{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:09:36Z","timestamp":1761620976320},"publisher-location":"New York, NY","reference-count":8,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387732688"},{"type":"electronic","value":"9780387732695"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-73269-5_5","type":"book-chapter","created":{"date-parts":[[2007,10,26]],"date-time":"2007-10-26T19:49:04Z","timestamp":1193428144000},"page":"33-40","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Email Security Awareness \u2014 a Practical Assessment of Employee Behaviour"],"prefix":"10.1007","author":[{"given":"Hennie","family":"Kruger","sequence":"first","affiliation":[]},{"given":"Lynette","family":"Drevin","sequence":"additional","affiliation":[]},{"given":"Tjaart","family":"Steyn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,10,26]]},"reference":[{"key":"5_CR1","unstructured":"Pipkin, D.L.: Information Security. Protecting the Global Enterprise. Prentice-Hall Inc., (Upper Saddle River, NJ, 2000)"},{"key":"5_CR2","unstructured":"Dark, M.J.: Security Education, Training and Awareness from a Human Performance Technology Point of View, In: Readings and Cases in Management of Information Security, Whitman, M.E., Mattord, H.J. (Thomson Course Technology, 2006), pp. 86\u2013104."},{"key":"5_CR3","series-title":"Security and Privacy in Dynamic Environments","first-page":"448","volume-title":"IFIP International Federation for Information Processing","author":"L. Drevin","year":"2006","unstructured":"Drevin, L., Kruger, H.A. & Steyn, T.: Value-focused assessment of ICT security awareness in an academic environment, In: IFIP International Federation for Information Processing, Volume 201, Security and Privacy in Dynamic Environments, eds. Fischer-Hubner, S., Ranneberg, K., Yngstrom, L., Lindskog, S. (Boston: Springer, 2006), pp. 448\u2013453."},{"key":"5_CR4","series-title":"Security and Privacy in Dynamic Environments","first-page":"454","volume-title":"IFIP International Federation for Information Processing","author":"R.C. Dodge","year":"2006","unstructured":"Dodge, R.C. & Ferguson, A.J.: Using Phishing for User Email Security Awareness, In: IFIP International Federation for Information Processing, Volume 201, Security and Privacy in Dynamic Environments, eds. Fischer-Hubner, S., Ranneberg, K., Yngstrom, L., Lindskog, S. (Boston: Springer, 2006), pp. 454\u2013459."},{"key":"5_CR5","unstructured":"Kruger, H.A., Drevin, L. & Steyn, T.: A framework for evaluating ICT security awareness, In: Proceedings of the 2006 ISSA Conference, Johannesburg, South Africa, 5\u20137 July 2006 (on CD, 2006)."},{"key":"5_CR6","unstructured":"Steyn, T., Kruger, H.A. & Drevin, L.: Identity theft \u2014 Empirical evidence from a Phishing exercise, In: Proceedings of the 2007 IFIP Conference, Sandton, South Africa, 14\u201316 May 2007 (Accepted, to be published, 2007)."},{"key":"5_CR7","volume-title":"Moderne Statistiek vir die Praktyk","author":"A.G.W. Steyn","year":"1998","unstructured":"Steyn, A.G.W., Smit, CF., Du Toit, S.H.C. & Strasheim, C: Moderne Statistiek vir die Praktyk. Sesde uitgawe. (JL van Schaik. Pretoria, 1998)."},{"key":"5_CR8","volume-title":"Applied Business Statistics","author":"T. Wegner","year":"1993","unstructured":"Wegner, T.: Applied Business Statistics. (Juta & Co, Ltd. Kenwyn, 1993)."}],"container-title":["IFIP Advances in Information and Communication Technology","Fifth World Conference on Information Security Education"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73269-5_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,21]],"date-time":"2020-03-21T07:03:30Z","timestamp":1584774210000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73269-5_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387732688","9780387732695"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73269-5_5","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2007]]},"assertion":[{"value":"26 October 2007","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}