{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T22:22:24Z","timestamp":1751840544575,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/icawst.2019.8923444","type":"proceedings-article","created":{"date-parts":[[2019,12,6]],"date-time":"2019-12-06T07:10:47Z","timestamp":1575616247000},"page":"1-4","source":"Crossref","is-referenced-by-count":7,"title":["Confront Phishing Attacks \u2014 from a Perspective of Security Education"],"prefix":"10.1109","author":[{"given":"Toyoo","family":"Takata","sequence":"first","affiliation":[]},{"given":"Kanayo","family":"Ogura","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"184","article-title":"The Fundamental Study of the Need for Cognition Scale","volume":"6","author":"kohyama","year":"1991","journal-title":"Jpn J Social Psychol"},{"key":"ref11","article-title":"A Proposal of Web-based Training System with Motion Pictures for Targeted Attack Countermeasure","volume":"1f19","author":"yatogo","year":"2017","journal-title":"Proc of 2017 Tohoku Section Joint Conf of Institutes of Electrical and Information Engineers"},{"key":"ref12","article-title":"Development of Web-based Training System with Motion Pictures for Targeted Attack Countermeasure","author":"yatogo","year":"2018","journal-title":"Graduate Research Report of Iwate Prefectural University"},{"year":"2010","key":"ref13","article-title":"Survey on Awareness of Information Security Threats"},{"year":"2018","key":"ref14","article-title":"Survey on Awareness of Information Security Threats"},{"year":"2019","key":"ref15","article-title":"Social Engineering Attacks by Numbers: Prevalence, Costs, & Impact"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511527920.011"},{"key":"ref17","first-page":"2d1-4","article-title":"Development of Studying Materials for Preventing Social Engineering Using User&#x2019;s Information Usage Environment","author":"chiba","year":"2009","journal-title":"Proc of 2009 Symp on Cryptography and Information Security Japan (SCIS2009)"},{"year":"2018","key":"ref18","article-title":"Security Measures in Daily Life"},{"year":"2018","key":"ref19","article-title":"Examples of Targeted Attack Mail and How to Distinguish it"},{"key":"ref4","first-page":"3-605","article-title":"A Study on the Targeted Attack Protection in Social Engineering","volume":"5w 5","author":"yatogo","year":"2017","journal-title":"Proc of 81st National Convention of IPSJ"},{"article-title":"More Than One in 10 Employees Fall for Social Engineering Attacks","year":"2018","author":"ashford","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.65.1.113"},{"key":"ref5","article-title":"The Victimization Process and Effective Prevention Measures of Money Transfer Fraud: a Study from the Perspective of Fear-arousing Appeal","volume":"21730510","author":"suzuki","year":"2012","journal-title":"Research Result Report of Grand-in-Aid for Young Scientists (B) JSPS"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1037\/h0042761"},{"journal-title":"Social Engineering The Art of Human Hacking Chapter 6","year":"2010","author":"hadnagy","key":"ref7"},{"year":"2019","key":"ref2","article-title":"What is Spear Phishing?"},{"year":"2019","key":"ref1","article-title":"2019 Global Phish Report"},{"key":"ref9","first-page":"135","article-title":"Construction of Japanese Version of Cognitive Need for Structure Scale","volume":"21","author":"suzuki","year":"1999","journal-title":"Tsukuba Peychological Research"}],"event":{"name":"2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)","start":{"date-parts":[[2019,10,23]]},"location":"Morioka, Japan","end":{"date-parts":[[2019,10,25]]}},"container-title":["2019 IEEE 10th International Conference on Awareness Science and Technology (iCAST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8913318\/8923121\/08923444.pdf?arnumber=8923444","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T20:21:12Z","timestamp":1658262072000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8923444\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/icawst.2019.8923444","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}