{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T06:48:43Z","timestamp":1773557323051,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":35,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819605699","type":"print"},{"value":"9789819605705","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:00:00Z","timestamp":1732924800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:00:00Z","timestamp":1732924800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-0570-5_27","type":"book-chapter","created":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T00:47:40Z","timestamp":1732927660000},"page":"373-388","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["On How Cialdini\u2019s Persuasion Principles Influence Individuals in the Context of Social Engineering: A Qualitative Study"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-0708-4183","authenticated-orcid":false,"given":"Aya","family":"Muhanad","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1082-6864","authenticated-orcid":false,"given":"Israa","family":"Abuelezz","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8848-0760","authenticated-orcid":false,"given":"Khaled","family":"Khan","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5285-7829","authenticated-orcid":false,"given":"Raian","family":"Ali","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,30]]},"reference":[{"key":"27_CR1","doi-asserted-by":"publisher","first-page":"85094","DOI":"10.1109\/ACCESS.2020.2992807","volume":"8","author":"Z Wang","year":"2020","unstructured":"Wang, Z., Sun, L., Zhu, H.: Defining social engineering in cybersecurity. IEEE Access 8, 85094\u201385115 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2992807","journal-title":"IEEE Access"},{"key":"27_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1201\/1079.07366981\/45802.33.8.20060201\/91956.1","volume":"33","author":"TR Peltier","year":"2006","unstructured":"Peltier, T.R.: Social engineering: concepts and solutions. EDPACS 33, 1\u201313 (2006). https:\/\/doi.org\/10.1201\/1079.07366981\/45802.33.8.20060201\/91956.1","journal-title":"EDPACS"},{"key":"27_CR3","doi-asserted-by":"publisher","first-page":"11895","DOI":"10.1109\/ACCESS.2021.3051633","volume":"9","author":"Z Wang","year":"2021","unstructured":"Wang, Z., Zhu, H., Sun, L.: Social engineering in cybersecurity: effect mechanisms, human vulnerabilities and attack methods. IEEE Access 9, 11895\u201311910 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3051633","journal-title":"IEEE Access"},{"key":"27_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5840\/bpej198433\/426","volume":"3","author":"TL Beauchamp","year":"1984","unstructured":"Beauchamp, T.L., Hare, R.M., Biederman, B.: Manipulative advertising [with Commentaries]. Bus. Prof. Ethics J. 3, 1\u201330 (1984)","journal-title":"Bus. Prof. Ethics J."},{"key":"27_CR5","doi-asserted-by":"publisher","unstructured":"Cemiloglu, D., Gurgun, S., Arden-Close, E., Jiang, N., Ali, R.: Explainability as a psychological inoculation: building resistance to digital persuasion in online gambling through explainable interfaces. Int. J. Hum.\u2013Comput. Interact. 1\u201319 (2023). https:\/\/doi.org\/10.1080\/10447318.2023.2281744","DOI":"10.1080\/10447318.2023.2281744"},{"key":"27_CR6","doi-asserted-by":"publisher","unstructured":"Smith, E.R., Mackie, D.M., Claypool, H.M.: Social Psychology, 4th edn. Psychology Press, New York (2014). https:\/\/doi.org\/10.4324\/9780203833698","DOI":"10.4324\/9780203833698"},{"key":"27_CR7","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1037\/hea0000854","volume":"39","author":"S Gaube","year":"2020","unstructured":"Gaube, S., Fischer, P., Windl, V., Lermer, E.: The effect of persuasive messages on hospital visitors\u2019 hand hygiene behavior. Health Psychol. 