{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T06:04:17Z","timestamp":1768975457318,"version":"3.49.0"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030773915","type":"print"},{"value":"9783030773922","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-77392-2_27","type":"book-chapter","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T23:06:05Z","timestamp":1625267165000},"page":"417-431","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Social Engineering Attacks: Recent Advances and Challenges"],"prefix":"10.1007","author":[{"given":"Nikol","family":"Mashtalyar","sequence":"first","affiliation":[]},{"given":"Uwera Nina","family":"Ntaganzwa","sequence":"additional","affiliation":[]},{"given":"Thales","family":"Santos","sequence":"additional","affiliation":[]},{"given":"Saqib","family":"Hakak","sequence":"additional","affiliation":[]},{"given":"Suprio","family":"Ray","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"key":"27_CR1","doi-asserted-by":"publisher","first-page":"85094","DOI":"10.1109\/ACCESS.2020.2992807","volume":"8","author":"Z Wang","year":"2020","unstructured":"Wang, Z., Sun, L., Zhu, H.: Defining social engineering in cybersecurity. IEEE Access 8, 85094\u201385115 (2020)","journal-title":"IEEE Access"},{"issue":"4","key":"27_CR2","doi-asserted-by":"publisher","first-page":"89","DOI":"10.3390\/fi11040089","volume":"11","author":"F Salahdine","year":"2019","unstructured":"Salahdine, F., Kaabouch, N.: Social engineering attacks: a survey. Future Internet 11(4), 89 (2019)","journal-title":"Future Internet"},{"issue":"1","key":"27_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-018-0128-7","volume":"8","author":"SM Albladi","year":"2018","unstructured":"Albladi, S.M., Weir, G.R.S.: User characteristics that influence judgment of social engineering attacks in social networks. Hum.-Cent. Comput. Inf. Sci. 8(1), 1\u201324 (2018). https:\/\/doi.org\/10.1186\/s13673-018-0128-7","journal-title":"Hum.-Cent. Comput. Inf. Sci."},{"key":"27_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijhcs.2018.06.004","volume":"120","author":"EJ Williams","year":"2018","unstructured":"Williams, E.J., Hinds, J., Joinson, A.N.: Exploring susceptibility to phishing in the workplace. Int. J. Hum. Comput. Stud. 120, 1\u201313 (2018)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Breda, F., Barbosa, H., Morais, T.: Social engineering and cyber security. In: Proceedings of International Technology, Education and Development Conference (2017)","DOI":"10.21125\/inted.2017.1008"},{"issue":"11","key":"27_CR6","first-page":"15","volume":"2","author":"A Kumar","year":"2015","unstructured":"Kumar, A., Chaudhary, M., Kumar, N.: Social engineering threats and awareness: a survey. Eur. J. Adv. Eng. Tech. 2(11), 15\u201319 (2015)","journal-title":"Eur. J. Adv. Eng. Tech."},{"key":"27_CR7","doi-asserted-by":"publisher","first-page":"124134","DOI":"10.1109\/ACCESS.2020.3006172","volume":"8","author":"S Hakak","year":"2020","unstructured":"Hakak, S., Khan, W.Z., Imran, M., Choo, K.-K.R., Shoaib, M.: Have you been a victim of COVID-19-related cyber incidents? Survey, taxonomy, and mitigation strategies. IEEE Access 8, 124134\u2013124144 (2020)","journal-title":"IEEE Access"},{"key":"27_CR8","unstructured":"FBI. Federal agencies warn of emerging fraud schemes related to COVID-19 vaccines. [Online]. Available: https:\/\/www.fbi.gov\/news\/pressrel\/press-releases\/federal-agencies-warn-of-emerging-fraud-schemes-related-to-covid-19-vaccines"},{"issue":"5","key":"27_CR9","doi-asserted-by":"publisher","first-page":"9","DOI":"10.14569\/IJACSA.2020.0110523","volume":"11","author":"A Alzahrani","year":"2020","unstructured":"Alzahrani, A.: Coronavirus