{"id":"https://openalex.org/W2743702796","doi":"https://doi.org/10.1007/978-3-319-58424-9_35","title":"Defense Methods Against Social Engineering Attacks","display_name":"Defense Methods Against Social Engineering Attacks","publication_year":2017,"publication_date":"2017-08-12","ids":{"openalex":"https://openalex.org/W2743702796","doi":"https://doi.org/10.1007/978-3-319-58424-9_35","mag":"2743702796"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-58424-9_35","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-58424-9_35","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Network Security Essentials","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.springer.com/gb/book/9783319584232","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5079764867","display_name":"Jibran Saleem","orcid":null},"institutions":[{"id":"https://openalex.org/I11983389","display_name":"Manchester Metropolitan University","ror":"https://ror.org/02hstj355","country_code":"GB","type":"education","lineage":["https://openalex.org/I11983389"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Jibran Saleem","raw_affiliation_strings":["Manchester Metropolitan University, Manchester, UK"],"affiliations":[{"raw_affiliation_string":"Manchester Metropolitan University, Manchester, UK","institution_ids":["https://openalex.org/I11983389"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5089637331","display_name":"Mohammad Hammoudeh","orcid":"https://orcid.org/0000-0003-1058-0996"},"institutions":[{"id":"https://openalex.org/I11983389","display_name":"Manchester Metropolitan University","ror":"https://ror.org/02hstj355","country_code":"GB","type":"education","lineage":["https://openalex.org/I11983389"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Mohammad Hammoudeh","raw_affiliation_strings":["Manchester Metropolitan University, Manchester, UK"],"affiliations":[{"raw_affiliation_string":"Manchester Metropolitan University, Manchester, UK","institution_ids":["https://openalex.org/I11983389"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5079764867"],"corresponding_institution_ids":["https://openalex.org/I11983389"],"apc_list":null,"apc_paid":null,"fwci":3.1815,"has_fulltext":false,"cited_by_count":35,"citation_normalized_percentile":{"value":0.93692699,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"603","last_page":"618"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/social-engineering","display_name":"Social engineering (security)","score":0.8368062973022461},{"id":"https://openalex.org/keywords/variety","display_name":"Variety (cybernetics)","score":0.6457318663597107},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6350526809692383},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.6235132217407227},{"id":"https://openalex.org/keywords/security-engineering","display_name":"Security engineering","score":0.4703674018383026},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.44700363278388977},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4306561052799225},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.4044256806373596},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.2455848753452301},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.08245429396629333},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.08110937476158142},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.08037459850311279}],"concepts":[{"id":"https://openalex.org/C70118762","wikidata":"https://www.wikidata.org/wiki/Q376934","display_name":"Social engineering (security)","level":2,"score":0.8368062973022461},{"id":"https://openalex.org/C136197465","wikidata":"https://www.wikidata.org/wiki/Q1729295","display_name":"Variety (cybernetics)","level":2,"score":0.6457318663597107},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6350526809692383},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.6235132217407227},{"id":"https://openalex.org/C13159133","wikidata":"https://www.wikidata.org/wiki/Q365674","display_name":"Security engineering","level":5,"score":0.4703674018383026},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.44700363278388977},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4306561052799225},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.4044256806373596},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.2455848753452301},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.08245429396629333},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.08110937476158142},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.08037459850311279},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/978-3-319-58424-9_35","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-58424-9_35","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computer and Network Security Essentials","raw_type":"book-chapter"},{"id":"pmh:oai:e-space.mmu.ac.uk:619983","is_oa":true,"landing_page_url":"https://e-space.mmu.ac.uk/view/authors/2d8e23d4511218f373fdb901df1fd553.html>","pdf_url":"https://www.springer.com/gb/book/9783319584232","source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"}],"best_oa_location":{"id":"pmh:oai:e-space.mmu.ac.uk:619983","is_oa":true,"landing_page_url":"https://e-space.mmu.ac.uk/view/authors/2d8e23d4511218f373fdb901df1fd553.html>","pdf_url":"https://www.springer.com/gb/book/9783319584232","source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"PeerReviewed"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2743702796.pdf","grobid_xml":"https://content.openalex.org/works/W2743702796.grobid-xml"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W126663066","https://openalex.org/W568389225","https://openalex.org/W605765508","https://openalex.org/W1442570287","https://openalex.org/W1528140671","https://openalex.org/W2051498836","https://openalex.org/W2058464881","https://openalex.org/W2077514183","https://openalex.org/W2157430593","https://openalex.org/W2193428859","https://openalex.org/W2408829461","https://openalex.org/W6605228834"],"related_works":["https://openalex.org/W3184585962","https://openalex.org/W4384824158","https://openalex.org/W4282920965","https://openalex.org/W3125551965","https://openalex.org/W4283821025","https://openalex.org/W4323021841","https://openalex.org/W2782187577","https://openalex.org/W4280505199","https://openalex.org/W2992687552","https://openalex.org/W2356074847"],"abstract_inverted_index":{"In":[0],"this":[1,48],"chapter,":[2],"multiple":[3],"Social":[4,44,105],"Engineering":[5,45,106],"defense":[6],"methods":[7],"are":[8],"comprehensively":[9],"reviewed.":[10],"Focus":[11],"has":[12],"been":[13,57,84],"placed":[14],"on":[15,65],"examining":[16],"data,":[17],"which":[18,61,93],"supports":[19],"the":[20,28,66],"hypothesis":[21],"that":[22],"security":[23,67,75],"awareness":[24],"is":[25,77],"one":[26,31],"of":[27,69,80,89,92],"key":[29],"strengths":[30],"can":[32,94],"develop,":[33],"to":[34,101],"assist":[35],"themselves":[36],"and":[37,41,50,59,73,99,103],"others,":[38],"in":[39,47],"avoiding":[40],"countering":[42],"increased":[43],"attacks":[46,107],"day":[49],"age.":[51],"Various":[52],"case":[53],"studies":[54],"have":[55,83],"also":[56],"analyzed":[58],"evaluated,":[60],"demonstrates":[62],"positive":[63],"impact":[64],"outlook":[68],"employees,":[70],"once":[71],"continuous":[72],"sufficient":[74],"training":[76],"delivered.":[78],"Evidences":[79],"effective":[81],"counter-techniques":[82],"gathered":[85],"using":[86],"a":[87],"variety":[88],"sources,":[90],"all":[91],"be":[95],"employed":[96],"by":[97],"businesses":[98],"individuals":[100],"deter":[102],"prevent":[104],"from":[108],"taking":[109],"place.":[110]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":4}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
