Skip to main content

aDvanced sOcial enGineering And vulNerability Assesment Framework

Deliverables

Project Website and Social Networking accounts

This deliverable reports on the creation of the project website and of the social networking accounts created within T8.2.

Production of dissemination material

This deliverable reports on the material prepared within T8.2 to disseminate the results of the DOGANA project

Legal Requirements for Privacy by Design

this deliverable reports the outcome of Task 5.2 ‘Legal and ethical requirements for the development of DOGANA: privacy by design’

Tool chain architecture and specification

An internal draft of the tool chain specification is expected to be available from Task 3.2 at M11 in order to be reviewed by the legal team. It will be released formally from Task 3.2 to other WP tasks at M14.

Final Dissemination Report

This deliverable reports on the dissemination activities carried out during the whole project.

Legal and Ethical Recommendations

This deliverable reports the outcome of Task 5.5 ‘Legal and ethical recommendations for policy-makers’

Revised report on existing tools, their evaluation and the gap to be filled by DOGANA development (v2)

This deliverable reports on the outcomes of Task 3.1 and provides an up-to-date description of which are the existing tools from which the DOGANA development will benefit and the corresponding Gap analysis. The outcomes of Task 2.1 and 2.2 will represent a basis for this document.

Preliminary Dissemination Report

This deliverable reports on the dissemination activities carried out in the first 18 months of the project.

Second Workshop Report

This deliverable reports on the achievements and outcomes of the second project workshop.

Report on existing tools, their evaluation and the gap to be filled by DOGANA development (v1)

This deliverable reports on the outcomes of Task 3.1 and provides an up-to-date description of which are the existing tools from which the DOGANA development will benefit and the corresponding Gap analysis. The outcomes of Task 2.1 and 2.2 will represent a basis for this document.

Collaboration with other projects Report

This deliverable reports on the activities of T8.4.

Legal and Ethical Conditions for Cautious Organisations

This deliverable reports the outcome of Task 5.3 ‘Legal and ethical requirements for the development of DOGANA: organisational context setting’

First Workshop Report (V2)

This deliverable reports on the achievements and outcomes of the first project workshop. This is the final release.

DOGANA metrics for evaluation of the existing tools

This deliverable reports the outcomes of Task 2.2 and provides a unified methodology for metrics that will be used all along the project developments, especially for WP3 and T 3.1. A shared and agreed methodology is of great importance to streamline the evaluation process, given the heterogeneous landscape of existing tools with different TRLs.

DOGANA Interaction Design Guidelines

This deliverable reports on the outcomes of Task 4.3 and consists of a guide for developers to help implementing usable and end-user oriented solutions. The goal is to ait the developers from taking design decisions, which affect the final user experience.

Dissemination plan and calendar of activities

This deliverable provides the dissemination plan defined within T8.1.

Legal and Ethical Background Report

This deliverable reports on the outcome of Task 5.1.

First Workshop Report (V1)

This deliverable reports on the achievements and outcomes of the first project workshop. There will be 2 releases at M24 (first release) and at M28 (final version)

DOGANA-Model Version 1

This deliverable reports on the outcomes of Task 4.2 and consists of the first version of the underlying psychological model of DOGANA. The model yields as foundation of the DOGANA awareness methods and the DOGANA tools.

Publications

Factors influencing crime rates: an econometric analysis approach

Author(s): John M. A. Bothos, Stelios C. A. Thomopoulos
Published in: Signal Processing, Sensor/Information Fusion, and Target Recognition XXV, 2016, Page(s) 98421A
DOI: 10.1117/12.2223395

Ethical Implications and Consequences of Phishing Studies in Organizations - An Empirical Perspective

Author(s): Marc Busch, Yung Shin Van der Sype, Michaela Reisinger, Peter Fröhlich, Christina Hochleitner, Manfred Tscheligi
Published in: Ethical Encounters in HCI @ CHI 2016, Issue 7/05/2016, 2016

Social Engineering 2.0 - A Foundational Work: Invited Paper

Author(s): Davide Ariu, Enrico Frumento, Giorgio Fumera
Published in: Proceedings of the Computing Frontiers Conference on ZZZ - CF'17, 2017, Page(s) 319-325
DOI: 10.1145/3075564.3076260

The Dark Side of Open Data

Author(s): M. Mauri, A. Mulas, D. Ariu
Published in: Proceedings of the 2nd International Workshop on Knowledge Discovery on the WEB - Cagliari, Italy, September 8 - 10, 2016, 2016

DeltaPhish: Detecting Phishing Webpages in Compromised Websites

Author(s): Corona, Igino; Biggio, Battista; Contini, Matteo; Piras, Luca; Corda, Roberto; Mereu, Mauro; Mureddu, Guido; Ariu, Davide; Roli, Fabio
Published in: Computer Security – ESORICS 2017. ESORICS 2017. Lecture Notes in Computer Science, Issue vol 10492, 2017
DOI: 10.1007/978-3-319-66402-6_22

Victim Communication Stack (VCS) - A flexible model to select the Human Attack Vector

Author(s): Enrico Frumento, Federica Freschi, Davide Andreoletti, Angelo Consoli
Published in: Proceedings of the 12th International Conference on Availability, Reliability and Security - ARES '17, 2017, Page(s) 1-6
DOI: 10.1145/3098954.3103156

DOGANA: Research on Human element advanced vulnerability assessment

Author(s): B. Pacheco, N. Escravana
Published in: Web Proceedings of the APWG eCrime Cyber-Security Symposium, October 24-26, 2017, 2017

La profilazione nel digital marketing

Author(s): A. Lacavalla (author), M. Ronchi (advisor), E. Frumento (co-advisor)
Published in: 2017

On the Road to Privacy- and Data Protection-Friendly Security Technologies in the Workplace – A Case-Study of the MUSES Risk and Trust Analysis Engine

Author(s): Yung Shin Van Der Sype, Jonathan Guislain, Jean-Marc Seigneur, and Xavier Titi
Published in: Data Protection and Privacy: (In)visibilities and Infrastructures, 2017

Cybersecurity and the evolutions of healthcare: challenges and threats behind its evolution

Author(s): Enrico Frumento
Published in: m_Health between reality and futures, 2019

A data protection perspective on training in the m-health sector

Author(s): Erik Kamenjasevic, Danaja Fabcic Povse
Published in: m_Health between reality and futures, 2019