Conceiving new technologies as social experiments is a means to discuss responsible deployment of technologies that may have unknown and potentially harmful side-effects. Thus far, the uncertain outcomes addressed in the paradigm of new technologies as social experiments have been mostly safety-related, meaning that potential harm is caused by the design plus accidental events in the environment. In some domains, such as cyberspace, adversarial agents (attackers) may be at least as important when it comes to undesirable effects of deployed technologies. In such cases, conditions for responsible experimentation may need to be implemented differently, as attackers behave strategically rather than probabilistically. In this contribution, we ou...
Abstract: Growth of technologies, interconnected systems and digitalization, securing data becomes a...
Pre-emptive security emphasizes the necessity of envisioning and designing technologies enabling the...
The article explores the pervasive threat of social engineering in cybersecurity, emphasizing its su...
Conceiving new technologies as social experiments is a means to discuss responsible deployment of te...
Conceiving new technologies as social experiments is a means to discuss responsible deployment of te...
Conceiving new technologies as social experiments is a means to discuss responsible deployment of te...
Lessons from previous experiences are often overlooked when deploying security-sensitive technology ...
Lessons from previous experiences are often overlooked when deploying security-sensitive technology ...
Studies that approach the deployment of new technologies as social experiments have mostly focused o...
This paper highlights methods of syntactic and semantic social engineering attacks (human-based and ...
This paper is primarily intended to firstly define and review the literature in cybersecurity and vi...
Social engineering penetration testing is a complex but necessary tool to test the security of infor...
Social engineering, as an art of deception, is very present in the era of globalization and it inter...
Cybersecurity cannot be ensured with mere technical solutions. Hackers often use fraudulent emails t...
Technology has always been a vital component of human development, most often aimed at the advanceme...
Abstract: Growth of technologies, interconnected systems and digitalization, securing data becomes a...
Pre-emptive security emphasizes the necessity of envisioning and designing technologies enabling the...
The article explores the pervasive threat of social engineering in cybersecurity, emphasizing its su...
Conceiving new technologies as social experiments is a means to discuss responsible deployment of te...
Conceiving new technologies as social experiments is a means to discuss responsible deployment of te...
Conceiving new technologies as social experiments is a means to discuss responsible deployment of te...
Lessons from previous experiences are often overlooked when deploying security-sensitive technology ...
Lessons from previous experiences are often overlooked when deploying security-sensitive technology ...
Studies that approach the deployment of new technologies as social experiments have mostly focused o...
This paper highlights methods of syntactic and semantic social engineering attacks (human-based and ...
This paper is primarily intended to firstly define and review the literature in cybersecurity and vi...
Social engineering penetration testing is a complex but necessary tool to test the security of infor...
Social engineering, as an art of deception, is very present in the era of globalization and it inter...
Cybersecurity cannot be ensured with mere technical solutions. Hackers often use fraudulent emails t...
Technology has always been a vital component of human development, most often aimed at the advanceme...
Abstract: Growth of technologies, interconnected systems and digitalization, securing data becomes a...
Pre-emptive security emphasizes the necessity of envisioning and designing technologies enabling the...
The article explores the pervasive threat of social engineering in cybersecurity, emphasizing its su...