviment modernHumanitiesmedia_commonACE: Architecture, City and Environment
researchProduct

Security of information in IT systems

2005

The aim of the paper is to increase human awareness of the dangers connected with social engineering methods of obtaining information. The article demonstrates psychological and sociological methods of influencing people used in the attacks on IT systems. Little known techniques are presented about one of the greater threats that is electromagnetic emission or corona effect. Moreover, the work shows methods of protecting against this type of dangers. Also, in the paper one can find information on devices made according to the TEMPEST technology. The article not only discusses the methods of gathering information, but also instructs how to protect against its out-of-control loss.

business.industrySocial engineering (security)Telecommunication securityInformation technologyEavesdroppingElectromagnetic emissionComputer securitycomputer.software_genreInformation protection policyInformation security managementSociologyTempestbusinesscomputerSPIE Proceedings
researchProduct

Tietoturvan ihmiselementti : sosiaalinen manipulointi

2017

Tämän tutkielman aiheena on sosiaalinen manipulointi, tietoturvan ihmiselementti ja sen huomioon ottaminen ja hyökkäysten ehkäiseminen yrityksen tai organisaation tietoturvassa. Sosiaalisella manipuloinnilla tarkoitetaan tutkielman kontekstissa tietojärjestelmän käyttäjiin kohdistuvaa manipulointia, jonka tavoitteena on informaation keruu tai tietojärjestelmään murtautuminen. Aihetta on tärkeää tutkia, sillä useat tietoturva-asiantuntijat ovat yhtä mieltä siitä, että merkittävin tietojärjestelmän tietoturvauhka on sen käyttäjät ja heidän tietoturvallisuuden näkökulmasta tekemät inhimilliset erehdykset. Sosiaalinen manipulointi kohdistuu juuri tähän tietoturvan heikkouteen. Tutkielman tuloks…

käyttäjän manipulointiAdvanced persistent threatAPT-hyökkäyssosiaalinen vaikuttaminenIT-securitySocial engineeringtietoturvakyberturvallisuus
researchProduct