{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:46:21Z","timestamp":1742975181533,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030574031"},{"type":"electronic","value":"9783030574048"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-57404-8_8","type":"book-chapter","created":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T23:20:00Z","timestamp":1597965600000},"page":"97-108","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Does Ubuntu Influence Social Engineering Susceptibility?"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1777-9682","authenticated-orcid":false,"given":"Ntsewa B.","family":"Mokobane","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6176-3007","authenticated-orcid":false,"given":"Reinhardt A.","family":"Botha","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,21]]},"reference":[{"issue":"3","key":"8_CR1","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1016\/j.techsoc.2010.07.001","volume":"32","author":"S Abraham","year":"2010","unstructured":"Abraham, S., Chengalur-Smith, I.: An overview of social engineering malware: trends, tactics, and implications. Technol. Soc. 32(3), 183\u2013196 (2010). https:\/\/doi.org\/10.1016\/j.techsoc.2010.07.001","journal-title":"Technol. Soc."},{"key":"8_CR2","doi-asserted-by":"publisher","unstructured":"Ajzen, I.: Organizational behaviour and human decision processes, pp. 179\u2013211 (1991). https:\/\/doi.org\/10.1016\/0749-5978(91)90020-T","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"8_CR3","volume-title":"Attitudes, Personality and Behavior","author":"I Ajzen","year":"2005","unstructured":"Ajzen, I.: Attitudes, Personality and Behavior, 2nd edn. McGraw Hill House, Maidenhead (2005)","edition":"2"},{"issue":"3","key":"8_CR4","doi-asserted-by":"publisher","first-page":"73","DOI":"10.3390\/fi11030073","volume":"11","author":"H Aldawood","year":"2019","unstructured":"Aldawood, H., Skinner, G.: Reviewing cyber security social engineering training and awareness programs: pitfalls and on-going issues. Future Internet 11(3), 73 (2019). https:\/\/doi.org\/10.3390\/fi11030073","journal-title":"Future Internet"},{"key":"8_CR5","doi-asserted-by":"publisher","unstructured":"Wolf, W.B.: Decision processes as analysed by Chester I. Barnard. J. Manag. Hist. (Arch.) 1(4), 1\u2013110 (1995). https:\/\/doi.org\/10.1108\/13552529510102298","DOI":"10.1108\/13552529510102298"},{"issue":"23","key":"8_CR6","doi-asserted-by":"publisher","first-page":"31","DOI":"10.19101\/ijacr.2016.623006","volume":"6","author":"NY Conteh","year":"2016","unstructured":"Conteh, N.Y., Schmick, P.J.: Cybersecurity: risks, vulnerabilities and countermeasures to prevent social engineering attacks. Int. J. Adv. Comput. Res. 6(23), 31 (2016). https:\/\/doi.org\/10.19101\/ijacr.2016.623006","journal-title":"Int. J. Adv. Comput. Res."},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"1130","DOI":"10.1108\/ITP-12-2017-0422","volume":"32","author":"C Campbell","year":"2019","unstructured":"Campbell, C.: Solutions for counteracting human deception in social engineering attacks. Inf. Technol. People 32, 1130\u20131152 (2019)","journal-title":"Inf. Technol. People"},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"102056","DOI":"10.1016\/j.ijinfomgt.2019.102056","volume":"51","author":"C Donalds","year":"2020","unstructured":"Donalds, C., Osei-Bryson, K.: Cybersecurity compliance behavior: exploring the influences of individual decision style and other antecedents. Int. J. Inf. Manag 51, 102056 (2020)","journal-title":"Int. J. Inf. Manag"},{"key":"8_CR9","volume-title":"Predicting and Changing Behavior","author":"M Fishbein","year":"2010","unstructured":"Fishbein, M., Ajzen, I.: Predicting and Changing Behavior. Taylor and Francis Group, New York (2010)"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.cose.2016.01.004","volume":"59","author":"WR Flores","year":"2016","unstructured":"Flores, W.R., Ekstedt, M.: Shaping the intention to resist social engineering through transformational leadership, information security culture and awareness. Comput. Secur. 