39, 471\u2013481 (2020). https:\/\/doi.org\/10.1037\/hea0000854","journal-title":"Health Psychol."},{"key":"27_CR8","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1038\/scientificamerican0201-76","volume":"284","author":"RB Cialdini","year":"2001","unstructured":"Cialdini, R.B.: The science of persuasion. Sci. Am. 284, 76\u201381 (2001). https:\/\/doi.org\/10.1038\/scientificamerican0201-76","journal-title":"Sci. Am."},{"key":"27_CR9","first-page":"237","volume":"33","author":"BD Goss","year":"2021","unstructured":"Goss, B.D., Rothschild, P.C., Hutson, M.M.: Applying persuasion theory to sport properties\u2019 digital media. J. Manag. Issues: JMI 33, 237\u2013258 (2021)","journal-title":"J. Manag. Issues: JMI"},{"key":"27_CR10","doi-asserted-by":"publisher","unstructured":"Gkika, S., Lekakos, G.: Investigating the effectiveness of persuasion strategies on recommender systems. In: 2014 9th International Workshop on Semantic and Social Media Adaptation and Personalization, pp. 94\u201397 (2014). https:\/\/doi.org\/10.1109\/SMAP.2014.37","DOI":"10.1109\/SMAP.2014.37"},{"key":"27_CR11","doi-asserted-by":"crossref","unstructured":"Fitzduff, M.: Why Irrational Politics Appeals: Understanding the Allure of Trump, 1st edn. Bloomsbury Publishing (2017)","DOI":"10.5040\/9798216035671.ch-001"},{"key":"27_CR12","unstructured":"Archer, A.K.: \u201cI Made a Choice\u201d: Exploring the Persuasion Tactics Used by Online Romance Scammers in Light of Cialdini\u2019s Compliance Principles. ePublications Regis University (2017). https:\/\/epublications.regis.edu\/theses\/823"},{"key":"27_CR13","doi-asserted-by":"publisher","unstructured":"Mollazehi, A., Abuelezz, I., Barhamgi, M., Khan, K.M., Ali, R.: Do Cialdini\u2019s persuasion principles still influence trust and risk-taking when social engineering is knowingly possible? In: Ara\u00fajo, J., de la Vara, J.L., Santos, M.Y., Assar, S. (eds.) Research Challenges in Information Science, pp. 273\u2013288. Springer, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-59465-6_17","DOI":"10.1007\/978-3-031-59465-6_17"},{"key":"27_CR14","doi-asserted-by":"publisher","unstructured":"Muhanad, A., Haris, R., Abouelezz, I., Barhamgi, M., Ali, R., Khan, K.M.: Do Personality Traits Really Impact Susceptibility to Persuasion in Social Engineering? A Study Among UK and Arab Samples (2024). https:\/\/www.researchsquare.com\/article\/rs-4902235\/v1, https:\/\/doi.org\/10.21203\/rs.3.rs-4902235\/v1","DOI":"10.21203\/rs.3.rs-4902235\/v1"},{"issue":"4","key":"27_CR15","doi-asserted-by":"publisher","first-page":"7","DOI":"10.7862\/rz.2020.hss.38","volume":"27","author":"K Coombs-Hoar","year":"2020","unstructured":"Coombs-Hoar, K.: Effect of cultural differences on the principle of authority introduced by Robert Cialdini. Humanit. Soc. Sci. 27(4), 7\u201318 (2020). https:\/\/doi.org\/10.7862\/rz.2020.hss.38","journal-title":"Humanit. Soc. Sci."},{"key":"27_CR16","doi-asserted-by":"publisher","unstructured":"Khaled, R., Barr, P., Noble, J., Fischer, R., Biddle, R.: Our Place or Mine? Exploration into collectivism-focused persuasive technology design. In: IJsselsteijn, W.A., de Kort, Y.A.W., Midden, C., Eggen, B., van den Hoven, E. (eds.) Persuasive Technology. PERSUASIVE 2006. LNCS, vol. 3962, pp. 72\u201383. Springer, Cham (2006). https:\/\/doi.org\/10.1007\/11755494_11","DOI":"10.1007\/11755494_11"},{"key":"27_CR17","doi-asserted-by":"publisher","unstructured":"Oyibo, K., Adaji, I., Orji, R., Olabenjo, T., Vassileva, J.: Susceptibility to persuasive strategies: a comparative analysis of Nigerians vs. Canadians. In: Proceedings of the 26th Conference on User Modeling, Adaptation and Personalization (UMAP 2018), pp. 229\u2013238. Association for Computing Machinery, New York, USA (2018). https:\/\/doi.org\/10.1145\/3209219.3209239","DOI":"10.1145\/3209219.3209239"},{"key":"27_CR18","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1016\/j.obhdp.2016.05.003","volume":"136","author":"JF Yates","year":"2016","unstructured":"Yates, J.F., de Oliveira, S.: Culture and decision making. Organ. Behav. Hum. Decis. Process. 