Matches in DBpedia 2014 for { <http://dbpedia.org/resource/Social_Hacking> ?p ?o. }
Showing items 1 to 15 of
15
with 100 items per page.
- Social_Hacking abstract "Social hacking describes the act of attempting to manipulate outcomes of social behaviour through orchestrated actions. The general function of social hacking is to gain access to restricted information or to a physical space without proper permission. Most often, social hacking attacks are achieved by impersonating an individual or group who is directly or indirectly known to the victims or by representing an individual or group in a position of authority. This is done through pre-meditated research and planning to gain victims’ confidence. Social hackers take great measures to present overtones of familiarity and trustworthiness to elicit confidential or personal information.Social hacking is most commonly associated as a component of “social engineering”.Although the practice involves exercising control over human behaviour rather than computers, the term "social hacking" is also used in reference to online behaviour and increasingly, social media activity. The technique can be used in multiple ways that affect public perception and conversely, increase public awareness of social hacking activity. However, while awareness helps reduce the volume of hacks being carried out, technology has allowed for attack tools to become more sophisticated.".
- Social_Hacking wikiPageExternalLink article.
- Social_Hacking wikiPageExternalLink social-entrepreneurs-hack-capitalism.
- Social_Hacking wikiPageID "41725205".
- Social_Hacking wikiPageRevisionID "604285313".
- Social_Hacking date "April 2014".
- Social_Hacking reason "categorising".
- Social_Hacking subject Category:Social_engineering_(computer_security).
- Social_Hacking comment "Social hacking describes the act of attempting to manipulate outcomes of social behaviour through orchestrated actions. The general function of social hacking is to gain access to restricted information or to a physical space without proper permission. Most often, social hacking attacks are achieved by impersonating an individual or group who is directly or indirectly known to the victims or by representing an individual or group in a position of authority.".
- Social_Hacking label "Social Hacking".
- Social_Hacking sameAs m.010867_7.
- Social_Hacking sameAs Q17081851.
- Social_Hacking sameAs Q17081851.
- Social_Hacking wasDerivedFrom Social_Hacking?oldid=604285313.
- Social_Hacking isPrimaryTopicOf Social_Hacking.