Essays about: "social engineering"

Showing result 1 - 5 of 246 essays containing the words social engineering.

  1. 1. The challenge of data-driven requirements elicitation techniques : Systematic Literature Review & Controlled Experiment

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik; Blekinge Tekniska Högskola/Institutionen för programvaruteknik

    Author : Tianpeng Zhang; Linxiang Ruan; [2020]
    Keywords : Requirements Elicitation; Data-Driven Requirements; Social Network Analysis; Text Classification;

    Abstract : Background. Nowadays, Requirements Engineering(RE) focuses not only the pri- mary stakeholders but also large scale data, which comes from an amount of cus- tomers’ operations and feedback. For instance, the user reviews in the mobile app platform become an important analysis target, since they contain a lot of informa- tion. READ MORE

  2. 2. BankID-based Authentication for Phone Calls

    University essay from Lunds universitet/Institutionen för elektro- och informationsteknik

    Author : Anton Göransson; Emma Asklund; [2020]
    Keywords : Electronic identification; BankID; authentication; social engineering; phone calls; spoofing; Technology and Engineering;

    Abstract : Authentication for phone calls is important for companies with hundreds of customers wanting to access sensitive information. However, it is sub-par compared to authentication when using applications or websites. In this thesis, seven models have been developed for how to use BankID as the authentication service during phone calls. READ MORE

  3. 3. Sweet Blood Surveillance: An ethnographic approach to diabetes management through the Diabetes Care Network

    University essay from Lunds universitet/Avdelningen för etnologi

    Author : Jesse Vargas; [2020]
    Keywords : Diabetes Care Network DCN ; Type 1 Diabetes; Sociotechnical System; Ethnography; Technology and Engineering; Medicine and Health Sciences; Cultural Sciences;

    Abstract : Is the management of Type 1 Diabetes best left to the medical sciences, or do the social sciences have a stake as well? In ‘Sweet Blood Surveillance,’ I push back against the perceived domination of scientific objectivity to make space for the subjective experience of diabetes in the maintenance of glucose levels through a collaboration with medical technical objects. To accomplish my task, I create an analytical tool, the Diabetes Care Network, in order to conceptualize the sociotechnical system of postmodern diabetes care, focusing on the social group of the User. READ MORE

  4. 4. The impact of social influence on pre-evacuation behavior - An eye tracking analysis on information gathering during pre-evacuation behavior, comparing normative and informational social influence

    University essay from Lunds universitet/Avdelningen för Brandteknik

    Author : Rebecca Rostedt; Sofie Andersson; [2019]
    Keywords : Social influence; informational social influence; normative social influence; pre-evacuation; evacuation; eye-tracking; Technology and Engineering;

    Abstract : This study explores social influence within the pre-evacuation phase, which includes a literature review followed by experiments. The study is based on experiments by Latané and Darley (1968) but altered, here using eye tracking to examine if people who are alone use their gaze in the same way as people in a group, when collecting information in the pre-evacuation phase. READ MORE

  5. 5. Implementing a Nudge to Prevent Email Phishing

    University essay from KTH/Skolan för elektroteknik och datavetenskap (EECS); KTH/Skolan för elektroteknik och datavetenskap (EECS)

    Author : Viktor Vitek; Taqui Syed Shah; [2019]
    Keywords : Hacking; Phishing; Social Engineering; Psychology; Nudge; ; Dataintrång; Nätfiske; Social Manipulation; Psykologi; Nudge; ;

    Abstract : Phishing is a reoccurring issue, which uses social engineering as an attack strategy. The prevention of these attacks is often content-based filters. These solutions are however not always perfect, and phishing emails can still be able to get through the filters. We suggest a new strategy to combat phishing. READ MORE