<?xml version="1.0"?>
<!DOCTYPE article
PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20190208//EN"
       "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" article-type="research-article" dtd-version="1.4" xml:lang="en">
 <front>
  <journal-meta>
   <journal-id journal-id-type="publisher-id">Economic and Social Research</journal-id>
   <journal-title-group>
    <journal-title xml:lang="en">Economic and Social Research</journal-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Экономические и социально-гуманитарные исследования</trans-title>
    </trans-title-group>
   </journal-title-group>
   <issn publication-format="print">2409-1073</issn>
   <issn publication-format="online">3033-5442</issn>
  </journal-meta>
  <article-meta>
   <article-id pub-id-type="publisher-id">116508</article-id>
   <article-id pub-id-type="doi">10.24151/2409-1073-2024-2-68-83</article-id>
   <article-id pub-id-type="edn">ALTXYE</article-id>
   <article-categories>
    <subj-group subj-group-type="toc-heading" xml:lang="ru">
     <subject>Экономика инновационного развития: теория и практика</subject>
    </subj-group>
    <subj-group subj-group-type="toc-heading" xml:lang="en">
     <subject>Economics of Innovation-Driven Growth: Theory and Practice</subject>
    </subj-group>
    <subj-group>
     <subject>Экономика инновационного развития: теория и практика</subject>
    </subj-group>
   </article-categories>
   <title-group>
    <article-title xml:lang="en">Dependence of the level of digital fraud committed using social engineering methods on economic factors in the federal subjects of the Russian Federation</article-title>
    <trans-title-group xml:lang="ru">
     <trans-title>Зависимость уровня цифрового мошенничества, совершённого с помощью методов социальной инженерии, от экономических факторов в субъектах Российской Федерации</trans-title>
    </trans-title-group>
   </title-group>
   <contrib-group content-type="authors">
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Стрижак</surname>
       <given-names>Анна Юрьевна</given-names>
      </name>
      <name xml:lang="en">
       <surname>Strizhak</surname>
       <given-names>Anna Yur'evna</given-names>
      </name>
     </name-alternatives>
     <email>strizhak.a86@mail.ru</email>
     <bio xml:lang="ru">
      <p>доктор экономических наук;</p>
     </bio>
     <bio xml:lang="en">
      <p>doctor of economic sciences;</p>
     </bio>
     <xref ref-type="aff" rid="aff-1"/>
    </contrib>
    <contrib contrib-type="author">
     <name-alternatives>
      <name xml:lang="ru">
       <surname>Пекарская</surname>
       <given-names>Ольга Анатольевна</given-names>
      </name>
      <name xml:lang="en">
       <surname>Pekarskaya</surname>
       <given-names>Olga A.</given-names>
      </name>
     </name-alternatives>
     <email>pekarskaya.olga@mail.ru</email>
     <bio xml:lang="ru">
      <p>кандидат экономических наук;</p>
     </bio>
     <bio xml:lang="en">
      <p>candidate of economic sciences;</p>
     </bio>
     <xref ref-type="aff" rid="aff-2"/>
    </contrib>
   </contrib-group>
   <aff-alternatives id="aff-1">
    <aff>
     <institution xml:lang="ru">Санкт-Петербургский политехнический университет Петра Великого</institution>
     <city>St Petersburg</city>
     <country>Россия</country>
    </aff>
    <aff>
     <institution xml:lang="en">Peter the Great St. Petersburg Polytechnic University</institution>
     <city>St Petersburg</city>
     <country>Russian Federation</country>
    </aff>
   </aff-alternatives>
   <aff-alternatives id="aff-2">
    <aff>
     <institution xml:lang="ru">Санкт-Петербургский университет ГПС МЧС России</institution>
    </aff>
    <aff>
     <institution xml:lang="en">Saint Petersburg university of State fire service of EMERCOM of Russia</institution>
    </aff>
   </aff-alternatives>
   <pub-date publication-format="print" date-type="pub" iso-8601-date="2024-06-20T00:00:00+03:00">
    <day>20</day>
    <month>06</month>
    <year>2024</year>
   </pub-date>
   <pub-date publication-format="electronic" date-type="pub" iso-8601-date="2024-06-20T00:00:00+03:00">
    <day>20</day>
    <month>06</month>
    <year>2024</year>
   </pub-date>
   <issue>2</issue>
   <elocation-id>68—83</elocation-id>
   <history>
    <date date-type="received" iso-8601-date="2024-03-17T00:00:00+03:00">
     <day>17</day>
     <month>03</month>
     <year>2024</year>
    </date>
   </history>
