{"id":"https://openalex.org/W3047462340","doi":"https://doi.org/10.1108/ics-07-2019-0078","title":"How effective are social engineering interventions? A meta-analysis","display_name":"How effective are social engineering interventions? A meta-analysis","publication_year":2020,"publication_date":"2020-08-04","ids":{"openalex":"https://openalex.org/W3047462340","doi":"https://doi.org/10.1108/ics-07-2019-0078","mag":"3047462340"},"language":"en","primary_location":{"id":"doi:10.1108/ics-07-2019-0078","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-07-2019-0078","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035625057","display_name":"Jan-Willem Bull\u00e9e","orcid":"https://orcid.org/0000-0003-0067-6863"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Jan-Willem Bullee","raw_affiliation_strings":["Department of Industrial Engineering and Business Information Systems (IEBIS), Faculty of Behavioural, Management and Social Sciences (BMS), University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Department of Industrial Engineering and Business Information Systems (IEBIS), Faculty of Behavioural, Management and Social Sciences (BMS), University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5086905649","display_name":"Marianne Junger","orcid":"https://orcid.org/0000-0002-9515-9860"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Marianne Junger","raw_affiliation_strings":["Department of Industrial Engineering and Business Information Systems (IEBIS), Faculty of Behavioural, Management and Social Sciences (BMS), University of Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Department of Industrial Engineering and Business Information Systems (IEBIS), Faculty of Behavioural, Management and Social Sciences (BMS), University of Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5035625057"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":null,"apc_paid":null,"fwci":6.1388,"has_fulltext":false,"cited_by_count":35,"citation_normalized_percentile":{"value":0.96606539,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":99},"biblio":{"volume":"28","issue":"5","first_page":"801","last_page":"830"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9940999746322632,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9940000176429749,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/psychological-intervention","display_name":"Psychological intervention","score":0.8696202039718628},{"id":"https://openalex.org/keywords/scopus","display_name":"Scopus","score":0.6075322031974792},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6070218086242676},{"id":"https://openalex.org/keywords/intervention","display_name":"Intervention (counseling)","score":0.5838736295700073},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5649902820587158},{"id":"https://openalex.org/keywords/meta-analysis","display_name":"Meta-analysis","score":0.5455164909362793},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.47055983543395996},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.4454341232776642},{"id":"https://openalex.org/keywords/sample-size-determination","display_name":"Sample size determination","score":0.4110734760761261},{"id":"https://openalex.org/keywords/applied-psychology","display_name":"Applied psychology","score":0.36019623279571533},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3549152612686157},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.24576783180236816},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.21355891227722168},{"id":"https://openalex.org/keywords/medline","display_name":"MEDLINE","score":0.1651993691921234},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1091156005859375},{"id":"https://openalex.org/keywords/statistics","display_name":"Statistics","score":0.10665947198867798},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10474291443824768},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.08221572637557983},{"id":"https://openalex.org/keywords/geography","display_name":"Geography","score":0.08183246850967407}],"concepts":[{"id":"https://openalex.org/C27415008","wikidata":"https://www.wikidata.org/wiki/Q7256382","display_name":"Psychological intervention","level":2,"score":0.8696202039718628},{"id":"https://openalex.org/C83867959","wikidata":"https://www.wikidata.org/wiki/Q371467","display_name":"Scopus","level":3,"score":0.6075322031974792},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6070218086242676},{"id":"https://openalex.org/C2780665704","wikidata":"https://www.wikidata.org/wiki/Q959298","display_name":"Intervention (counseling)","level":2,"score":0.5838736295700073},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5649902820587158},{"id":"https://openalex.org/C95190672","wikidata":"https://www.wikidata.org/wiki/Q815382","display_name":"Meta-analysis","level":2,"score":0.5455164909362793},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.47055983543395996},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.4454341232776642},{"id":"https://openalex.org/C129848803","wikidata":"https://www.wikidata.org/wiki/Q2564360","display_name":"Sample size determination","level":2,"score":0.4110734760761261},{"id":"https://openalex.org/C75630572","wikidata":"https://www.wikidata.org/wiki/Q538904","display_name":"Applied psychology","level":1,"score":0.36019623279571533},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3549152612686157},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.24576783180236816},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.21355891227722168},{"id":"https://openalex.org/C2779473830","wikidata":"https://www.wikidata.org/wiki/Q1540899","display_name":"MEDLINE","level":2,"score":0.1651993691921234},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1091156005859375},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.10665947198867798},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10474291443824768},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.08221572637557983},{"id":"https://openalex.org/C205649164","wikidata":"https://www.wikidata.org/wiki/Q1071","display_name":"Geography","level":0,"score":0.08183246850967407},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C118552586","wikidata":"https://www.wikidata.org/wiki/Q7867","display_name":"Psychiatry","level":1,"score":0.0},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C126322002","wikidata":"https://www.wikidata.org/wiki/Q11180","display_name":"Internal medicine","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1108/ics-07-2019-0078","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-07-2019-0078","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/08bb19dc-fc8e-4979-973a-191e087a640f","is_oa":false,"landing_page_url":"https://research.utwente.nl/en/publications/08bb19dc-fc8e-4979-973a-191e087a640f","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Bullee, J-W & Junger, M 2020, 'How effective are social engineering interventions? A meta-analysis', Information and Computer Security, vol. 28, no. 5, pp. 801-830. https://doi.org/10.1108/ICS-07-2019-0078","raw_type":"info:eu-repo/semantics/publishedVersion"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.699999988079071,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":84,"referenced_works":["https://openalex.org/W55403762","https://openalex.org/W133685568","https://openalex.org/W809551758","https://openalex.org/W946133946","https://openalex.org/W1546397018","https://openalex.org/W1552468722","https://openalex.org/W1676381828","https://openalex.org/W1973697585","https://openalex.org/W1976387959","https://openalex.org/W1983208818","https://openalex.org/W1983484926","https://openalex.org/W1985747251","https://openalex.org/W1986518351","https://openalex.org/W1989801194","https://openalex.org/W1990889672","https://openalex.org/W1994289001","https://openalex.org/W1995554356","https://openalex.org/W2000645163","https://openalex.org/W2001195938","https://openalex.org/W2018398218","https://openalex.org/W2019176237","https://openalex.org/W2022334732","https://openalex.org/W2026843999","https://openalex.org/W2029827226","https://openalex.org/W2046234515","https://openalex.org/W2052176706","https://openalex.org/W2061194197","https://openalex.org/W2066214936","https://openalex.org/W2066305821","https://openalex.org/W2066978993","https://openalex.org/W2071869991","https://openalex.org/W2074614677","https://openalex.org/W2085876742","https://openalex.org/W2090907153","https://openalex.org/W2095773001","https://openalex.org/W2099889974","https://openalex.org/W2102421525","https://openalex.org/W2107031757","https://openalex.org/W2108258189","https://openalex.org/W2108414202","https://openalex.org/W2109887283","https://openalex.org/W2112432954","https://openalex.org/W2117546413","https://openalex.org/W2118525092","https://openalex.org/W2121476060","https://openalex.org/W2127209084","https://openalex.org/W2134907585","https://openalex.org/W2136136174","https