{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,5]],"date-time":"2024-05-05T20:25:27Z","timestamp":1714940727132},"reference-count":16,"publisher":"CRC Press","isbn-type":[{"value":"9781420066203","type":"print"},{"value":"9781420066227","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,12,21]]},"DOI":"10.1081\/e-eia-120046852","type":"book-chapter","created":{"date-parts":[[2016,7,28]],"date-time":"2016-07-28T15:20:59Z","timestamp":1469719259000},"page":"2751-2760","source":"Crossref","is-referenced-by-count":0,"title":["Social Engineering: Mitigation"],"prefix":"10.1081","author":[{"given":"Marcus","family":"Rogers","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2010,12,20]]},"reference":[{"key":"CIT0007","first-page":"51","volume-title":"Handbook of Information Security Management","author":"Berti J.","year":"2002"},{"key":"CIT0008","volume-title":"Social Engineering","author":"Wright M.","year":"2003"},{"key":"CIT0011","volume-title":"Information Policy","author":"Martinez S. M.","year":"2004"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.psych.51.1.539"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.83.3.526"},{"issue":"1","key":"CIT0015","first-page":"48","volume":"8","author":"Masip J.","year":"2004","journal-title":"Psychology in Spain"},{"key":"CIT0016","first-page":"66","volume-title":"Perspectives on Persuasion, Social Influence and Compliance Gaining","author":"Petty R.","year":"2004"},{"key":"CIT0017","first-page":"3","volume-title":"Information Security Handbook","author":"Rogers M.","year":"2006"},{"key":"CIT0018","volume-title":"The Art of Deception: Controlling the Human Element of Security","author":"Mitnick K.","year":"2003"},{"key":"CIT0019","doi-asserted-by":"crossref","unstructured":"Hoeschele , M. Rogers , M.Detecting social engineering. In Advances in Digital Forensics; Pollit , M. Shinoi , S. , Eds. Springer : New York , 2005 ; 67 \u2013 77 .","DOI":"10.1007\/0-387-31163-7_6"},{"key":"CIT0021","volume-title":"The Complete Idiot's Guide to Persuasion","author":"Booth-Butterfield S.","year":"2009"},{"key":"CIT0022","first-page":"4","volume":"49","author":"Meichenbaum D.","year":"1996","journal-title":"Clinical Psychologist"},{"key":"CIT0023","volume-title":"How People Learn: Brain, Mind Experience and School","author":"Bransford J.","year":"2000"},{"key":"CIT0024","volume-title":"How to Write and Use Instructional Objectives","author":"Gronlund N.","year":"2000","edition":"6"},{"issue":"1","key":"CIT0025","volume":"9","author":"Winkler I. S.","year":"1996","journal-title":"Comput. Syst. Winter"},{"key":"CIT0027","volume-title":"Intruders and Deceivers","author":"Mitnick K.","year":"2005"}],"container-title":["Encyclopedia of Information Assurance"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.crcnetbase.com\/doi\/pdf\/10.1081\/E-EIA-120046852","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T21:33:32Z","timestamp":1568237612000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.crcnetbase.com\/doi\/10.1081\/E-EIA-120046852"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,12,20]]},"ISBN":["9781420066203","9781420066227"],"references-count":16,"alternative-id":["10.1081\/E-EIA-120046852","10.1081\/E-EIA"],"URL":"https:\/\/doi.org\/10.1081\/e-eia-120046852","relation":{},"subject":[],"published":{"date-parts":[[2010,12,20]]}}}