{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,19]],"date-time":"2026-05-19T03:11:35Z","timestamp":1779160295387,"version":"3.51.4"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/fie43999.2019.9028369","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T06:17:01Z","timestamp":1584080221000},"page":"1-5","source":"Crossref","is-referenced-by-count":9,"title":["Cyber Security Social Engineers An Extensible Teaching Tool for Social Engineering Education and Awareness"],"prefix":"10.1109","author":[{"given":"Jin-Ning","family":"Tioh","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mani","family":"Mina","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Douglas W.","family":"Jacobson","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","author":"abt","year":"1987","journal-title":"Serious Games"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.297"},{"key":"ref12","author":"adams","year":"2009","journal-title":"The Designer's Notebook Sorting Out the Genre Muddle"},{"key":"ref13","author":"thorsen","year":"2010","journal-title":"US Gamer Population 170 Million - NPD"},{"key":"ref14","author":"smith","year":"2015","journal-title":"Valve to Showcase SteamVR Hardware Steam Machines & More at GDC 2015"},{"key":"ref15","first-page":"49","article-title":"Video games in education","author":"squire","year":"2003","journal-title":"Int J Intell Games Simul"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2017.8190712"},{"key":"ref17","article-title":"The Attack Cycle","author":"nyirak","year":"2019","journal-title":"Security Through Education"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/FIE.2013.6684881"},{"key":"ref4","year":"2010","journal-title":"A Cyber-missile Aimed at Iran?"},{"key":"ref3","author":"baker","year":"2011","journal-title":"Sony PlayStation suffers massive data breach"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1201\/b13707"},{"key":"ref5","article-title":"US cybercrime: Rising risks, reduced readiness Key findings from the 2014 US State of Cybercrime Survey","author":"mickelberg","year":"2014","journal-title":"National Threat Assessment Center USA Secret Service"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1108\/10748120110424816"},{"key":"ref7","article-title":"Cyber security awareness campaigns: Why do they fail to change behaviour?","author":"bada","year":"2019","journal-title":"arXiv preprint arXiv 1901 04217"},{"key":"ref2","author":"dearden","year":"2017","journal-title":"An Unprecedented Cyber Attack Just Took out Major Banks Government and Airport Computers in Ukraine"},{"key":"ref1","year":"2017","journal-title":"Shadow Brokers Threaten to Release Windows 10 Hacking Tools"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/950566.950596"}],"event":{"name":"2019 IEEE Frontiers in Education Conference (FIE)","location":"Covington, KY, USA","start":{"date-parts":[[2019,10,16]]},"end":{"date-parts":[[2019,10,19]]}},"container-title":["2019 IEEE Frontiers in Education Conference (FIE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9011701\/9028348\/09028369.pdf?arnumber=9028369","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T15:12:46Z","timestamp":1658157166000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9028369\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/fie43999.2019.9028369","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}