{"id":"https://openalex.org/W2610092537","doi":"https://doi.org/10.1108/ics-04-2017-0022","title":"Social engineering defence mechanisms and counteracting training strategies","display_name":"Social engineering defence mechanisms and counteracting training strategies","publication_year":2017,"publication_date":"2017-04-27","ids":{"openalex":"https://openalex.org/W2610092537","doi":"https://doi.org/10.1108/ics-04-2017-0022","mag":"2610092537"},"language":"en","primary_location":{"id":"doi:10.1108/ics-04-2017-0022","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-04-2017-0022","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5040527974","display_name":"Peter Schaab","orcid":null},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Peter Schaab","raw_affiliation_strings":["Department of Software Engineering, Technische Universitat Munchen Fakultat fur Informatik, Garching, Bayern, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, Technische Universitat Munchen Fakultat fur Informatik, Garching, Bayern, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024651104","display_name":"Kristian Beckers","orcid":null},"institutions":[{"id":"https://openalex.org/I62916508","display_name":"Technical University of Munich","ror":"https://ror.org/02kkvpp62","country_code":"DE","type":"education","lineage":["https://openalex.org/I62916508"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Kristian Beckers","raw_affiliation_strings":["Department of Software Engineering, Technische Universitat Munchen Fakultat fur Informatik, Garching, Bayern, Germany"],"affiliations":[{"raw_affiliation_string":"Department of Software Engineering, Technische Universitat Munchen Fakultat fur Informatik, Garching, Bayern, Germany","institution_ids":["https://openalex.org/I62916508"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048076332","display_name":"Sebastian Pape","orcid":"https://orcid.org/0000-0002-0893-7856"},"institutions":[{"id":"https://openalex.org/I114090438","display_name":"Goethe University Frankfurt","ror":"https://ror.org/04cvxnb49","country_code":"DE","type":"education","lineage":["https://openalex.org/I114090438"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Sebastian Pape","raw_affiliation_strings":["Business Informatics and Information Economics, Goethe-Universitat Frankfurt am Main Fachbereich 02 Wirtschaftswissenschaften, Frankfurt am Main, Hessen, Germany"],"affiliations":[{"raw_affiliation_string":"Business Informatics and Information Economics, Goethe-Universitat Frankfurt am Main Fachbereich 02 Wirtschaftswissenschaften, Frankfurt am Main, Hessen, Germany","institution_ids":["https://openalex.org/I114090438"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5040527974"],"corresponding_institution_ids":["https://openalex.org/I62916508"],"apc_list":null,"apc_paid":null,"fwci":7.2544,"has_fulltext":false,"cited_by_count":39,"citation_normalized_percentile":{"value":0.97131702,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"25","issue":"2","first_page":"206","last_page":"222"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9631999731063843,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.9501000046730042,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/social-engineering","display_name":"Social engineering (security)","score":0.7282938957214355},{"id":"https://openalex.org/keywords/countermeasure","display_name":"Countermeasure","score":0.5944761037826538},{"id":"https://openalex.org/keywords/security-engineering","display_name":"Security engineering","score":0.5436157584190369},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.49976158142089844},{"id":"https://openalex.org/keywords/engineering-ethics","display_name":"Engineering ethics","score":0.4869891107082367},{"id":"https://openalex.org/keywords/value","display_name":"Value (mathematics)","score":0.48464685678482056},{"id":"https://openalex.org/keywords/critical-security-studies","display_name":"Critical security studies","score":0.44162997603416443},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42224031686782837},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4085804522037506},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.38233038783073425},{"id":"https://openalex.org/keywords/management-science","display_name":"Management science","score":0.3758346736431122},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.3559821546077728},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.34539568424224854},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.3048468828201294},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.2681003510951996},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.2573194205760956},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.23224228620529175},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.1378975808620453},{"id":"https://openalex.org/keywords/network-security-policy","display_name":"Network security policy","score":0.09876662492752075}],"concepts":[{"id":"https://openalex.org/C70118762","wikidata":"https://www.wikidata.org/wiki/Q376934","display_name":"Social engineering (security)","level":2,"score":0.7282938957214355},{"id":"https://openalex.org/C21593369","wikidata":"https://www.wikidata.org/wiki/Q1032176","display_name":"Countermeasure","level":2,"score":0.5944761037826538},{"id":"https://openalex.org/C13159133","wikidata":"https://www.wikidata.org/wiki/Q365674","display_name":"Security engineering","level":5,"score":0.5436157584190369},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.49976158142089844},{"id":"https://openalex.org/C55587333","wikidata":"https://www.wikidata.org/wiki/Q1133029","display_name":"Engineering ethics","level":1,"score":0.4869891107082367},{"id":"https://openalex.org/C2776291640","wikidata":"https://www.wikidata.org/wiki/Q2912517","display_name":"Value (mathematics)","level":2,"score":0.48464685678482056},{"id":"https://openalex.org/C505623098","wikidata":"https://www.wikidata.org/wiki/Q3002932","display_name":"Critical security