{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T00:45:57Z","timestamp":1770511557211,"version":"3.49.0"},"reference-count":69,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1109\/icitst.2013.6750253","type":"proceedings-article","created":{"date-parts":[[2014,3,27]],"date-time":"2014-03-27T15:20:46Z","timestamp":1395933646000},"page":"508-515","source":"Crossref","is-referenced-by-count":20,"title":["Social engineering in social networking sites: Affect-based model"],"prefix":"10.1109","author":[{"given":"Abdullah","family":"Algarni","sequence":"first","affiliation":[]},{"given":"Yue","family":"Xu","sequence":"additional","affiliation":[]},{"family":"Taizan Chan","sequence":"additional","affiliation":[]},{"family":"Yu-Chu Tian","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"35","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20779"},{"key":"36","author":"hammond","year":"2000","journal-title":"Judgments under Stress"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2009.5350374"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1080\/03637759209376245"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1201\/1079.07366981\/45802.33.8.20060201\/91956.1"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.82.5.722"},{"key":"38","author":"hovland","year":"1953","journal-title":"Communication and Persuasion Psychological Studies of Opinion Change"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1080\/19393550802623214"},{"key":"42","first-page":"2366","author":"coronges","year":"2012","journal-title":"The Influences of Social Networks on Phishing Vulnerability"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4964-1_1"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1145\/1655028.1655034"},{"key":"67","author":"brafman","year":"2011","journal-title":"Click The Forces behind How We Fully Engage with People Work and Everything We Do Crown Pub"},{"key":"66","doi-asserted-by":"publisher","DOI":"10.1177\/107769900608300208"},{"key":"69","doi-asserted-by":"publisher","DOI":"10.1207\/s15327965pli0801_1"},{"key":"68","author":"zimbardo","year":"2007","journal-title":"The Lucifer Effect Understanding How Good People Turn Evil"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1059524.1059554"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1029533.1029577"},{"key":"24","first-page":"648","author":"luo","year":"2009","journal-title":"An Analysis of Security in Social Networks"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.7763\/IJEEEE.2013.V3.278"},{"key":"26","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1109\/i-Society18435.2011.5978444","article-title":"Axioms for vulnerability measurement of online social network profiles","author":"alim","year":"2011","journal-title":"Information Society (I-Society) 2011 International Conference on"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1089\/cpb.2006.9.526"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1177\/0907568211406456"},{"key":"29","author":"scheelen","year":"2012","journal-title":"The Devil Is in the Details Social Engineering by Means of Social Media"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1231047.1231062"},{"key":"2","author":"hadnagy","year":"2010","journal-title":"Social Engineering The Art of Human Hacking"},{"key":"1","author":"mitnick","year":"2001","journal-title":"The Art of Deception Controlling the Human Element of Security"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.6017\/ital.v25i4.3355"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22424-9_4"},{"key":"6","first-page":"4","author":"zhang","year":"2010","journal-title":"Privacy and Security for Online Social Networks Challenges and Opportunities"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"key":"32","author":"mohebzada","year":"2010","journal-title":"COE444 Spring 2010 Research Project Report"},{"key":"4","article-title":"Manufactured consent and cyberwar","author":"blunden","year":"2010","journal-title":"LockDown Conference Proceedings"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/PCI.2010.31"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1108\/18347641211272731"},{"key":"8","article-title":"The risk of social engineering on information security a survey of iT professionals","year":"2011","journal-title":"Technical Report Long Beach CA"},{"key":"59","doi-asserted-by":"publisher","DOI":"10.1037\/h0071152"},{"key":"58","doi-asserted-by":"publisher","DOI":"10.1037\/h0072509"},{"key":"57","article-title":"A multi-level defense against social engineering","volume":"13","author":"gragg","year":"2003","journal-title":"SANS Reading Room"},{"key":"56","author":"maslow","year":"1943","journal-title":"A