Back to Results
First PageMeta Content
Social engineering / Computer crimes / Phishing / Spamming / Robert Cialdini / Kevin Mitnick / Persuasion / Social influence / The Art of Deception / Social psychology / Cybercrime / Behavioural sciences


Social Engineering Attacks Lightning Talk Sven Übelacker Security in Distributed Applications Hamburg University of Technology
Add to Reading List

Document Date: 2015-03-03 03:21:19


Open Document

File Size: 71,60 KB

Share Result on Facebook

City

Hamburg / /

Company

A. Darwish A.E. / Behavioral / /

Facility

University of Arkansas / Distributed Applications Hamburg University of Technology / /

IndustryTerm

peripheral/heuristic vs. central route processing / Online Persuasion / methods and tools / human information processing / cloud computing / /

Organization

Distributed Applications Hamburg University of Technology / University of Arkansas / European Union / Hofstede Center / /

Person

George Loewenstein / Robert B. Cialdini / Nava Ashraf / James L Parrish Jr / Paul Wilson / Louise Leenen / David Gragg / Bruce Schneier / Kevin Mitnick / Frank Stajano / Francois Mouton / Daniel Kahneman / Progress / Janet L Bailey / James F Courtney / Adam Smith / Colin F Camerer / Sven Übelacker / /

/

Position

author / editor / Economist / /

ProvinceOrState

Arkansas / /

PublishedMedium

Journal of Economic Perspectives / Communications of the ACM / Lecture Notes in Computer Science / /

URL

http /

SocialTag