{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,4]],"date-time":"2026-02-04T07:43:38Z","timestamp":1770191018391,"version":"3.49.0"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032141064","type":"print"},{"value":"9783032141071","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-14107-1_18","type":"book-chapter","created":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T19:37:08Z","timestamp":1770147428000},"page":"203-216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Social Engineering and Information System Security-A Survey on the Necessity of Prevention"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9273-302X","authenticated-orcid":false,"given":"Florence","family":"Sedes","sequence":"first","affiliation":[]},{"given":"Jonathan","family":"Degrace","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,2,4]]},"reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.cose.2017.10.008","volume":"73","author":"JM Hatfield","year":"2018","unstructured":"Hatfield, J.M.: Social engineering in cybersecurity: the evolution of a concept. Comput. Secur. 73, 102\u2013113 (2018)","journal-title":"Comput. Secur."},{"key":"18_CR2","doi-asserted-by":"publisher","first-page":"11895","DOI":"10.1109\/ACCESS.2021.3051633","volume":"9","author":"Z Wang","year":"2021","unstructured":"Wang, Z., Zhu, H., Sun, L., et al.: Social engineering in cybersecurity: effect mechanisms, human vulnerabilities and attack methods. IEEE Access 9, 11895\u201311910 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3051633","journal-title":"IEEE Access"},{"key":"18_CR3","unstructured":"Sedes, F., Degrace, J.: S\u00e9curit\u00e9 dans les SI & social engineering \u2013 Un \u00e9tat des lieux, INFORSID (2024). https:\/\/hal.science\/hal-04613192\/document"},{"key":"18_CR4","unstructured":"Verizon: Rapport d\u2019enqu\u00eate sur les violations de donn\u00e9es (2024). https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/2023\/summary-offindings\/"},{"issue":"2","key":"18_CR5","doi-asserted-by":"publisher","first-page":"21","DOI":"10.2307\/41164635","volume":"18","author":"HI Ansoff","year":"1975","unstructured":"Ansoff, H.I.: Managing strategic surprise by response to weak signals. Calif. Manage. Rev. 18(2), 21\u201333 (1975)","journal-title":"Calif. Manage. Rev."},{"key":"18_CR6","unstructured":"Russell, S.J., Norvig, P.: Artificial Intelligence: A Modern Approach. Pearson Education, Paris France, 3e \u00e9d. (2010)"},{"key":"18_CR7","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1002\/spy2.73","volume":"2","author":"Y Affan","year":"2019","unstructured":"Affan, Y., Rubia, F., et al.: Contemplating social engineering studies and attack scenarios: a review study. Secur. Priv. 2, 73 (2019)","journal-title":"Secur. Priv."},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Party, P.P., Rajendran, G.: Identification and prevention of social engineering attacks on an enterprise. In: International Carnahan Conference on Security Technology (ICCST), pp. 1\u20135. IEEE (2019). https:\/\/ieeexplore.ieee.org\/abstract\/document\/8888441","DOI":"10.1109\/CCST.2019.8888441"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Kaushalya, K.M.H.S., et al.: An overview of social engineering in the context of information security. In: IEEE 5th International Conference on Engineering Technologies and Applied Sciences (ICETAS), pp. 1\u20136 (2018)","DOI":"10.1109\/ICETAS.2018.8629126"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"De Casanove, O., Sedes, F.: Malicious human behaviour in information system security: contribution to a threat model for event detection algorithms. Foundations and practice of security. In: 15th International Symposium, FPS 2022, Ottawa, ON, Canada, December 12\u201314, pp. 208\u2013220 (2022)","DOI":"10.1007\/978-3-031-30122-3_13"},{"key":"18_CR11","doi-asserted-by":"publisher","unstructured":"Schmitt, M., Flechais, I.: Digital deception generative artificial intelligence