   <self-uri xlink:href="https://esgi-journal.ru/en/nauka/article/116508/view">https://esgi-journal.ru/en/nauka/article/116508/view</self-uri>
   <abstract xml:lang="ru">
    <p>Представлен теоретический анализ феномена социальной инженерии в условиях развития цифрового пространства. Исследованы основные методы социальной инженерии, используемые мошенниками с целью получить доступ к конфиденциальной информации потенциальной жертвы. Проведен корреляционно-регрессионный анализ влияния экономических факторов (средней заработной платы и безработицы в регионах) на коэффициент пострадавших от преступлений, совершённых с применением методов социальной инженерии. Для анализа использованы данные зарегистрированных в МВД РФ заявлений граждан, потерпевших от мошеннических действий, совершённых с применением информационно-телекоммуникационных технологий или в сфере компьютерной информации. Выявлена прямая связь количества преступлений, совершённых с использованием приемов социальной инженерии, с показателями безработицы по регионам РФ, а также обратная - со средней заработной платой жителей регионов. Предложены меры нивелирования проблемы мошенничества в цифровом пространстве.</p>
   </abstract>
   <trans-abstract xml:lang="en">
    <p>The authors present theoretical analysis of the phenomenon of social engineering under conditions of digital space development and discuss the principal methods of social engineering used by fraudsters to gain access to the confidential information about a potential victim. Correlation and regression analysis of economic factors impact on the coefficient of victims of crimes committed using social engineering methods is carried out. The factors under consideration include average salary and unemployment in the regions. The analysis was conducted using the data from statements registered with the Ministry of Internal A airs of the Russian Federation by citizens who suffered from fraudulent actions committed using information and telecommunication technologies or in the field of computer information. A direct relationship between the number of criminal incidents committed using social engineering methods and unemployment rates in the regions of the Russian Federation, as well as an inverse relationship between the dependent variable and the average salary of residents of the regions have been revealed. Measures to deal with the digital fraud problem are proposed.</p>
   </trans-abstract>
   <kwd-group xml:lang="ru">
    <kwd>социальная инженерия</kwd>
    <kwd>оппортунистическое поведение</kwd>
    <kwd>мошенничество</kwd>
    <kwd>кибератака</kwd>
    <kwd>цифровое пространство</kwd>
   </kwd-group>
   <kwd-group xml:lang="en">
    <kwd>social engineering</kwd>
    <kwd>opportunistic behavior</kwd>
    <kwd>fraud</kwd>
    <kwd>cyberattack</kwd>
    <kwd>digital space</kwd>
   </kwd-group>
  </article-meta>
 </front>
 <body>
  <p></p>
 </body>
 <back>
  <ref-list>
   <ref id="B1">
    <label>1.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Бекарев А. М., Плотников М. В. Проблемы социальной инженерии // Личность. Культура. Общество. 2012. Т. 14. № 1. С. 219-227.  EDN: OUPPBT</mixed-citation>
     <mixed-citation xml:lang="en">Bekarev A. M., Plotnikov M. V. “Problems of Social Engineering”. Lichnost’. Kul’tura. Obshchestvo = Personality. Culture. Society 14.1 (2012): 219—227. (In Russian). EDN: OUPPBT.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B2">
    <label>2.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Кавеева А. Д., Гурин К. Е. Искусственные профили &quot;ВКонтакте&quot; и их влияние на социальную сеть пользователей // Журнал социологии и социальной антропологии. 2018. Т. 21. № 2. С. 214-231.  DOI: 10.31119/jssa.2018.21.2.8  EDN: XZOGHB</mixed-citation>
     <mixed-citation xml:lang="en">Kaveyeva A., Gurin K. “ ‘VKontakte’ Fake Accounts and Their Influence on the Users’ Social Network”. Zhurnal sotsiologii i sotsialnoy antropologii = The Journal of Sociology and Social Anthropology 21.2 (2018): 214—231. (In Russian). https://doi.org/10.31119/jssa.2018.21.2.8 EDN: XZOGHB.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B3">
    <label>3.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Ламинина О. Г. Возможности социальной инженерии в информационных технологиях // Гуманитарные, социально-экономические и общественные науки. 2017. № 2. С. 21-23.  EDN: YFNAWP</mixed-citation>