social engineering attacks: issues and recommendations. Int. J. Adv. Comput. Sci. Appl. 11(5), 9 (2020). https:\/\/doi.org\/10.14569\/IJACSA.2020.0110523","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"27_CR10","unstructured":"Google. Protecting businesses against cyber threats during COVID-19 and beyond. [Online]. Available: https:\/\/cloud.google.com\/blog\/products\/identity-security\/protecting-against-cyber-threats-during-covid-19-and-beyond"},{"key":"27_CR11","unstructured":"Szurdi, J., Starov, O., McCabe, A., Chen, Z., Duan, R.: Studying how cybercriminals prey on the COVID-19 pandemic. [Online]. Available: https:\/\/unit42.paloaltonetworks.com\/how-cybercriminals-prey-on-the-covid-19-pandemic\/"},{"issue":"1","key":"27_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s42400-020-00047-5","volume":"3","author":"SM Albladi","year":"2020","unstructured":"Albladi, S.M., Weir, G.R.: Predicting individuals\u2019 vulnerability to social engineering in social networks. Cybersecur. 3(1), 1\u201319 (2020)","journal-title":"Cybersecur."},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Lansley, M., Kapetanakis, S., Polatidis, N.: SEADer++ v2: detecting social engineering attacks using natural language processing and machine learning. In: 2020 International Conference on Innovations in Intelligent Systems and Applications (INISTA), pp. 1\u20136. IEEE (2020)","DOI":"10.1109\/INISTA49547.2020.9194623"},{"issue":"1","key":"27_CR14","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/s11235-020-00733-2","volume":"76","author":"A Basit","year":"2020","unstructured":"Basit, A., Zafar, M., Liu, X., Javed, A.R., Jalil, Z., Kifayat, K.: A comprehensive survey of AI-enabled phishing attacks detection techniques. Telecommun. Syst. 76(1), 139\u2013154 (2020). https:\/\/doi.org\/10.1007\/s11235-020-00733-2","journal-title":"Telecommun. Syst."},{"key":"27_CR15","unstructured":"Abreu, J.V.F., Fernandes, J.H.C., Gondim, J.J.C., Ralha, C.G.: Bot development for social engineering attacks on Twitter. arXiv preprint arXiv:2007.11778 (2020)"},{"key":"27_CR16","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1007\/978-3-642-39377-8_29","volume-title":"Information Assurance and Security Education and Training","author":"A Smith","year":"2013","unstructured":"Smith, A., Papadaki, M., Furnell, S.M.: Improving awareness of social engineering attacks. In: Dodge, R.C., Futcher, L. (eds.) WISE 2009\/2011\/2013. IAICT, vol. 406, pp. 249\u2013256. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39377-8_29"},{"key":"27_CR17","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1007\/978-3-319-58424-9_35","volume-title":"Computer and Network Security Essentials","author":"J Saleem","year":"2018","unstructured":"Saleem, J., Hammoudeh, M.: Defense methods against social engineering attacks. In: Daimi, K. (ed.) Computer and Network Security Essentials, pp. 603\u2013618. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-58424-9_35"},{"issue":"4","key":"27_CR18","first-page":"188","volume":"1","author":"AU Zulkurnain","year":"2015","unstructured":"Zulkurnain, A.U., Hamidy, A., Husain, A.B., Chizari, H.: Social engineering attack mitigation. Int. J. Math. Comput. Sci. 1(4), 188\u2013198 (2015)","journal-title":"Int. J. Math. Comput. Sci."},{"key":"27_CR19","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s11292-014-9222-7","volume":"11","author":"J-W Bull\u00e9e","year":"2015","unstructured":"Bull\u00e9e, J.-W., Montoya, L., Pieters, W., Junger, M., Hartel, P.H.: The persuasion and security awareness experiment: reducing the success of social engineering attacks. J. Exp. Criminol. 11, 97\u2013115 (2015)","journal-title":"J. Exp. Criminol."