{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T02:49:25Z","timestamp":1768531765773,"version":"3.49.0"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030555054","type":"print"},{"value":"9783030555061","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,8,6]],"date-time":"2020-08-06T00:00:00Z","timestamp":1596672000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,6]],"date-time":"2020-08-06T00:00:00Z","timestamp":1596672000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-55506-1_59","type":"book-chapter","created":{"date-parts":[[2020,8,5]],"date-time":"2020-08-05T07:02:37Z","timestamp":1596610957000},"page":"668-680","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Experimental Evaluation of Phishing Attack on High School Students"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3631-9593","authenticated-orcid":false,"given":"R.","family":"Marusenko","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9349-7946","authenticated-orcid":false,"given":"V.","family":"Sokolov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4055-1494","authenticated-orcid":false,"given":"V.","family":"Buriachok","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,6]]},"reference":[{"key":"59_CR1","doi-asserted-by":"publisher","unstructured":"Fan, W., Lwakatare, K., Rong, R.: Social engineering: I-E based model of human weakness for attack and defense investigations. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 9(1), 1\u201311 (2017). \nhttps:\/\/doi.org\/10.5815\/ijcnis.2017.01.01","DOI":"10.5815\/ijcnis.2017.01.01"},{"key":"59_CR2","doi-asserted-by":"publisher","unstructured":"Albladi, S.M., Weir, G.R.S.: User characteristics that influence judgment of social engineering attacks in social networks. Hum. Cent. Comput. Inf. Sci. 8(1), 5 (2018). \nhttps:\/\/doi.org\/10.1186\/s13673-018-0128-7","DOI":"10.1186\/s13673-018-0128-7"},{"key":"59_CR3","doi-asserted-by":"publisher","unstructured":"Sokolov, V.Y., Kurbanmuradov, D.M.: Method of counteraction in social engineering on information activity objectives. Cybersecur. Educ. Sci. Tech. 1, 6\u201316 (2018). \nhttps:\/\/doi.org\/10.28925\/2663-4023.2018.1.616","DOI":"10.28925\/2663-4023.2018.1.616"},{"key":"59_CR4","doi-asserted-by":"publisher","unstructured":"Sokolov, V.Y., Korzhenko, O.Y.: Analysis of recent attacks based on social engineering techniques. In: Dorenskyi, O.P. (ed.) All-Ukrainian Scientific and Practical Conference of Higher Education Applicants and Young Scientists \u201cComputer Engineering and Cyber Security: Achievements and Innovations, pp. 361\u2013363. Kropyvnytskyi (2018). \nhttps:\/\/doi.org\/10.5281\/zenodo.2575459","DOI":"10.5281\/zenodo.2575459"},{"key":"59_CR5","unstructured":"Kessel, P.: EY Global Information Security Survey 2018\u201319, London (2019)"},{"key":"59_CR6","unstructured":"Cisco: Annual Cybersecurity Report, San Jose (2018)"},{"key":"59_CR7","unstructured":"Campbell, N., Lautenbach, B.: Telstra Security Report 2018, Sydney (2018)"},{"key":"59_CR8","unstructured":"Pescatore, J.: SANS Top New Attacks and Threat Report, Swansea (2019)"},{"key":"59_CR9","unstructured":"Floderus, S., Rosenholm, L.: An Educational Experiment in Discovering Spear Phishing Attacks, Karlskrona (2019). urn:nbn:se:bth-18446"},{"issue":"1","key":"59_CR10","doi-asserted-by":"publisher","first-page":"4","DOI":"10.2139\/ssrn.3176319","volume":"2","author":"R Broadhurst","year":"2019","unstructured":"Broadhurst, R., et al.: Phishing and cybercrime risks in a university student community. Int. J. Cybersecur. Intell. Cybercrim. 2(1), 4\u201323 (2019). \nhttps:\/\/doi.org\/10.2139\/ssrn.3176319","journal-title":"Int. J. Cybersecur. Intell. Cybercrim."},{"key":"59_CR11","doi-asserted-by":"publisher","unstructured":"Chaudhry, J.A., Chaudhry, S.A., Rittenhouse, R.G.: Phishing attacks and defenses. Int. J. Secur. Appl. (IJSIA) 10(1), 247\u2013256 (2016). \nhttps:\/\/doi.org\/10.14257\/ijsia.2016.10.1.23","DOI":"10.14257\/ijsia.2016.10.1.23"},{"key":"59_CR12","unstructured":"Positive Technologies: Cybersecurity Threatscape 2018. Trends and Forecasts, London (2019)"},{"key":"59_CR13","unstructured":"Funk, G., et al.: Implementation Guideline ISO\/IEC 27001:2013. A practical guideline for implementing an ISMS in accordance with the international standard ISO\/IEC 27001:2013, Berlin (2017)"},{"key":"59_CR14","doi-asserted-by":"publisher","unstructured":"Gururaj, H.L., Swathi, B.H., Ramesh, B.: Threats, consequences and issues of various attacks on online social networks. Int. J. Educ. Manag. Eng. (IJEME) 8(4), 50\u201360 (2018). \nhttps:\/\/doi.org\/10.5815\/ijeme.2018.04.05","DOI":"10.5815\/ijeme.2018.04.05"},{"key":"59_CR15","doi-asserted-by":"publisher","unstructured":"Zareapoor, M., Seeja, K.R.: Feature extraction or feature selection for text classification: a case study on phishing email detection. Int. J. Inf. Eng. Electron. Bus. (IJIEEB) 7(2), 60\u201365 (2015). \nhttps:\/\/doi.org\/10.5815\/ijieeb.2015.02.08","DOI":"10.5815\/ijieeb.2015.02.08"},{"key":"59_CR16","unstructured":"Can you spot when you\u2019re being phished? (2018). \nhttps:\/\/phishingquiz.withgoogle.com\n\n. Accessed 28 Nov 2019"},{"key":"59_CR17","unstructured":"Statistical portrait (2019). \nhttp:\/\/kubg.edu.ua\/prouniversitet\/vizytivka\/statistichni-portret.html\n\n. Accessed 28 Nov 2019. (Publication in Ukrainian)"},{"key":"59_CR18","doi-asserted-by":"publisher","unstructured":"Rahman, M.M.: Mining social data to extract intellectual knowledge. Int. J. Intell. Syst. Appl. (IJISA) 4(10), 15\u201324 (2012). \nhttps:\/\/doi.org\/10.5815\/ijisa.2012.10.02","DOI":"10.5815\/ijisa.2012.10.02"},{"key":"59_CR19","doi-asserted-by":"publisher","unstructured":"Wang, B., Wei, Y., Yang, Y., Han, J.: Design and implementation of anti-phishing authentication system. Int. J. Wirel. Microwave Technol. (IJWMT) 1(6), 38\u201345 (2011). \nhttps:\/\/doi.org\/10.5815\/ijwmt.2011.06.06","DOI":"10.5815\/ijwmt.2011.06.06"},{"key":"59_CR20","doi-asserted-by":"publisher","unstructured":"Gupta, R., Shukla, P.K.: Experimental analysis of browser based novel anti-phishing system tool at educational level. Int. J. Inf. Technol. Comput. Sci. (IJITCS) 8(2), 78\u201384 (2016). \nhttps:\/\/doi.org\/10.5815\/ijitcs.2016.02.10","DOI":"10.5815\/ijitcs.2016.02.10"},{"key":"59_CR21","doi-asserted-by":"publisher","unstructured":"Yin, M., Luo, J., Cao, D., et al.: User name alias extraction in emails. Int. J. Image Graph. Sig. Process. (IJIGSP) 3, 1\u20139 (2011). \nhttps:\/\/doi.org\/10.5815\/ijigsp.2011.03.01","DOI":"10.5815\/ijigsp.2011.03.01"},{"key":"59_CR22","doi-asserted-by":"publisher","unstructured":"Nasr, A.A., Ezz, M.M., Abdulmaged, M.Z.: An intrusion detection and prevention system based on automatic learning of traffic anomalies. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 1, 53\u201360 (2016). \nhttps:\/\/doi.org\/10.5815\/ijcnis.2016.01.07","DOI":"10.5815\/ijcnis.2016.01.07"},{"key":"59_CR23","doi-asserted-by":"publisher","unstructured":"Bernacki, J., Ko\u0142aczek, G.: Anomaly detection in network traffic using selected methods of time series analysis. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 9, 10\u201318 (2015). \nhttps:\/\/doi.org\/10.5815\/ijcnis.2015.09.02","DOI":"10.5815\/ijcnis.2015.09.02"},{"key":"59_CR24","doi-asserted-by":"publisher","unstructured":"Abdulhamid, S.M., Shuaib, M., Osho, O., et al.: Comparative analysis of classification algorithms for email spam detection. Int. J. Comput. Netw. Inf. Secur. (IJCNIS) 1, 60\u201367 (2018). \nhttps:\/\/doi.org\/10.5815\/ijcnis.2018.01.07","DOI":"10.5815\/ijcnis.2018.01.07"},{"key":"59_CR25","doi-asserted-by":"publisher","unstructured":"Buriachok, V., Sokolov, V.: Implementation of active learning in the master\u2019s program on cybersecurity. In: Hu, Z., Petoukhov, S., Dychka, I., He, M. (eds) Advances in Computer Science for Engineering and Education II. ICCSEEA 2019. Advances in Intelligent Systems and Computing, vol. 938, pp. 610\u2013624. Springer, Cham (2020). \nhttps:\/\/doi.org\/10.1007\/978-3-030-16621-2_57","DOI":"10.1007\/978-3-030-16621-2_57"}],"container-title":["Advances in Intelligent Systems and Computing","Advances in Computer Science for Engineering and Education III"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-55506-1_59","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,5]],"date-time":"2020-08-05T07:33:54Z","timestamp":1596612834000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-55506-1_59"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,6]]},"ISBN":["9783030555054","9783030555061"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-55506-1_59","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,8,6]]},"assertion":[{"value":"6 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSEEA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computer Science, Engineering and Education Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kiev","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ukraine","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 January 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 January 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccseea2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.uacnconf.org\/iccseea2020\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}