{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T15:43:30Z","timestamp":1774453410648,"version":"3.50.1"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T00:00:00Z","timestamp":1669248000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T00:00:00Z","timestamp":1669248000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s10207-022-00637-z","type":"journal-article","created":{"date-parts":[[2022,11,25]],"date-time":"2022-11-25T09:12:11Z","timestamp":1669367531000},"page":"305-317","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":27,"title":["How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates"],"prefix":"10.1007","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1937-1587","authenticated-orcid":false,"given":"Qin","family":"An","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9858-2015","authenticated-orcid":false,"given":"Wilson Cheong Hin","family":"Hong","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0667-4511","authenticated-orcid":false,"given":"XiaoShu","family":"Xu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9995-8432","authenticated-orcid":false,"given":"Yunfeng","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5347-9575","authenticated-orcid":false,"given":"Kimberly","family":"Kolletar-Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,24]]},"reference":[{"key":"637_CR1","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1108\/k-12-2014-0283","volume":"44","author":"NHA Rahim","year":"2015","unstructured":"Rahim, N.H.A., Hamid, S., Mat Kiah, M.L., Shamshirband, S., Furnell, S.: A systematic review of approaches to assessing cybersecurity awareness. Kybernetes 44, 606\u2013622 (2015). https:\/\/doi.org\/10.1108\/k-12-2014-0283","journal-title":"Kybernetes"},{"key":"637_CR2","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-t","volume":"50","author":"I Ajzen","year":"1991","unstructured":"Ajzen, I.: The theory of planned behavior. Organ. Behav. Hum. Decis. Process. 50, 179\u2013211 (1991). https:\/\/doi.org\/10.1016\/0749-5978(91)90020-t","journal-title":"Organ. Behav. Hum. Decis. Process."},{"key":"637_CR3","volume-title":"Diffusion of Innovations","author":"EM Rogers","year":"2003","unstructured":"Rogers, E.M.: Diffusion of Innovations. Free Press, New York (2003)"},{"key":"637_CR4","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.cose.2006.02.008","volume":"25","author":"HA Kruger","year":"2006","unstructured":"Kruger, H.A., Kearney, W.D.: A prototype for assessing information security awareness. Comput. Secur. 25, 289\u2013296 (2006). https:\/\/doi.org\/10.1016\/j.cose.2006.02.008","journal-title":"Comput. Secur."},{"key":"637_CR5","doi-asserted-by":"publisher","DOI":"10.3127\/ajis.v21i0.1697","author":"A McCormac","year":"2017","unstructured":"McCormac, A., Calic, D., Butavicius, M., Parsons, K., Zwaans, T., Pattinson, M.: A reliable measure of information security awareness and the identification of bias in responses. Australas. J. Inf. Syst. (2017). https:\/\/doi.org\/10.3127\/ajis.v21i0.1697","journal-title":"Australas. J. Inf. Syst."},{"key":"637_CR6","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.cose.2013.12.003","volume":"42","author":"K Parsons","year":"2014","unstructured":"Parsons, K., McCormac, A., Butavicius, M., Pattinson, M., Jerram, C.: Determining employee awareness using the human aspects of information security questionnaire (HAIS-Q). Comput. Secur. 42, 165\u2013176 (2014). https:\/\/doi.org\/10.1016\/j.cose.2013.12.003","journal-title":"Comput. Secur."},{"key":"637_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-022-11121-5","author":"WCH Hong","year":"2022","unstructured":"Hong, W.C.H., Chi, C., Liu, J., Zhang, Y., Lei, V.N.