{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T03:38:35Z","timestamp":1772941115147,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","funder":[{"name":"Ministry for Culture and Innovation","award":["EKOP-2025-NKE-1-006"],"award-info":[{"award-number":["EKOP-2025-NKE-1-006"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12,3]]},"DOI":"10.1145\/3773002.3774811","type":"proceedings-article","created":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T10:43:31Z","timestamp":1771584211000},"page":"198-204","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Beyond Technology: Uncovering Social Engineering Vulnerabilities Through Integrated Phishing Simulation and Physical Security Audit"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7308-9304","authenticated-orcid":false,"given":"Peter","family":"Banyasz","sequence":"first","affiliation":[{"name":"Department of Cybersecurity and e-Government, Ludovika University of Public Service, Budapest, Hungary"},{"name":"Institute of Cybersecurity, Ludovika University of Public Service, Budapest, Hungary"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9036-4112","authenticated-orcid":false,"given":"Mate","family":"Dub","sequence":"additional","affiliation":[{"name":"Doctoral School of Military Sciences, Ludovika University of Public Service, Budapest, Hungary"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7191-4924","authenticated-orcid":false,"given":"Tamas","family":"Szadeczky","sequence":"additional","affiliation":[{"name":"Department of Cybersecurity and e-Government, Ludovika University of Public Service, Budapest, Hungary"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-4824-0923","authenticated-orcid":false,"given":"Kincso Boroka","family":"Banyasz-Vaczi","sequence":"additional","affiliation":[{"name":"Istvan Nemeskurty Faculty of Teacher Training, Ludovika University of Public Service, Budapest, Hungary"}]}],"member":"320","published-online":{"date-parts":[[2026,2,20]]},"reference":[{"key":"e_1_3_3_1_1_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICOTEN52080.2021.9493434"},{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.18576\/amis\/160402"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-99-9811-1_33"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","unstructured":"S.K. Birthriya P. Ahlawat and A.K. Jain. 2025. Detection and prevention of spear phishing attacks: A comprehensive survey. Comput Secur 151 (2025). 10.1016\/j.cose.2025.104317","DOI":"10.1016\/j.cose.2025.104317"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"publisher","unstructured":"R. Dodge K. Coronges and E. Rovira. 2012. Empirical benefits of training to phishing susceptibility. Springer New York LLC. 10.1007\/978-3-642-30436-1_37","DOI":"10.1007\/978-3-642-30436-1_37"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISDFS58141.2023.10131771"},{"key":"e_1_3_3_1_7_2","volume-title":"CEUR Workshop Proceedings 3713","author":"Greco Francesco","year":"2024","unstructured":"Francesco Greco, Paolo Buono, Domenico Desiato, Giuseppe Desolda, Rosa Lanzilotti, and Grazia Ragone. 2024. Unlocking the Potential of Simulated Phishing Campaigns: Measuring the Impact of Interaction among Different Human Factors. CEUR Workshop Proceedings 3713, 37\u201352. Retrieved from https:\/\/www.scopus.com\/inward\/record.uri?eid=2-s2.0-85198704438&partnerID=40&md5=f789077391586a4275f4c69668299b51"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICE3IS59323.2023.10335412"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1049\/PBSE022E"},{"key":"e_1_3_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.3390\/s21155119"},{"key":"e_1_3_3_1_11_2","volume-title":"Retrieved","author":"Suzanne","year":"2025","unstructured":"Suzanne D. Pawlowski and Yoonhyuk Jung. Social Representations of Cybersecurity by University Students and Implications for Instructional Design. Retrieved July 23, 2025 from https:\/\/core.ac.uk\/outputs\/301383284\/?utm_source=pdf&utm_medium=banner&utm_campaign=pdf-decoration-v1"},{"key":"e_1_3_3_1_12_2","doi-asserted-by":"publisher","unstructured":"Ward Priestman Tony Anstis Isabel G Sebire Shankar Sridharan and Neil J Sebire. 2019. Phishing in healthcare organisations: Threats mitigation and approaches. BMJ Health and Care Informatics 26. 10.1136\/bmjhci-2019-100031","DOI":"10.1136\/bmjhci-2019-100031"},{"key":"e_1_3_3_1_13_2","volume-title":"Establishing the Human Firewall: Reducing an Individual's Vulnerability to Social Engineering Attacks. (March","author":"Scheeres Jamison","year":"2008","unstructured":"Jamison Scheeres. 2008. Establishing the Human Firewall: Reducing an Individual's Vulnerability to Social Engineering Attacks. (March 2008), 49."},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/WiMob61911.2024.10770451"},{"key":"e_1_3_3_1_15_2","first-page":"69","article-title":"Incorporating lab experience into computer security courses: three case studies","volume":"7","author":"Son Joon","year":"2015","unstructured":"Joon Son, Vijay Bhuse, Lotfi Ben Othmane, and Leszek Lilien. 2015. Incorporating lab experience into computer security courses: three case studies. Global Journal of Enterprise Information System 7, 2 (2015), 69\u201380.","journal-title":"Global Journal of Enterprise Information System"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3299815.3314437"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICAIC53980.2022.9897038"},{"key":"e_1_3_3_1_18_2","doi-asserted-by":"publisher","unstructured":"R. Taib K. Yu S. Berkovsky M. Wiggins and P. Bayl-Smith. 2019. Social Engineering and Organisational Dependencies in Phishing Attacks. Springer Verlag. 10.1007\/978-3-030-29381-9_35","DOI":"10.1007\/978-3-030-29381-9_35"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1145\/503345.503348"}],"event":{"name":"CEEeGov 2025: Central and Eastern European eDem and eGov Days 2025","location":"Bucharest Romania","acronym":"CEEeGov 2025"},"container-title":["Proceedings of the Central and Eastern European eDem and eGov Days 2025"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3773002.3774811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T10:44:48Z","timestamp":1772880288000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3773002.3774811"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,3]]},"references-count":19,"alternative-id":["10.1145\/3773002.3774811","10.1145\/3773002"],"URL":"https:\/\/doi.org\/10.1145\/3773002.3774811","relation":{},"subject":[],"published":{"date-parts":[[2025,12,3]]},"assertion":[{"value":"2026-02-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}