What techniques can be used to reduce the chance that social engineering will be successful?

 What is an IPS?  

. How does IPS anomaly detection differ from misuse detection?