{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T15:21:39Z","timestamp":1743002499865,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031048081"},{"type":"electronic","value":"9783031048098"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-04809-8_53","type":"book-chapter","created":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T05:02:51Z","timestamp":1651122171000},"page":"583-594","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Method of Obtaining Data from Open Scientific Sources and Social Engineering Attack Simulation"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3631-9593","authenticated-orcid":false,"given":"Roman","family":"Marusenko","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9349-7946","authenticated-orcid":false,"given":"Volodymyr","family":"Sokolov","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9390-2980","authenticated-orcid":false,"given":"Ivan","family":"Bogachuk","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,29]]},"reference":[{"key":"53_CR1","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.cose.2021.102248","volume":"105","author":"HS Lallie","year":"2021","unstructured":"Lallie, H.S., et al.: Cyber security in the age of COVID-19: a timeline and analysis of cyber-crime and cyber-attacks during the pandemic. Comput. Secur. 105, 102\u2013248 (2021). https:\/\/doi.org\/10.1016\/j.cose.2021.102248","journal-title":"Comput. Secur."},{"issue":"2","key":"53_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5815\/ijieeb.2021.02.01","volume":"13","author":"R Khweiled","year":"2021","unstructured":"Khweiled, R., Jazzar, M., Eleyan, D.: Cybercrimes during COVID-19 Pandemic. Int. J. Inf. Eng. Electron. Bus. 13(2), 1\u201310 (2021). https:\/\/doi.org\/10.5815\/ijieeb.2021.02.01","journal-title":"Int. J. Inf. Eng. Electron. Bus."},{"issue":"4","key":"53_CR3","doi-asserted-by":"publisher","first-page":"35","DOI":"10.5815\/ijeme.2021.04.04","volume":"11","author":"M Jazzar","year":"2021","unstructured":"Jazzar, M., Yousef, R.F., Eleyan, D.: Evaluation of machine learning techniques for email spam classification. Int. J. Educ. Manag. Eng. 11(4), 35\u201342 (2021). https:\/\/doi.org\/10.5815\/ijeme.2021.04.04","journal-title":"Int. J. Educ. Manag. Eng."},{"issue":"1","key":"53_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5815\/ijcnis.2017.01.01","volume":"9","author":"W Fan","year":"2017","unstructured":"Fan, W., Lwakatare, K., Rong, R.: Social engineering: I-E based model of human weakness for attack and defense investigations. Int. J. Comput. Netw. Inf. Secur. 9(1), 1\u201311 (2017). https:\/\/doi.org\/10.5815\/ijcnis.2017.01.01","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"key":"53_CR5","unstructured":"ISO\/IEC 27032:2012. Information technology\u2014security techniques\u2014guidelines for cybersecurity. https:\/\/www.iso.org\/standard\/44375.html. Accessed 31 Oct 2021"},{"key":"53_CR6","unstructured":"Cialdini, R.B.: Influence: The Psychology of Persuasion. Rev. Ed. Harper Collins, New York (2017)"},{"key":"53_CR7","doi-asserted-by":"publisher","unstructured":"Zielinska, O., et al.: The persuasive phish. In: Proceedings of the Symposium and Bootcamp on the Science of Security (2016). https:\/\/doi.org\/10.1145\/2898375.2898382","DOI":"10.1145\/2898375.2898382"},{"key":"53_CR8","doi-asserted-by":"publisher","unstructured":"Arabia-Obedoza, M.R., et al.: Social engineering attacks a reconnaissance synthesis analysis. In: 2020 11th IEEE Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (2020). https:\/\/doi.org\/10.1109\/uemcon51285.2020.9298100","DOI":"10.1109\/uemcon51285.2020.9298100"},{"key":"53_CR9","series-title":"Smart Innovation, Systems and Technologies","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-981-13-9155-2_5","volume-title":"Developments and Advances in Defense and Security","author":"E Benavides","year":"2020","unstructured":"Benavides, E., Fuertes, W., Sanchez, S., Sanchez, M.: Classification of phishing attack solutions by employing deep learning techniques: a systematic literature review. In: Rocha, \u00c1., Pereira, R.P. (eds.) Developments and Advances in Defense and Security. SIST, vol. 152, pp. 51\u201364. Springer, Singapore (2020). https:\/\/doi.org\/10.1007\/978-981-13-9155-2_5"},{"key":"53_CR10","doi-asserted-by":"publisher","unstructured":"Ona, D., et al.: Phishing attacks: detecting and preventing infected e-mails using machine learning methods. In: 2019 3rd Cyber Security in Networking Conference (2019). https:\/\/doi.org\/10.1109\/csnet47905.2019.9108961","DOI":"10.1109\/csnet47905.2019.9108961"},{"key":"53_CR11","doi-asserted-by":"publisher","unstructured":"FBI: internet crime report 2020. Comput. Fraud Secur. 