{"id":"https://openalex.org/W4382562327","doi":"https://doi.org/10.23919/mipro57284.2023.10159691","title":"Social Engineering Aspects of Email Phishing: an Overview and Taxonomy","display_name":"Social Engineering Aspects of Email Phishing: an Overview and Taxonomy","publication_year":2023,"publication_date":"2023-05-22","ids":{"openalex":"https://openalex.org/W4382562327","doi":"https://doi.org/10.23919/mipro57284.2023.10159691"},"language":"en","primary_location":{"id":"doi:10.23919/mipro57284.2023.10159691","is_oa":false,"landing_page_url":"https://doi.org/10.23919/mipro57284.2023.10159691","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 46th MIPRO ICT and Electronics Convention (MIPRO)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5021217894","display_name":"Igor Tomi\u010di\u0107","orcid":"https://orcid.org/0000-0002-8626-9507"},"institutions":[{"id":"https://openalex.org/I181343428","display_name":"University of Zagreb","ror":"https://ror.org/00mv6sv71","country_code":"HR","type":"education","lineage":["https://openalex.org/I181343428"]}],"countries":["HR"],"is_corresponding":true,"raw_author_name":"Igor Tomi\u010di\u0107","raw_affiliation_strings":["University of Zagreb Artificial Intelligence Laboratory; Center for Forensics, Biometrics and Privacy,Faculty of Organization and Informatics,Pavlinska 2,Vara\u017edin,Croatia,42000"],"affiliations":[{"raw_affiliation_string":"University of Zagreb Artificial Intelligence Laboratory; Center for Forensics, Biometrics and Privacy,Faculty of Organization and Informatics,Pavlinska 2,Vara\u017edin,Croatia,42000","institution_ids":["https://openalex.org/I181343428"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5021217894"],"corresponding_institution_ids":["https://openalex.org/I181343428"],"apc_list":null,"apc_paid":null,"fwci":1.3767,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.8461161,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1201","last_page":"1207"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10664","display_name":"Sentiment Analysis and Opinion Mining","score":0.98089998960495,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.7563515901565552},{"id":"https://openalex.org/keywords/taxonomy","display_name":"Taxonomy (biology)","score":0.6741864681243896},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6135314702987671},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.5034791827201843},{"id":"https://openalex.org/keywords/social-engineering","display_name":"Social engineering (security)","score":0.43329542875289917},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3548431992530823},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3080292344093323},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.2071222960948944},{"id":"https://openalex.org/keywords/ecology","display_name":"Ecology","score":0.09989094734191895},{"id":"https://openalex.org/keywords/biology","display_name":"Biology","score":0.05728766322135925}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.7563515901565552},{"id":"https://openalex.org/C58642233","wikidata":"https://www.wikidata.org/wiki/Q8269924","display_name":"Taxonomy (biology)","level":2,"score":0.6741864681243896},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6135314702987671},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.5034791827201843},{"id":"https://openalex.org/C70118762","wikidata":"https://www.wikidata.org/wiki/Q376934","display_name":"Social engineering (security)","level":2,"score":0.43329542875289917},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3548431992530823},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3080292344093323},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2071222960948944},{"id":"https://openalex.org/C18903297","wikidata":"https://www.wikidata.org/wiki/Q7150","display_name":"Ecology","level":1,"score":0.09989094734191895},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.05728766322135925}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/mipro57284.2023.10159691","is_oa":false,"landing_page_url":"https://doi.org/10.23919/mipro57284.2023.10159691","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 46th MIPRO ICT and Electronics Convention (MIPRO)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320335322","display_name":"European Regional Development Fund","ror":"https://ror.org/00k4n6c32"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W171999360","https://openalex.org/W1498672433","https://openalex.org/W1512366833","https://openalex.org/W2002321422","https://openalex.org/W2029591949","https://openalex.org/W2088505378","https://openalex.org/W2113449956","https://openalex.org/W2305322260","https://openalex.org/W2794598542","https://openalex.org/W2902244753","https://openalex.org/W2942101457","https://openalex.org/W2944786674","https://openalex.org/W3133194403","https://openalex.org/W3138009395","https://openalex.org/W4210947630","https://openalex.org/W4281400878","https://openalex.org/W6630586217","https://openalex.org/W6792146811"],"related_works":["https://openalex.org/W2944809083","https://openalex.org/W3159552247","https://openalex.org/W4229025036","https://openalex.org/W2737752763","https://openalex.org/W2572193563","https://openalex.org/W4391182755","https://openalex.org/W2765340726","https://openalex.org/W4283826021","https://openalex.org/W2595760708","https://openalex.org/W3080514658"],"abstract_inverted_index":{"Numerous":[0],"online":[1],"resources":[2],"and":[3,27,41,62,72,78,102,138,145,151,156],"reports":[4],"are":[5,97],"pointing":[6],"to":[7,88,123,134,153],"the":[8,24,49,64,90,103,107,115,128,136,158,163],"growing":[9],"effectiveness":[10],"of":[11,20,48,67,93,117,127,140,165,172],"email":[12,100,130],"phishing":[13,53,55,71,101,131],"techniques,":[14,132],"with":[15,142],"some":[16],"indicating":[17],"that":[18,28,95,109],"85%":[19],"IT":[21],"breaches":[22],"involve":[23],"human":[25,166],"element,":[26],"96%":[29],"or":[30],"social":[31,73],"attacks":[32,112],"arrive":[33],"via":[34],"email.":[35],"Phishing":[36],"is":[37,69,120],"a":[38,42,85,125],"common":[39],"occurrence,":[40],"significantly":[43],"successful":[44],"one.":[45],"While":[46],"most":[47],"available":[50],"research":[51,68],"on":[52,162],"involves":[54],"detection,":[56],"prevention,":[57],"filtering,":[58],"anti-phishing":[59],"tools,":[60],"techniques":[61,94,144],"countermeasures,":[63],"remaining":[65],"body":[66],"tackling":[70],"engineering":[74],"in":[75,99],"(too)":[76],"generic":[77],"broad":[79],"contexts.":[80],"This":[81],"paper":[82,119],"will":[83],"propose":[84,124],"focused":[86],"effort":[87],"identify":[89],"specific":[91],"groups":[92],"attackers":[96],"using":[98],"principles":[104,137],"running":[105],"\u201cbehind":[106],"scenes\u201d":[108],"make":[110],"these":[111,169],"successful.":[113],"Thus,":[114],"goal":[116],"this":[118],"threefold:":[121],"(1)":[122],"taxonomy":[126],"observed":[129,143],"(2)":[133],"associate":[135],"factors":[139],"influence":[141],"shed":[146],"light":[147],"behind":[148],"their":[149],"effectiveness,":[150],"(3)":[152],"raise":[154],"awareness":[155],"lay":[157],"groundwork":[159],"for":[160],"working":[161],"model":[164],"resilience":[167],"against":[168],"manipulative":[170],"forms":[171],"cyber":[173],"attacks.":[174]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