136, 106\u2013118 (2016). https:\/\/doi.org\/10.1016\/j.obhdp.2016.05.003","journal-title":"Organ. Behav. Hum. Decis. Process."},{"key":"27_CR19","doi-asserted-by":"publisher","unstructured":"Alnunu, M., Amin, A., Abu-Rayya, H.M.: The susceptibility to persuasion strategies among Arab Muslims: the role of culture and acculturation. Front. Psychol. 12 (2021). https:\/\/doi.org\/10.3389\/fpsyg.2021.574115","DOI":"10.3389\/fpsyg.2021.574115"},{"issue":"2","key":"27_CR20","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77\u2013101 (2006). https:\/\/doi.org\/10.1191\/1478088706qp063oa","journal-title":"Qual. Res. Psychol."},{"key":"27_CR21","doi-asserted-by":"publisher","first-page":"1391","DOI":"10.1007\/s11135-021-01182-y","volume":"56","author":"D Byrne","year":"2022","unstructured":"Byrne, D.: A worked example of Braun and Clarke\u2019s approach to reflexive thematic analysis. Qual. Quant. 56, 1391\u20131412 (2022). https:\/\/doi.org\/10.1007\/s11135-021-01182-y","journal-title":"Qual. Quant."},{"key":"27_CR22","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1097\/00003086-200009000-00018","volume":"378","author":"BD Rowley","year":"2000","unstructured":"Rowley, B.D., Baldwin, D.C., Bay, R.C., Cannula, M.: Can professional values be taught? A look at residency training. Clin. Orthop. Relat. Res. 378, 110\u2013114 (2000). https:\/\/doi.org\/10.1097\/00003086-200009000-00018","journal-title":"Clin. Orthop. Relat. Res."},{"issue":"8","key":"27_CR23","doi-asserted-by":"publisher","first-page":"696","DOI":"10.1080\/01421590400019518","volume":"26","author":"K Van De Camp","year":"2004","unstructured":"Van De Camp, K., Vernooij-Dassen, M.J.F.J., Grol, R.P.T.M., Bottema, B.J.A.M.: How to conceptualize professionalism: a qualitative study. Med. Teach. 26(8), 696\u2013702 (2004). https:\/\/doi.org\/10.1080\/01421590400019518","journal-title":"Med. Teach."},{"key":"27_CR24","unstructured":"Sterling, B.: The Hacker Crackdown Law and Disorder on the Electronic Frontier. Open Road Integrated Media, New York, NY (2012)"},{"key":"27_CR25","doi-asserted-by":"crossref","unstructured":"Sun, H.: A longitudinal study of herd behavior in the adoption and continued use of technology. MIS Q. 37(4), 1013\u20131041 (2013). http:\/\/www.jstor.org\/stable\/43825780","DOI":"10.25300\/MISQ\/2013\/37.4.02"},{"issue":"2","key":"27_CR26","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1177\/109467059800100207","volume":"1","author":"N Donthu","year":"1998","unstructured":"Donthu, N., Yoo, B.: Cultural influences on service quality expectations. J. Serv. Res. 1(2), 178\u2013186 (1998). https:\/\/doi.org\/10.1177\/109467059800100207","journal-title":"J. Serv. Res."},{"issue":"2","key":"27_CR27","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1177\/1050651902016002003","volume":"16","author":"KS Amant","year":"2002","unstructured":"Amant, K.S.: When cultures and computers collide: rethinking computer-mediated communication according to international and intercultural communication expectations. J. Bus. Tech. Commun. JBTC 16(2), 196\u2013214 (2002). https:\/\/doi.org\/10.1177\/1050651902016002003","journal-title":"J. Bus. Tech. Commun. JBTC"},{"issue":"7","key":"27_CR28","doi-asserted-by":"publisher","first-page":"846","DOI":"10.1002\/asi.24760","volume":"74","author":"MS Park","year":"2023","unstructured":"Park, M.S., Park, J., Kim, H., Lee, J.H., Park, H.: Measuring the impacts of quantity and trustworthiness of information on COVID-19 vaccination intent. J. Am. Soc. Inf. Sci. 74(7), 846\u2013865 (2023). https:\/\/doi.org\/10.1002\/asi.24760","journal-title":"J. Am. Soc. Inf. Sci."