{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:15:54Z","timestamp":1743106554623,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031048180"},{"type":"electronic","value":"9783031048197"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-04819-7_24","type":"book-chapter","created":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T10:02:41Z","timestamp":1652695361000},"page":"233-242","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Information Security Threat Assessment Using Social Engineering in the Organizational Context \u2013 Literature Review"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8996-6394","authenticated-orcid":false,"given":"Ant\u00f3nio","family":"Lopes","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4398-8384","authenticated-orcid":false,"given":"Leonilde","family":"Reis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5383-9884","authenticated-orcid":false,"given":"Henrique","family":"S\u00e3o Mamede","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5139-6728","authenticated-orcid":false,"given":"Arnaldo","family":"Santos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,17]]},"reference":[{"key":"24_CR1","first-page":"260","volume":"93","author":"\u015e Ada","year":"2015","unstructured":"Ada, \u015e, Ghaffarzadeh, M.: Decision making based on management information system and decision support system. Eur. Res. 93, 260\u2013269 (2015)","journal-title":"Eur. Res."},{"key":"24_CR2","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1016\/j.proeng.2015.12.083","volume":"129","author":"L Astakhova","year":"2015","unstructured":"Astakhova, L.: Evaluation assurance levels for human resource security of an information system. Procedia Eng. 129, 635\u2013639 (2015)","journal-title":"Procedia Eng."},{"key":"24_CR3","unstructured":"Bansla, N., Kunwar, S., Jain, K.: Social engineering: a technique for managing human behavior (2019)"},{"key":"24_CR4","doi-asserted-by":"crossref","unstructured":"Beckers, K., Pape, S.: A serious game for eliciting social engineering security requirements (2016)","DOI":"10.1109\/RE.2016.39"},{"key":"24_CR5","unstructured":"Bianchi, I., Dinis, R.: Governan\u00e7a de TI em universidades p\u00fablicas: Proposta de um modelo. Instituto Universit\u00e1rio de Lisboa (ISCTE-IUL). http:\/\/repositorium.sdum.uminho.pt\/handle\/1822\/39467, Accessed 01 Nov 2021"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Breda, F., Barbosa, H., Morais, T.: Social engineering and cyber security (2017)","DOI":"10.21125\/inted.2017.1008"},{"key":"24_CR7","unstructured":"Brocke, J., Hevner, A., Maedche, A.: Introduction to design science research (2020)"},{"key":"24_CR8","doi-asserted-by":"publisher","first-page":"31","DOI":"10.19101\/IJACR.2016.623006","volume":"6","author":"N Conteh","year":"2016","unstructured":"Conteh, N., Schmick, P.: Cybersecurity: risks, vulnerabilities, and countermeasures to prevent social engineering attacks. Int. J. Adv. Comput. Res. 6, 31 (2016)","journal-title":"Int. J. Adv. Comput. Res."},{"key":"24_CR9","doi-asserted-by":"publisher","first-page":"101747","DOI":"10.1016\/j.cose.2020.101747","volume":"92","author":"R Diesch","year":"2020","unstructured":"Diesch, R., Pfaff, M., Krcmar, H.: A comprehensive model of information security factors for decision-makers. Comput. Secur. 92, 101747 (2020)","journal-title":"Comput. Secur."},{"key":"24_CR10","unstructured":"Farinha, P., Sousa, G.: O Impacto da Consciencializa\u00e7\u00e3o dos Colaboradores na Seguran\u00e7a da Informa\u00e7\u00e3o das Organiza\u00e7\u00f5es. Revista CyberLaw. Edi\u00e7\u00e3o N.\u00ba XI. Mar\u00e7o 2021. CIJIC (2021)"},{"key":"24_CR11","unstructured":"Ferreira, I., Ferreira, S., Silva, C., Carvalho, J.: Dilemas iniciais na investiga\u00e7\u00e3o em TSI design science e design research, uma clarifica\u00e7\u00e3o de conceitos. In: Proceedings of Confer\u00eancia Ib\u00e9rica de Sistemas y Tecnologias de Informa\u00e7\u00e3o (2012)"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Ghafir, I., Prenosil, V., Alhejailan, A., Hammoudeh, M.: Social engineering attack strategies and defence approaches, pp 145\u2013149 (2016)","DOI":"10.1109\/FiCloud.2016.28"},{"issue":"10","key":"24_CR13","doi-asserted-by":"publisher","first-page":"4986","DOI":"10.1007\/s11227-018-2337-2","volume":"74","author":"I Ghafir","year":"2018","unstructured":"Ghafir, I., et al.: Security threats to critical infrastructure: the human factor. J. Supercomput. 74(10), 4986\u20135002 (2018). https:\/\/doi.org\/10.1007\/s11227-018-2337-2","journal-title":"J. Supercomput."},{"issue":"28","key":"24_CR14","doi-asserted-by":"publisher","first-page":"75","DOI":"10.2307\/25148625","volume":"1","author":"A Hevner","year":"2004","unstructured":"Hevner, A., March, S., Park, J., Ram, S.: Design science in information systems research. MIS Q. 1(28), 75\u2013105 (2004)","journal-title":"MIS Q."},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Kalni\u0146\u0161, R., Puri\u0146\u0161, J., Alksnis, G.: Security evaluation of wireless network access points. Appl. Comput. Syst. 21, 38\u201345 (2017)","DOI":"10.1515\/acss-2017-0005"},{"key":"24_CR16","doi-asserted-by":"publisher","unstructured":"Lacerda, P., Dresch, A., Proen\u00e7a, A., Antunes, A.: Design Science research: 89 m\u00e9todo de pesquisa para a engenharia de produ\u00e7\u00e3o. Gest\u00e3o Produ\u00e7\u00e3o 20(4), 741\u2013761 (2011). https:\/\/doi.org\/10.1590\/S0104-530X2013005000014, Accessed 01 Nov 2021","DOI":"10.1590\/S0104-530X2013005000014"},{"key":"24_CR17","unstructured":"Lohani, S.: Social engineering: hacking into humans. Int. J. Adv. Stud. Sci. Res. 4(1) (2021). https:\/\/ssrn.com\/abstract=3329391, Accessed 01 Nov 2021"},{"key":"24_CR18","unstructured":"Lopes, A., Reis, L.: Framework para Avalia\u00e7\u00e3o de Amea\u00e7as \u00e0 Seguran\u00e7a de Informa\u00e7\u00e3o com Recurso a Engenharia Social no contexto Organizacional. In: IFM Conference \u2013 Internacional F\u00f3rum on Managment (2021)"},{"key":"24_CR19","unstructured":"Lopes, A., Reis, L.: Engenharia Social: Uma amea\u00e7a oculta para a Seguran\u00e7a da Informa\u00e7\u00e3o Organizacional. In Reis, L., et al. (eds.) Temas Emergentes em Ci\u00eancias Empresariais - Novas abordagens nas \u00e1reas cient\u00edficas da Contabilidade, Finan\u00e7as, Sistemas de Informa\u00e7\u00e3o, Metodologias e Pr\u00e1ticas Pedag\u00f3gicas. Edi\u00e7\u00f5es S\u00edlabo (2022)"},{"key":"24_CR20","unstructured":"Merwe, J., Mouton, F.: Mapping the anatomy of social engineering attacks to the systems engineering life cycle (2017)"},{"issue":"59","key":"24_CR21","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/j.cose.2016.03.004","volume":"2016","author":"F Mouton","year":"2016","unstructured":"Mouton, F., Leenen, L., Venter, H.: Social engineering attack examples, templates and scenarios. Comput. Secur. 2016(59), 186\u2013209 (2016)","journal-title":"Comput. Secur."},{"key":"24_CR22","unstructured":"Pandey, A.: Phishing and social engineering techniques (2019)"},{"key":"24_CR23","unstructured":"Pedro, S.: Modela\u00e7\u00e3o de Processos para as principais \u00e1reas de Recursos Humanos. Nova Information Management School (2015)"},{"key":"24_CR24","doi-asserted-by":"crossref","unstructured":"Peffers, K., Tuunanen, T., Rothenberger, M., Chatterjee, S.: A design science research methodology for information systems research. J. Manag. Inf. Syst. 24, 45\u201377 (2007)","DOI":"10.2753\/MIS0742-1222240302"},{"key":"24_CR25","doi-asserted-by":"crossref","unstructured":"Pokrovskaia, N.: Social engineering and digital technologies for the security of the social capital development. In: Proceedings of the International Conference of Quality Management, Transport and Information Security, Petersburg, Russia, 24\u201330 September 2017, pp. 16\u201319 (2017)","DOI":"10.1109\/ITMQIS.2017.8085750"},{"key":"24_CR26","unstructured":"Roquete, M.: Modelo de maturidade para apoio \u00e0 implementa\u00e7\u00e3o de uma filosofia de gest\u00e3o orientada a processos numa organiza\u00e7\u00e3o. Nova Information Management School, Lisboa (2018)"},{"key":"24_CR27","doi-asserted-by":"crossref","unstructured":"Salahdine, F., Kaabouch, N.: Social engineering attacks: a survey. Fut. Internet 11, 89 (2019)","DOI":"10.3390\/fi11040089"},{"key":"24_CR28","unstructured":"Stallings, W.: Cryptography and Network Security: Principles and Practice, 7 edn. Pearson Education, Harlow (2017)"},{"key":"24_CR29","doi-asserted-by":"publisher","unstructured":"Venkatesha, S., Reddy, R., Chandavarkar, R.: social engineering attacks during the COVID-19 pandemic. SN Comput. Sci. 2, 78 (2021). https:\/\/doi.org\/10.1007\/s42979-020-00443-1, Accessed 01 Nov 2021","DOI":"10.1007\/s42979-020-00443-1"},{"key":"24_CR30","doi-asserted-by":"crossref","unstructured":"Van, D., Sjouw, A., Smakman, M., Smit, K.: Social engineering as approach for probing organizations to improve IT security: a case study at a large international firm in the transport industry, pp. 119\u2013126 (2019)","DOI":"10.33965\/es2019_201904L015"},{"key":"24_CR31","doi-asserted-by":"crossref","unstructured":"Veiga, A., Astakhova, L., Botha, A., Herselman, M.: Defining organizational information security culture \u2013 perspectives from academia and industry. Comput. Secur. 92, 101713 (2020)","DOI":"10.1016\/j.cose.2020.101713"},{"key":"24_CR32","doi-asserted-by":"publisher","unstructured":"Wang, Z., Sun, L., Zhu, H.: Defining social engineering in cybersecurity. IEEE Access 8, 85094 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2020.2992807, Accessed 01 Nov 2021","DOI":"10.1109\/ACCESS.2020.2992807"}],"container-title":["Lecture Notes in Networks and Systems","Information Systems and Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-04819-7_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T01:18:17Z","timestamp":1727227097000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-04819-7_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031048180","9783031048197"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-04819-7_24","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"type":"print","value":"2367-3370"},{"type":"electronic","value":"2367-3389"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"17 May 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WorldCIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"World Conference on Information Systems and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Budva","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Montenegro","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 April 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"worldcist2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/worldcist.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}