     <mixed-citation xml:lang="en">Laminina O. G. “Possibilities of Social Engineering in Information Technologies”. Gumanitarnyye, sotsial’no-ekonomicheskiye i obshchestvennyye nauki = Humanities, Socio-Economic and Social Sciences 2 (2017): 21—23. (In Russian). EDN: YFNAWP.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B4">
    <label>4.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Парфёнова И. А., Пекарская О. А. Основные концепции информационной защиты // Актуальные проблемы инфотелекоммуникаций в науке и образовании (АПИНО 2023): сб. науч. ст. XII Междунар. науч.-техн. и науч.-метод. конф. (С.-Петербург, 28 февр. - 01 мар. 2023): в 4 т. / под ред. С. И. Макаренко; сост. В. С. Елагин, Е. А. Аникевич. Т. 2. СПб.: СПбГУТ им. М. А. Бонч-Бруевича, 2023. С. 833-837.  EDN: OBWAEF</mixed-citation>
     <mixed-citation xml:lang="en">Parfenova I., Pekarskaya O. “Basic Concepts of Information Security”. Aktual’nyye problemy infotelekommunikatsiy v nauke i obrazovanii (APINO 2023): sb. nauch. st. XII Mezhdunar. nauch.-tekhn. i nauch.-metod. konf. (S.-Peterburg, 28 fevr. — 01 mar. 2023). Ed. by S. I. Makarenko, comp. V. S. Elagin, E. A. Anikevich. Vol. 2. St. Petersburg: SPbSUT n. a. M. A. Bonch-Bruyevich, 2023. 833—837. (In Russian). EDN: OBWAEF. 4 vols.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B5">
    <label>5.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Равочкин Н. Н. Идея как инструмент социальной инженерии: философский анализ // Социодинамика. 2019. № 12. С. 237-255.  DOI: 10.25136/2409-7144.2019.12.31237  EDN: IXWAYP</mixed-citation>
     <mixed-citation xml:lang="en">Ravochkin N. N. “Idea as an Instrument of Social Engineering: Philosophical Analysis”. Sotsiodinamika = Sociodynamics 12 (2019): 237—255. (In Russian). https://doi.org/10.25136/2409-7144.2019.12.31237 EDN: IXWAYP.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B6">
    <label>6.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Ревенков П. В., Бердюгин А. А. Социальная инженерия как источник рисков в условиях дистанционного банковского обслуживания // Национальные интересы: приоритеты и безопасность. 2017. Т. 13. № 9 (354). С. 1747-1760.  DOI: 10.24891/ni.13.9.1747  EDN: WTCYWU</mixed-citation>
     <mixed-citation xml:lang="en">Revenkov P. V., Berdyugin A. A. “Social Engineering as a Source of Risks in Online Banking Services”. Natsional’nyye interesy: prioritety i bezopasnost’ = National Interests: Priorities and Security 13.9 (354) (2017): 1747—1760. (In Russian). https://doi.org/10.24891/ni.13.9.1747 EDN: WTCYWU.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B7">
    <label>7.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Резник Ю. М. Социальная инженерия: предметная область и границы применения // Социологические исследования. 1994. № 2. С. 87-95.</mixed-citation>
     <mixed-citation xml:lang="en">Reznik Yu. M. “Social Engineering: Subject Area and Boundaries of Application”. Sotsiologicheskiye issledovaniya = Sociological Studies 2 (1994): 87—95. (In Russian).</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B8">
    <label>8.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Стрижак А. Ю. Контагиозность оппортунизма в киберпространстве: тенденции и пути нивелирования // Новое в экономической кибернетике. 2020. № 3-4. С. 346-353.  EDN: QAQHUB</mixed-citation>
     <mixed-citation xml:lang="en">Strizhak A. “The Contagiousness of Opportunism in Cyberspace: Trends and Ways of Leveling”. Novoye v ekonomicheskoy kibernetike = New in Economic Cybernetics 3-4 (2020): 346—353. (In Russian). EDN: QAQHUB.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B9">
    <label>9.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Стрижак А. Ю. Оппортунистическое поведение в киберпространстве: новый вызов пандемии // Вестник ДонНУ. Сер. В. Экономика и право. 2020. № 3. С. 184-189.  EDN: RMRQQB</mixed-citation>
     <mixed-citation xml:lang="en">Strizhak A. “Opportunist Behavior in Cyberspace: A New Pandemic Challenge”. Vestnik DonNU. Ser. V. Ekonomika i pravo = Bulletin of Donetsk National University. Series V. Economics and Law 3 (2020): 184—189. (In Russian). EDN: RMRQQB.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B10">
    <label>10.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Стрижак А. Ю., Пекарская О. А. Проблемы социальной инженерии в киберпространстве: региональный аспект // Инновационная парадигма экономических механизмов хозяйствования: сб. науч. тр. IX Междунар. науч.-практ. конф. (Симферополь, 15 мая 2024). Симферополь: Тип. &quot;Ариал&quot;, 2024. С. 621-623.  EDN: JHJJKB</mixed-citation>
