{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:40:42Z","timestamp":1776102042803,"version":"3.50.1"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319203751","type":"print"},{"value":"9783319203768","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_4","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"36-47","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":71,"title":["Principles of Persuasion in Social Engineering and Their Use in Phishing"],"prefix":"10.1007","author":[{"given":"Ana","family":"Ferreira","sequence":"first","affiliation":[]},{"given":"Lynne","family":"Coventry","sequence":"additional","affiliation":[]},{"given":"Gabriele","family":"Lenzini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"4_CR1","volume-title":"The Art of Deception","author":"K Mitnick","year":"2002","unstructured":"Mitnick, K., Simon, W.: The Art of Deception. Wiley Publishing Inc., New York (2002)"},{"key":"4_CR2","volume-title":"Influence: The Psychology of Persuasion (Revision Edition)","author":"RB Cialdini","year":"2007","unstructured":"Cialdini, R.B.: Influence: The Psychology of Persuasion (Revision Edition). Harper Business, Dunmore (2007)"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Quiel, S., Uebelacker, S.: The social engineering personality framework. In: Proceedings of 4th Workshop on Socio-Technical Aspects in Security and Trust (STAST 2014), Vienna, Austria, 18 July 2014, pp. 24\u201330 (2014)","DOI":"10.1109\/STAST.2014.12"},{"key":"4_CR4","unstructured":"Akbar, N.: Analysing persuasion principles in phishing emails. Ph.D. dissertation, Master Thesis, University of Twente, The Netherlands, October 2014"},{"key":"4_CR5","unstructured":"Gragg, D.: A multi-level defense against social engineering. Technical Report, SANS Institute - InfoSec Reading Room (2003)"},{"issue":"3","key":"4_CR6","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1145\/1897852.1897872","volume":"54","author":"F Stajano","year":"2011","unstructured":"Stajano, F., Wilson, P.: Understanding scam victims: seven principles for systems security. Commun. ACM 54(3), 70\u201375 (2011)","journal-title":"Commun. ACM"},{"key":"4_CR7","unstructured":"Scheeres, J.W., Mills, R.F., Grimaila, M.R.: Establishing the human firewall: reducing an individual\u2019s engineering attacks. In: Proceedings of the 3rd International Conference on Information Warfare and Security (ICIW), Omaha, USA, 24\u201325 April 2008"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Fette, I., Sadeh, N., Tomasic, A.: Learning to detect phishing emails. In: Proceedings of the 16th Interenational Conference on World Wide Web (WWW 2007), Banff, AB, Canada, 8\u201312 May 2008, pp. 649\u2013656. ACM (2007)","DOI":"10.1145\/1242572.1242660"},{"issue":"2","key":"4_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1754393.1754396","volume":"10","author":"P Kumaraguru","year":"2010","unstructured":"Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L.F., Hong, J.: Teaching Johnny not to fall for phish. ACM Trans. Internet Technol. 10(2), 1\u201331 (2010)","journal-title":"ACM Trans. Internet Technol."},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Blythe, M., Petrie, H., Clark, J.A.: F for fake: four studies on how we fall for phish. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2011), Vancouver, BC, Canada, 7\u201312 May 2011, pp. 3469\u20133478. ACM (2011)","DOI":"10.1145\/1978942.1979459"},{"key":"4_CR11","volume-title":"The Small BIG: Small Changes that Spark Big Influence","author":"SJ Martin","year":"2014","unstructured":"Martin, S.J., Goldstein, N., Cialdini, R.B.: The Small BIG: Small Changes that Spark Big Influence. Grand Central Publishing, New York (2014)"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1037\/h0061787","volume":"56","author":"R Arnheim","year":"1945","unstructured":"Arnheim, R.: The gestalt theory of expression. Psychol. Rev. 56, 156\u2013171 (1945)","journal-title":"Psychol. Rev."},{"key":"4_CR13","doi-asserted-by":"crossref","DOI":"10.4324\/9780203076323","volume-title":"Perception Beyond Gestalt: Progress in Vision Research","author":"A Geremek","year":"2013","unstructured":"Geremek, A., Greenlee, M., Magnussen, S.: Perception Beyond Gestalt: Progress in Vision Research. Psychology Press, New York (2013)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:20:33Z","timestamp":1583508033000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}