{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T20:09:30Z","timestamp":1769026170403,"version":"3.49.0"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031578663","type":"print"},{"value":"9783031578670","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-57867-0_22","type":"book-chapter","created":{"date-parts":[[2024,4,9]],"date-time":"2024-04-09T13:03:03Z","timestamp":1712667783000},"page":"295-310","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards a Better Understanding of Cyber Awareness Amongst Migrant Communities in Australia"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3979-1746","authenticated-orcid":false,"given":"Misita","family":"Anwar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9111-3195","authenticated-orcid":false,"given":"Manika","family":"Saha","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2943-5035","authenticated-orcid":false,"given":"Gillian","family":"Oliver","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2306-3798","authenticated-orcid":false,"given":"Mohamed","family":"Ibrahim","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9050-5675","authenticated-orcid":false,"given":"Carsten","family":"Rudolphr","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,10]]},"reference":[{"key":"22_CR1","unstructured":"Bada, M., Sasse, A.M., Nurse, J.R.: Cyber security awareness campaigns: why do they fail to change behaviour? (2019). arXiv preprint arXiv:1901.02672"},{"key":"22_CR2","unstructured":"Braun, V., Clarke, V.:\u00a0Thematic Analysis. American Psychological Association, Washington (2012)"},{"key":"22_CR3","unstructured":"Calandro, E., Berglund, N.: Unpacking cyber-capacity building in shaping cyberspace governance: the SADC case (2019). https:\/\/researchictafrica.net\/wp\/wp-content\/uploads\/2020\/07\/GIGAnet-presentation-v02.pdf"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Chang, H.C., Hawamdeh, S. (eds.). Cybersecurity for Information Professionals: Concepts and Applications (2020)","DOI":"10.1201\/9781003042235"},{"key":"22_CR5","unstructured":"Coopers, P.: Turnaround and transformation in cybersecurity: key findings from the global state of information security survey 2016 (2015)"},{"issue":"14","key":"22_CR6","doi-asserted-by":"publisher","first-page":"2953","DOI":"10.1080\/0144929X.2021.1963475","volume":"41","author":"A Dabbous","year":"2022","unstructured":"Dabbous, A., Barakat, K.A., Navarro, B.Q.: Fake news detection and social media trust: a cross-cultural perspective. Behav. Inf. Technol. 41(14), 2953\u20132972 (2022). https:\/\/doi.org\/10.1080\/0144929X.2021.1963475","journal-title":"Behav. Inf. Technol."},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Dawson, J., Thomson, R.: The future cybersecurity workforce: going beyond technical skills for successful cyber performance. Front. Psychol. 9, 284332 (2018)","DOI":"10.3389\/fpsyg.2018.00744"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Da Veiga, A., Loock, M., Renaud, K.: Cyber4Dev-Q: calibrating cyber awareness in the developing country context. Electron. J. Inf. Syst. Dev. Countries 88, e12198 (2021)","DOI":"10.1002\/isd2.12198"},{"key":"22_CR9","unstructured":"Dharmawansa, A.D., Madhuwanthi, R.A.M.: Evaluating the information security awareness (ISA) of employees in the banking sector: a case study. In: proceedings 13th International Research Conference, General Sir John Kotelawala Defence University, Ratmalana, Sri Lanka, pp. 147\u2013154, 15 October 2020)."},{"issue":"1","key":"22_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.giq.2017.02.007","volume":"34","author":"H De Bruijn","year":"2017","unstructured":"De Bruijn, H., Janssen, M.: Building cybersecurity awareness: the need for evidence-based framing strategies. Gov. Inf. Q. 34(1), 1\u20137 (2017)","journal-title":"Gov. Inf. Q."},{"key":"22_CR11","unstructured":"Department of home affairs, Somalia born community information summary (2016). https:\/\/www.homeaffairs.gov.au\/mca\/files\/2016-cis-somalia.pdf"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Egelman, S., Harbach, M., Peer, E.: Behavior ever follows intention? A validation of the Security Behavior Intentions Scale (SeBIS). In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI 2016), pp. 5257\u20135261. ACM (2016). https:\/\/blues.cs.berkeley.edu\/wp-content\/uploads\/2016\/02\/article1.pdf","DOI":"10.1145\/2858036.2858265"},{"key":"22_CR13","unstructured":"eSafety Commissioner, Protecting Voices At Risk (2020). https:\/\/www.esafety.gov.au\/sites\/default\/files\/2020-08\/Protecting%20voices%20at%20risk%20online_0.pdf"},{"key":"22_CR14","unstructured":"Grobler, M., Dlamini, Z., Ngobeni, S., Labuschagne, A.: Towards a cyber security aware rural community. In: Proceedings of the 2011 Information Security for South Africa (ISSA) Conference, Hayatt Regency Hotel, Rosebank, Johannesburg, South Africa (2011). http:\/\/hdl.handle.net\/10204\/5183"},{"issue":"7","key":"22_CR15","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1089\/cyber.2019.0703","volume":"23","author":"L Hadlington","year":"2020","unstructured":"Hadlington, L., Binder, J., Stanulewicz, N.: Fear of missing out predicts employee information security awareness above personality traits, age, and gender. Cyberpsychol. Behav. Soc. Netw. 23(7), 459\u2013464 (2020). https:\/\/doi.org\/10.1089\/cyber.2019.0703","journal-title":"Cyberpsychol. Behav. Soc. Netw."},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Halevi, T., Memon, N., Lewis, J., Kumaraguru, P., Arora, S., Dagar, N., Chen, J.: Cultural and psychological factors in cyber-security. In: Proceedings of the 18th International Conference on Information Integration and Web-based Applications and Services, pp. 318\u2013324 (2016)","DOI":"10.1145\/3011141.3011165"},{"key":"22_CR17","doi-asserted-by":"publisher","unstructured":"Henshel, D., Sample, C., Cains, M., Hoffman, B.: Integrating cultural factors into human factors framework and ontology for cyber attackers. In: Nicholson, D. (eds.) Advances in Human Factors in Cybersecurity. Advances in Intelligent Systems and Computing, vol. 501, pp. 123\u2013137. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-41932-9_11","DOI":"10.1007\/978-3-319-41932-9_11"},{"key":"22_CR18","unstructured":"IBM global technology services. IBM Security Services 2014 Cyber Security Intelligence Index: Analysis of cyber-attack and incident data from IBM\u2019s worldwide security operations, Research Report, IBM (2014). https:\/\/i.crn.com\/sites\/default\/files\/ckfinderimages\/userfiles\/images\/crn\/custom\/IBMSecurityServices2014.PDF"},{"key":"22_CR19","doi-asserted-by":"publisher","unstructured":"Jeong, J. Mihelcic, J., Oliver, G., Rudolph, C.: Towards an improved understanding of human factors in cybersecurity. In: IEEE 5th International Conference on Collaboration and Internet Computing (CIC), Los Angeles, CA, USA, pp. 338\u2013345 (2019). https:\/\/doi.org\/10.1109\/CIC48465.2019.00047","DOI":"10.1109\/CIC48465.2019.00047"},{"key":"22_CR20","doi-asserted-by":"publisher","unstructured":"Kariuki, P., Ofusori, L.O., Subramaniam, P.R.: Cybersecurity threats and vulnerabilities experienced by small-scale African migrant traders in Southern Africa. Secur. J. 1\u201330 (2023). https:\/\/doi.org\/10.1057\/s41284-023-00378-1","DOI":"10.1057\/s41284-023-00378-1"},{"key":"22_CR21","unstructured":"Lewis, M.: Game or shame - how to teach employees to be cybersecurity aware. MOBILECORP, 22 September 2020. https:\/\/www.mobilecorp.com.au\/blog\/game-or-shame-how-to-teach-employees-to-be-cybersecurity-aware"},{"key":"22_CR22","unstructured":"Nisbett, R.: The geography of thought: how Asians and westerners think differently... and why. Simon and Schuster (2004)"},{"key":"22_CR23","doi-asserted-by":"publisher","first-page":"424","DOI":"10.1016\/j.sbspro.2014.07.133","volume":"147","author":"E Metalidou","year":"2014","unstructured":"Metalidou, E., Marinagi, C., Trivellas, P., Eberhagen, N., Skourlas, C., Giannakopoulos, G.: The human factor of information security: unintentional damage perspective,\u201d. Procedia Soc. Behav. Sci. 147, 424\u2013428 (2014)","journal-title":"Procedia Soc. Behav. Sci."},{"issue":"4","key":"22_CR24","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1177\/1059601110378295","volume":"35","author":"T Moon","year":"2010","unstructured":"Moon, T.: Organizational cultural intelligence: dynamic capability perspective. Group Org. Manag. 35(4), 456\u2013493 (2010)","journal-title":"Group Org. Manag."},{"key":"22_CR25","unstructured":"Morgan, S.: Cybercrime to cost the world $10.5 trillion annually by 2025, Special Report: cyber warfare in the c-suite, Cybercrime magazine (2020). https:\/\/cybersecurityventures.com\/cybercrime-damages-6-trillion-by-2021\/"},{"key":"22_CR26","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.cose.2013.12.003","volume":"42","author":"K Parsons","year":"2014","unstructured":"Parsons, K., McCormac, A., Butavicius, M., Pattinson, M., Jerram, C.: Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q). Comput. Secur. 