     <mixed-citation xml:lang="en">Strizhak A. Yu., Pekarskaya O. A. “Problems of Social Engineering in Cyberspace: Regional Aspect”. Innovatsionnaya paradigma ekonomicheskikh mekhanizmov khozyaystvovaniya: sb. nauch. tr. IX Mezhdunar. nauch.-prakt. konf. (Simferopol’, 15 maya 2024). Simferopol: Tip. “Arial”, 2024. 621—623. (In Russian). EDN: JHJJKB.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B11">
    <label>11.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Уржа О. А. Социальная инженерия как методология управленческой деятельности // Социологические исследования. 2017. № 10 (402). С. 87-96.  DOI: 10.7868/S0132162517100099  EDN: ZNGYKL</mixed-citation>
     <mixed-citation xml:lang="en">Urzha O. A. “Social Engineering as Methodology of Management Activity”. Sotsiologicheskiye issledovaniya = Sociological Studies 10 (402) (2017): 87—96. (In Russian). https://doi.org/ 10.7868/S0132162517100099 EDN: ZNGYKL.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B12">
    <label>12.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Экономико-математические подходы к исследованию банковской системы России / В. Д. Никифорова, М. Ю. Волокобинский, А. А. Никифоров, О. А. Пекарская // Технологическая перспектива в рамках Евразийского пространства: Новые рынки и точки экономического роста: материалы 4-й Междунар. науч. конф. (С.-Петербург, 13-15 дек. 2018) / под ред. О. Н. Кораблевой и др. СПб.: ЦНИТ &quot;Астерион&quot;, 2018. С. 248-253.  EDN: QWJPNF</mixed-citation>
     <mixed-citation xml:lang="en">Nikiforova V. D., Volokobinskiy M. Yu., Nikiforov A. A., Pekarskaya O. A. “Economic and Mathematical Approaches to the Investigation on the Russian Banking System”. Tekhnologicheskaya perspektiva v ramkakh Evraziyskogo prostranstva: Novyye rynki i tochki ekonomicheskogo rosta: materialy 4-y Mezhdunar. nauch. konf. (S.-Peterburg, 13—15 dek. 2018). Ed. by O. N. Korableva et al. St. Petersburg: TsNIT “Asterion”, 2018. 248—253. (In Russian). EDN: QWJPNF.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B13">
    <label>13.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Bhusal Ch. S. Systematic review on social engineering: Hacking by manipulating humans // Journal of Information Security. 2021. Vol. 12. No. 1. P. 104-114.  DOI: 10.4236/jis.2021.121005  EDN: LVCSDE</mixed-citation>
     <mixed-citation xml:lang="en">Bhusal Chandra S. “Systematic Review on Social Engineering: Hacking by Manipulating Humans”. Journal of Information Security 12.1 (2021): 104—114. https://doi.org/10.4236/jis.2021.121005</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B14">
    <label>14.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Cialdini R. Influence: The Psychology of Persuasion. New York: Harper Collins, 2006. 336 p.</mixed-citation>
     <mixed-citation xml:lang="en">Cialdini Robert. Influence: The Psychology of Persuasion. New York: Harper Collins, 2006. 336 p.</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B15">
    <label>15.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Email phishing and signal detection: How persuasion principles and personality influence response patterns and accuracy / P. Lawson, C. J. Pearson, A. Crowson, C. B. Mayhorn // Applied Ergonomics. 2020. Vol. 86. Art. ID: 103084.  DOI: 10.1016/j.apergo.2020.103084  EDN: ZJBDGC</mixed-citation>
     <mixed-citation xml:lang="en">Lawson Patrick, Pearson Carl J., Crowson Aaron, Mayhorn Christopher B. “Email Phishing and Signal Detection: How Persuasion Principles and Personality Influence Response Patterns and Accuracy”. Applied Ergonomics 86 (2020): 103084. https://doi.org/10.1016/j.apergo.2020.103084</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B16">
    <label>16.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Heartfield R., Loukas G. A taxonomy of attacks and a survey of defence mechanisms for semantic social engineering attacks // ACM Computing Surveys. 2015. Vol. 48. Iss. 3. P. 1-39.  DOI: 10.1145/2835375</mixed-citation>
     <mixed-citation xml:lang="en">Heartfield Ryan, Loukas George. “A Taxonomy of Attacks and a Survey of Defence Mechanisms for Semantic Social Engineering Attacks”. ACM Computing Surveys 48.3 (2015): 1—39. https://doi.org/10.1145/2835375</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B17">