},{"key":"27_CR20","doi-asserted-by":"crossref","unstructured":"Parthy, P.P., Rajendran, G.: Identification and prevention of social engineering attacks on an enterprise. In: 2019 International Carnahan Conference on Security Technology (ICCST), pp. 1\u20135. IEEE (2019)","DOI":"10.1109\/CCST.2019.8888441"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Aldawood, H.A., Skinner, G.: A critical appraisal of contemporary cyber security social engineering solutions: measures, policies, tools and applications. In: 2018 26th International Conference on Systems Engineering (ICSEng), pp. 1\u20136. IEEE (2018)","DOI":"10.1109\/ICSENG.2018.8638166"},{"key":"27_CR22","doi-asserted-by":"crossref","unstructured":"Aldawood, H., Skinner, G.: An academic review of current industrial and commercial cyber security social engineering solutions. In: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy, pp. 110\u2013115 (2019)","DOI":"10.1145\/3309074.3309083"},{"issue":"5","key":"27_CR23","doi-asserted-by":"publisher","first-page":"1130","DOI":"10.1108\/ITP-12-2017-0422","volume":"32","author":"CC Campbell","year":"2019","unstructured":"Campbell, C.C.: Solutions for counteracting human deception in social engineering attacks. Inf. Technol. People 32(5), 1130\u20131152 (2019)","journal-title":"Inf. Technol. People"},{"key":"27_CR24","doi-asserted-by":"publisher","first-page":"6910","DOI":"10.1109\/ACCESS.2016.2616285","volume":"4","author":"R Heartfield","year":"2016","unstructured":"Heartfield, R., Loukas, G., Gan, D.: You are probably not the weakest link: towards practical prediction of susceptibility to semantic social engineering attacks. IEEE Access 4, 6910\u20136928 (2016)","journal-title":"IEEE Access"},{"key":"27_CR25","unstructured":"Google. Improving malicious document detection in gmail with deeplearning (2020). [Online]. Available: https:\/\/security.googleblog.com\/2020\/02\/improving-malicious-document-detection.html. Accessed 16 January 2021"},{"key":"27_CR26","unstructured":"World Health Organisation. How to report misinformation online (2020). [Online]. Available: https:\/\/www.who.int\/campaigns\/connecting-the-world-to-combat-coronavirus\/how-to-report-misinformation-online. Accessed 16 January 2021"},{"key":"27_CR27","unstructured":"W.H.O. Coronavirus disease (COVID-19) advice for the public: mythbusters (2020). [Online]. Available: https:\/\/www.who.int\/emergencies\/diseases\/novel-coronavirus-2019\/advice-for-public\/myth-busters. Accessed 16 January 2021"},{"key":"27_CR28","unstructured":"U.Gov. (2020) Go viral! a 5 minute game that helps protect you against COVID-19 misinformation. [Online]. Available: https:\/\/www.goviralgame.com\/en?utm_source=EO&utm_medium=SocialMedia&utm_campaign=goviral&utm_content=Eng. Accessed 16 January 2021"},{"key":"27_CR29","unstructured":"WHO. Countering misinformation with the government of the United Kingdom (2020). [Online]. Available: https:\/\/www.who.int\/news-room\/feature-stories\/detail\/countering-misinformation-about-covid-19. Accessed 16 January 2021"},{"issue":"6","key":"27_CR30","doi-asserted-by":"publisher","first-page":"1201","DOI":"10.1109\/JSAC.2017.2692307","volume":"35","author":"M Shafi","year":"2017","unstructured":"Shafi, M., et al.: 5g: a tutorial overview of standards, trials, challenges, deployment, and practice. IEEE J Sel. Areas Commun. 35(6), 1201\u20131221 (2017)","journal-title":"IEEE J Sel. Areas Commun."