{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T01:39:24Z","timestamp":1772933964208,"version":"3.50.1"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/bigdata66926.2025.11402315","type":"proceedings-article","created":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T20:57:57Z","timestamp":1772830677000},"page":"3752-3761","source":"Crossref","is-referenced-by-count":0,"title":["Social Engineering Attacks: A Systemisation of Knowledge on People Against Humans"],"prefix":"10.1109","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1093-6721","authenticated-orcid":false,"given":"Scott","family":"Thomson","sequence":"first","affiliation":[{"name":"Charles Sturt University,Faculty of Business, Justice and Behavioural Sciences,Sydney,Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5848-7451","authenticated-orcid":false,"given":"Michael","family":"Bewong","sequence":"additional","affiliation":[{"name":"Charles Sturt University,Faculty of Business, Justice and Behavioural Sciences,Wagga,Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0487-0615","authenticated-orcid":false,"given":"Arash","family":"Mahboubi","sequence":"additional","affiliation":[{"name":"University of NSW,Canberra,Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3802-5687","authenticated-orcid":false,"given":"Tanveer","family":"Zia","sequence":"additional","affiliation":[{"name":"School of Arts and Sciences, University of Notre Dame,Sydney,Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1093\/jtm\/taab103"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1108\/sasbe-09-2024-0363"},{"key":"ref3","article-title":"City of Parramatta, Smart City and Innovation Strategy","year":"2024","journal-title":"City of Parramatta: Sydney"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2025.03.135"},{"key":"ref5","volume-title":"ASD Cyber Threat Report 2022\u20132023 | Cyber.gov.au. 2023 14\/11\/23","year":"2023"},{"key":"ref6","article-title":"Australian Cyber Security Centre","volume-title":"Annual Cyber Threat Report 2023\u20132024","year":"2024"},{"key":"ref7","article-title":"Australian Cyber Security Centre, ACSC Annual Cyber Threat Report, July 2021 to June 2022, Australian Cyber Security Centre, Editor","journal-title":"2022, Australian Signals Directorate: Online"},{"key":"ref8","volume-title":"JPCERT Coordination Center Business E-mail Compromise Survey Report","year":"2020"},{"key":"ref9","first-page":"34","article-title":"The State of Scams in Japan 2024","author":"Abraham","year":"2024","journal-title":"Global Anti-Scam Alliance: Online"},{"key":"ref10","volume-title":"Leading social media apps in Australia as of January 2022, by downloads. Statista [Graph]","year":"2022"},{"key":"ref11","volume-title":"Number of social media users worldwide from 2017 to 2028 (in billions). Statista [Graph]","year":"2025"},{"key":"ref12","article-title":"Optus Data Breach, Australian Cyber Security Centre, Editor","year":"2022","journal-title":"Australian Signals Directorate: Online"},{"key":"ref13","article-title":"Medibank Private Cyber Security Incident, Australian Cyber Security Centre, Editor","year":"2022","journal-title":"Australian Signals Directorate: Online"},{"key":"ref14","volume-title":"Standards Australia, Data and Digital Standards Landscape","year":"2022"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2024.104004"},{"key":"ref16","first-page":"7","article-title":"Proofpoint, The Human Factor2021 - Cybersecurity, ransomware and email fraud in a year that changed the world [Report]","year":"2022","journal-title":"Proofpoint: Online"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2020.3016821"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1177\/0162243921992844"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10111-021-00683-y"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-11-2020-0179"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3390\/app11199266"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-02-2021-0021"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3130013"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.3390\/app112311269"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2021.101766"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.7717\/peerj-cs.827"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3389\/feduc.2021.807277"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106979"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-11-2020-0753"},{"key":"ref30","article-title":"Share of internet users in Australia who use social media for online shopping in the year 2020 with forecasts up to 2024","volume-title":"Statista [Graph] 2021","year":"2021"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1177\/10534512050400030401"},{"key":"ref32","volume-title":"ACSC Annual Cyber Threat Report - 1 July 2020 to 30 June 2021","year":"2021"},{"key":"ref33","article-title":"Annual Cyber Threat Report 2024\u20132025, ACSC, Editor","year":"2025","journal-title":"Australian Government: Canberra"},{"key":"ref34","first-page":"1","volume-title":"Japan National Center of Incident readiness and Strategy for Cybersecurity, QUAD Cyber Challenge Campaign","year":"2023"},{"key":"ref35","volume-title":"Strategies to mitigate cyber security incidents","year":"2021"},{"key":"ref36","volume-title":"Phishing by Industry Benchmarking Report","author":"Huisman","year":"2024"}],"event":{"name":"2025 IEEE International Conference on Big Data (BigData)","location":"Macau, China","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,11]]}},"container-title":["2025 IEEE International Conference on Big Data (BigData)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11400704\/11400712\/11402315.pdf?arnumber=11402315","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T06:56:09Z","timestamp":1772866569000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11402315\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/bigdata66926.2025.11402315","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}