{"id":"https://openalex.org/W2183548010","doi":"https://doi.org/10.3233/978-1-61499-617-0-107","title":"Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention","display_name":"Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2183548010","doi":"https://doi.org/10.3233/978-1-61499-617-0-107","mag":"2183548010"},"language":"en","primary_location":{"id":"doi:10.3233/978-1-61499-617-0-107","is_oa":true,"landing_page_url":"https://doi.org/10.3233/978-1-61499-617-0-107","pdf_url":null,"source":{"id":"https://openalex.org/S4306463470","display_name":"IOS Press eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"ebook platform"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptology and Information Security Series","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.3233/978-1-61499-617-0-107","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5116337840","display_name":"Bull eacute e Jan-Willem","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Bull&eacute;e Jan-Willem","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042976194","display_name":"Lorena Montoya","orcid":"https://orcid.org/0000-0001-6403-9834"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Montoya Lorena","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5116337842","display_name":"Junger Marianne","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Junger Marianne","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5016345474","display_name":"Pieter Hartel","orcid":"https://orcid.org/0000-0002-0411-0421"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hartel Pieter H.","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5116337840"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":10.1676,"has_fulltext":false,"cited_by_count":25,"citation_normalized_percentile":{"value":0.98360656,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"107","last_page":"114"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11519","display_name":"Digital Mental Health Interventions","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/3202","display_name":"Applied Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11519","display_name":"Digital Mental Health Interventions","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/3202","display_name":"Applied Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10068","display_name":"Technology Adoption and User Behaviour","score":0.9204000234603882,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intervention","display_name":"Intervention (counseling)","score":0.6315432190895081},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4154853820800781},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.38378679752349854},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.36714863777160645},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.33799412846565247}],"concepts":[{"id":"https://openalex.org/C2780665704","wikidata":"https://www.wikidata.org/wiki/Q959298","display_name":"Intervention (counseling)","level":2,"score":0.6315432190895081},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4154853820800781},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.38378679752349854},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.36714863777160645},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.33799412846565247},{"id":"https://openalex.org/C118552586","wikidata":"https://www.wikidata.org/wiki/Q7867","display_name":"Psychiatry","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3233/978-1-61499-617-0-107","is_oa":true,"landing_page_url":"https://doi.org/10.3233/978-1-61499-617-0-107","pdf_url":null,"source":{"id":"https://openalex.org/S4306463470","display_name":"IOS Press eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"ebook platform"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptology and Information Security Series","raw_type":"book-chapter"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/7195aa28-5db4-4bb8-bf84-4a027155a1cf","is_oa":false,"landing_page_url":"https://research.utwente.nl/en/publications/7195aa28-5db4-4bb8-bf84-4a027155a1cf","pdf_url":null,"source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Bullee, J-W, Montoya, L, Junger, M & Hartel, P H 2016, Telephone-based social engineering attacks: An experiment testing the success and time decay of an intervention. in A Mathur & A Roychoudhury (eds), Proceedings of the inaugural Singapore Cyber Security R &D Conference (SG-CRC 2016). Cryptology and Information Security Series, vol. 14, IOS, Amsterdam, pp. 107-114, Singapore Cyber Security R &D Conference, SG-CRC 2016, Singapore, Singapore, 14/01/16. https://doi.org/10.3233/978-1-61499-617-0-107","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"mag:2183548010","is_oa":false,"landing_page_url":"https://dblp.uni-trier.de/db/conf/sgcrc/sgcrc2016.html#BulleeMJH16","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":null}],"best_oa_location":{"id":"doi:10.3233/978-1-61499-617-0-107","is_oa":true,"landing_page_url":"https://doi.org/10.3233/978-1-61499-617-0-107","pdf_url":null,"source":{"id":"https://openalex.org/S4306463470","display_name":"IOS Press eBooks","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310318577","host_organization_name":"IOS Press","host_organization_lineage":["https://openalex.org/P4310318577"],"host_organization_lineage_names":["IOS Press"],"type":"ebook platform"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptology and Information Security Series","raw_type":"book-chapter"},"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.6000000238418579,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1662240627","https://openalex.org/W1967600771","https://openalex.org/W1976387959","https://openalex.org/W1993971483","https://openalex.org/W2020382762","https://openalex.org/W2030007850","https://openalex.org/W2051616490","https://openalex.org/W2066214936","https://openalex.org/W2078599937","https://openalex.org/W2099536489","https://openalex.org/W2108258189","https://openalex.org/W2144086727","https://openalex.org/W2165305466","https://openalex.org/W2185804591","https://openalex.org/W2883277067"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"The":[0],"objective":[1],"of":[2,10,63,66,76],"this":[3,44],"study":[4],"is":[5],"to":[6,14,70,83,86,92,105,111],"evaluate":[7],"the":[8,21,71,74,77,93,112,127],"effectiveness":[9],"an":[11,58,87,106],"information":[12],"campaign":[13],"counter":[15],"a":[16,55],"social":[17],"engineering":[18],"attack":[19,94,113],"via":[20],"telephone.":[22],"Four":[23],"different":[24,82],"offenders":[25],"phoned":[26],"48":[27],"employees":[28,67],"and":[29,51],"made":[30],"them":[31],"believe":[32],"that":[33,43,119],"their":[34],"PC":[35],"was":[36,80,99],"distributing":[37],"spam":[38],"emails.":[39],"Targets":[40],"were":[41],"told":[42],"situation":[45],"could":[46],"be":[47],"solved":[48],"by":[49],"downloading":[50],"executing":[52],"software":[53],"from":[54],"website":[56],"(i.e.":[57],"untrusted":[59],"one).":[60],"A":[61],"total":[62],"46.15":[64],"%":[65],"not":[68],"exposed":[69,85,104],"intervention":[72,88,107],"followed":[73],"instructions":[75],"offender.":[78],"This":[79,116],"significantly":[81],"those":[84,103],"1":[89],"week":[90],"prior":[91,110],"(9.1":[95],"%);":[96],"however":[97],"there":[98],"no":[100],"effect":[101],"for":[102],"2":[108],"weeks":[109],"(54.6":[114],"%).":[115],"research":[117],"suggests":[118],"scam":[120],"awareness-raising":[121],"campaigns":[122],"reduce":[123],"vulnerability":[124],"only":[125],"in":[126],"short":[128],"term.":[129]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":5},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
