{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T20:04:19Z","timestamp":1746302659502,"version":"3.37.3"},"reference-count":51,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100013405","name":"Rijksdienst voor Ondernemend Nederland","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100013405","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1109\/eurospw54576.2021.00024","type":"proceedings-article","created":{"date-parts":[[2021,10,29]],"date-time":"2021-10-29T19:27:58Z","timestamp":1635535678000},"page":"149-160","source":"Crossref","is-referenced-by-count":10,"title":["Dissecting Social Engineering Attacks Through the Lenses of Cognition"],"prefix":"10.1109","author":[{"given":"Pavlo","family":"Burda","sequence":"first","affiliation":[]},{"given":"Luca","family":"Allodi","sequence":"additional","affiliation":[]},{"given":"Nicola","family":"Zannone","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2014.0522"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2017.09.004"},{"key":"ref33","article-title":"Thinking, Fast&Slow","author":"kahneman","year":"2011","journal-title":"Farrar Straus&Giroux"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1108\/OIR-04-2015-0106"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.03.002"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94782-2_6"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1080\/10658980701788165"},{"key":"ref36","article-title":"Influence: The Psychology of Persuasion","author":"cialdini","year":"1984","journal-title":"Harper Business"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1126\/science.185.4157.1124"},{"key":"ref34","first-page":"697","article-title":"A perspective on judgment and choice: Mapping bounded rationality","year":"2003","journal-title":"American Psychologist"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00447"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2018.23016"},{"key":"ref29","article-title":"Pre-suasion: A revolutionary way to influence and persuade","author":"cialdini","year":"2016","journal-title":"Simon & Schuster"},{"key":"ref2","first-page":"543","article-title":"A Look at Targeted Attacks Through the Lense of an {NGO}","author":"blond","year":"2014"},{"key":"ref1","article-title":"The Art of Deception: Controlling the Human Element of Security","author":"mitnick","year":"2003","journal-title":"John Wiley & Sons"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20376-8_4"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2019.1552745"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.09.012"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.12.003"},{"key":"ref23","first-page":"2583","article-title":"The effectiveness of deceptive tactics in phishing","volume":"4","author":"marett","year":"2009","journal-title":"Americas Conf Inf Syst"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511481499.004"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222270111"},{"key":"ref50","doi-asserted-by":"crossref","DOI":"10.3389\/fpsyg.2020.01755","article-title":"Human Cognition Through the Lens of Social Engineering Cyberattacks","volume":"11","author":"monta\u00f1ez","year":"2020","journal-title":"Frontiers in Psychology"},{"key":"ref51","first-page":"37:1","article-title":"A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks","volume":"48","author":"heartfield","year":"2015","journal-title":"ACM Computing Surveys"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2003.08.012"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2006.01.009"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1299015.1299022"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cognition.2007.06.002"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2008.02.014"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/S1364-6613(00)01819-2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0010-0277(00)00123-2"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S1364-6613(03)00056-1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.tics.2004.12.004"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.3390\/fi11040089"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2013.763860"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2019.2940952"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/eCrime47957.2019.9037502"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3407023.3409178"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025831"},{"journal-title":"Rational Choice in an Uncertain World The Psychology of Judgment and Decision Making","year":"2010","author":"hastie","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S1364-6613(00)01538-2"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.010"},{"journal-title":"Cognitive Psychology and Its Implications","year":"2000","author":"anderson","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2021.106930"},{"key":"ref45","first-page":"1309","article-title":"Cognitive triaging of phishing attacks","author":"van der heijden","year":"2019","journal-title":"USENIX Security Symposium"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1080\/13669870110062712"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(15)30066-X"},{"key":"ref42","article-title":"A Framework for Reasoning About the Human in the Loop","author":"cranor","year":"2008","journal-title":"USENIX Security Symposium"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2012.2208392"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65610-2_9"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12100"}],"event":{"name":"2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)","start":{"date-parts":[[2021,9,6]]},"location":"Vienna, Austria","end":{"date-parts":[[2021,9,10]]}},"container-title":["2021 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9583613\/9583677\/09583678.pdf?arnumber=9583678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:55:52Z","timestamp":1652201752000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9583678\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9]]},"references-count":51,"URL":"https:\/\/doi.org\/10.1109\/eurospw54576.2021.00024","relation":{},"subject":[],"published":{"date-parts":[[2021,9]]}}}