-L., Xu, X.: The influence of social education level on cybersecurity awareness and behaviour: a comparative study of university students and working graduates. Educ. Inf. Technol. (2022). https:\/\/doi.org\/10.1007\/s10639-022-11121-5","journal-title":"Educ. Inf. Technol."},{"key":"637_CR8","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3390\/fi13020039","volume":"13","author":"JB Ulven","year":"2021","unstructured":"Ulven, J.B., Wangen, G.: A systematic review of cybersecurity risks in higher education. Future Internet 13, 39 (2021). https:\/\/doi.org\/10.3390\/fi13020039","journal-title":"Future Internet"},{"key":"637_CR9","doi-asserted-by":"publisher","first-page":"101640","DOI":"10.1016\/j.cose.2019.101640","volume":"88","author":"A Wiley","year":"2020","unstructured":"Wiley, A., McCormac, A., Calic, D.: More than the individual: examining the relationship between culture and information security awareness. Comput. Secur. 88, 101640 (2020). https:\/\/doi.org\/10.1016\/j.cose.2019.101640","journal-title":"Comput. Secur."},{"key":"637_CR10","first-page":"10","volume":"35","author":"Y-L Li","year":"2014","unstructured":"Li, Y.-L., Li, Y., Li, A.: A study on college students\u2019 internet information ethics cognition and influencing factors [\u5927\u5b66\u751f\u7f51\u7edc\u4fe1\u606f\u4f26\u7406\u8ba4\u77e5\u4e0e\u5f71\u54cd\u56e0\u7d20\u7814\u7a76]. Inf. Doc. Work 35, 10\u201316 (2014)","journal-title":"Inf. Doc. Work"},{"key":"637_CR11","doi-asserted-by":"publisher","unstructured":"Huang, X., He, W., Hua, C., Shang, Y.: The Statistical Analysis about Status and Influencing Factors of University Students\u2019 Safety Accidents. Statistical and Application [\u9ad8\u6821\u5b66\u751f\u5b89\u5168\u4e8b\u6545\u53d1\u751f\u72b6\u51b5\u53ca\u5176\u5f71\u54cd\u56e0\u7d20\u7684\u7edf\u8ba1\u5206\u6790]. 3, 57\u201367 (2014). https:\/\/doi.org\/10.12677\/sa.2014.32009","DOI":"10.12677\/sa.2014.32009"},{"key":"637_CR12","doi-asserted-by":"publisher","unstructured":"Elkhannoubi, H., & Belaissaoui, M.: Assess developing countries\u2019 cybersecurity capabilities through a social influence strategy. In: 2016 7th International Conference on Sciences of Electronics, Technologies of Information and Telecommunications (SETIT) pp.19\u201323 IEEE. (2016). https:\/\/doi.org\/10.1109\/SETIT.2016.7939834","DOI":"10.1109\/SETIT.2016.7939834"},{"key":"637_CR13","unstructured":"Fishbein, M., Ajzen, I.: Belief, attitude, intention, and behavior: an Introduction to Theory and Research. Addison-Wesley Pub. Co, Reading, Mass. (1975)"},{"key":"637_CR14","unstructured":"Vance, A.: Why Do Employees Violate Is Security policies?: Insights from Multiple Theoretical Perspectives, http:\/\/urn.fi\/urn:isbn:9789514262876"},{"key":"637_CR15","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1016\/j.dss.2008.11.010","volume":"46","author":"B-Y Ng","year":"2009","unstructured":"Ng, B.-Y., Kankanhalli, A., Xu, Y.: (Calvin): studying users\u2019 computer security behavior: a health belief perspective. Decis. Support Syst. 46, 815\u2013825 (2009). https:\/\/doi.org\/10.1016\/j.dss.2008.11.010","journal-title":"Decis. Support Syst."},{"key":"637_CR16","doi-asserted-by":"crossref","unstructured":"Fan, J., Zhang, P.: Study on e-government Information Misuse Based on General Deterrence Theory. In: ICSSSM11. pp. 1\u20136. IEEE Institute of Electrical & Electronic Engineers (2011)","DOI":"10.1109\/ICSSSM.2011.5959454"},{"key":"637_CR17","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1287\/isre.2.3.173","volume":"2","author":"K Mathieson","year":"1991","unstructured":"Mathieson, K.: Predicting user intentions: comparing the technology acceptance model with the theory of planned behaviour. Inf. Syst. Res. 2, 173\u2013191 (1991). https:\/\/doi.org\/10.1287\/isre.2.3.173","journal-title":"Inf. Syst. Res."