{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:36:53Z","timestamp":1766443013021,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":8,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3760745","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:42:02Z","timestamp":1763854922000},"page":"4842-4844","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Poster: Decoding Social Engineering: A Multi-Level Framework for Tactic Generation, Annotation, and Evaluation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3024-7181","authenticated-orcid":false,"given":"Yicun","family":"Tian","sequence":"first","affiliation":[{"name":"Swinburne University of Technology, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2944-4647","authenticated-orcid":false,"given":"Youyang","family":"Qu","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3690-0321","authenticated-orcid":false,"given":"Ming","family":"Ding","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Sydney, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3122-6745","authenticated-orcid":false,"given":"Shigang","family":"Liu","sequence":"additional","affiliation":[{"name":"Data61, CSIRO, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9429-8957","authenticated-orcid":false,"given":"Pei-Wei","family":"Tsai","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Melbourne, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2189-7801","authenticated-orcid":false,"given":"Jun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Influence: The psychology of persuasion.","author":"Cialdini Robert B","year":"2007","unstructured":"Robert B Cialdini and Robert B Cialdini. 2007. Influence: The psychology of persuasion. Vol. 55. Collins New York."},{"key":"e_1_3_2_1_2_1","unstructured":"CISA. no date. Counter-phishing recommendations for federal agencies. https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/Capacity_Enhancement_Guide-Counter-Phishing_Recommendations_for_Federal_Agencies_1_0.pdf Accessed: 16 October 2024."},{"key":"e_1_3_2_1_3_1","volume-title":"Why Johnny can't rely on anti-phishing educational interventions to protect himself against contemporary phishing attacks? arXiv preprint arXiv:2004.13262","author":"Fernando Matheesha","year":"2020","unstructured":"Matheesha Fernando and Nalin Asanka Gamagedara Arachchilage. 2020. Why Johnny can't rely on anti-phishing educational interventions to protect himself against contemporary phishing attacks? arXiv preprint arXiv:2004.13262 (2020)."},{"key":"e_1_3_2_1_4_1","volume-title":"International Conference on Broadband and Wireless Computing, Communication and Applications. Springer, 270-281","author":"Guo Shih-Wei","year":"2022","unstructured":"Shih-Wei Guo, Tzu-Chi Chen, Hui-Juan Wang, Fang-Yie Leu, and Yao-Chung Fan. 2022. Generating personalized phishing emails for social engineering training based on neural language models. In International Conference on Broadband and Wireless Computing, Communication and Applications. Springer, 270-281."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103695"},{"key":"e_1_3_2_1_6_1","volume-title":"The Thirteenth International Conference on Learning Representations.","author":"Nguyen Van","year":"2025","unstructured":"Van Nguyen, Tingmin Wu, Marthie Grobler, Surya Nepal, Carsten Rudolph, et al., 2025. AI2TALE: An Innovative Information Theory-based Approach for Learning to Localize Phishing Attacks. In The Thirteenth International Conference on Learning Representations."},{"key":"e_1_3_2_1_7_1","unstructured":"Ian Verrender. 2025. Qantas executives slow to be seen after data breach affecting up to 6 million customers. https:\/\/www.abc.net.au\/news\/2025-07-04\/qantas-reputation-public-relations-after-cyber-attack\/105492774. Accessed: 2025-07-04."},{"key":"e_1_3_2_1_8_1","volume-title":"Yun Sing Koh, and Giovanni Russello","author":"Xue Yinuo","year":"2025","unstructured":"Yinuo Xue, Eric Spero, Yun Sing Koh, and Giovanni Russello. 2025. MultiPhishGuard: An LLM-based Multi-Agent System for Phishing Email Detection. arXiv preprint arXiv:2505.23803 (2025)."}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3760745","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:32:23Z","timestamp":1766442743000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3760745"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":8,"alternative-id":["10.1145\/3719027.3760745","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3760745","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}