2013 Information Security for South Africa 2013
DOI: 10.1109/issa.2013.6641064
|View full text |Cite
|
Sign up to set email alerts
|

Social engineering from a normative ethics perspective

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(14 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…The templates are also kept as simple as possible so that they can be expanded upon to create more elaborate scenarios with exactly the same principal structures. The templates were developed in such a way that other researchers can use them to perform repeatable experiments of social engineering attacks, with repeatable results, without having to physically perform the attack and potentially cause harm to innocent targets [21,22].…”
Section: Templates For Social Engineering Attacksmentioning
confidence: 99%
“…The templates are also kept as simple as possible so that they can be expanded upon to create more elaborate scenarios with exactly the same principal structures. The templates were developed in such a way that other researchers can use them to perform repeatable experiments of social engineering attacks, with repeatable results, without having to physically perform the attack and potentially cause harm to innocent targets [21,22].…”
Section: Templates For Social Engineering Attacksmentioning
confidence: 99%
“…For example, in [63], participant deception and debriefing, privacy and institute review board approval were determined to be the main challenges that affect the design and execution of phishing experiments. Mouton et al [64] proposes a normative perspective for ethics in social engineering which can help ethics committees in the process of experiment approval. Here, reporting susceptibility would be considered from a utilitarian and deontogical standpoint; that is, whether or not the collected and reported data would be ethical given the consequences of the specified action (utilitarianism) or the duty and obligations related to that action (deontology).…”
Section: B Challenges In Producing Datasets For Semantic Social Engimentioning
confidence: 99%
“…The templates are also kept as simple as possible so that they can be expanded upon to create more elaborate scenarios with similar principal structures. The templates can also be used to verify or compare other models, processes and frameworks without having to physically perform the attack and potentially cause harm to innocent targets [19]. The rest of this section is dedicated to testing the SEADM against the social engineering attack templates.…”
Section: Application Of the Social Engineering Attack Detection Modelmentioning
confidence: 99%