},{"key":"637_CR18","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1108\/09685220010371394","volume":"8","author":"MT Siponen","year":"2000","unstructured":"Siponen, M.T.: A conceptual foundation for organizational information security awareness. Inf. Manag. Comput. Secur. 8, 31\u201341 (2000). https:\/\/doi.org\/10.1108\/09685220010371394","journal-title":"Inf. Manag. Comput. Secur."},{"key":"637_CR19","doi-asserted-by":"publisher","first-page":"1119","DOI":"10.1016\/j.tele.2016.01.002","volume":"33","author":"W Heirman","year":"2016","unstructured":"Heirman, W., Walrave, M., Vermeulen, A., Ponnet, K., Vandebosch, H., Hardies, K.: Applying the theory of planned behavior to adolescents\u2019 acceptance of online friendship requests sent by strangers. Telemat. Inform. 33, 1119\u20131129 (2016). https:\/\/doi.org\/10.1016\/j.tele.2016.01.002","journal-title":"Telemat. Inform."},{"key":"637_CR20","doi-asserted-by":"publisher","DOI":"10.23962\/10539\/23572","author":"R Chandarman","year":"2017","unstructured":"Chandarman, R., Van Niekerk, B.: Students\u2019 cybersecurity awareness at a private tertiary educational institution. Afr. J. Inf. Commun. (2017). https:\/\/doi.org\/10.23962\/10539\/23572","journal-title":"Afr. J. Inf. Commun."},{"key":"637_CR21","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.cose.2011.10.007","volume":"31","author":"P Ifinedo","year":"2012","unstructured":"Ifinedo, P.: Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory. Comput. Secur. 31, 83\u201395 (2012). https:\/\/doi.org\/10.1016\/j.cose.2011.10.007","journal-title":"Comput. Secur."},{"key":"637_CR22","doi-asserted-by":"publisher","first-page":"613","DOI":"10.2307\/25750694","volume":"34","author":"C Anderson","year":"2010","unstructured":"Anderson, C., Agarwal, R.: Practicing safe computing: a multimethod empirical examination of home computer user security behavioral intentions. MIS Q. 34, 613 (2010). https:\/\/doi.org\/10.2307\/25750694","journal-title":"MIS Q."},{"key":"637_CR23","doi-asserted-by":"publisher","first-page":"205","DOI":"10.25300\/misq\/2016\/40.1.09","volume":"40","author":"Y Chen","year":"2016","unstructured":"Chen, Y., Zahedi, F.M.: Individuals\u2019 internet security perceptions and behaviors: polycontextual contrasts between the United States and China. MIS Q. 40, 205\u2013222 (2016). https:\/\/doi.org\/10.25300\/misq\/2016\/40.1.09","journal-title":"MIS Q."},{"key":"637_CR24","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.dss.2016.09.013","volume":"92","author":"M Warkentin","year":"2016","unstructured":"Warkentin, M., Johnston, A.C., Shropshire, J., Barnett, W.D.: Continuance of protective security behavior: a longitudinal study. Decis. Support Syst. 92, 25\u201335 (2016). https:\/\/doi.org\/10.1016\/j.dss.2016.09.013","journal-title":"Decis. Support Syst."},{"key":"637_CR25","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1057\/ejis.2009.6","volume":"18","author":"T Herath","year":"2009","unstructured":"Herath, T., Rao, H.R.: Protection motivation and deterrence: a framework for security policy compliance in organisations. Eur. J. Inf. Syst. 18, 106\u2013125 (2009). https:\/\/doi.org\/10.1057\/ejis.2009.6","journal-title":"Eur. J. Inf. Syst."