59, 26\u201344 (2016). https:\/\/doi.org\/10.1016\/j.cose.2016.01.004","journal-title":"Comput. Secur."},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.cose.2017.11.015","volume":"73","author":"M Gratian","year":"2018","unstructured":"Gratian, M., Bandi, S., Cukier, M., Dykstra, J., Ginther, A.: Correlating human traits and cyber security behaviour intention. Comput. Secur. 73, 345\u2013358 (2018). https:\/\/doi.org\/10.1016\/j.cose.2017.11.015","journal-title":"Comput. Secur."},{"key":"8_CR12","volume-title":"Social Engineering: The Art of Human Hacking","author":"C Hadnagy","year":"2011","unstructured":"Hadnagy, C.: Social Engineering: The Art of Human Hacking. Wiley, Indianapolis (2011)"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Halevi, T., Lewis, J., Memon, N.: A pilot study of cyber security and privacy related behaviour and personality traits. In: International World Wide Web Conference Committee, pp. 13\u201317 (2013)","DOI":"10.2139\/ssrn.2383427"},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.cose.2017.10.008","volume":"73","author":"JM Hatfield","year":"2018","unstructured":"Hatfield, J.M.: Social engineering in cybersecurity. the evolution of a concept. Comput. Secur. 73, 102\u2013113 (2018)","journal-title":"Comput. Secur."},{"key":"8_CR15","doi-asserted-by":"publisher","unstructured":"Himonga, C., Taylor, M., Pope, A.: Reflections on judicial views of Ubuntu (2013). https:\/\/doi.org\/10.4314\/pelj.v16i5.8","DOI":"10.4314\/pelj.v16i5.8"},{"key":"8_CR16","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.im.2013.10.001","volume":"51","author":"P Ifinedo","year":"2014","unstructured":"Ifinedo, P.: Information systems security policy compliance: an empirical study of the effects of socialization, influence, and cognition. Inf. Manage. 51, 69\u201379 (2014). https:\/\/doi.org\/10.1016\/j.im.2013.10.001","journal-title":"Inf. Manage."},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.chb.2016.09.012","volume":"66","author":"M Junger","year":"2017","unstructured":"Junger, M., Montoya, L., Overink, F.J.: Priming and warning are not effective to prevent social engineering attacks. Comput. Hum. Behav. 66, 75\u201387 (2017)","journal-title":"Comput. Hum. Behav."},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1016\/j.jnca.2018.03.015","volume":"112","author":"R Kaur","year":"2018","unstructured":"Kaur, R., Singh, S., Kumar, H.: Rise of spam and compromised accounts in online social networks. a-state-of-the-art review of different combating approaches. J. Netw. Comput. Appl. 112, 53\u201388 (2018)","journal-title":"J. Netw. Comput. Appl."},{"key":"8_CR19","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.cose.2016.05.006","volume":"61","author":"WD Kearney","year":"2016","unstructured":"Kearney, W.D., Kruger, H.A.: Can perceptual differences account for enigmatic information security behaviour in an organization? Comput. Secur. 61, 46\u201358 (2016). https:\/\/doi.org\/10.1016\/j.cose.2016.05.006","journal-title":"Comput. Secur."},{"key":"8_CR20","first-page":"112","volume":"22","author":"K Krombholz","year":"2015","unstructured":"Krombholz, K., Hobel, H., Huber, M., Weippl, E.: Advanced social engineering attacks. J. Inf. Secur. Appl. 22, 112\u2013122 (2015)","journal-title":"J. Inf. Secur. Appl."},{"key":"8_CR21","unstructured":"Metz, T.: Ubuntu as a moral theory and human rights in South Africa (2011). http:\/\/www.scielo.org.za\/pdf\/ahrlj\/v11n2\/11.pdf"},{"key":"8_CR22","unstructured":"Mokgoro, Y.J.: Ubuntu and the law in South Africa (1997). https:\/\/journals.assaf.org.za\/per\/article\/view\/2897"},{"key":"8_CR23","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.cose.2016.03.004","volume":"59","author":"F Mouton","year":"2016","unstructured":"Mouton, F., Leenen, L., Venter, H.S.: Social engineering attack examples, templates and scenarios. Comput. Secur. 