{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T05:04:33Z","timestamp":1749531873710,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319585529"},{"type":"electronic","value":"9783319585536"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58553-6_8","type":"book-chapter","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T12:04:33Z","timestamp":1493813073000},"page":"87-97","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A Linguistic Approach to Information Security Awareness Education in a Healthcare Environment"],"prefix":"10.1007","author":[{"given":"Lynette","family":"Drevin","sequence":"first","affiliation":[]},{"given":"Hennie","family":"Kruger","sequence":"additional","affiliation":[]},{"given":"Anna-Marie","family":"Bell","sequence":"additional","affiliation":[]},{"given":"Tjaart","family":"Steyn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,4]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1016\/j.ijmedinf.2005.08.002","volume":"75","author":"R Haux","year":"2006","unstructured":"Haux, R.: Health information systems \u2013 past, present, future. Int. J. Med. Inform. 75, 268\u2013281 (2006)","journal-title":"Int. J. Med. Inform."},{"key":"8_CR2","unstructured":"Appari, A., Johnson, M.E.: Information security and privacy in healthcare: Current State of Research. Center for Digital Strategies Tuck School of Business Dartmouth College (2008)"},{"key":"8_CR3","unstructured":"Maseti, O.: A model for role-based security education, training and awareness in the South African healthcare environment. Unpublished M dissertation. Nelson Mandela Metropolitan University (2008)"},{"issue":"1","key":"8_CR4","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1177\/183335830503400105","volume":"34","author":"KT Win","year":"2005","unstructured":"Win, K.T.: A review of security electronic health records. Health Inform. Manage. 34(1), 13\u201318 (2005)","journal-title":"Health Inform. Manage."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Meingast, M., Roosta, T., Sastry, S.: Security and privacy issues with health care information technology. In: Proceedings of the 28th IEEE EMBS Annula International Conference, New York City, USA (2006)","DOI":"10.1109\/IEMBS.2006.4398689"},{"key":"8_CR6","unstructured":"South Africa.: Protection of Personal Information Act No 4 of 2013. Government gazette, 581:37067, 26 November 2013"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Medlin, B.D., Cazier, J.A.: Social engineering techniques and password security: two issues relevant in the case of health care workers. IGI Glob. 3(2), 58\u201370","DOI":"10.4018\/ijcwt.2013040104"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Van Deursen, N., Buchanan, W.J., Duff, A.: Monitoring information security risks within health care. Comput. Secur. 37, 31\u201345 (2014)","DOI":"10.1016\/j.cose.2013.04.005"},{"issue":"4","key":"8_CR9","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1504\/IJIEM.2010.035624","volume":"6","author":"A Appari","year":"2010","unstructured":"Appari, A., Johnson, M.E.: Information security and privacy in healthcare: current state of research. Int. J. Internet Enterp. Manage. 6(4), 279\u2013314 (2010)","journal-title":"Int. J. Internet Enterp. Manage."},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1016\/j.ijmedinf.2009.08.006","volume":"78","author":"JL Fernando","year":"2009","unstructured":"Fernando, J.L., Dawson, L.L.: The health information system security threat lifecycle: an informatics theory. Int. J. Med. Informatics 78, 815\u2013826 (2009)","journal-title":"Int. J. Med. Informatics"},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1016\/j.jbi.2012.12.003","volume":"46","author":"JL Fernandez-Aleman","year":"2013","unstructured":"Fernandez-Aleman, J.L., Senor, I.C., Lozoya, P.A.O., Toval, A.: Security and privacy in electronic health records: a systematic literature review. J. Biomed. Informatics 46, 541\u2013562 (2013)","journal-title":"J. Biomed. Informatics"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1016\/j.ijmedinf.2003.12.008","volume":"73","author":"E Cavalli","year":"2004","unstructured":"Cavalli, E., Mattasoglio, A., Pinciroli, F., Spaggiari, P.: Information security concepts and practices: the case of a provincial multi-specialty hospital. Int. J. Med. Informatics 73, 297\u2013303 (2004)","journal-title":"Int. J. Med. Informatics"},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1016\/S0167-4048(02)00212-2","volume":"21","author":"L Janczewski","year":"2002","unstructured":"Janczewski, L., Shi, F.X.: Development of information security baselines for healthcare information systems in New Zealand. Comput. Secur. 21, 172\u2013192 (2002)","journal-title":"Comput. Secur."