نتایج جستجو برای: social threat

تعداد نتایج: 655959  

2014
Seth Hardy Masashi Crete-Nishihata Katharine Kleemola Adam Senft Byron Sonne Greg Wiseman Phillipa Gill Ronald J. Deibert

Targeted attacks on civil society and non-governmental organizations have gone underreported despite the fact that these organizations have been shown to be frequent targets of these attacks. In this paper, we shed light on targeted malware attacks faced by these organizations by studying malicious e-mails received by 10 civil society organizations (the majority of which are from groups related...

Journal: :Neuroscience and biobehavioral reviews 2004
Melissa J Green Mary L Phillips

Rapid and efficient judgments about the significance of social threat are important for species survival and may recruit specialized neurocognitive systems, consistent with biological models of threat processing. We review cognitive, psychophysiological, neuropsychological, and neuroimaging evidence in support of specialized neural networks subserving the processing of facial displays of threat...

Journal: :Behavioral Ecology and Sociobiology 2021

2002
Paul B. Thompson

German social theorist Ulrich Beck has suggested that the political economy of post-industrial society has shifted away from the competition among relatively well-defined social groups for control of benefit streams resulting from technological and organizational innovations that characterized the roughly 200-year period of industrialization. In its place, we find constantly changing aggregates...

2009
Aaron Smith Maria Papadaki Steven Furnell

Social engineering is a method of attack involving the exploitation of human weakness, gullibility and ignorance. Although related techniques have existed for some time, current awareness of social engineering and its many guises is relatively low and efforts are therefore required to improve the protection of the user community. This paper begins by examining the problems posed by social engin...

2010
Kenny Olof Robert Jansson Rossouw von Solms

As most employees are information-workers nowadays, they are very vulnerable to various malicious attacks. However, some threat sources have realized that it is far easier to obtain wanted information directly from authorized users than using software or other means to obtain such information. This is generally referred to as Social Engineering. Therefore, organizations are at risk, because mos...

2008
Sonia Kang Belle Derks

This article reviews social neuroscience research on the experience of stigma from the target’s perspective. More specifi cally, we discuss several research programs that employ electroencephalography, event-related potentials, or functional magnetic resonance imaging methods to examine neural correlates of stereotype and social identity threat. We present neuroimaging studies that show brain a...

2009
Astrid C. Buba Natascha de Hoog

We investigated the dependence of threat perception and reaction on social distance estimation. Social identity threat was imposed within a 2x2 between subjects design, with N=163 students reading a criticising comment about their ingroup assigned to originate from one of two possible outgroups. The participants completed parts of the scale Overlap of self, ingroup and outgroup (OSIO, Schubert ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید