291 research outputs found

    Artificial Intelligence\u27s Impact on Social Engineering Attacks

    Get PDF
    This research paper aims to explore the concept of social engineering attacks and the impact of artificial intelligence on them. Security threats posed by Social Engineering have escalated significantly in recent years. Despite the availability of advanced security software and hardware mechanisms, a vulnerability still exists in the organization\u27s or individual\u27s defense system. In this paper we look at types of social engineering attacks and the basic techniques used by attackers will be described. The primary areas of study are how AI impacts social engineering and is used to detect and prevent social engineering attacks. The application of automated systems is rapidly growing in every lifestyle we imagine – social media, merchandise apps, driverless cars, and cybersecurity companies. Even though AI has improved cybersecurity, it is giving cybercriminals a position to unleash advanced attacks. The employment of chatbots is rising. Chances are we have had an interaction with a Chatbot already, it may well be on Facebook Messenger. Unfortunately, many of us do not realize that we are talking to a bot. This paper also discusses the concepts of voice spoofing, deep fakes and automated social engineering

    Unsolicited commercial e-mail (spam): integrated policy and practice

    Get PDF
    The internet offers a cost-effective medium to build better relationships with customers than has been possible with traditional marketing media. Internet technologies, such as electronic mail, web sites and digital media, offer companies the ability to expand their customer reach, to target specific communities, and to communicate and interact with customers in a highly customised manner. In the last few years, electronic mail has emerged as an important marketing tool to build and maintain closer relationships both with customers and with prospects. E-mail marketing has become a popular choice for companies as it greatly reduces the costs associated with previously conventional methods such as direct mailing, cataloguing (i.e. sending product catalogues to potential customers) and telecommunication marketing. As small consumers obtain e-mail addresses, the efficiency of using e-mail as a marketing tool will grow. While e-mail may be a boon for advertisers, it is a problem for consumers, corporations and internet service providers since it is used for sending 'spam' (junk-mail). Unsolicited commercial e-mail (UCE), which is commonly called spam, impinges on the privacy of individual internet users. It can also cost users in terms of the time spent reading and deleting the messages, as well as in a direct financial sense where users pay time-based connection fees. Spam, which most frequently takes the form of mass mailing advertisements, is a violation of internet etiquette (EEMA, 2002). This thesis shows that spam is an increasing problem for information society citizens. For the senders of spam, getting the message to millions of people is easy and cost-effective, but for the receivers the cost of receiving spam is financial, time-consuming, resource-consuming, possibly offensive or even illegal, and also dangerous for information systems. The problem is recognised by governments who have attempted legislative measures, but these have had little impact because of the combined difficulties of crossing territorial boundaries and of continuously evasive originating addresses. Software developers are attempting to use technology to tackle the problem, but spammers keep one step ahead, for example by adapting subject headings to avoid filters. Filters have difficulty differentiating between legitimate e-mail and unwanted e-mail, so that while we may reduce our junk we may also reduce our wanted messages. Putting filter control into the hands of individual users results in an unfair burden, in that there is a cost of time and expertise from the user. Where filter control is outsourced to expert third parties, solving the time and expertise problems, the cost becomes financial. Given the inadequacy of legislation, and the unreliability of technical applications to resolve the problem, there is an unfair burden on information society citizens. This research has resulted in the conclusion that cooperation between legislation and technology is the most effective way to handle and manage spam, and that therefore a defence in depth should be based on a combination of those two strategies. The thesis reviews and critiques attempts at legislation, self-regulation and technical solutions. It presents a case for an integrated and user-oriented approach, and provides recommendations

    The role of supplier relationship platforms in supply chain management- the case of Ecratum

    Get PDF
    Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Information Systems and Technologies ManagementThe term supply chain can be defined as a process in which suppliers, manufacturers, distributors, and retailers are working together during the whole process of manufacturing the product and delivering it to the end-user. More specifically, all parties are involved in various phases from getting the raw material, transforming this material into a product that will satisfy users' needs and make sure this product reaches the end customer (La Londe & Masters, 1994). However, even though supply chains are created with the main aim to reduce costs, find the right partners to deliver the products and stay competitive on the market, proper management is crucial for the successful operation. Supply chain management (hereinafter: SCM), is all about the right optimization and strategic planning to identify, acquire, gain, allocate and manage all the needed resources that are involved in the workflow of achieving strategic objectives (Flynn, Harding, Lallatin, Pohlig & Sturzl, 2006)

    Technical and Legal Approaches to Unsolicited Electronic Mail

    Get PDF

    Effective means of improving email communication

    Get PDF
    Email communication has become an integral part of the communication structure within organisations, but the problems it can cause are rarely assessed. The defects associated with email, which are related to both the quantity and the quality of email need to be understood by employees for them to become more effective users of email. Email training within organisations tends to focus on how to use email as a software package, without looking at when it is appropriate to use email and how to get your message across effectively. This thesis first explores email defects and how they impact on organisations. [Continues.

    The role of newsletters in the future of independent journalism

    Get PDF
    Professional project report submitted in partial fulfillment of the requirements for the degree of Masters of Arts in Journalism from the School of Journalism, University of Missouri--Columbia.News organizations have innovated new methods of reaching the audience directly as the industry shifts to consumer supported revenue models. One strategy that has created buzz and is circulated widely, is the Email Newsletter. In addition to media companies, independent journalists are also using newsletters for personal goals such as finding a side income, creating a brand and advertising their work and projects. In this report, intrapreneurial and entrepreneurial journalists who create newsletters discuss the potentials and pitfalls of producing newsletters. The report finds that independent journalists are using the medium to fill in crucial gaps of information in local regions and niche topics and capitalizing on editorial independence offered by the medium. The article also features voices from legacy media organization Forbes and newsletters startups such as 6AM City.Includes bibliographical references

    Phishing susceptibility: Differences Across Generations

    Get PDF
    Masteroppgaven min er en case study som undersøker om eldre eller yngre folk er mer utsatt for phishing angrep. Dette ble gjennomført med bruken av semi-strukturerte intervjuer og en phishing "test" hvor deltakerne gikk gjennom 10 eksempler på phishing og ga sin mening om de var reele eller phishing

    The Privacy Matrix

    Get PDF

    A Further Darkside to Unsolicited Commercial E-mail? An Assessment of Potential Employer Liability for Spam E-mail, 22 J. Marshall J. Computer & Info. L. 179 (2003)

    Get PDF
    This article looks at employer liability for pornographic spam in the workplace. It begins with an analysis of the risks and unique problems posed by employees’ Internet use while at work. The article makes note of some trouble areas where employers may be held vicariously liable for sexual harassment. It is suggested that employers protect themselves by taking steps to: 1) reduce the prevalence of unsolicited commercial e-mail in the workplace; 2) mute the potential harm of offensive e-mail; and 3) create a paper trail indicating diligence in the fight to protect employees. Employers may reach these goals by the use of filtering technologies, disabling image loading in e-mail client programs, and updating policies on computer and Internet use in the workplace. If these goals are accomplished, then employers should find their prospective liability has been limited and the number of would-be plaintiffs to sue over sexual harassment will have been reduced
    • …
    corecore