    <label>17.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Kaul P., Sharma D. Study of automated social engineering, its vulnerabilities, threats and suggested countermeasures // International Journal of Computer Applications. 2013. Vol. 67. No. 7. P. 13-16.  DOI: 10.5120/11406-6726</mixed-citation>
     <mixed-citation xml:lang="en">Kaul Priya, Sharma Deepak. “Study of Automated Social Engineering, Its Vulnerabilities, Threats and Suggested Countermeasures”. International Journal of Computer Applications 67.7 (2013): 13—16. https://doi.org/10.5120/11406-6726</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B18">
    <label>18.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Manske K. An introduction to social engineering // Information Systems Security. 2000. Vol. 9. Iss. 5. P. 53-59.  DOI: 10.1201/1086/43312.9.5.20001112/31378.10</mixed-citation>
     <mixed-citation xml:lang="en">Manske Kurt. “An Introduction to Social Engineering”. Information Systems Security 9.5 (2000): 53—59. https://doi.org/10.1201/1086/43312.9.5.20001112/31378.10</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B19">
    <label>19.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Mouton F., Leenen L., Venter H. S. Social engineering attack examples, templates and scenarios // Computers &amp; Security. 2016. Vol. 59. P. 186-209.  DOI: 10.1016/j.cose.2016.03.004</mixed-citation>
     <mixed-citation xml:lang="en">Mouton François, Leenen Louise, Venter H. S. “Social Engineering Attack Examples, Templates and Scenarios”. Computers &amp; Security 59 (2016): 186—209. https://doi.org/10.1016/j.cose.2016.03.004</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B20">
    <label>20.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Parhi K., Pietikainen P. Socialising the anti-social: Psychopathy, psychiatry and social engineering in Finland, 1945-1968 // Social History of Medicine. 2017. Vol. 30. Iss. 3. P. 637-660.  DOI: 10.1093/shm/hkw093</mixed-citation>
     <mixed-citation xml:lang="en">Parhi Katariina, Pietikainen Petteri. “Socialising the Anti-Social: Psychopathy, Psychiatry and Social Engineering in Finland, 1945—1968”. Social History of Medicine 30.3 (2017): 637—660. https://doi.org/10.1093/ shm/hkw093</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B21">
    <label>21.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Roberts J. C. II, Al-Hamdani W. Who can you trust in the cloud? A review of security issues within cloud computing // Proceedings of the 2011 Information Security Curriculum Development Conference. New York: ACM, 2011. P. 15-19.  DOI: 10.1145/2047456.2047458</mixed-citation>
     <mixed-citation xml:lang="en">Roberts John C. II, Al-Hamdani Wasim. “Who Can You Trust in The Cloud? A Review of Security Issues Within Cloud Computing”. Proceedings of the 2011 Information Security Curriculum Development Conference. New York: ACM, 2011. 15—19. https://doi.org/10.1145/2047456.2047458</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B22">
    <label>22.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">Social engineering attacks on the knowledge worker / K. Krombholz, H. Hobel, M. Huber, E. Weippl // Proceedings of the 6th International Conference on Security of Information and Networks. New York: ACM, 2013. P. 28-35.  DOI: 10.1145/2523514.2523596</mixed-citation>
     <mixed-citation xml:lang="en">Krombholz K., Hobel H., Huber M., Weippl E. “Social Engineering Attacks on the Knowledge Worker”. Proceedings of the 6th International Conference on Security of Information and Networks. New York: ACM, 2013. 28—35. https://doi.org/10.1145/2523514.2523596</mixed-citation>
    </citation-alternatives>
   </ref>
   <ref id="B23">
    <label>23.</label>
    <citation-alternatives>
     <mixed-citation xml:lang="ru">The persuasion and security awareness experiment: Reducing the success of social engineering attacks /j.-W. Bullée, L. Montoya, W. Pieters et al. // Journal of Experimental Criminology. 2015. Vol. 11. P. 97-115.  DOI: 10.1007/s11292-014-9222-7  EDN: ZZPYIM</mixed-citation>
     <mixed-citation xml:lang="en">Bullée Jan-Willem H., Montoya Lorena, Pieters Wolter, Junger Marianne, Hartel Pieter H. “The Persuasion and Security Awareness Experiment: Reducing the Success of Social Engineering Attacks”. Journal of Experimental Criminology 11 (2015): 97—115. https://doi.org/10.1007/s11292-014-9222-7</mixed-citation>
    </citation-alternatives>
   </ref>
  </ref-list>
 </back>
</article>