},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/S1386-5056(98)00168-3","volume":"54","author":"E Smith","year":"1999","unstructured":"Smith, E., Eloff, J.H.P.: Security in health-care information systems \u2013 current trends. Int. J. Med. Informatics 54, 39\u201354 (1999)","journal-title":"Int. J. Med. Informatics"},{"key":"8_CR15","unstructured":"Redspin. Breach report 2015: Protected Health Information (PHI). Redspin (2016)"},{"key":"8_CR16","unstructured":"Munro, D.: Data breaches in healthcare totaled over 112 million records in 2015. Forbes (2015). http:\/\/www.forbes.com\/sites\/danmunro\/2015\/12\/31\/data-breaches-in-healthcare-total-over-112-million-records-in-2015\/#1996c0557fd5"},{"key":"8_CR17","unstructured":"HIPAA. Major 2016 healthcare data breaches: midyear summary. HIPAA J. (2016). http:\/\/www.hipaajournal.com\/major-2016-healthcare-data-breaches-mid-year-summary-3499\/"},{"key":"8_CR18","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.cose.2015.10.002","volume":"56","author":"G Ogutcu","year":"2016","unstructured":"Ogutcu, G., Testik, O.M., Chouseinoglou, O.: Analysis of personal information security behavior and awareness. Comput. Secur. 56, 83\u201393 (2016)","journal-title":"Comput. Secur."},{"key":"8_CR19","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1016\/S1386-5056(00)00112-X","volume":"60","author":"SK Katsikas","year":"2000","unstructured":"Katsikas, S.K.: Health care management and information systems security: awareness, training or education? Int. J. Med. Informatics 60, 129\u2013135 (2000)","journal-title":"Int. J. Med. Informatics"},{"issue":"5","key":"8_CR20","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1108\/09685221011095236","volume":"18","author":"HA Kruger","year":"2010","unstructured":"Kruger, H.A., Drevin, L., Steyn, T.: A vocabulary test to assess information security awareness. Inform. Manage. Comput. Secur. 18(5), 316\u2013327 (2010)","journal-title":"Inform. Manage. Comput. Secur."},{"key":"8_CR21","unstructured":"Fromkin, V.A. (ed.): Linguistics: An introduction to linguistic theory. Fromkin, V.A. Wiley-Blackwell (2001)"},{"key":"8_CR22","unstructured":"Jansen van Vuuren, N.: \u2019n Ondersoek na die gebruik van wiskunde-woordeskat en metakognitiewe strategie\u00eb tydens probleemoplossing by Graad 7-leerders. Unpublished M dissertation, North-West University, Potchefstroom (2014)"},{"key":"8_CR23","doi-asserted-by":"crossref","first-page":"489","DOI":"10.15700\/saje.v28n4a210","volume":"28","author":"MS Van der Walt","year":"2008","unstructured":"Van der Walt, M.S., Maree, K., Ellis, S.: A mathematics vocabulary questionnaire for use in the intermediate phase. South Afr. J. Educ. 28, 489\u2013504 (2008)","journal-title":"South Afr. J. Educ."},{"key":"8_CR24","volume-title":"Cognitive Psychology. Applying the Science of Mind","author":"G Robinson-Riegler","year":"2008","unstructured":"Robinson-Riegler, G., Robinson-Riegler, B.: Cognitive Psychology. Applying the Science of Mind. Pearson, Boston (2008)"},{"key":"8_CR25","unstructured":"Van der Walt, M.S.: Aanpassing van die studie ori\u00ebntasievraelys in Wiskunde vir gebruik in die intermedi\u00eare fase. Unpublished PhD dissertation, North-West University, Potchefstroom (2008)"},{"issue":"5","key":"8_CR26","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1016\/j.cose.2007.03.001","volume":"26","author":"SM Furnell","year":"2007","unstructured":"Furnell, S.M., Bryant, P., Phippen, A.D.: Assessing the security perceptions of personal Internet users. Comput. Secur. 26(5), 410\u2013417 (2007)","journal-title":"Comput. Secur."},{"key":"8_CR27","volume-title":"Foundations of Behavioral Research","author":"FN Kerlinger","year":"1986","unstructured":"Kerlinger, F.N.: Foundations of Behavioral Research, 3rd edn. CBS Publishing, Japan (1986)","edition":"3"},{"key":"8_CR28","volume-title":"Statistical power analysis for the behavioral sciences","author":"J Cohen","year":"1988","unstructured":"Cohen, J.: Statistical power analysis for the behavioral sciences, 2nd edn. Lawrence Earlbaum Associates, Hillsdale (1988)","edition":"2"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Security Education for a Global Digital Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58553-6_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,22]],"date-time":"2021-05-22T00:10:17Z","timestamp":1621642217000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58553-6_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319585529","9783319585536"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58553-6_8","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"4 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP World Conference on Information Security Education","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise-ifip2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ifiptc11.org\/wg118-events\/wise10","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}