{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T19:59:25Z","timestamp":1771012765440,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":6,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,28]],"date-time":"2004-10-28T00:00:00Z","timestamp":1098921600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,28]]},"DOI":"10.1145\/1029533.1029577","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T17:55:16Z","timestamp":1107107716000},"page":"177-181","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":64,"title":["The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems"],"prefix":"10.1145","author":[{"given":"Gregory L.","family":"Orgill","sequence":"first","affiliation":[{"name":"Brigham Young University, Provo, UT"}]},{"given":"Gordon W.","family":"Romney","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT"}]},{"given":"Michael G.","family":"Bailey","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT"}]},{"given":"Paul M.","family":"Orgill","sequence":"additional","affiliation":[{"name":"Brigham Young University, Provo, UT"}]}],"member":"320","published-online":{"date-parts":[[2004,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Retrieved on","author":"Jones C.","year":"2003","unstructured":"Jones , C. ( 2003 ). Social Engineering: Understanding and Auditing . Retrieved on July 22, 2004 from http:\/\/www.giac.org\/practical\/GSEC\/Chris_Jones_GSEC.pdf Jones, C. (2003). Social Engineering: Understanding and Auditing. Retrieved on July 22, 2004 from http:\/\/www.giac.org\/practical\/GSEC\/Chris_Jones_GSEC.pdf"},{"key":"e_1_3_2_1_2_1","volume-title":"Retrieved on","author":"Gragg D.","year":"2004","unstructured":"Gragg , D. A Multi-Level Defense Against Social Engineering. (2002) . Retrieved on July 22, 2004 from http:\/\/www.sans.org\/rr\/papers\/51\/920.pdf. Gragg, D. A Multi-Level Defense Against Social Engineering. (2002). Retrieved on July 22, 2004 from http:\/\/www.sans.org\/rr\/papers\/51\/920.pdf."},{"key":"e_1_3_2_1_3_1","volume-title":"Retrieved on","author":"Littman J.","year":"1998","unstructured":"Littman , J. ( 1998 ). Inside jobs: Is there a hacker in the next cubicle ? Retrieved on July 22, 2004 from http:\/\/www.cnn.com\/TECH\/computing\/9808\/13\/hacker.idg\/. Littman, J. (1998). Inside jobs: Is there a hacker in the next cubicle? Retrieved on July 22, 2004 from http:\/\/www.cnn.com\/TECH\/computing\/9808\/13\/hacker.idg\/."},{"key":"e_1_3_2_1_4_1","volume-title":"Retrieved on","author":"Lively","year":"2003","unstructured":"Lively Jr ., C. ( 2003 ) Psychological Based Social Engineering . Retrieved on July 22, 2004 from http:\/\/www.giac.org\/practical\/GSEC\/Charles_Lively_GSEC.pdf. Lively Jr., C. (2003) Psychological Based Social Engineering. Retrieved on July 22, 2004 from http:\/\/www.giac.org\/practical\/GSEC\/Charles_Lively_GSEC.pdf."},{"key":"e_1_3_2_1_5_1","volume-title":"K. My First RSA Conference. Retrieved on","author":"Mitnick","year":"2004","unstructured":"Mitnick , K. My First RSA Conference. Retrieved on July 22, 2004 from http:\/\/www.securityfocus.com\/news\/199. Mitnick, K. My First RSA Conference. Retrieved on July 22, 2004 from http:\/\/www.securityfocus.com\/news\/199."},{"key":"e_1_3_2_1_6_1","volume-title":"The Art of Deception","author":"Mitnick K.","year":"2002","unstructured":"Mitnick , K. and Smith , W . The Art of Deception . Indianapolis, IN : Wiley Publishing Inc , 2002 , 245. Mitnick, K. and Smith, W. The Art of Deception. Indianapolis, IN: Wiley Publishing Inc, 2002, 245."}],"event":{"name":"SIGITE04: ACM Special Interest Group for Information Technology Education Conference 2004","location":"Salt Lake City UT USA","acronym":"SIGITE04","sponsor":["ACM Association for Computing Machinery","SIGITE ACM Special Interest Group on Information Technology Education"]},"container-title":["Proceedings of the 5th conference on Information technology education"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029533.1029577","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1029533.1029577","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:30:59Z","timestamp":1750264259000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029533.1029577"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,28]]},"references-count":6,"alternative-id":["10.1145\/1029533.1029577","10.1145\/1029533"],"URL":"https:\/\/doi.org\/10.1145\/1029533.1029577","relation":{},"subject":[],"published":{"date-parts":[[2004,10,28]]},"assertion":[{"value":"2004-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}