},{"issue":"10","key":"27_CR31","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/3409116","volume":"63","author":"S Cresci","year":"2020","unstructured":"Cresci, S.: A decade of social bot detection. Commun. ACM 63(10), 72\u201383 (2020)","journal-title":"Commun. ACM"},{"key":"27_CR32","doi-asserted-by":"crossref","unstructured":"Heidari, M., Jones, J.H.: Using bert to extract topic-independent sentiment features for social media bot detection. In: 11th IEEE Annual Ubiquitous Computing, Electronics and Mobile Communication Conference (UEMCON), vol. 2020, pp. 0542\u20130547. IEEE (2020)","DOI":"10.1109\/UEMCON51285.2020.9298158"},{"key":"27_CR33","doi-asserted-by":"publisher","first-page":"312","DOI":"10.1016\/j.ins.2018.08.019","volume":"467","author":"S Kudugunta","year":"2018","unstructured":"Kudugunta, S., Ferrara, E.: Deep neural networks for bot detection. Inf. Sci. 467, 312\u2013322 (2018)","journal-title":"Inf. Sci."},{"issue":"1","key":"27_CR34","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/s00542-016-3237-0","volume":"24","author":"W Wu","year":"2018","unstructured":"Wu, W., Alvarez, J., Liu, C., Sun, H.-M.: Bot detection using unsupervised machine learning. Microsyst. Technol. 24(1), 209\u2013217 (2018)","journal-title":"Microsyst. Technol."},{"key":"27_CR35","unstructured":"Abou Daya, A., Salahuddin, M.A., Limam, N., Boutaba, R.: A graph-based machine learning approach for bot detection. In: IFIP\/IEEE Symposium on Integrated Network and Service Management (IM), vol. 2019, pp. 144\u2013152. IEEE (2019)"},{"key":"27_CR36","doi-asserted-by":"publisher","first-page":"164229","DOI":"10.1109\/ACCESS.2019.2945338","volume":"7","author":"J-H Huh","year":"2019","unstructured":"Huh, J.-H., Seo, Y.-S.: Understanding edge computing: engineering evolution with artificial intelligence. IEEE Access 7, 164229\u2013164245 (2019)","journal-title":"IEEE Access"},{"key":"27_CR37","doi-asserted-by":"crossref","unstructured":"Xia, P., et al.: Don\u2019t fish in troubled waters! characterizing coronavirus-themed cryptocurrency scams (2020)","DOI":"10.1109\/eCrime51433.2020.9493255"},{"key":"27_CR38","first-page":"650","volume":"07","author":"K Weber","year":"2020","unstructured":"Weber, K., Sch\u00fctz, A., Fertig, T., M\u00fcller, N.: Exploiting the human factor: social engineering attacks on cryptocurrency users 07, 650\u2013668 (2020)","journal-title":"Exploiting the human factor: social engineering attacks on cryptocurrency users"},{"key":"27_CR39","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1016\/j.future.2019.02.050","volume":"97","author":"WZ Khan","year":"2019","unstructured":"Khan, W.Z., Ahmed, E., Hakak, S., Yaqoob, I., Ahmed, A.: Edge computing: a survey. Future Gener. Comput. Syst. 97, 219\u2013235 (2019)","journal-title":"Future Gener. Comput. Syst."},{"key":"27_CR40","doi-asserted-by":"crossref","unstructured":"Hakak, S., Ray, S., Khan, W.Z., Scheme, E.: A framework for edge-assisted healthcare data analytics using federated learning. In: IEEE International Workshop on Data Analytics for Smart Health (DASH) 2020. IEEE BigData (2020)","DOI":"10.1109\/BigData50022.2020.9377873"},{"issue":"2","key":"27_CR41","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/IOTM.0001.1900092","volume":"3","author":"S Hakak","year":"2020","unstructured":"Hakak, S., Khan, W.Z., Gilkar, G.A., Haider, N., Imran, M., Alkatheiri, M.S.: Industrial wastewater management using blockchain technology: architecture, requirements, and future directions. IEEE Internet of Things Mag. 3(2), 38\u201343 (2020)","journal-title":"IEEE Internet of Things Mag."}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-77392-2_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:30:51Z","timestamp":1751495451000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-77392-2_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030773915","9783030773922"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-77392-2_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}