},{"key":"27_CR29","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1016\/j.pragma.2013.07.012","volume":"59","author":"MJ Metzger","year":"2013","unstructured":"Metzger, M.J., Flanagin, A.J.: Credibility and trust of information in online environments: the use of cognitive heuristics. J. Pragmat. 59, 210\u2013220 (2013). https:\/\/doi.org\/10.1016\/j.pragma.2013.07.012","journal-title":"J. Pragmat."},{"issue":"3","key":"27_CR30","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1111\/j.1460-2466.2010.01488.x","volume":"60","author":"MJ Metzger","year":"2010","unstructured":"Metzger, M.J., Flanagin, A.J., Medders, R.B.: Social and heuristic approaches to credibility evaluation online. J. Commun. 60(3), 413\u2013439 (2010). https:\/\/doi.org\/10.1111\/j.1460-2466.2010.01488.x","journal-title":"J. Commun."},{"key":"27_CR31","unstructured":"Veerasamy, N., Labuschagne, W.A.: Determining trust factors of social networking In: Kuusisto, R., Kurkinen, E (eds.) Proceedings of the 12th European Conference on Information Warfare and Security, pp. 288\u2013297. Academic Conferences Ltd., UK (2013)"},{"key":"27_CR32","first-page":"91","volume-title":"The Social Net: The Social Psychology of the Internet","author":"R Guadagno","year":"2007","unstructured":"Guadagno, R., Cialdini, R.: Online persuasion and compliance: social influence on the Internet and beyond. In: Amichai-Hamburger, Y. (ed.) The Social Net: The Social Psychology of the Internet, pp. 91\u2013113. Oxford University Press, New York (2007)"},{"key":"27_CR33","doi-asserted-by":"publisher","unstructured":"Noorbehbahani, F., Zarein, Z.: The impact of demographic factors on persuasion strategies in personalized recommender system. In: 2018 8th International Conference on Computer and Knowledge Engineering (ICCKE), pp. 104\u2013109 (2018). https:\/\/doi.org\/10.1109\/ICCKE.2018.8566550","DOI":"10.1109\/ICCKE.2018.8566550"},{"issue":"9\u201310","key":"27_CR34","doi-asserted-by":"publisher","first-page":"1151","DOI":"10.1111\/jocn.12681","volume":"24","author":"R Al-Amer","year":"2015","unstructured":"Al-Amer, R., Ramjan, L., Glew, P., Darwish, M., Salamonson, Y.: Translation of interviews from a source language to a target language: examining issues in cross-cultural health care research. J. Clin. Nurs. 24(9\u201310), 1151\u20131162 (2015). https:\/\/doi.org\/10.1111\/jocn.12681","journal-title":"J. Clin. Nurs."},{"key":"27_CR35","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/j.chb.2017.02.043","volume":"72","author":"Y Akbulut","year":"2017","unstructured":"Akbulut, Y., D\u00f6nmez, O., Dursun, \u00d6.\u00d6.: Cyberloafing and social desirability bias among students and employees. Comput. Hum. Behav. 72, 87\u201395 (2017). https:\/\/doi.org\/10.1016\/j.chb.2017.02.043","journal-title":"Comput. Hum. Behav."}],"container-title":["Lecture Notes in Computer Science","Web Information Systems Engineering \u2013 WISE 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-0570-5_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,30]],"date-time":"2024-11-30T01:07:47Z","timestamp":1732928867000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-0570-5_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,30]]},"ISBN":["9789819605699","9789819605705"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-0570-5_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,30]]},"assertion":[{"value":"30 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Doha","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Qatar","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/wise2024-qatar.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}