{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T19:59:29Z","timestamp":1771012769441,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540255840","type":"print"},{"value":"9783540319795","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/978-3-540-31979-5_12","type":"book-chapter","created":{"date-parts":[[2010,6,30]],"date-time":"2010-06-30T12:42:55Z","timestamp":1277901775000},"page":"132-143","source":"Crossref","is-referenced-by-count":12,"title":["Measuring Resistance to Social Engineering"],"prefix":"10.1007","author":[{"given":"H\u00e5gen","family":"Hasle","sequence":"first","affiliation":[]},{"given":"Yngve","family":"Kristiansen","sequence":"additional","affiliation":[]},{"given":"Ketil","family":"Kintel","sequence":"additional","affiliation":[]},{"given":"Einar","family":"Snekkenes","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Aftenposten. Dataforeningen raser mot nettoverv\u00e5king, http:\/\/www.aftenposten.no\/nyheter\/nett\/article.jhtml?articleID=663692"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Anderson, R.: Why cryptosystems fail. In: Proceedings of the 1st Conference on Computer and Communications Security (1993)","DOI":"10.1145\/168588.168615"},{"key":"12_CR3","unstructured":"World\u00a0Medical Association. World medical association declaration of Helsinki, http:\/\/www.wma.net\/e\/policy\/b3.htm"},{"key":"12_CR4","unstructured":"Augostinos, M., Walker, I.: Social cogntition. an integrated Introduction. SAGE publications Ltd, 6 Bonhill Street, London, Reprinted (2002)"},{"issue":"4","key":"12_CR5","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/S1363-4127(03)00007-4","volume":"8","author":"N. Barrett","year":"2003","unstructured":"Barrett, N.: Penetration testing and social engineering: hacking the weakest link. Information Security Technical Report\u00a08(4), 56\u201364 (2003)","journal-title":"Information Security Technical Report"},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Berghel, H.: Digital village - Malware month. Communications of the ACM\u00a046(12) (December 2003)","DOI":"10.1145\/953460.953476"},{"key":"12_CR7","unstructured":"The National Committee for Research Ethics in the Social Sciences and the Humanities. Guidelines for research ethics in the social sciences, law and the humanities, www.etikkom.no\/retningslinjer\/NESHretningslinjer\/NESHretningslinjer\/Eng%elsk"},{"key":"12_CR8","unstructured":"Gordon, S.: Social engineering: Techniques and prevention. In: Proceedings of the 12th World Conference on Computer Security, Audit & Control, Westminster, UK, October 1995, pp. 445\u2013451 (1995)"},{"key":"12_CR9","unstructured":"Henning, R.R.: Security service level agreements: Quantifiable security for the enterprise? In: Proceedings of the 1999 workshop on New security paradigms Caledon Hills, Ontario, Canada, pp. 54\u201360 (1999), ISBN: 1-58113-149-6 doi.acm.org\/10.1145\/335169.335194"},{"key":"12_CR10","volume-title":"Hacking Linux exposed: Linux security secrets & solutions","author":"B. Hatch","year":"2001","unstructured":"Hatch, B., Lee, J., Kurtz, G.: Hacking Linux exposed: Linux security secrets & solutions. Osborne\/McGraw-Hill, New York (2001), ISBN: 0-07-212773-2"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Kienzle, D., Elder, M.C.: Recent worms: A survey and trends. In: Proceedings of the 2003 ACM workshop on Rapid Malcode, Washington, DC, USA, pp. 1\u201310 (2003), ISBN: 1-58113-785-0","DOI":"10.1145\/948187.948189"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"McClure, J., Ames, W.I., McGraw, T.F., Gouin, J.L.: A system and method for enhanced psychophysiological detection of deception. In: Proceedings of the 36th Annual 2002 International Carnahan Conference on Security Technology, pp. 50\u201359 (2002)","DOI":"10.1109\/CCST.2002.1049226"},{"key":"12_CR13","volume-title":"The Art of Deception: Controlling the Human Element of Security","author":"K.D. Mitnick","year":"2003","unstructured":"Mitnick, K.D., Simon, W.L.: The Art of Deception: Controlling the Human Element of Security. John Wiley & Sons, Chichester (2003)"},{"key":"12_CR14","unstructured":"Aftenposten Nettutgave. Nettstedet vet at du er der, http:\/\/www.aftenposten.no\/nyheter\/iriks\/article.jhtml?articleID=662796"},{"key":"12_CR15","unstructured":"Payne, S.C.: A guide to security metrics (July 2001), rr.sans.org\/audit\/metrics.php"},{"key":"12_CR16","unstructured":"Poulsen, K.: Mitnick to lawmakers: People, phones and weakest links (2000) Available from, http:\/\/www.politechbot.com\/p-00969.html"},{"key":"12_CR17","unstructured":"Rienzi, G.: All university computer users need to protect passwords. The Gazette Online \u2014 The newspaper of the Johns Hopkins University\u00a029(7) (October 1999), www.jhu.edu\/~gazette\/1999\/oct1199\/11warns.html"},{"key":"12_CR18","unstructured":"Rubin, A.D.: Security considerations for remote electronic voting. In: 29th Research Conference on Communication, Information and Internet Policy, TPRC 2001 (2001)"},{"key":"12_CR19","volume-title":"Secrets and Lies: Digital Security in a Networked World","author":"B. Schneier","year":"2000","unstructured":"Schneier, B.: Secrets and Lies: Digital Security in a Networked World. John Wiley & Sons, Chichester (2000)"},{"key":"12_CR20","unstructured":"Smith, R.M.: The web bug faq. Electronic Frontier Foundation (1999)"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Vaughn, R., Henning, R., Siraj, A.: Information assurance measures and metrics \u2014 state of practice and proposed taxonomy. A revised version will be presented at the Thirty-Sixth Hawaii International Conference on System Sciences (HICSS-36) to be held January 6\u20139 (2003), http:\/\/www.cs.jmu.edu\/users\/prietorx\/HICSS36\/Minitrack14\/FullPapers\/InfoAssura%nceMesureMetricsFinalVaughn.pdf","DOI":"10.1109\/HICSS.2003.1174904"},{"key":"12_CR22","unstructured":"Vigilante.com. Vigilante home, http:\/\/Vigilante.com"},{"key":"12_CR23","unstructured":"Winkler, I.: Case study of industrial espionage through social engineering. In: Proceedings of 19th National Information Systems Security Conference (1996), citeseer.ist.psu.edu\/320204.html"},{"key":"12_CR24","volume-title":"Corporate Espionage: what it is, why it is happening your company, what you must do about it","author":"I. Winkler","year":"1997","unstructured":"Winkler, I.: Corporate Espionage: what it is, why it is happening your company, what you must do about it. Prima Publishing, CA (1997), ISBN: 0761508406"},{"key":"12_CR25","first-page":"12","volume-title":"Proceedings of the 2003 ACM workshop on Rapid Malcode","author":"N. Weaver","year":"2003","unstructured":"Weaver, N., Paxson, V., Staniford, S., Cunningham, R.: A taxonomy of computer worms. In: Proceedings of the 2003 ACM workshop on Rapid Malcode, pp. 12\u201318. ACM Press, New York (2003), ISBN: 1-58113-785-0 doi.acm.org\/10.1145\/948187.948190"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-31979-5_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,18]],"date-time":"2020-11-18T23:32:33Z","timestamp":1605742353000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-31979-5_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540255840","9783540319795"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-31979-5_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005]]}}}