{"id":"https://openalex.org/W4409102261","doi":"https://doi.org/10.1109/tnse.2025.3556927","title":"Mitigating Social Engineering Attacks Through Cost-Effective Security Awareness Training Policy","display_name":"Mitigating Social Engineering Attacks Through Cost-Effective Security Awareness Training Policy","publication_year":2025,"publication_date":"2025-04-03","ids":{"openalex":"https://openalex.org/W4409102261","doi":"https://doi.org/10.1109/tnse.2025.3556927"},"language":"en","primary_location":{"id":"doi:10.1109/tnse.2025.3556927","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3556927","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":null,"any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5052758633","display_name":"Yang Qin","orcid":"https://orcid.org/0000-0002-1981-1423"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yang Qin","raw_affiliation_strings":["School of Big Data and Software Engineering, Chongqing University, Chongqing, China","School of Big Data and Software Engineering, Chongqing University, Chongqing, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Big Data and Software Engineering, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]},{"raw_affiliation_string":"School of Big Data and Software Engineering, Chongqing University, Chongqing, P.R. China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100620333","display_name":"Xiaofan Yang","orcid":"https://orcid.org/0000-0002-3273-1233"},"institutions":[{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaofan Yang","raw_affiliation_strings":["School of Big Data and Software Engineering, Chongqing University, Chongqing, China","School of Big Data and Software Engineering, Chongqing University, Chongqing, P.R. China"],"affiliations":[{"raw_affiliation_string":"School of Big Data and Software Engineering, Chongqing University, Chongqing, China","institution_ids":["https://openalex.org/I158842170"]},{"raw_affiliation_string":"School of Big Data and Software Engineering, Chongqing University, Chongqing, P.R. China","institution_ids":["https://openalex.org/I158842170"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012015574","display_name":"Lu\u2010Xing Yang","orcid":"https://orcid.org/0000-0002-9229-5787"},"institutions":[{"id":"https://openalex.org/I149704539","display_name":"Deakin University","ror":"https://ror.org/02czsnj07","country_code":"AU","type":"education","lineage":["https://openalex.org/I149704539"]}],"countries":["AU"],"is_corresponding":false,"raw_author_name":"Lu-Xing Yang","raw_affiliation_strings":["School of Information Technology, Deakin University, Melbourne, VIC, Australia","School of Information Technology, Deakin University, Melbourne, Australia"],"affiliations":[{"raw_affiliation_string":"School of Information Technology, Deakin University, Melbourne, VIC, Australia","institution_ids":["https://openalex.org/I149704539"]},{"raw_affiliation_string":"School of Information Technology, Deakin University, Melbourne, Australia","institution_ids":["https://openalex.org/I149704539"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5036581757","display_name":"Kaifan Huang","orcid":"https://orcid.org/0000-0001-8998-8083"},"institutions":[{"id":"https://openalex.org/I142108993","display_name":"Southwest University","ror":"https://ror.org/01kj4z117","country_code":"CN","type":"education","lineage":["https://openalex.org/I142108993"]},{"id":"https://openalex.org/I158842170","display_name":"Chongqing University","ror":"https://ror.org/023rhb549","country_code":"CN","type":"education","lineage":["https://openalex.org/I158842170"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Kaifan Huang","raw_affiliation_strings":["College of Artificial Intelligence, Southwest University, Chongqing, China","School of Big Data and Software Engineering, Chongqing University, Chongqing, P.R. China"],"affiliations":[{"raw_affiliation_string":"College of Artificial Intelligence, Southwest University, Chongqing, China","institution_ids":["https://openalex.org/I142108993"]},{"raw_affiliation_string":"School of Big Data and Software Engineering, Chongqing University, Chongqing, P.R. China","institution_ids":["https://openalex.org/I158842170"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5052758633"],"corresponding_institution_ids":["https://openalex.org/I158842170"],"apc_list":null,"apc_paid":null,"fwci":3.1528,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.89716605,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"12","issue":"4","first_page":"3145","last_page":"3158"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/training","display_name":"Training (meteorology)","score":0.6173990964889526},{"id":"https://openalex.org/keywords/social-engineering","display_name":"Social engineering (security)","score":0.5337859988212585},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5156723260879517},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.48930951952934265},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4353146553039551},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.34311428666114807}],"concepts":[{"id":"https://openalex.org/C2777211547","wikidata":"https://www.wikidata.org/wiki/Q17141490","display_name":"Training (meteorology)","level":2,"score":0.6173990964889526},{"id":"https://openalex.org/C70118762","wikidata":"https://www.wikidata.org/wiki/Q376934","display_name":"Social engineering (security)","level":2,"score":0.5337859988212585},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5156723260879517},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48930951952934265},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4353146553039551},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.34311428666114807},{"id":"https://openalex.org/C153294291","wikidata":"https://www.wikidata.org/wiki/Q25261","display_name":"Meteorology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/tnse.2025.3556927","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tnse.2025.3556927","pdf_url":null,"source":{"id":"https://openalex.org/S2484352698","display_name":"IEEE Transactions on Network Science and Engineering","issn_l":"2327-4697","issn":["2327-4697","2334-329X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Network Science and Engineering","raw_type":"journal-article"},{"id":"pmh:oai:figshare.com:article/28738769","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal contribution"}],"best_oa_location":{"id":"pmh:oai:figshare.com:article/28738769","is_oa":true,"landing_page_url":null,"pdf_url":null,"source":{"id":"https://openalex.org/S4377196282","display_name":"Figshare","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210132348","host_organization_name":"Figshare (United Kingdom)","host_organization_lineage":["https://openalex.org/I4210132348"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Journal contribution"},"sustainable_development_goals":[{"score":0.41999998688697815,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":50,"referenced_works":["https://openalex.org/W1985984683","https://openalex.org/W1987381312","https://openalex.org/W2000281623","https://openalex.org/W2027514326","https://openalex.org/W2029699977","https://openalex.org/W2063917507","https://openalex.org/W2083689991","https://openalex.org/W2114747139","https://openalex.org/W2167404615","https://openalex.org/W2222283188","https://openalex.org/W2294347342","https://openalex.org/W2509774545","https://openalex.org/W2568632554","https://openalex.org/W2766373534","https://openalex.org/W2769367994","https://openalex.org/W2781518247","https://openalex.org/W2796098074","https://openalex.org/W2887941812","https://openalex.org/W2898933733","https://openalex.org/W2978276984","https://openalex.org/W3083024126","https://openalex.org/W3084641931","https://openalex.org/W3132865718","https://openalex.org/W3162740817","https://openalex.org/W3196923443","https://openalex.org/W3204452949","https://openalex.org/W3215321209","https://openalex.org/W4250134109","https://openalex.org/W4251323996","https://openalex.org/W4302759880","https://openalex.org/W4311142515","https://openalex.org/W4378594123","https://openalex.org/W4380032285","https://openalex.org/W4385163756","https://openalex.org/W4385357949","https://openalex.org/W4386090462","https://openalex.org/W4386260484","https://openalex.org/W4388543997","https://openalex.org/W4390512239","https://openalex.org/W4392309481","https://openalex.org/W4392970647","https://openalex.org/W4394769998","https://openalex.org/W4396750574","https://openalex.org/W4399266670","https://openalex.org/W4399477206","https://openalex.org/W4403360640","https://openalex.org/W6676950571","https://openalex.org/W6766395966","https://openalex.org/W6766460034","https://openalex.org/W7056150758"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W230091440","https://openalex.org/W2233261550","https://openalex.org/W2810751659","https://openalex.org/W258997015","https://openalex.org/W2997094352","https://openalex.org/W3216976533","https://openalex.org/W3152571439","https://openalex.org/W2902953947","https://openalex.org/W2176431381"],"abstract_inverted_index":{"Human":[0],"beings":[1],"are":[2,155],"often":[3],"considered":[4],"the":[5,20,53,63,71,79,88,104,120,124,131,137,140,152,161,174,186,190],"weakest":[6],"link":[7],"in":[8],"cybersecurity.":[9],"Social":[10],"engineering":[11,194],"attacks":[12],"exploit":[13],"this":[14,51,102],"vulnerability,":[15],"posing":[16],"significant":[17],"threats":[18],"to":[19,29,40,56,70,109,180],"digital":[21],"assets":[22],"of":[23,61,73,129,139,151,192],"organizations.":[24],"A":[25],"highly":[26],"effective":[27],"strategy":[28],"protect":[30],"users":[31],"from":[32],"falling":[33],"into":[34],"traps":[35],"set":[36],"by":[37,118],"attackers":[38],"is":[39,99,107,134,143,163,178],"implement":[41],"comprehensive":[42],"security":[43,64,80,95],"awareness":[44,65,81,96],"training":[45,66,82],"focused":[46],"on":[47],"social":[48,193],"engineering.":[49],"In":[50],"context,":[52],"organization":[54],"needs":[55],"find":[57],"a":[58,76,166],"cost-effective":[59],"policy":[60,77],"allocating":[62],"cost.":[67],"We":[68],"refer":[69],"problem":[72,106,162,168],"finding":[74],"such":[75],"as":[78,165],"(SAT)":[83],"problem.":[84,90],"This":[85,183],"paper":[86],"addresses":[87],"SAT":[89,105,115,125,132,153,171,176],"First,":[91],"an":[92,110,127],"opinion":[93],"dynamics-based":[94],"evolution":[97],"model":[98,113,133],"introduced.":[100],"On":[101],"basis,":[103],"reduced":[108],"optimal":[111,197],"control":[112,198],"(the":[114,169],"model).":[116],"Second,":[117],"deriving":[119],"optimality":[121],"system":[122],"for":[123,158],"problem,":[126],"algorithm":[128,142,154,177],"solving":[130],"proposed.":[135],"Next,":[136],"feasibility":[138],"proposed":[141,179],"validated":[144],"through":[145,196],"numerical":[146],"experiments.":[147],"Additionally,":[148],"further":[149],"exploration":[150],"conducted.":[156],"Finally,":[157],"greater":[159],"versatility,":[160],"formulated":[164],"discrete-time":[167],"discrete":[170,175],"problem),":[172],"and":[173],"solve":[181],"it.":[182],"work":[184],"takes":[185],"first":[187],"step":[188],"toward":[189],"prevention":[191],"attack":[195],"approach.":[199]},"counts_by_year":[{"year":2026,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