59, 186\u2013209 (2016). https:\/\/doi.org\/10.1016\/j.cose.2016.03.004","journal-title":"Comput. Secur."},{"key":"8_CR24","unstructured":"Oxford University Press: Ubuntu (1998). https:\/\/en.wikipedia.org\/wiki\/Oxford_Advanced_Learner\u2019s_Dictionary"},{"issue":"4","key":"8_CR25","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1016\/j.cose.2011.12.010","volume":"31","author":"SL Pfleeger","year":"2012","unstructured":"Pfleeger, S.L., Caputo, D.D.: Leveraging behavioural science to mitigate cyber security risk. Comput. Secur. 31(4), 597\u2013611 (2012)","journal-title":"Comput. Secur."},{"key":"8_CR26","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1016\/j.sbspro.2014.03.185","volume":"128","author":"G Popescu","year":"2014","unstructured":"Popescu, G.: Human behavior, from psychology to a trans-disciplinary insight. Soc. Behav. Sci. 128, 442\u2013446 (2014)","journal-title":"Soc. Behav. Sci."},{"key":"8_CR27","doi-asserted-by":"publisher","unstructured":"Rosen, D., Stefanone, M.A., Lackaff, D.: Online and offline social networks: investigating culturally-specific behaviour and satisfaction. In: Proceedings of the 43rd Hawaii International Conference on System Sciences (2010). https:\/\/doi.org\/10.1109\/hicss.2010.292","DOI":"10.1109\/hicss.2010.292"},{"key":"8_CR28","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.cose.2015.05.012","volume":"53","author":"NS Safa","year":"2015","unstructured":"Safa, N.S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N.A., Herawan, T.: Information security conscious care behaviour formation in organizations. Comput. Secur. 53, 65\u201378 (2015)","journal-title":"Comput. Secur."},{"issue":"4","key":"8_CR29","doi-asserted-by":"publisher","first-page":"89","DOI":"10.3390\/fi11040089","volume":"11","author":"F Salahdine","year":"2019","unstructured":"Salahdine, F., Kaabouch, N.: Social engineering attacks: a survey. Future Internet 11(4), 89 (2019). https:\/\/doi.org\/10.3390\/fi11040089","journal-title":"Future Internet"},{"key":"8_CR30","doi-asserted-by":"publisher","first-page":"1096","DOI":"10.1016\/j.promfg.2015.07.181","volume":"3","author":"D Tayouri","year":"2015","unstructured":"Tayouri, D.: The human factor in social media security. combining education and technology to reduce social engineering risks and damages. Procedia Manuf. 3, 1096\u20131100 (2015). https:\/\/doi.org\/10.1016\/j.promfg.2015.07.181","journal-title":"Procedia Manuf."},{"key":"8_CR31","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.dss.2017.09.004","volume":"103","author":"A Vishwanath","year":"2017","unstructured":"Vishwanath, A.: Getting phished on social media. Decis. Support Syst. 103, 70\u201381 (2017). https:\/\/doi.org\/10.1016\/j.dss.2017.09.004","journal-title":"Decis. Support Syst."}],"container-title":["IFIP Advances in Information and Communication Technology","Human Aspects of Information Security and Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57404-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T12:39:39Z","timestamp":1724330379000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-57404-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030574031","9783030574048"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57404-8_8","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"21 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Human Aspects of Information Security and Assurance","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mytilene, Lesbos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"haisa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.haisa.org\/?page=home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"63% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.79","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The symposium was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}