://openalex.org/W2140976335","https://openalex.org/W2143678814","https://openalex.org/W2150326939","https://openalex.org/W2154956243","https://openalex.org/W2160044375","https://openalex.org/W2164777277","https://openalex.org/W2168760655","https://openalex.org/W2172004424","https://openalex.org/W2183548010","https://openalex.org/W2206385118","https://openalex.org/W2253456770","https://openalex.org/W2264719303","https://openalex.org/W2278316643","https://openalex.org/W2292391400","https://openalex.org/W2329226491","https://openalex.org/W2465697596","https://openalex.org/W2497179706","https://openalex.org/W2521132308","https://openalex.org/W2527800909","https://openalex.org/W2544337092","https://openalex.org/W2561909538","https://openalex.org/W2568632554","https://openalex.org/W2571747832","https://openalex.org/W2626529610","https://openalex.org/W2741872938","https://openalex.org/W2745971308","https://openalex.org/W2762332720","https://openalex.org/W2765489703","https://openalex.org/W2793841683","https://openalex.org/W2800686740","https://openalex.org/W2809771144","https://openalex.org/W2913304133","https://openalex.org/W2930608316","https://openalex.org/W2996415795","https://openalex.org/W4232348671","https://openalex.org/W4298346378"],"related_works":["https://openalex.org/W2593155302","https://openalex.org/W2041415459","https://openalex.org/W3126095231","https://openalex.org/W2072812638","https://openalex.org/W2352855287","https://openalex.org/W2378906650","https://openalex.org/W2384288445","https://openalex.org/W2382526412","https://openalex.org/W4200071106","https://openalex.org/W2347474189"],"abstract_inverted_index":{"Purpose":[0],"Social":[1],"engineering":[2,39,258],"is":[3,248],"a":[4,108,199,208],"prominent":[5],"aspect":[6],"of":[7,19,22,49,102,111,133,138,144,215,225,256],"online":[8],"crime.":[9],"Various":[10],"interventions":[11,30,50,173,185,197,259],"have":[12,178],"been":[13],"developed":[14],"to":[15,27,33,37,75,79,99,230,238],"reduce":[16,76],"the":[17,35,44,77,89,100,131,134,136,139,142,145,169,249,254],"success":[18],"this":[20,216,247],"type":[21],"attacks.":[23,40],"This":[24,227],"paper":[25],"aims":[26],"investigate":[28,46],"if":[29],"can":[31],"help":[32],"decrease":[34],"vulnerability":[36,78],"social":[38,80,257],"If":[41],"they":[42],"help,":[43],"authors":[45,58,93,127,161,244],"which":[47,61,97],"forms":[48],"and":[51,66,121,141,155,235],"specific":[52],"elements":[53,224],"constitute":[54],"success.":[55,241],"Design/methodology/approach":[56],"The":[57,82,92,116,126,160,213,243],"selected":[59],"studies":[60,83,96],"had":[62],"an":[63],"experimental":[64],"design":[65],"rigorously":[67],"tested":[68],"at":[69,181],"least":[70],"one":[71],"intervention":[72,119,140],"that":[73,191,246,252],"aimed":[74],"engineering.":[81],"were":[84,124,150],"primarily":[85],"identified":[86,94],"from":[87],"querying":[88],"Scopus":[90],"database.":[91],"19":[95],"lead":[98],"identification":[101],"37":[103],"effect":[104,122,166,180,221],"sizes,":[105],"based":[106],"on":[107,130,194],"total":[109],"sample":[110],"N":[112],"=":[113],"23,146":[114],"subjects.":[115],"available":[117],"training,":[118],"materials":[120],"sizes":[123],"analysed.":[125],"collected":[128],"information":[129],"context":[132],"intervention,":[135],"characteristics":[137,143],"research":[146],"methodology.":[147],"All":[148],"analyses":[149],"performed":[151],"using":[152],"random-effects":[153],"models,":[154],"heterogeneity":[156],"was":[157],"quantified.":[158],"Findings":[159],"find":[162],"substantial":[163],"differences":[164,219],"in":[165,220],"size":[167],"for":[168,222],"different":[170,223],"interventions.":[171,226],"Some":[172],"are":[174,186,192,202],"highly":[175],"effective;":[176],"others":[177],"no":[179],"all.":[182],"Highly":[183],"intensive":[184],"more":[187,203],"effective":[188,204],"than":[189,205],"those":[190,206],"low":[193],"intensity.":[195],"Furthermore,":[196],"with":[198,207],"narrow":[200],"focus":[201],"broad":[209],"focus.":[210],"Practical":[211],"implications":[212],"results":[214],"study":[217,251],"show":[218],"allows":[228],"practitioners":[229],"review":[231],"their":[232,240],"awareness":[233],"campaigns":[234],"tailor":[236],"them":[237],"increase":[239],"Originality/value":[242],"believe":[245],"first":[250],"compares":[253],"impact":[255],"systematically.":[260]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":12},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