studies","level":5,"score":0.44162997603416443},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42224031686782837},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4085804522037506},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.38233038783073425},{"id":"https://openalex.org/C539667460","wikidata":"https://www.wikidata.org/wiki/Q2414942","display_name":"Management science","level":1,"score":0.3758346736431122},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.3559821546077728},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.34539568424224854},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.3048468828201294},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.2681003510951996},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.2573194205760956},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.23224228620529175},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.1378975808620453},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.09876662492752075},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C146978453","wikidata":"https://www.wikidata.org/wiki/Q3798668","display_name":"Aerospace engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-04-2017-0022","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-04-2017-0022","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":48,"referenced_works":["https://openalex.org/W37565756","https://openalex.org/W68504517","https://openalex.org/W413202983","https://openalex.org/W1480504010","https://openalex.org/W1511039991","https://openalex.org/W1512366833","https://openalex.org/W1535340835","https://openalex.org/W1662240627","https://openalex.org/W1955603680","https://openalex.org/W1958658927","https://openalex.org/W1969900674","https://openalex.org/W1974065322","https://openalex.org/W1978962906","https://openalex.org/W1982486301","https://openalex.org/W1987426626","https://openalex.org/W1993246901","https://openalex.org/W1994117383","https://openalex.org/W1995962054","https://openalex.org/W2007227619","https://openalex.org/W2008073538","https://openalex.org/W2009661351","https://openalex.org/W2037202491","https://openalex.org/W2040017767","https://openalex.org/W2046037438","https://openalex.org/W2046411892","https://openalex.org/W2055147709","https://openalex.org/W2081046118","https://openalex.org/W2085126443","https://openalex.org/W2101218147","https://openalex.org/W2114969359","https://openalex.org/W2115281393","https://openalex.org/W2145046219","https://openalex.org/W2145902176","https://openalex.org/W2162366439","https://openalex.org/W2167366201","https://openalex.org/W2264719303","https://openalex.org/W2396938716","https://openalex.org/W2417503639","https://openalex.org/W2465472852","https://openalex.org/W2489328367","https://openalex.org/W2560532904","https://openalex.org/W2576079384","https://openalex.org/W2579499026","https://openalex.org/W2795780965","https://openalex.org/W2953323811","https://openalex.org/W6652359479","https://openalex.org/W6659960172","https://openalex.org/W6966926043"],"related_works":["https://openalex.org/W2993550008","https://openalex.org/W3184585962","https://openalex.org/W4384824158","https://openalex.org/W3125551965","https://openalex.org/W4283821025","https://openalex.org/W2782187577","https://openalex.org/W2364525344","https://openalex.org/W4282920965","https://openalex.org/W4280505199","https://openalex.org/W2992687552"],"abstract_inverted_index":{"Purpose":[0],"This":[1],"paper":[2],"aims":[3],"to":[4,80,88,114,147,174,200,224,246],"outline":[5,81,115,212],"strategies":[6,60,87,183,211],"for":[7,26,155,236],"defence":[8,59,228],"against":[9,204,229],"social":[10,106,129,141,152,157,169,205,220,230],"engineering":[11,41,142,153,206,231],"that":[12,187],"are":[13,61],"missing":[14],"in":[15,31,54,70,140,168,193],"the":[16,27,35,38,90,112,133,160,190],"current":[17],"best":[18],"practices":[19],"of":[20,37,105,151,165],"information":[21,71],"technology":[22],"(IT)":[23],"security.":[24,56],"Reason":[25],"incomplete":[28],"training":[29,182,210],"techniques":[30],"IT":[32,55,64,101,194,239],"security":[33,65,102,195,198,240],"is":[34,42,50],"interdisciplinary":[36,214],"field.":[39],"Social":[40],"focusing":[43],"on":[44,244],"exploiting":[45],"human":[46,75],"behaviour,":[47],"and":[48,84,103,117,131,144,196,219,238],"this":[49,82],"not":[51],"sufficiently":[52],"addressed":[53],"Instead,":[57],"most":[58],"devised":[62],"by":[63,232],"experts":[66],"with":[67,242],"a":[68,96,225],"background":[69],"systems":[72],"rather":[73],"than":[74],"behaviour.":[76],"The":[77,93,136,178,209],"authors":[78,94,137,161,179],"aim":[79],"gap":[83],"point":[85],"out":[86],"fill":[89],"gaps.":[91],"Design/methodology/approach":[92],"conducted":[95],"literature":[97],"review":[98],"from":[99,128,184],"viewpoint":[100,104],"psychology.":[107],"In":[108],"addition,":[109],"they":[110],"mapped":[111,145],"results":[113,186],"gaps":[116,121,139],"analysed":[118,138],"how":[119,213,245],"these":[120,185],"could":[122],"be":[123,172],"filled":[124],"using":[125],"established":[126],"methods":[127],"psychology":[130,170,221],"discussed":[132],"findings.":[134],"Findings":[135],"defences":[143],"them":[146],"underlying":[148],"psychological":[149],"principles":[150],"attacks,":[154],"example,":[156],"proof.":[158],"Furthermore,":[159],"discuss":[162],"which":[163,176],"type":[164],"countermeasure":[166],"proposed":[167],"should":[171],"applied":[173],"counteract":[175],"principle.":[177],"derived":[180],"two":[181],"go":[188],"beyond":[189],"state-of-the-art":[191],"trainings":[192],"allow":[197],"professionals":[199,241],"raise":[201],"companies\u2019":[202],"bars":[203],"attacks.":[207],"Originality/value":[208],"research":[215],"between":[216],"computer":[217],"science":[218],"can":[222],"lead":[223],"more":[226],"complete":[227],"providing":[233],"reference":[234],"points":[235],"researchers":[237],"advice":[243],"improve":[247],"training.":[248]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":5},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":10},{"year":2019,"cited_by_count":4},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
