{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:15:48Z","timestamp":1761621348808,"version":"3.40.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319710839"},{"type":"electronic","value":"9783319710846"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71084-6_16","type":"book-chapter","created":{"date-parts":[[2017,11,17]],"date-time":"2017-11-17T07:37:22Z","timestamp":1510904242000},"page":"144-153","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Scorecard Approach for Cyber-Security Awareness"],"prefix":"10.1007","author":[{"given":"Tsosane","family":"Shabe","sequence":"first","affiliation":[]},{"given":"Elmarie","family":"Kritzinger","sequence":"additional","affiliation":[]},{"given":"Marianne","family":"Loock","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,18]]},"reference":[{"issue":"3","key":"16_CR1","first-page":"17","volume":"4","author":"B Heidenreich","year":"2013","unstructured":"Heidenreich, B., Gray, D.H.: Cyber-security: the threat of the internet. Glob. Secur. Stud. 4(3), 17\u201326 (2013)","journal-title":"Glob. Secur. Stud."},{"key":"16_CR2","first-page":"011001","volume":"755","author":"P Kumar","year":"2016","unstructured":"Kumar, P., Joseph, J., Singh, K.: International conference on recent trends in physics 2016 (ICRTP2016). J. Phys.: Conf. Ser. 755, 011001 (2016)","journal-title":"J. Phys.: Conf. Ser."},{"issue":"14","key":"16_CR3","first-page":"40","volume":"5","author":"J Wright","year":"2012","unstructured":"Wright, J., Omar, M.: Cyber security and mobile threats: the need for antivirus applications for smart phones. J. Inf. Syst. Technol. Plan. 5(14), 40\u201360 (2012)","journal-title":"J. Inf. Syst. Technol. Plan."},{"issue":"9","key":"16_CR4","first-page":"18197","volume":"5","author":"M Sornamageswari","year":"2016","unstructured":"Sornamageswari, M., Bothma, C.: Phishing detection in websites using neural networks and firefly. Int. J. Eng. Comput. Sci. 5(9), 18197\u201318204 (2016)","journal-title":"Int. J. Eng. Comput. Sci."},{"issue":"52","key":"16_CR5","first-page":"29","volume":"52","author":"N Kortjan","year":"2014","unstructured":"Kortjan, N., Von Solms, R.: A conceptual framework for cyber-security awareness and education in SA. S. Afr. Comput. J. 52(52), 29\u201341 (2014)","journal-title":"S. Afr. Comput. J."},{"key":"16_CR6","unstructured":"Androulidakis, I., Kandus, G.: Mobile phone security awareness and practices of students in budapest. In: ICDT 2011, The Sixth International, pp. 18\u201324 (2011).  Available from: \nhttp:\/\/www.thinkmind.org\/index.php?view=article&articleid=icdt_2011_1_40_20110\n\n. Accessed 8 July 2017"},{"key":"16_CR7","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1016\/j.cose.2012.11.004","volume":"34","author":"A Mylonas","year":"2013","unstructured":"Mylonas, A., Kastania, A., Gritzalis, D.: Delegate the smartphone user? Security awareness in smartphone platforms. Comput. Secur. 34, 47\u201366 (2013)","journal-title":"Comput. Secur."},{"issue":"1","key":"16_CR8","first-page":"402","volume":"11","author":"CMF Dominguez","year":"2010","unstructured":"Dominguez, C.M.F., Ramaswamy, M., Martinez, E.M., Cleal, M.G.: A framework for information security awareness programs. Issues Inf. Syst. 11(1), 402\u2013409 (2010)","journal-title":"Issues Inf. Syst."},{"issue":"4","key":"16_CR9","doi-asserted-by":"crossref","first-page":"346","DOI":"10.18178\/ijeee.4.4.346-350","volume":"4","author":"LP Shing","year":"2016","unstructured":"Shing, L.P., Shing, L.H., Tech, V., Chiang, M.C., Yang, C.W., Lu, T.: Smartphone security risks: android. Int. J. Electron. Electr. Eng. 4(4), 346\u2013350 (2016)","journal-title":"Int. J. Electron. Electr. Eng."},{"key":"16_CR10","unstructured":"Kortjan, N.: A cyber security awareness and education framework for South Africa, p. 219 (2013). \nhttps:\/\/researchspace.csir.co.za\/dspace\/handle\/10204\/5941\n\n. Accessed 14 May 2017"},{"key":"16_CR11","unstructured":"Grobler, M., Dlamini, Z., Ngobeni, S., Labuschagne, A.: Towards a cyber security aware rural community. In: Proceedings of the 2011 Information Security for South Africa (ISSA) Conference, pp. 1\u20137 (2011). \nhttp:\/\/goo.gl\/680YtV\n\n. Accessed 4 May 2017"},{"key":"16_CR12","unstructured":"GC Active Management: 2GC Balanced Scorecard Usage Survey. 2GC Active Management (2014). \nhttp:\/\/2gc.eu\/resource_centre\/surveys\n\n. Accessed 23 Nov 2016"},{"key":"16_CR13","volume-title":"Business Research Methods","author":"DR Cooper","year":"1995","unstructured":"Cooper, D.R., Emory, C.W.: Business Research Methods, 5th edn. Irwin, Chicago (1995)","edition":"5"},{"key":"16_CR14","volume-title":"Essentials of Marketing Research","author":"WR Dillon","year":"1993","unstructured":"Dillon, W.R., Madden, T.J., Firtle, N.H.: Essentials of Marketing Research. Irwin, Illinois (1993)"}],"container-title":["Lecture Notes in Computer Science","Emerging Technologies for Education"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71084-6_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,3,12]],"date-time":"2018-03-12T05:09:12Z","timestamp":1520831352000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71084-6_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319710839","9783319710846"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71084-6_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}