Employees’ Social Graph Analysis: A Model of Detection the Most Criticality Trajectories of the Social Engineering Attack’s Spread

Author(s):  
A. Khlobystova ◽  
M. Abramov ◽  
A. Tulupyev
2017 ◽  
pp. 5-21
Author(s):  
Krzysztof Węcel ◽  
Bartosz Perkowski ◽  
Agata Filipowska ◽  
Dawid Węckowski ◽  
Piotr Zwolenkiewicz

2021 ◽  
Vol 14 (7) ◽  
pp. 1124-1136
Author(s):  
Dimitris Tsaras ◽  
George Trimponias ◽  
Lefteris Ntaflos ◽  
Dimitris Papadias

Influence maximization (IM) is a fundamental task in social network analysis. Typically, IM aims at selecting a set of seeds for the network that influences the maximum number of individuals. Motivated by practical applications, in this paper we focus on an IM variant, where the owner of multiple competing products wishes to select seeds for each product so that the collective influence across all products is maximized. To capture the competing diffusion processes, we introduce an Awareness-to-Influence (AtI) model. In the first phase, awareness about each product propagates in the social graph unhindered by other competing products. In the second phase, a user adopts the most preferred product among those encountered in the awareness phase. To compute the seed sets, we propose GCW, a game-theoretic framework that views the various products as agents, which compete for influence in the social graph and selfishly select their individual strategy. We show that AtI exhibits monotonicity and submodularity; importantly, GCW is a monotone utility game. This allows us to develop an efficient best-response algorithm, with quality guarantees on the collective utility. Our experimental results suggest that our methods are effective, efficient, and scale well to large social networks.


2018 ◽  
Vol 109 (2) ◽  
pp. 133-148 ◽  
Author(s):  
Francois Mouton ◽  
Alastair Nottingham ◽  
Louise Leenen ◽  
H.S Venter

Author(s):  
Tahir Abbas

This article situates the debate on the United Kingdom’s Prevent policy in the broader framework of the global paradigm for countering violent extremism (CVE), which appeared at the end of 2015. It argues that omission of a nuanced focus on the social, cultural, economic, and political characteristics of radicalised people has led to a tendency to introduce blanket measures which, inadvertently and indirectly, have had harmful results. Moreover, although Prevent has been the fundamental element of the British government’s counterterrorist strategy since 2006, it confuses legitimate political resistance of young British Muslims with signs of violent extremism, thus giving credence to the argument that Prevent is a form of social engineering which, in the last instance, pacifies resistance by reaffirming the status quo in the country’s domestic and foreign policy.


2016 ◽  
Vol 6 (4) ◽  
pp. 209-223

During the university course the future legal psychologists have to master a wide range of professional competencies, among them are those that can be classified as management, with an emphasis on project making competencies and their relationship with the project making professional culture. The article presents the results of students' self-evaluation competencies. This research was a part of the monitoring of learning outcomes in a number of disciplines in the Faculty of Legal Psychology, Moscow State University of Psychology and Education. The author raises the problem of defining the concepts of "project culture" and "psychological culture of project making", which still do not have a clear definition inspite of the intensive development of the socio-cultural, innovative and other forms of project making. For legal psychologists project making culture involves the acquisition of psychologically correct approaches to the development, evaluation, promotion and institutionalization of the ideas, so they can provide the solution of professional problems.


2021 ◽  
Vol 34 (01) ◽  
pp. 258-269
Author(s):  
Vyacheslav I. Karpunin ◽  
Tatiana S. Novashina

The systemic and functional analysis of economic nature of Crypto currency within the modern theory of money is a necessary essential component of the study that allowed the authors to formulate a vision of social and economic model of future international monetary system. The authors consider the substance of money in a dialectic unity of the transformation of forms and spheres of its being. The forms of being of money are: material, monetary, paper, electronic. The spheres of being of money are: social, - the "symbol money"; economic, - the "bank notes"; political and legal, - "monetary units". In this paper we show that money is a financial instrument. Money is a market form of universal claim to a share in the wealth of society. The uncovering of internal intrinsic structure of money allows the authors to show convincingly that a currency, especially a "Crypto currency", cannot have and does not have an "economic nature". In considering the process of historical transformation of international monetary systems, taking into account the real achievements of financial, information, program and social engineering for the creation of a digital "gold" the authors believe that the social and economic model of future international monetary system has received its real approbation.


2018 ◽  
Vol 11 (2) ◽  
pp. 49-57
Author(s):  
Adrian Cristian MOISE

Starting from the provisions of Article 2 of the Council of Europe Convention on Cybercrime and from the provisions of Article 3 of Directive 2013/40/EU on attacks against information systems, the present study analyses how these provisions have been transposed into the text of Article 360 of the Romanian Criminal Code.  Illegal access to a computer system is a criminal offence that aims to affect the patrimony of individuals or legal entities.The illegal access to computer systems is accomplished with the help of the social engineering techniques, the best known technique of this kind is the use of phishing threats. Typically, phishing attacks will lead the recipient to a Web page designed to simulate the visual identity of a target organization, and to gather personal information about the user, the victim having knowledge of the attack.


Sign in / Sign up

Export Citation Format

Share Document