{"id":"https://openalex.org/W4400411270","doi":"https://doi.org/10.1109/educon60312.2024.10578700","title":"Reinforcing Cybersecurity Awareness through Simulated Phishing Attacks: Findings from an HEI Case Study","display_name":"Reinforcing Cybersecurity Awareness through Simulated Phishing Attacks: Findings from an HEI Case Study","publication_year":2024,"publication_date":"2024-05-08","ids":{"openalex":"https://openalex.org/W4400411270","doi":"https://doi.org/10.1109/educon60312.2024.10578700"},"language":"en","primary_location":{"id":"doi:10.1109/educon60312.2024.10578700","is_oa":false,"landing_page_url":"https://doi.org/10.1109/educon60312.2024.10578700","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Global Engineering Education Conference (EDUCON)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037799637","display_name":"Aurelia Ciupe","orcid":"https://orcid.org/0000-0003-0962-9828"},"institutions":[{"id":"https://openalex.org/I158333966","display_name":"Technical University of Cluj-Napoca","ror":"https://ror.org/03r8nwp71","country_code":"RO","type":"education","lineage":["https://openalex.org/I158333966"]}],"countries":["RO"],"is_corresponding":true,"raw_author_name":"Aurelia Ciupe","raw_affiliation_strings":["Technical University of Cluj-Napoca,Multimedia Systems and Applications Laboratory,Cluj-Napoca,Romania"],"raw_orcid":"https://orcid.org/0000-0003-0962-9828","affiliations":[{"raw_affiliation_string":"Technical University of Cluj-Napoca,Multimedia Systems and Applications Laboratory,Cluj-Napoca,Romania","institution_ids":["https://openalex.org/I158333966"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011275629","display_name":"Bogdan Orza","orcid":"https://orcid.org/0000-0002-0544-903X"},"institutions":[{"id":"https://openalex.org/I158333966","display_name":"Technical University of Cluj-Napoca","ror":"https://ror.org/03r8nwp71","country_code":"RO","type":"education","lineage":["https://openalex.org/I158333966"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Bogdan Orza","raw_affiliation_strings":["Technical University of Cluj-Napoca,Multimedia Systems and Applications Laboratory,Cluj-Napoca,Romania"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Technical University of Cluj-Napoca,Multimedia Systems and Applications Laboratory,Cluj-Napoca,Romania","institution_ids":["https://openalex.org/I158333966"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5037799637"],"corresponding_institution_ids":["https://openalex.org/I158333966"],"apc_list":null,"apc_paid":null,"fwci":6.714,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.96720025,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9589999914169312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9589999914169312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9488999843597412,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.929099977016449,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9280099868774414},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.747314453125},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5898030996322632},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5254085063934326},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.45544955134391785},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.30400216579437256},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.21563544869422913}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9280099868774414},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.747314453125},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5898030996322632},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5254085063934326},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.45544955134391785},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.30400216579437256},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.21563544869422913}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/educon60312.2024.10578700","is_oa":false,"landing_page_url":"https://doi.org/10.1109/educon60312.2024.10578700","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 IEEE Global Engineering Education Conference (EDUCON)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W2019176237","https://openalex.org/W2081840305","https://openalex.org/W2995810494","https://openalex.org/W3133843004","https://openalex.org/W3135397516","https://openalex.org/W3196923443"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2338899373","https://openalex.org/W4252285266","https://openalex.org/W199254545","https://openalex.org/W2476504758","https://openalex.org/W4248464163","https://openalex.org/W2997836625","https://openalex.org/W111175386","https://openalex.org/W4361023959","https://openalex.org/W1937580673"],"abstract_inverted_index":{"Cybersecurity":[0],"represents":[1],"a":[2,30,34,50,179,183,205],"critical":[3,191],"challenge":[4],"in":[5,29,37,41,149,158,220],"the":[6,14,42,57,89,114,142,153,187,194,215,228,243,247],"protection":[7],"of":[8,53,66,91,141,155,176,186,197,207,217,230,246],"educational":[9,61,102],"institutions'":[10],"digital":[11,68,248],"assets":[12],"and":[13,40,77,110,133,138,160,168,203,241],"sensitive":[15],"data":[16,127,165],"they":[17],"hold.":[18],"Phishing":[19],"attempts":[20],"are":[21,224],"exploiting":[22],"user":[23,136],"vulnerabilities":[24],"at":[25],"an":[26,83],"alarming":[27],"rate,":[28],"context":[31],"defined":[32],"by":[33],"substantial":[35],"increase":[36],"internet":[38],"usage":[39],"personal":[43],"information":[44],"shared":[45],"online.":[46],"Preliminary":[47],"findings":[48],"suggest":[49],"varying":[51,174],"degree":[52],"security":[54],"literacy,":[55],"indicating":[56],"need":[58],"for":[59,214],"targeted":[60],"interventions.":[62],"The":[63,122],"Technical":[64],"University":[65],"Cluj-Napoca's":[67],"ecosystem":[69],"encompasses":[70],"over":[71],"20,000":[72],"users,":[73],"including":[74],"students,":[75],"faculty,":[76],"administrative":[78],"staff.":[79],"In":[80],"November":[81],"2023,":[82],"attack":[84,93],"simulation":[85,123,180],"was":[86,166],"conducted":[87],"through":[88],"configuration":[90],"various":[92],"scenarios":[94],"using":[95],"social":[96],"engineering":[97],"techniques":[98],"via":[99],"Office":[100],"365's":[101],"services.":[103],"Including":[104],"elements":[105],"such":[106,201],"as":[107],"deceptive":[108],"emails":[109],"fraudulent":[111],"login":[112],"pages,":[113],"initiative":[115],"aimed":[116],"to":[117,199,237],"observe":[118],"phishing":[119,143],"behaviours":[120],"closely.":[121],"campaign":[124],"captured":[125],"quantitative":[126],"on":[128,135],"click":[129],"rates,":[130,132],"report":[131],"feedback":[134],"confidence":[137],"perceived":[139],"difficulty":[140],"attempts.":[144],"Furthermore,":[145],"it":[146],"engaged":[147],"participants":[148],"reflective":[150],"practices,":[151],"enabling":[152],"identification":[154],"potential":[156],"improvements":[157],"individual":[159],"institutional":[161],"cybersecurity":[162,218],"protocols.":[163],"Training-related":[164],"collected":[167],"synthesized":[169],"from":[170],"users":[171],"who":[172],"exhibited":[173],"rates":[175],"compromise.":[177],"Such":[178],"can":[181],"reveal":[182],"broad":[184],"overview":[185],"ecosystem's":[188],"vulnerabilities,":[189],"offering":[190],"insights":[192],"into":[193],"users'":[195],"level":[196],"readiness":[198],"counter":[200],"threats":[202],"fostering":[204],"culture":[206],"continuous":[208],"monitoring":[209],"against":[210],"cyberattacks.":[211],"Strategic":[212],"implications":[213],"structuring":[216],"education":[219,222],"higher":[221],"institutions":[223],"envisioned,":[225],"along":[226],"with":[227],"development":[229],"customized,":[231],"adaptive":[232],"learning":[233],"modules":[234],"that":[235],"envision":[236],"identified":[238],"skill":[239],"gaps":[240],"strengthen":[242],"overall":[244],"resilience":[245],"infrastructure":[249],"(Abstract)":[250]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":1}],"updated_date":"2025-12-21T01:58:51.020947","created_date":"2025-10-10T00:00:00"}