in social engineering and phishing. SSRN Electron. J. 57(54) (2023). https:\/\/doi.org\/10.1007\/s10462-024-10973-2","DOI":"10.1007\/s10462-024-10973-2"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Wang, Z., Zhu, H., Sun, L.: Defining social engineering in cybersecurity. IEEE Access 8, 85094\u201385115 (2020). https:\/\/www.researchgate.net\/publication\/341199647_Defining_Social_Engineering_in_Cybersecurity","DOI":"10.1109\/ACCESS.2020.2992807"},{"key":"18_CR13","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1186\/s13673-018-0128-7","volume":"8","author":"SM Albladi","year":"2018","unstructured":"Albladi, S.M., Weir, G.R.S.: User characteristics that influence judgment of social engineering attacks in social networks. Hum. Centrics Comput. Inf. Sci. 8, 5 (2018). https:\/\/doi.org\/10.1186\/s13673-018-0128-7","journal-title":"Hum. Centrics Comput. Inf. Sci."},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Winters, G.M., et al.: Validation of the sexual grooming model of child sexual abusers. J. Child Sex. Abuse 855\u2013875 (2020)","DOI":"10.1080\/10538712.2020.1801935"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Ringenberg, T.R., Seigfried-Spellar, K.C., Rayz, J.M., Rogers, M.K.: A scoping review of child grooming strategies: pre and post internet. Dans Child Abuse Neglect. 123 (2022)","DOI":"10.1016\/j.chiabu.2021.105392"},{"key":"18_CR16","unstructured":"Begue, L., Desrichard, O.: Trait\u00e9 de Psychologie Sociale. De Boeck (2024)"},{"key":"18_CR17","unstructured":"Cialdini, R.: Influence et Manipulation. Pocket (2024)"},{"key":"18_CR18","unstructured":"Joule, R.V., Beauvois, L.: Petit trait\u00e9 de manipulation \u00e0 l\u2019usage des honn\u00eates gens (2024). https:\/\/www.education-authentique.org\/uploads\/PDF-DOC\/JBM_Trait%C3%A9_manipulation_JouleBeauvois.pdf"},{"key":"18_CR19","unstructured":"Falkowicz, S., et al.: Au Coeur de L\u2019esprit Critique. Petit Guide Pour D\u00e9jouer les Manipulations, pp. 55\u201398. Eyrolle (2023)"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"CHO, et al.: Effect of personality traits on trust and risk to phishing vulnerability: modeling and analysis. In: Dans IEEE International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA), pp. 7\u201313. IEEE (2016)","DOI":"10.1109\/COGSIMA.2016.7497779"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Mouton, F., Malan, M.M., Leenen, L., et al.: Social engineering attack framework. In: Information Security for South Africa (ISSA), pp. 1\u20139. IEEE (2014). https:\/\/ieeexplore.ieee.org\/document\/6950510","DOI":"10.1109\/ISSA.2014.6950510"},{"key":"18_CR22","unstructured":"Barra, V., Cornuejols, A., Miclet, L.: Apprentissage Artificiel: Concepts et algorithmes. Eyrolles (2021)"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Falade, P.V.: Decoding the threat landscape: ChatGPT, FraudGPT, and WormGPT in social engineering attacks. Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol. 9(5) (2023). https:\/\/ijsrcseit.com\/paper\/CSEIT2390533.pdf","DOI":"10.32628\/CSEIT2390533"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Gupta, M., Akiri, C., Aryal, K.: From ChatGPT to ThreatGPT: impact of generative AI in cybersecurity and privacy. IEEE Access 11, 80218\u201380245 (2023). https:\/\/ieeexplore.ieee.org\/document\/10198233","DOI":"10.1109\/ACCESS.2023.3300381"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Syafitri, W., Shukur, Z., et al.: Social engineering attacks prevention: a systematic literature review. IEEE Access 10, p. 39325 \u2013 39343 (2022). https:\/\/www.researchgate.net\/publication\/359528837_Social_Engineering_Attacks_Prevention_A_Systematic_Literature_Review","DOI":"10.1109\/ACCESS.2022.3162594"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Mouton, F., Leenen, L., et al.: Social engineering attack detection model: SEADMv2. In: International Conference on Cyberworlds (CW), pp. 216\u2013223 (2015). https:\/\/ieeexplore.ieee.org\/document\/7398418","DOI":"10.1109\/CW.2015.52"},{"key":"18_CR27","unstructured":"Sosafe: Le point sur les menaces et les bonnes pratiques en cybers\u00e9curit\u00e9 (2024)"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Burda, P., Allodi, L., Zannon, N.: Don\u2019t forget the human: a crowdsourced approach to automate response and containment against spear phishing attacks. In: IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 471\u2013476 (2020). https:\/\/ieeexplore.ieee.org\/document\/9229829","DOI":"10.1109\/EuroSPW51379.2020.00069"},{"key":"18_CR29","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.chb.2016.09.012","volume":"66","author":"M Junger","year":"2017","unstructured":"Junger, M., Montoya, L., Overink, F.-J.: Priming and warnings are not effective to prevent social engineering attacks. Comput. Hum. Behav. 66, 75\u201387 (2017)","journal-title":"Comput. Hum. Behav."},{"key":"18_CR30","doi-asserted-by":"crossref","unstructured":"Kumaraguru, P., Sheng, S., Acquisti, A., et al.: Teaching Johnny not to fall for phish. Dans ACM Trans. Internet Technol. 10(2), 1\u201331 (2010). https:\/\/www.researchgate.net\/publication\/220169843_Teaching_Johnny_not_to_fall_for_phish","DOI":"10.1145\/1754393.1754396"},{"key":"18_CR31","doi-asserted-by":"publisher","first-page":"801","DOI":"10.1108\/ICS-07-2019-0078","volume":"28","author":"J-W Bullee","year":"2020","unstructured":"Bullee, J.-W., Junger, M.: How effective are social engineering interventions? A meta-analysis. Inf. Comput. Secur. 28, 801\u2013830 (2020)","journal-title":"Inf. Comput. Secur."},{"key":"18_CR32","unstructured":"Barom\u00e8tre du, N.: Enqu\u00eate sur la diffusion des technologies de l\u2019information et de la communication dans la soci\u00e9t\u00e9 fran\u00e7aise. ARCEP, p. 8 (2022)"},{"key":"18_CR33","doi-asserted-by":"crossref","unstructured":"de Casanove, O., Leleu, N., Sedes, F.: Applying PDCA to security, education, training and awareness programs. In: 16th IFIP WG 11.12 International Symposium on Human Aspects of Information Security and Assurance (HAISA 2022), IFIP TC 11 Working Group 12: Human Aspects of Information Security and Assurance, pp. 39\u201348 (2022)","DOI":"10.1007\/978-3-031-12172-2_4"},{"key":"18_CR34","unstructured":"Whittaker, Z., Leetaru, K., Goodman, B.: The emerging threat of AI-powered social engineering. ACM Digit. Threats Res. Pract. (2021)"},{"key":"18_CR35","first-page":"451","volume":"76","author":"A Kumar","year":"2023","unstructured":"Kumar, A., Carley, K.M.: AI-driven manipulation on social media: a survey of techniques and defenses. J. Artif. Intell. Res. 76, 451\u2013478 (2023)","journal-title":"J. Artif. Intell. Res."},{"key":"18_CR36","unstructured":"Brundage, M., et al.: The malicious use of artificial intelligence: forecasting, prevention, and mitigation. arXiv:1802.07228 (2018)"},{"key":"18_CR37","unstructured":"Vincent, J.: Deepfake videos could be used to interfere in elections, warn experts. The Verge (2020)"}],"container-title":["Lecture Notes in Computer Science","Social Networks Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-14107-1_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,3]],"date-time":"2026-02-03T19:37:13Z","timestamp":1770147433000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-14107-1_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032141064","9783032141071"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-14107-1_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"4 February 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ASONAM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Social Networks Analysis and Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":", ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 August 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"asonam-12025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/asonam.cpsc.ucalgary.ca\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}