Renovating Russiais a richly comparative investigation of late Imperial and early Soviet medico-scientific theories of moral and social disorder. Daniel Beer argues that in the late Imperial years ...liberal psychiatrists, psychologists, and criminologists grappled with an intractable dilemma. They sought to renovate Russia, to forge a modern enlightened society governed by the rule of law, but they feared the backwardness, irrationality, and violent potential of the Russian masses. Situating their studies of degeneration, crime, mental illness, and crowd psychology in a pan-European context, Beer shows how liberals' fears of societal catastrophe were only heightened by the effects of industrial modernization and the rise of mass politics.
In the wake of the orgy of violence that swept the Empire in the 1905 Revolution, these intellectual elites increasingly put their faith in coercive programs of scientific social engineering. Their theories survived liberalism's political defeat in 1917 and meshed with the Bolsheviks' radical project for social transformation. They came to sanction the application of violent transformative measures against entire classes, culminating in the waves of state repression that accompanied forced industrialization and collectivization.Renovating Russiathus offers a powerful revisionist challenge to established views of the fate of liberalism in the Russian Revolution.
The field of information security is a fast-growing discipline. Even though the effectiveness of security measures to protect sensitive information is increasing, people remain susceptible to ...manipulation and thus the human element remains a weak link. A social engineering attack targets this weakness by using various manipulation techniques to elicit sensitive information. The field of social engineering is still in its early stages with regard to formal definitions, attack frameworks and templates of attacks. This paper proposes detailed social engineering attack templates that are derived from real-world social engineering examples. Current documented examples of social engineering attacks do not include all the attack steps and phases. The proposed social engineering attack templates attempt to alleviate the problem of limited documented literature on social engineering attacks by mapping the real-world examples to the social engineering attack framework. Mapping several similar real-world examples to the social engineering attack framework allows one to establish a detailed flow of the attack whilst abstracting subjects and objects. This mapping is then utilised to propose the generalised social engineering attack templates that are representative of real-world examples, whilst still being general enough to encompass several different real-world examples. The proposed social engineering attack templates cover all three types of communication, namely bidirectional communication, unidirectional communication and indirect communication. In order to perform comparative studies of different social engineering models, processes and frameworks, it is necessary to have a formalised set of social engineering attack scenarios that are fully detailed in every phase and step of the process. The social engineering attack templates are converted to social engineering attack scenarios by populating the template with both subjects and objects from real-world examples whilst still maintaining the detailed flow of the attack as provided in the template. Furthermore, this paper illustrates how the social engineering attack scenarios are applied to verify a social engineering attack detection model. These templates and scenarios can be used by other researchers to either expand on, use for comparative measures, create additional examples or evaluate models for completeness. Additionally, the proposed social engineering attack templates can also be used to develop social engineering awareness material.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
Social engineering (SE) attacks are a growing concern for organizations that rely on technology to protect sensitive data. Identifying and preventing these attacks can be challenging, as they ...frequently rely on manipulating human behavior rather than exploiting technical vulnerabilities. Although various studies have explored SE attacks and their defense mechanisms, there remains a gap in the literature concerning the holistic and layered classification of these threats and countermeasures. To address this, we conducted a comprehensive literature survey to understand existing taxonomies and subsequently identified areas that required a more structured and exhaustive categorization. Based on the survey results, we propose a comprehensive taxonomy of SE attacks, classifying them based on three levels: environment, approaches, and mediums. Additionally, we present a taxonomy of social engineering countermeasures, encompassing both technical and non-technical solutions. The proposed taxonomies serve as a foundation for future research and offer organizations a valuable framework for developing effective strategies to detect, prevent, and respond to social engineering incidents.
The Social Engineering Optimizer (SEO) Fathollahi-Fard, Amir Mohammad; Hajiaghaei-Keshteli, Mostafa; Tavakkoli-Moghaddam, Reza
Engineering applications of artificial intelligence,
06/2018, Volume:
72
Journal Article
Peer reviewed
Although several meta-heuristics have been developed in the last two decades, most of them are population-based, undergo many steps along with several parameters that make them hard to understand and ...code. In addition, there are same procedures in recent metaheuristics which make them similar. So, the researchers usually are confused to select a metaheuristic and cannot find any superiority or at least in any algorithms. Because of this, the researchers still use the old algorithms instead of the recent ones. Contrary to previous work, this paper aims to develop a simple, intelligent and new single-solution algorithm that has just four main steps and three simple parameters to tune. Social Engineering Optimizer (SEO) starts with two initial solutions divided into attacker and defender. The attacker obtains the rules of Social Engineering techniques to reach its desired goals. By these simple features, the algorithm does precisely both intensification and diversification phases. The basis of the algorithm depends on how an attacker attacks to a defender by four different associated techniques. Finally, the proposed SEO is applied to solve a set of benchmark functions, important engineering and multi-objective optimization problems. The result shows its superiority in comparison with other well-known and recent meta-heuristics.