},{"key":"637_CR26","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.dss.2009.02.005","volume":"47","author":"T Herath","year":"2009","unstructured":"Herath, T., Rao, H.R.: Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness. Decis. Support Syst. 47, 154\u2013165 (2009). https:\/\/doi.org\/10.1016\/j.dss.2009.02.005","journal-title":"Decis. Support Syst."},{"key":"637_CR27","unstructured":"Roberts, S.A.: Exploring the Relationships between User Cybersecurity Knowledge, Cybersecurity and Cybercrime Attitudes, and Online Risky Behaviors, https:\/\/www.proquest.com\/openview\/c1c31d84698165e5843133986323a773\/1.pdf?pq-origsite=gscholar&cbl=18750&diss=y, (2021)"},{"key":"637_CR28","doi-asserted-by":"publisher","DOI":"10.1186\/1744-8603-6-6","author":"A De-Graft Aikins","year":"2010","unstructured":"De-Graft Aikins, A., Boynton, P., Atanga, L.L.: Developing effective chronic disease interventions in Africa: insights from Ghana and Cameroon. Glob. Health (2010). https:\/\/doi.org\/10.1186\/1744-8603-6-6","journal-title":"Glob. Health"},{"key":"637_CR29","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1002\/pfi.4140430905","volume":"43","author":"PG Schrader","year":"2004","unstructured":"Schrader, P.G., Lawless, K.A.: The knowledge, attitudes, & behaviors approach how to evaluate performance and learning in complex environments. Perform. Improv. 43, 8\u201315 (2004). https:\/\/doi.org\/10.1002\/pfi.4140430905","journal-title":"Perform. Improv."},{"key":"637_CR30","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1016\/j.cose.2017.01.004","volume":"66","author":"K Parsons","year":"2017","unstructured":"Parsons, K., Calic, D., Pattinson, M., Butavicius, M., McCormac, A., Zwaans, T.: The human aspects of information security questionnaire (HAIS-Q): two further validation studies. Comput. Secur. 66, 40\u201351 (2017). https:\/\/doi.org\/10.1016\/j.cose.2017.01.004","journal-title":"Comput. Secur."},{"key":"637_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1080\/08874417.2020.1712269","volume":"62","author":"M Zwilling","year":"2020","unstructured":"Zwilling, M., Klien, G., Lesjak, D., Wiechetek, \u0141, Cetin, F., Basim, H.N.: Cyber security awareness, knowledge and behavior: a comparative study. J. Comput. Inf. Syst. 62, 1\u201316 (2020). https:\/\/doi.org\/10.1080\/08874417.2020.1712269","journal-title":"J. Comput. Inf. Syst."},{"key":"637_CR32","doi-asserted-by":"publisher","first-page":"S579","DOI":"10.1046\/j.1440-6047.11.supp3.7.x","volume":"11","author":"A Worsley","year":"2002","unstructured":"Worsley, A.: Nutrition knowledge and food consumption: can nutrition knowledge change food behaviour? Asia Pac. J. Clin. Nutr. 11, S579\u2013S585 (2002). https:\/\/doi.org\/10.1046\/j.1440-6047.11.supp3.7.x","journal-title":"Asia Pac. J. Clin. Nutr."},{"key":"637_CR33","unstructured":"Parsons, K., McCormac, A., Pattinson, M.R., Butavicius, M.A., Jerram, C.: An Analysis of Information Security Vulnerabilities at Three Australian Government Organisations, In Furnell, S. M., Clarke, N. L. & Katos, V (Eds). Proceedings of the European Information Security Multi-Conference (EISMC 2013). 34\u201344 (2013)"},{"key":"637_CR34","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1108\/ics-03-2018-0032","volume":"26","author":"A McCormac","year":"2018","unstructured":"McCormac, A., Calic, D., Parsons, K., Butavicius, M., Pattinson, M., Lillie, M.: The effect of resilience and job stress on information security awareness. Inf. Comput. Secur. 26, 277\u2013289 (2018). https:\/\/doi.org\/10.1108\/ics-03-2018-0032","journal-title":"Inf. Comput. Secur."},{"key":"637_CR35","doi-asserted-by":"publisher","unstructured":"Bostan, A., Akman, I.: Impact of Education on Security Practices in ICT. Tehnicki Vjesnik\u2014Technical Gazette. 