42, 165\u2013176 (2014)","journal-title":"Comput. Secur."},{"key":"22_CR27","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.cose.2017.01.004","volume":"66","author":"K Parsons","year":"2017","unstructured":"Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., Zwaans, T.: The human aspects of information security questionnaire (HAIS-Q): two further validation studies. Comput. Secur. 66, 40\u201351 (2017). https:\/\/doi.org\/10.1016\/j.cose.2017.01.004","journal-title":"Comput. Secur."},{"key":"22_CR28","doi-asserted-by":"crossref","unstructured":"Reid, R., Van Niekerk, J.: From information security to cyber security cultures. In: IEEE Information Security for South Africa, pp. 1\u20137 (2014)","DOI":"10.1109\/ISSA.2014.6950492"},{"issue":"2","key":"22_CR29","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1108\/ICS-01-2016-0003","volume":"24","author":"R Reid","year":"2016","unstructured":"Reid, R., Van Niekerk, J.: Decoding audience interpretations of awareness campaign messages. Inf. Comput. Secur. 24(2), 177\u2013193 (2016). https:\/\/doi.org\/10.1108\/ICS-01-2016-0003","journal-title":"Inf. Comput. Secur."},{"key":"22_CR30","unstructured":"Saridewi, V.S., Sari, R.F.: Feature selection in the human aspect of information security questionnaires using multi cluster feature selection. Int. J. Adv. Sci. Technol. 29(7 Special Issue), 3484\u20133493 (2020)"},{"key":"22_CR31","doi-asserted-by":"crossref","unstructured":"Sch\u00e4fer, C., Schadauer, A.: Online fake news, hateful posts against refugees, and a surge in xenophobia and hate crimes in Austria. In: Refugee News, Refugee Politics, pp. 109\u2013116. Routledge (2018)","DOI":"10.4324\/9781351049634-13"},{"key":"22_CR32","doi-asserted-by":"publisher","first-page":"846794","DOI":"10.3389\/fcomm.2022.846794","volume":"7","author":"A Schultze-Krumbholz","year":"2022","unstructured":"Schultze-Krumbholz, A., Pfetsch, J.S., Lietz, K.: Cyberbullying in a multicultural context\u2014forms, strain, and coping related to ethnicity-based cybervictimization. Front. Commun. 7, 846794 (2022). https:\/\/doi.org\/10.3389\/fcomm.2022.846794","journal-title":"Front. Commun."},{"issue":"2","key":"22_CR33","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/503345.503348","volume":"31","author":"M Siponen","year":"2001","unstructured":"Siponen, M.: Five dimensions of information security awareness. ACM SIGCAS Comput. Soc. 31(2), 24\u201329 (2001)","journal-title":"ACM SIGCAS Comput. Soc."},{"key":"22_CR34","unstructured":"Van der Spuy, A.: Collaborative cybersecurity: the mauritius case. (Policy Brief No. 1; Africa Digital Policy). Research ICT Africa (2018). https:\/\/researchictafrica.net\/wp\/wp-content\/uploads\/2018\/11\/Policy-Brief-ADPP-N-1-Collaborative-Cybersecurity-Mauritius-Case.pdf"},{"key":"22_CR35","doi-asserted-by":"publisher","unstructured":"Velki, T., \u0160oli, K.: Development and validation of a new measurement instrument: the behavioral-cognitive internet security questionnaire (BCISQ). Int. J. Electr. Comput. Eng. Syst. 10, 19\u201324 (2019). https:\/\/doi.org\/10.32985\/ijeces.10.1.3","DOI":"10.32985\/ijeces.10.1.3"},{"key":"22_CR36","doi-asserted-by":"crossref","unstructured":"Voce, I., Morgan, A.: Cybercrime in Australia 2023. AIC reports Statistical Report 43. Australian Institute of Criminology (2023)","DOI":"10.52922\/sr77031"},{"key":"22_CR37","doi-asserted-by":"publisher","unstructured":"Zwilling, M., Klien, G., Lesjak, D., Wiechetek, L., Cetin, F., Basim, H.N.: Cyber security awareness, knowledge, and behavior: a comparative study. J. Comput. Inf. Syst. 2(5), 99\u2013110 (2016) (2020). https:\/\/doi.org\/10.1080\/08874417.2020.1712269","DOI":"10.1080\/08874417.2020.1712269"}],"container-title":["Lecture Notes in Computer Science","Wisdom, Well-Being, Win-Win"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-57867-0_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T11:07:44Z","timestamp":1723115264000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-57867-0_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031578663","9783031578670"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-57867-0_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"10 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"iConference","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Changchun","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iconference2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ischools.org\/iConference","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}