{"id":"https://openalex.org/W3013813322","doi":"https://doi.org/10.1186/s42400-020-00047-5","title":"Predicting individuals\u2019 vulnerability to social engineering in social networks","display_name":"Predicting individuals\u2019 vulnerability to social engineering in social networks","publication_year":2020,"publication_date":"2020-03-05","ids":{"openalex":"https://openalex.org/W3013813322","doi":"https://doi.org/10.1186/s42400-020-00047-5","mag":"3013813322"},"language":"en","primary_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-020-00047-5","pdf_url":"https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-020-00047-5","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"type":"article","type_crossref":"journal-article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-020-00047-5","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063170591","display_name":"Samar Muslah Albladi","orcid":"https://orcid.org/0000-0001-9246-9540"},"institutions":[{"id":"https://openalex.org/I4210099699","display_name":"University of Jeddah","ror":"https://ror.org/015ya8798","country_code":"SA","type":"funder","lineage":["https://openalex.org/I4210099699"]}],"countries":["SA"],"is_corresponding":false,"raw_author_name":"Samar Muslah Albladi","raw_affiliation_strings":["College of Computer Science and Engineering, University of Jeddah, Jeddah, Kingdom of Saudi Arabia"],"affiliations":[{"raw_affiliation_string":"College of Computer Science and Engineering, University of Jeddah, Jeddah, Kingdom of Saudi Arabia","institution_ids":["https://openalex.org/I4210099699"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5005334221","display_name":"George R. S. Weir","orcid":"https://orcid.org/0000-0002-6264-4480"},"institutions":[{"id":"https://openalex.org/I181647926","display_name":"University of Strathclyde","ror":"https://ror.org/00n3w3b69","country_code":"GB","type":"funder","lineage":["https://openalex.org/I181647926"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"George R. S. Weir","raw_affiliation_strings":["Department of Computer and Information Sciences, University of Strathclyde, Glasgow, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computer and Information Sciences, University of Strathclyde, Glasgow, UK","institution_ids":["https://openalex.org/I181647926"]}]}],"institution_assertions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":{"value":0,"currency":"USD","value_usd":0},"apc_paid":null,"fwci":8.513,"has_fulltext":true,"fulltext_origin":"pdf","cited_by_count":44,"citation_normalized_percentile":{"value":0.999983,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"3","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9956,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9956,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9921,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10557","display_name":"Social Media and Politics","score":0.9914,"subfield":{"id":"https://openalex.org/subfields/3315","display_name":"Communication"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability","score":0.74638927},{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.71204174},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.62432957},{"id":"https://openalex.org/keywords/social-engineering","display_name":"Social engineering (security)","score":0.43378353}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.74638927},{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.71204174},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.62432957},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.613848},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.48704293},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4533779},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.43735784},{"id":"https://openalex.org/C70118762","wikidata":"https://www.wikidata.org/wiki/Q376934","display_name":"Social engineering (security)","level":2,"score":0.43378353},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.42857203},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.41977477},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.41410986},{"id":"https://openalex.org/C100521375","wikidata":"https://www.wikidata.org/wiki/Q2015382","display_name":"Competence (human resources)","level":2,"score":0.41211075},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.36832738},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.29459774},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.23157772},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.22147498},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.09684631},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C137176749","wikidata":"https://www.wikidata.org/wiki/Q4105337","display_name":"Psychological