Theory of Human Motivation"},{"key":"19","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/978-3-540-68504-3_14","article-title":"Six patterns for persuasion in online social networks","author":"weiksner","year":"2008","journal-title":"Persuasive Technology"},{"key":"55","doi-asserted-by":"publisher","DOI":"10.1037\/h0058665"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.205"},{"key":"18","article-title":"Automated social engineering, proof of concept","author":"huber","year":"2009","journal-title":"Royal Institute of Technology Stockholm"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1290958.1290968"},{"key":"16","author":"mataracioglu","year":"2011","journal-title":"User Awareness Measurement Through Social Engineering"},{"key":"13","article-title":"Security issues and recommendations for online social networks","volume":"1","author":"hogben","year":"2007","journal-title":"ENISA Position Paper"},{"key":"14","first-page":"321","author":"nagy","year":"2009","journal-title":"Social Networks Security"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.75"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1294046.1294077"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.222"},{"key":"20","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1007\/978-3-540-68504-3_4","article-title":"Online persuasion in facebook and mixi a cross-cultural comparison","author":"fogg","year":"2008","journal-title":"Persuasive Technology"},{"key":"64","doi-asserted-by":"crossref","first-page":"328","DOI":"10.1177\/109019817400200403","article-title":"Historical origins of the health belief model","volume":"2","author":"rosenstock","year":"1974","journal-title":"Health Education &Behavior"},{"key":"65","first-page":"48","article-title":"A situational theory of publics conceptual history, recent challenges and new research","volume":"3","author":"grunig","year":"1997","journal-title":"Public Relations Research An International Perspective"},{"key":"62","doi-asserted-by":"publisher","DOI":"10.2307\/1415404"},{"key":"63","doi-asserted-by":"publisher","DOI":"10.1037\/h0046234"},{"key":"60","volume":"2","author":"arnold","year":"1960","journal-title":"Emotion and Personality Neurological and Physiological Aspects"},{"key":"61","doi-asserted-by":"publisher","DOI":"10.1093\/mind\/os-IX.34.188"},{"key":"49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-25952-7_14"},{"key":"48","first-page":"80","article-title":"The use of formal social engineering techniques to identify weaknesses during a computer vulnerability competition","volume":"26","author":"kvedar","year":"2010","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"45","author":"sherif","year":"1961","journal-title":"Social Judgment Assimilation and Contrast Effects in Communication and Attitude Change"},{"key":"44","article-title":"CSI survey 2007 the 12th annual computer crime and security survey","author":"richardson","year":"2007","journal-title":"Computer Security Institute"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1023\/B:GRUP.0000021839.04093.5d"},{"key":"46","first-page":"152","article-title":"An investigation of heuristics of human judgment in detecting deception and potential implications in countering social engineering","author":"qi","year":"2007","journal-title":"2007 IEEE Intelligence and Security Informatics ISI"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1102199.1102214"},{"key":"51","doi-asserted-by":"publisher","DOI":"10.1108\/09685221211219173"},{"key":"52","author":"cialdini","year":"2001","journal-title":"Influence Science and Practice"},{"key":"53","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSII.2012.6454454"},{"key":"54","doi-asserted-by":"publisher","DOI":"10.2307\/255378"},{"key":"50","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2010.5588500"}],"event":{"name":"2013 8th International Conference for Internet Technology and Secured Transactions (ICITST)","location":"London, United Kingdom","start":{"date-parts":[[2013,12,9]]},"end":{"date-parts":[[2013,12,12]]}},"container-title":["8th International Conference for Internet Technology and Secured Transactions (ICITST-2013)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6745432\/6750143\/06750253.pdf?arnumber=6750253","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,16]],"date-time":"2020-08-16T22:36:11Z","timestamp":1597617371000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6750253\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,12]]},"references-count":69,"URL":"https:\/\/doi.org\/10.1109\/icitst.2013.6750253","relation":{},"subject":[],"published":{"date-parts":[[2013,12]]}}}