DOI:10.20894/IJBI.
Periodicity: Bi Annual.
Impact Factor:
SJIF:5.065
Submission:Any Time
Publisher: IIR Groups
Language: English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJBI provides online manuscript tracking system.

Every issue of Journal of IJBI is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJCOA special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJBI website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 8 Issue 2 Date of Publication:   December 2019

Social Engineering threats and Countermeasures in SHCT

Syed Mehr Ali shah,Aijaz Ahmed, Mir Abid Ali

Page(s):   44-46 ISSN:   2278-2397
DOI:   10.20894/IJBI.105.008.002.004 Publisher:   Integrated Intelligent Research (IIR)


  1. Mitnick,,   "?How to Hack People",   BBC NewsOnline   ,2002
    View Artical

  2. J.Creswell.,   "Qualitative, quantitative and mixed method approaches",   Sage Publications Ltd   ,Vol.6   ,Issue 1   ,2014
    View Artical

  3. ,   "Firewall Analysis Saves Time Keeping Application Paths
    View Artical

  4. M.N.David,   "Usability and open source software? First Monday   ,Vol.8   ,Issue 1   ,2002
    View Artical

  5. Brace, I.,   "?How to Plan, Structure and Write Survey Material for Effective Market Research",   London, Market Research in Practice Series   ,2004
    View Artical

  6. R. Dhamija,   "?Why Phishing Works",   dept. Comp and Soc.,Harvard Univ.   ,2006
    View Artical

  7. ,   "QualitativeMethods   ,2017
    View Artical

  8. ,   "?Employee Information Awareness Service   ,2003
    View Artical

  9. Clifford Woody,   ",The Values of Educational Research to the Classroom Teacher",   The Journal of Educational Research   ,Vol.16   ,Issue 3   ,1927
    View Artical

  10. ,   "DCAF HORIZON WORKING PAPER",   On Cyberwarfare   ,2015
    View Artical

  11. S. Bosworth and M.E. Kabay,   "Computer Security Handbook   ,2014
    View Artical

  12. ,   "Cyber Security Planning Guid Federal Communication Commission
    View Artical