•A new single-solution meta-heuristic approach inspired by Social Engineering is developed.•The proposed easy and intelligent method has four main steps and just three simple parameters to tune.•The SEO is tested on the different benchmark functions, engineering and also multi-objective optimization problems.•The algorithm gives the opportunity to a user to select the suitable technique among four ones.•The results confirm the performance and effectiveness of SEO in practice.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP
•A Social Engineering Optimizer (SEO) is newly developed to solve the truck scheduling problem.•Three novel improvements for the SEO are proposed.•The algorithms are evaluated by using different test ...instances for the truck scheduling problem as well as a real case study.•The proposed algorithms are highly efficient in comparison with standard benchmark functions.
The truck scheduling problem is one of the most challenging and important types of scheduling with a large number of real-world applications in the area of logistics and cross-docking systems. This problem is formulated to find an optimal condition for both receiving and shipping trucks sequences. Due to the difficulty of the practicality of the truck scheduling problem for large-scale cases, the literature has shown that there is a chance, even with low possibility, for a new optimizer to outperform existing algorithms for this optimization problem. Already applied successfully to solve similar complicated optimization problems, the Social Engineering Optimizer (SEO) inspired by social engineering phenomena, has been never applied to the truck scheduling problem. This motivates us to develop a set of novel modifications of the recently-developed SEO. To validate these optimizers, they are evaluated by solving a set of standard benchmark functions. All the algorithms have been calibrated by the Taguchi experimental design approach to further enhance their optimization performance. In addition to some benchmarks of truck scheduling, a real case study to prove the proposed problem is utilized to show the high-efficiency of the developed optimizers in a real situation. The results indicate that the proposed modifications of SEO considerably outperform the state of the art algorithms and provide very competitive results.
Full text
Available for:
GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
A disassembly line is an industrialized and automated production line which should be scheduled with high production efficiency. Although many disassembly line balancing optimization studies are ...contributed recently, they increase or reduce the number of workstations to balance the disassembly line. From real-world managerial settings, an increase or decrease workstations, is too expensive and not realistic. The bucket brigades' disassembly line is self-balancing and self-organizing, which is not constrained by the workstation beat time and only needs to distribute workers on the line according to certain rules to achieve line balancing after a period of time. In this paper, a bucket brigades disassembly line balancing optimization method considering uncertainty is proposed, in which a cloud model is used to represent the uncertain disassembly time. The proposed model handles multiple objectives including smoothness, disassembly cost and disassembly energy consumption to be minimized. To solve this complex problem, this study innovates a new heuristic method based on the social engineering optimizer as an enhanced local search metaheuristic. Finally, a ball collector is used to verify the effectiveness of the proposed method and extensive analysis is done to compare the performance of proposed model with other recent algorithms.
Harden the human firewall against the most current threats Social Engineering: The Science of Human Hacking reveals the craftier side of the hacker's repertoire-why hack into something when you could ...just ask for access? Undetectable by firewalls and antivirus software, social engineering relies on human fault to gain access to sensitive spaces; in this book, renowned expert Christopher Hadnagy explains the most commonly-used techniques that fool even the most robust security personnel, and shows you how these techniques have been used in the past. The way that we make decisions as humans affects everything from our emotions to our security. Hackers, since the beginning of time, have figured out ways to exploit that decision making process and get you to take an action not in your best interest. This new Second Edition has been updated with the most current methods used by sharing stories, examples, and scientific study behind how those decisions are exploited. Networks and systems can be hacked, but they can also be protected; when the "system" in question is a human being, there is no software to fall back on, no hardware upgrade, no code that can lock information down indefinitely. Human nature and emotion is the secret weapon of the malicious social engineering, and this book shows you how to recognize, predict, and prevent this type of manipulation by taking you inside the social engineer's bag of tricks. Examine the most common social engineering tricks used to gain access Discover which popular techniques generally don't work in the real world Examine how our understanding of the science behind emotions and decisions can be used by social engineers Learn how social engineering factors into some of the biggest recent headlines Learn how to use these skills as a professional social engineer and secure your company Adopt effective counter-measures to keep hackers at bay By working from the social engineer's playbook, you gain the advantage of foresight that can help you protect yourself and others from even their best efforts. Social Engineering gives you the inside information you need to mount an unshakeable defense.
Social engineering entails deception where one manipulates individuals into divulging confidential or any personal information that may be used for fraudulent purposes. In mobile money theft, the ...attackers plan a "lure" to tempt a victim directly, via mobile phones; mostly to gain money by proposing a phony undertaking. The victim is often asked to pay some money to facilitate a lucrative undertaking, which in reality is phony. Once the victim has paid the money, the attackers become inaccessible. Reverse social engineering entails deception of the predator by the pray in order to capture or discourage the predator. Through a case study, this paper investigates and presents an incident where a victim of mobile social engineering attempts to reverse the process in order to arraign the attackers.
Full text
Available for:
BFBNIB, NUK, PILJ, SAZU, UL, UM, UPUK