{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T14:42:43Z","timestamp":1726411363141},"publisher-location":"Singapore","reference-count":10,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811050404"},{"type":"electronic","value":"9789811050411"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-5041-1_3","type":"book-chapter","created":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T07:14:39Z","timestamp":1494659679000},"page":"12-17","source":"Crossref","is-referenced-by-count":0,"title":["How to Train People to Increase Their Security Awareness in IT"],"prefix":"10.1007","author":[{"given":"Agata","family":"Niescieruk","sequence":"first","affiliation":[]},{"given":"Bogdan","family":"Ksiezopolski","sequence":"additional","affiliation":[]},{"given":"Radoslaw","family":"Nielek","sequence":"additional","affiliation":[]},{"given":"Adam","family":"Wierzbicki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,14]]},"reference":[{"key":"3_CR1","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1016\/j.chb.2014.05.046","volume":"38","author":"NAG Arachchilage","year":"2014","unstructured":"Arachchilage, N.A.G., Love, S.: Security awareness of computer users: a phishing threat avoidance perspective. Comput. Hum. Behav. 38, 304\u2013312 (2014)","journal-title":"Comput. Hum. Behav."},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Bylica, W., Ksiezopolski, B.: On scalable security audit for web application according to ISO 27002. In: Computer Networks. CCIS, vol. 160, pp. 386\u2013397. Springer (2011)","DOI":"10.1007\/978-3-642-21771-5_31"},{"issue":"10","key":"3_CR3","doi-asserted-by":"crossref","first-page":"2280","DOI":"10.1093\/comjnl\/bxu100","volume":"58","author":"K Mazur","year":"2014","unstructured":"Mazur, K., Ksiezopolski, B., Kotulski, Z.: The robust measurement method for security metrics generation. Comput. J. 58(10), 2280\u20132296 (2014). Oxford Press","journal-title":"Comput. J."},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Niescieruk, A., Ksiezopolski, B.: Motivation-based risk analysis process for IT Systems. In: AsiaARES, vol. 8407, pp. 446\u2013455 (2014)","DOI":"10.1007\/978-3-642-55032-4_45"},{"key":"3_CR5","unstructured":"de Nooy, W., Mrvar, A., Batagelj, V.: Exploratory Social Network Analysis with Pajek (2004). http:\/\/vlado.fmf.uni-lj.si\/pub\/networks\/data\/esna\/hiTech.htm"},{"key":"3_CR6","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.diin.2006.06.002","volume":"3","author":"MK Rogers","year":"2006","unstructured":"Rogers, M.K., Seigfried, K., Tidke, K.: Self-reported computer criminal behavior: a psychological analysis. Dig. Invest. 3, 116\u2013120 (2006)","journal-title":"Dig. Invest."},{"key":"3_CR7","doi-asserted-by":"crossref","first-page":"504","DOI":"10.1016\/S0167-4048(01)00608-3","volume":"20","author":"B Solms von","year":"2001","unstructured":"von Solms, B.: Information security - a multidimensional discipline. Comput. Secur. 20, 504\u2013508 (2001). Elsevier Science Ltd.","journal-title":"Comput. Secur."},{"key":"3_CR8","unstructured":"The web page of the QoP-ML project (2015). http:\/\/qopml.org\/"},{"issue":"6","key":"3_CR9","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/S1361-3723(06)70370-0","volume":"2006","author":"AJ Valentine","year":"2006","unstructured":"Valentine, A.J.: Enhancing the employee security awareness model. Comput. Fraud Secur. 2006(6), 17\u201319 (2006). Cybertrust\u2019s ICSA Labs","journal-title":"Comput. Fraud Secur."},{"issue":"2","key":"3_CR10","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1111\/1540-4560.00072","volume":"59","author":"AF Westin","year":"2003","unstructured":"Westin, A.F.: Social and political dimensions of privacy. J. Soc. Issues 59(2), 431\u2013453 (2003). Columbia University","journal-title":"J. Soc. Issues"}],"container-title":["Lecture Notes in Electrical Engineering","Advanced Multimedia and Ubiquitous Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-5041-1_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T16:07:46Z","timestamp":1569341266000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-5041-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811050404","9789811050411"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-5041-1_3","relation":{},"ISSN":["1876-1100","1876-1119"],"issn-type":[{"type":"print","value":"1876-1100"},{"type":"electronic","value":"1876-1119"}],"subject":[],"published":{"date-parts":[[2017]]}}}