{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T05:25:04Z","timestamp":1749014704192},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319988269"},{"type":"electronic","value":"9783319988276"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98827-6_11","type":"book-chapter","created":{"date-parts":[[2018,8,20]],"date-time":"2018-08-20T15:48:21Z","timestamp":1534780101000},"page":"131-139","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["The Role of Culture in the Design of Effective Cybersecurity Training and Awareness Programmes. A Case Study of the United Arab Emirates (UAE)"],"prefix":"10.1007","author":[{"given":"Abdulla","family":"Al Neaimi","sequence":"first","affiliation":[]},{"given":"Philip","family":"Lutaaya","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,21]]},"reference":[{"key":"11_CR1","doi-asserted-by":"publisher","unstructured":"Aloul, F.A.: The need for effective information security awareness. J. Adv. Inf. Technol. 3(3), 176\u2013183 (2012). Academy Publisher, https:\/\/doi.org\/10.4304\/jait.3.3.176-183","DOI":"10.4304\/jait.3.3.176-183"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. In: Management Information Systems Research Centre, University of Minnesota, USA, vol. 34, no. 3 (2010)","DOI":"10.2307\/25750690"},{"issue":"1","key":"11_CR3","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1108\/09685220010371394","volume":"8","author":"MT Siponen","year":"2000","unstructured":"Siponen, M.T.: A conceptual foundation for organizational information security awareness. Inf. Manag. Comput. Secur. 8(1), 31\u201341 (2000)","journal-title":"Inf. Manag. Comput. Secur."},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Horcher, A.-M., Tejay, G.P.: Building a better password: the role of cognitive load in information security training. In: IEEE, Richardson, TX, USA (2009)","DOI":"10.1109\/ISI.2009.5137281"},{"key":"11_CR5","unstructured":"Wunderle, W.D.: Through the Lens of Cultural Awareness: A Primer for US Armed Forces Deploying to Arab and Middle Eastern Countries, Combat Studies Institute Press Fort Leavenworth, KS 66027 (2006)"},{"key":"11_CR6","unstructured":"Lim, J.S., Ahmad, A., Chang, S., Maynard, S.B.: Embedding information security culture emerging concerns and challenges. In: PACIS 2010 Proceedings, Brisbane, Australia, pp. 463\u2013474 (2010)"},{"key":"11_CR7","unstructured":"McCrohan, K., et al.: Influence of awareness and training on cyber-security. J. Internet Commer. 9, 23\u201341 (2010). Method Approaches, pp. 3\u201323. Sage\/Media, Inc., London\/Hingham"},{"key":"11_CR8","unstructured":"Garret, C.: Developing a Security-Awareness Culture - Improving Security Decision Making. SANs Institute (2005)"},{"key":"11_CR9","unstructured":"Hight, S.D.: The importance of a security, education, training and awareness program (2005). http:\/\/www.infosecwriters.com\/Papers\/SHight_SETA.pdf. Accessed 25 Oct 2017"},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1136\/jme.28.3.143","volume":"28","author":"PS Seibert","year":"2002","unstructured":"Seibert, P.S., Stridh-lgo, P., Zimmerman, C.G.: A checklist to facilitate cultural awareness and sensitivity. J. Med. Ethics 28, 143\u2013146 (2002)","journal-title":"J. Med. Ethics"},{"key":"11_CR11","unstructured":"Whitmer, M.G.: IT security awareness and training, changing the culture of state government (2007). https:\/\/www.nascio.org\/Portals\/0\/Publications\/Documents\/NASCIO-ITSecurityAwarenessAndTraining.pdf. Accessed 15 Oct 2017"},{"key":"11_CR12","unstructured":"Ashraf, S.: Organization Need and Everyone\u2019s Responsibility Information Security Awareness. SANS Institute (2005)"},{"issue":"8","key":"11_CR13","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1016\/j.cose.2010.08.001","volume":"29","author":"E Kritzinger","year":"2010","unstructured":"Kritzinger, E., Von Solms, S.H.: Cyber-security for home users: a new way of protection through awareness enforcement. Comput. Secur. 29(8), 840\u2013847 (2010)","journal-title":"Comput. Secur."},{"key":"11_CR14","unstructured":"Parsons, K., McCormac, A., Butavicius, M., Ferguson, L.: Human factors and information security: individual, culture and security environment. Australian Government, Department of Defence (2010)"},{"key":"11_CR15","unstructured":"Al Shehri, Y.: Information security awareness and culture. Br. J. Arts Soc. Sci. (2012). ISSN: 2046-9578. British Journal Publishing"},{"key":"11_CR16","unstructured":"Kruger, H.A., Flowerday, S., Drevin, L., Steyn, T.: An assessment of the role of cultural factors in Information Security awareness. ISSA, IEEE Xplore Digital Library (2011). www.researchgate.net"},{"key":"11_CR17","volume-title":"Principles of Information Systems Security, Text and Cases","author":"G Dhillon","year":"2007","unstructured":"Dhillon, G.: Principles of Information Systems Security, Text and Cases. Wiley, New Jersey (2007)"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","e-Infrastructure and e-Services for Developing Countries"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98827-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,22]],"date-time":"2019-10-22T16:33:05Z","timestamp":1571761985000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98827-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319988269","9783319988276"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98827-6_11","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}