Jump to content

Talk:Social hacking

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

Wiki Education Foundation-supported course assignment

[edit]

This article was the subject of a Wiki Education Foundation-supported course assignment, between 14 January 2019 and 6 May 2019. Further details are available on the course page. Student editor(s): Kyle.long098.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 03:39, 18 January 2022 (UTC)[reply]

/hack 2607:9E80:1109:BF90:8097:77FC:2449:4E9 (talk) 23:39, 13 September 2024 (UTC)[reply]

Wiki Education Foundation-supported course assignment

[edit]

This article was the subject of a Wiki Education Foundation-supported course assignment, between 14 January 2019 and 6 May 2019. Further details are available on the course page. Student editor(s): Faithjaylee.

Above undated message substituted from Template:Dashboard.wikiedu.org assignment by PrimeBOT (talk) 03:39, 18 January 2022 (UTC)[reply]

General Structure

[edit]

Hey! Your intro is great! Nice and brief and informative. Just as a suggestion: I might restructure the sentence order a little (i.e. have the third sentence as the second, and second as third) --MaryB-INF2165 (talk) 19:21, 27 February 2014 (UTC)[reply]

Also, I think bolding the first instance your topic in your article is standard practice. --MaryB-INF2165 (talk) 19:23, 27 February 2014 (UTC)[reply]

Hi! this topic seems really interesting! Just for those who are not familiar with the topic, it might be great if we can introduce how this notion of 'social hacking' is different from other forms of social violations or impersonation --Junohk (talk) 19:40, 27 February 2014 (UTC)[reply]

Looks good, but I'm not sure about the title over the lede: Do we really need a second header saying "Social hacking"? I'm really not sure how to reword/replace it, or even whether we should or not. Otherwise, I'd say it's good for going live! Supernerd11 :D Firemind ^_^ Pokedex 19:32, 2 April 2014 (UTC)[reply]

Recommendations

[edit]

Hi AlienBreakfast, I think this article is a great start. It could use some common examples of social hacking that have been in the media, such as Revenge Porn. Also, your article would benefit from some more internal links, to define some of the terms used, such as the term hacking, itself. This would provide readers with more context as to all that hacking can entail, as well as how social hacking differs from just hacking.

Perhaps you could discuss laws that try to address the topic of social hacking, such as privacy laws or theft laws in Canada, the US, or perhaps some countries that have unusual laws regarding these issues, if anything like that exists.

Some sources about social hacking in the news:


Revenge-Porn King Hunter Moore Arrested by the FBI, from CBC.ca on Jan. 24, 2014

Also, a website for social hacking EXISTS (crazy...): Socialhacks.net

http://www.usatoday.com/story/tech/columnist/2014/01/02/snapchat-breach-new-tech-economy-john-shinal-usa-today/4250487/

--Shaina390 (talk) 19:43, 27 February 2014 (UTC)[reply]


There is also a great book about social engineering --"Social Engineering: The Art of Human Hacking"[1] It covers a great deal of personal hacking in both online and social settings while bringing awareness of how social engineering/hacking is closely weaved into our daily lives. It explains also how easy it is to persuade someone online to pass on her or his personal information while exploring some of the mechanisms that were used. --Junohk (talk) 20:13, 27 February 2014 (UTC)[reply]

The second source I found quite interesting was Tim Jordan's "Hacking : digital media and technological determinism"[2]--Junohk (talk) 20:19, 27 February 2014 (UTC)[reply]

Or Ian Mann's "Hacking the human : social engineering techniques and security countermeasures" [3]

Hope this was helpful!

-cheers --Junohk (talk) 20:19, 27 February 2014 (UTC)[reply]

References

  1. ^ Wilson], Christopher Hadnagy ; [foreword by Paul (2011). Social engineering : the art of human hacking. Indianapolis, IN: Wiley. ISBN 0470639539.{{cite book}}: CS1 maint: multiple names: authors list (link)
  2. ^ . ISBN 0745639720. {{cite book}}: Missing or empty |title= (help)
  3. ^ . ISBN 0566087731. {{cite book}}: Missing or empty |title= (help)

Possible/Suggested References

[edit]

I thought this was a pretty cool article on social engineering/social hacking: http://www.wired.com/gadgetlab/2014/01/my-epic-hack-revisited/

This one has interesting info on user privacy education: http://dl.acm.org/citation.cfm?id=1029577

Here's an article that talks about the small actions that it takes to successfully hack (ie gaining access slowly to an individual's info): http://www.cwu.edu/~tiddr/Courses/Archive/ACCT565/WebQuests/04SocialEngineering/04SocialEngineeringWebQuest.pdf

Hope they are helpful! --MaryB-INF2165 (talk) 19:33, 27 February 2014 (UTC)[reply]

Content

[edit]

A reference to a real-life instance of social hacking (either historically or contemporarily, or both!) might be very beneficial to your overall article. I linked references to one or two above that might be helpful. I found the content of this article to be very informative. I'm very excited to see where this ends up! --MaryB-INF2165 (talk) 19:39, 27 February 2014 (UTC)[reply]

[edit]

Hello fellow Wikipedians,

I have just modified one external link on Social hacking. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:

When you have finished reviewing my changes, please set the checked parameter below to true or failed to let others know (documentation at {{Sourcecheck}}).

This message was posted before February 2018. After February 2018, "External links modified" talk page sections are no longer generated or monitored by InternetArchiveBot. No special action is required regarding these talk page notices, other than regular verification using the archive tool instructions below. Editors have permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the RfC before doing mass systematic removals. This message is updated dynamically through the template {{source check}} (last update: 5 June 2024).

  • If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
  • If you found an error with any archives or the URLs themselves, you can fix them with this tool.

Cheers.—cyberbot IITalk to my owner:Online 11:37, 5 July 2016 (UTC)[reply]

Thomas Ronghang

[edit]

hacking in thomas Ronghang Makbum xx (talk) 05:44, 30 August 2021 (UTC)[reply]