{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T15:40:29Z","timestamp":1725982829127},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319937182"},{"type":"electronic","value":"9783319937199"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-93719-9_48","type":"book-chapter","created":{"date-parts":[[2018,6,29]],"date-time":"2018-06-29T11:35:01Z","timestamp":1530272101000},"page":"353-360","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The Current Situation of Information Security and Prevention General Course in Universities and a Teaching Approach Based on Students Structure"],"prefix":"10.1007","author":[{"given":"Wuyungerile","family":"Li","sequence":"first","affiliation":[]},{"given":"Jiachen","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Bing","family":"Jia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,30]]},"reference":[{"key":"48_CR1","unstructured":"http:\/\/finance.qq.com\/a\/20130307\/006189.htm"},{"key":"48_CR2","unstructured":"Li, Y., Yi, Z., Wei, Z.: Analysis on the present situation and countermeasures of information security education in colleges. China Med. Educ. Technol. (03), 300\u2013303 (2016)"},{"key":"48_CR3","first-page":"5735","volume":"24","author":"Z Yue","year":"2014","unstructured":"Yue, Z.: Exploration and practice of network information security education for college students. Comput. Knowl. Technol. 24, 5735\u20135736 (2014)","journal-title":"Comput. Knowl. Technol."},{"key":"48_CR4","first-page":"77","volume":"21","author":"L Feng","year":"2010","unstructured":"Feng, L.: Analysis and formation of college students\u2019 information security literacy. Comput. Educ. 21, 77\u201380 (2010)","journal-title":"Comput. Educ."},{"key":"48_CR5","first-page":"67","volume":"05","author":"X Miao","year":"2012","unstructured":"Miao, X.: Teaching exploration and research on information security courses for non-information security majors. China Educ. Inf. 05, 67\u201368 (2012)","journal-title":"China Educ. Inf."},{"key":"48_CR6","unstructured":"Yu, G., Yu, J.: Research on information security teaching of computer specialty. Sci. Technol. Inf. (16), 18\u201320 (2009)"},{"key":"48_CR7","first-page":"29","volume":"04","author":"X Hong-guang","year":"2009","unstructured":"Hong-guang, X., Zuo-wen, T., Ya-hui, Z.: On education of college students\u2019 information security awareness. Theory Practice Contemp. Educ. 04, 29\u201331 (2009)","journal-title":"Theory Practice Contemp. Educ."},{"key":"48_CR8","doi-asserted-by":"crossref","unstructured":"Wang, Y.: Management observation (26), 141\u2013142 (2012)","DOI":"10.1080\/08923647.2012.705773"},{"key":"48_CR9","unstructured":"https:\/\/doc.docsou.com\/b367bc530186deb06d1f79d39.html"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","e-Learning, e-Education, and Online Training"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-93719-9_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,20]],"date-time":"2019-10-20T04:53:44Z","timestamp":1571547224000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-93719-9_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319937182","9783319937199"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-93719-9_48","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}