2021(4), 4 (2021). https:\/\/doi.org\/10.1016\/s1361-3723(21)00038-5","DOI":"10.1016\/s1361-3723(21)00038-5"},{"key":"53_CR12","unstructured":"Internet crime report (2020). https:\/\/www.ic3.gov\/Media\/PDF\/AnnualReport\/2020_IC3Report.pdf. Accessed 31 Oct 2021"},{"key":"53_CR13","doi-asserted-by":"publisher","unstructured":"Nicholson, J., et al.: Investigating teenagers\u2019 ability to detect phishing messages. In: 2020 IEEE European Symposium on Security and Privacy Workshops (2020). https:\/\/doi.org\/10.1109\/eurospw51379.2020.00027","DOI":"10.1109\/eurospw51379.2020.00027"},{"key":"53_CR14","doi-asserted-by":"publisher","unstructured":"Gomes, V., Reis, J., Alturas, B.: Social engineering and the dangers of phishing. In: 2020 15th Iberian Conference on Information Systems and Technologies (2020). https:\/\/doi.org\/10.23919\/cisti49556.2020.9140445","DOI":"10.23919\/cisti49556.2020.9140445"},{"key":"53_CR15","unstructured":"Thomas theorem. https:\/\/www.oxfordreference.com\/view\/10.1093\/oi\/authority.20110803104247382. Accessed 31 Oct 2021"},{"key":"53_CR16","doi-asserted-by":"publisher","first-page":"101699","DOI":"10.1016\/j.is.2020.101699","volume":"104","author":"T Li","year":"2020","unstructured":"Li, T., Wang, X., Ni, Y.: Aligning social concerns with information system security: A fundamental ontology for social engineering. Inf. Syst. 104, 101699 (2020). https:\/\/doi.org\/10.1016\/j.is.2020.101699","journal-title":"Inf. Syst."},{"key":"53_CR17","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.ijhcs.2018.12.004","volume":"125","author":"A Ferreira","year":"2019","unstructured":"Ferreira, A., Teles, S.: Persuasion: how phishing emails can influence users and bypass security measures. Int. J. Hum.-Comput. Stud. 125, 19\u201331 (2019). https:\/\/doi.org\/10.1016\/j.ijhcs.2018.12.004","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"53_CR18","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"668","DOI":"10.1007\/978-3-030-55506-1_59","volume-title":"Advances in Computer Science for Engineering and Education III","author":"R Marusenko","year":"2021","unstructured":"Marusenko, R., Sokolov, V., Buriachok, V.: Experimental evaluation of phishing attack on high school students. In: Hu, Z., Petoukhov, S., Dychka, I., He, M. (eds.) ICCSEEA 2020. AISC, vol. 1247, pp. 668\u2013680. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-55506-1_59"},{"key":"53_CR19","unstructured":"Marusenko, R., et al.: Social engineering penetration testing in higher education institutions. In: Proceedings of the 2nd International Workshop on Cyber Hygiene & Conflict Management in Global Information Networks, pp. 1\u201312 (2021). [Preprint]"},{"key":"53_CR20","unstructured":"CEUR workshop proceedings. http:\/\/ceur-ws.org\/. Accessed 31 Oct 2021"},{"key":"53_CR21","unstructured":"Development public API. https:\/\/pub.orcid.org\/v3.0\/#\/Development_Public_API_v3.0. Accessed 31 Oct 2021"},{"key":"53_CR22","doi-asserted-by":"publisher","first-page":"6","DOI":"10.28925\/2663-4023.2018.1.616","volume":"1","author":"V Sokolov","year":"2018","unstructured":"Sokolov, V., Kurbanmuradov, D.: Method of counteraction in social engineering on information activity objectives. Cybersecur. Educ. Sci. Tech. 1, 6\u201316 (2018). https:\/\/doi.org\/10.28925\/2663-4023.2018.1.616","journal-title":"Cybersecur. Educ. Sci. Tech."},{"issue":"1","key":"53_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5815\/ijcnis.2020.01.01","volume":"12","author":"AA S\u00fczen","year":"2020","unstructured":"S\u00fczen, A.A.: A risk-assessment of cyber attacks and defense strategies in industry 4.0 ecosystem. Int. J. Comput. Netw. Inf. Secur. 12(1), 1\u201312 (2020). https:\/\/doi.org\/10.5815\/ijcnis.2020.01.01","journal-title":"Int. J. Comput. Netw. Inf. Secur."},{"key":"53_CR24","unstructured":"Anzodev: Mailer. Simple script for making email campaign. https:\/\/github.com\/anzodev\/mailer. Accessed 26 Jan 2022"},{"key":"53_CR25","unstructured":"Annual state of phishing report (2021). https:\/\/cofense.com\/wp-content\/uploads\/2021\/02\/cofense-annual-report-2021.pdf. Accessed 31 Oct 2021"},{"key":"53_CR26","doi-asserted-by":"crossref","unstructured":"2021 data breach investigations report. https:\/\/enterprise.verizon.com\/business\/resources\/reports\/2021-data-breach-investigations-report.pdfx. Accessed 31 Oct 2021","DOI":"10.1016\/S1361-3723(21)00061-0"},{"key":"53_CR27","unstructured":"Pilkey, A.: Spam is still the choice of online criminals, 40 years later. https:\/\/www.f-secure.com\/gb-en\/press\/p\/spam-is-still-the-choice-of-online-criminals-40-years-later. Accessed 31 Oct 2021"},{"key":"53_CR28","unstructured":"Shipley, D.: The hard truths about phishing simulation click rates. https:\/\/www.linkedin.com\/pulse\/hard-truths-phishing-simulation-click-rates-david-shipley. Accessed 31 Oct 2021"},{"key":"53_CR29","unstructured":"Spitzner, L.: Why a phishing click rate of 0% is bad. https:\/\/www.sans.org\/blog\/why-a-phishing-click-rate-of-0-is-bad\/. Accessed 31 Oct 2021"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Artificial Systems for Logistics Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-04809-8_53","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T05:16:36Z","timestamp":1651122996000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-04809-8_53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031048081","9783031048098"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-04809-8_53","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"29 April 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAILE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The International Conference on Artificial Intelligence and Logistics Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kiev","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ukraine","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 February 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 February 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icaile2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icics.net\/conf\/2022\/ICAILE2022\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}