resilience","level":2,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C542102704","wikidata":"https://www.wikidata.org/wiki/Q183257","display_name":"Psychotherapist","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-020-00047-5","pdf_url":"https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-020-00047-5","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},{"is_oa":false,"landing_page_url":"https://doaj.org/article/856e4a20819145bca001ed7c026d48dc","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_indexed_in_scopus":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":{"is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-020-00047-5","pdf_url":"https://cybersecurity.springeropen.com/track/pdf/10.1186/s42400-020-00047-5","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_indexed_in_scopus":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true},"sustainable_development_goals":[{"score":0.71,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":65,"referenced_works":["https://openalex.org/W1142104160","https://openalex.org/W136176785","https://openalex.org/W144368622","https://openalex.org/W1484864026","https://openalex.org/W1507592641","https://openalex.org/W1541296021","https://openalex.org/W1545460766","https://openalex.org/W1550682508","https://openalex.org/W1672705232","https://openalex.org/W1755084311","https://openalex.org/W1890953570","https://openalex.org/W1903961850","https://openalex.org/W1917355616","https://openalex.org/W1975580288","https://openalex.org/W1990674951","https://openalex.org/W1993637905","https://openalex.org/W1996529143","https://openalex.org/W1998485971","https://openalex.org/W1999683085","https://openalex.org/W2005092827","https://openalex.org/W2019293151","https://openalex.org/W2031922755","https://openalex.org/W2036053699","https://openalex.org/W2054539343","https://openalex.org/W2057450999","https://openalex.org/W2062586119","https://openalex.org/W2068533618","https://openalex.org/W2077836266","https://openalex.org/W2085463891","https://openalex.org/W2100739170","https://openalex.org/W2107031757","https://openalex.org/W2112238177","https://openalex.org/W2127939879","https://openalex.org/W2129939055","https://openalex.org/W2130769827","https://openalex.org/W2130892515","https://openalex.org/W2135122992","https://openalex.org/W2135870748","https://openalex.org/W2139398774","https://openalex.org/W2144377639","https://openalex.org/W2149608872","https://openalex.org/W2149945051","https://openalex.org/W2150785224","https://openalex.org/W2153245338","https://openalex.org/W2162532690","https://openalex.org/W2163020995","https://openalex.org/W2166213223","https://openalex.org/W2194315361","https://openalex.org/W2252446659","https://openalex.org/W2347140731","https://openalex.org/W2511572978","https://openalex.org/W2542150372","https://openalex.org/W2606850380","https://openalex.org/W2618014102","https://openalex.org/W2746228346","https://openalex.org/W2753189782","https://openalex.org/W2762618237","https://openalex.org/W2771577890","https://openalex.org/W2788201401","https://openalex.org/W2793277670","https://openalex.org/W2910687894","https://openalex.org/W3100732544","https://openalex.org/W3122877168","https://openalex.org/W4245374928","https://openalex.org/W4300870773"],"related_works":["https://openalex.org/W4390540899","https://openalex.org/W3157230915","https://openalex.org/W3118510577","https://openalex.org/W2947584067","https://openalex.org/W2789975780","https://openalex.org/W2370114625","https://openalex.org/W2062873522","https://openalex.org/W2030628044","https://openalex.org/W1883246888","https://openalex.org/W1756374135"],"abstract_inverted_index":{"Abstract":[0],"The":[1,21,140,172],"popularity":[2],"of":[3,10,24,40,45,58,69,93,102,115,137,153,174,180],"social":[4,50,70,110,116,147],"networking":[5,71],"sites":[6],"has":[7],"attracted":[8],"billions":[9],"users":[11,77,207],"to":[12,32,80,109,129,159],"engage":[13],"and":[14,27,54,66,163,218],"share":[15],"their":[16,107],"information":[17,28],"on":[18,105,134,169],"these":[19,30,84,210],"networks.":[20,117],"vast":[22],"amount":[23],"circulating":[25],"data":[26],"expose":[29],"networks":[31],"several":[33,135],"security":[34],"risks.":[35],"Social":[36],"engineering":[37,111],"is":[38,61,87],"one":[39],"the":[41,74,91,100,113,122,156,161,170,181,196],"most":[42,75,179],"common":[43],"types":[44],"threat":[46],"that":[47,178,187,201,209],"may":[48],"face":[49],"network":[51],"users.":[52],"Training":[53],"increasing":[55,90],"users\u2019":[56],"awareness":[57,219],"such":[59,94,150],"threats":[60,168],"essential":[62],"for":[63,83,89],"maintaining":[64],"continuous":[65],"safe":[67],"use":[68,160],"services.":[72],"Identifying":[73],"vulnerable":[76,206],"in":[78,112,155,165],"order":[79],"target":[81],"them":[82],"training":[85,217],"programs":[86],"desirable":[88],"effectiveness":[92],"programs.":[95,220],"Few":[96],"studies":[97],"have":[98],"investigated":[99],"effect":[101],"individuals\u2019":[103,202],"characteristics":[104,184,203],"predicting":[106],"vulnerability":[108,132,190],"context":[114],"To":[118],"address":[119],"this":[120,175],"gap,":[121],"present":[123,197],"study":[124,198],"developed":[125],"a":[126],"novel":[127],"model":[128,142],"predict":[130],"user":[131,138,183,189],"based":[133],"perspectives":[136],"characteristics.":[139],"proposed":[141],"includes":[143],"interactions":[144],"between":[145],"different":[146],"network-oriented":[148],"factors":[149,186],"as":[151],"level":[152],"involvement":[154],"network,":[157,162],"motivation":[158],"competence":[164],"dealing":[166],"with":[167],"network.":[171],"results":[173],"research":[176],"indicate":[177],"considered":[182,214],"are":[185],"influence":[188],"either":[191],"directly":[192],"or":[193],"indirectly.":[194],"Furthermore,":[195],"provides":[199],"evidence":[200],"can":[204,212],"identify":[205],"so":[208],"risks":[211],"be":[213],"when":[215],"designing":[216]},"abstract_inverted_index_v3":null,"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W3013813322","counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":16},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":8},{"year":2020,"cited_by_count":2}],"updated_date":"2025-03-31T02:48:32.546919","created_date":"2020-04-03"}