{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T04:23:56Z","timestamp":1773548636439,"version":"3.50.1"},"reference-count":5,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/cybersa.2019.8899715","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T18:18:43Z","timestamp":1574705923000},"page":"1-4","source":"Crossref","is-referenced-by-count":13,"title":["Security awareness escape room - a possible new method in improving security awareness of users"],"prefix":"10.1109","author":[{"given":"Eszter Di\u00e1na","family":"Oroszi","sequence":"first","affiliation":[{"name":"National University of Public Services,CISA, CISM, CRISC,Budapest"}]}],"member":"263","reference":[{"key":"ref4","article-title":"Social Engineering techniques, Targeted cyber attacks (Social Engineering technik&#x00E1;k","author":"oroszi","year":"2018","journal-title":"C&#x00E9;lzott kibert&#x00E1;mad&#x00E1;sok)"},{"key":"ref3","article-title":"Security awareness escape room","author":"oroszi","year":"2017","journal-title":"ISACA presentation ISACA Hungarian Chapter"},{"key":"ref5","author":"van den boer","year":"0","journal-title":"Introduction to Gamification Whitepaper"},{"key":"ref2","author":"mitnick","year":"2003","journal-title":"The Art of Deception Controlling the Human Element of Security"},{"key":"ref1","author":"long","year":"2008","journal-title":"No Tech Hacking-A Guide to Social Engineering Dumpster Diving and Shoulder Surfing"}],"event":{"name":"2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","location":"Oxford, UK","start":{"date-parts":[[2019,6,3]]},"end":{"date-parts":[[2019,6,4]]}},"container-title":["2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8892713\/8899350\/08899715.pdf?arnumber=8899715","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T00:41:35Z","timestamp":1755909695000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8899715\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":5,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2019.8899715","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}