22, 161\u2013168 (2015). https:\/\/doi.org\/10.17559\/tv-20140403122930","DOI":"10.17559\/tv-20140403122930"},{"key":"637_CR36","doi-asserted-by":"publisher","first-page":"101607","DOI":"10.1016\/j.cose.2019.101607","volume":"88","author":"A Brilingait\u0117","year":"2020","unstructured":"Brilingait\u0117, A., Bukauskas, L., Juozapavi\u010dius, A.: A framework for competence development and assessment in hybrid cybersecurity exercises. Comput. Secur. 88, 101607 (2020). https:\/\/doi.org\/10.1016\/j.cose.2019.101607","journal-title":"Comput. Secur."},{"key":"637_CR37","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1108\/ics-03-2017-0017","volume":"25","author":"M Pattinson","year":"2017","unstructured":"Pattinson, M., Butavicius, M., Parsons, K., McCormac, A., Calic, D.: Managing information security awareness at an Australian bank: a comparative study. Inf. Comput. Secur. 25, 181\u2013189 (2017). https:\/\/doi.org\/10.1108\/ics-03-2017-0017","journal-title":"Inf. Comput. Secur."},{"key":"637_CR38","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.cose.2015.01.002","volume":"49","author":"J Shropshire","year":"2015","unstructured":"Shropshire, J., Warkentin, M., Sharma, S.: Personality, attitudes, and intentions: predicting initial adoption of information security behavior. Comput. Secur. 49, 177\u2013191 (2015). https:\/\/doi.org\/10.1016\/j.cose.2015.01.002","journal-title":"Comput. Secur."},{"key":"637_CR39","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1089\/cyber.2017.0239","volume":"20","author":"L Hadlington","year":"2017","unstructured":"Hadlington, L., Parsons, K.: Can cyberloafing and internet addiction affect organizational information security? Cyberpsychol. Behav. Soc. Netw. 20, 567\u2013571 (2017). https:\/\/doi.org\/10.1089\/cyber.2017.0239","journal-title":"Cyberpsychol. Behav. Soc. Netw."},{"key":"637_CR40","first-page":"57","volume":"13","author":"S Chaudhary","year":"2015","unstructured":"Chaudhary, S., Zhao, Y., Berki, E., Valtanen, J., Li, L., Helenius, M., Mystakidis, S.: A cross-cultural and gender-based perspective for online security: exploring knowledge, skills and attitudes of higher education students. IADIS Int. J. WWW\/Internet 13, 57\u201371 (2015)","journal-title":"IADIS Int. J. WWW\/Internet"},{"key":"637_CR41","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.jisa.2018.08.002","volume":"42","author":"AA Cain","year":"2018","unstructured":"Cain, A.A., Edwards, M.E., Still, J.D.: An exploratory study of cyber hygiene behaviors and knowledge. J. Inf. Secur. Appl. 42, 36\u201345 (2018). https:\/\/doi.org\/10.1016\/j.jisa.2018.08.002","journal-title":"J. Inf. Secur. Appl."},{"key":"637_CR42","unstructured":"Choi, M., Levy, Y., & Anat, H.: The Role of User Computer Self-Efficacy, Cybersecurity Countermeasures Awareness, and Cybersecurity Skills Influence on Computer Misuse. In Proceedings of the Eighth Pre-ICIS Workshop on Information Security and Privacy. 1. December (2013)"},{"key":"637_CR43","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2019.101607","volume":"88","author":"A Brilingait\u0117","year":"2020","unstructured":"Brilingait\u0117, A., Bukauskas, L., Juozapavi\u010dius, A.: A framework for competence developmentand assessment in hybrid cybersecurity exercises. Comput. Secur. 88, 1\u201313 (2020). https:\/\/doi.org\/10.1016\/j.cose.2019.101607","journal-title":"Comput. Secur."},{"key":"637_CR44","doi-asserted-by":"crossref","unstructured":"Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L. F., & Downs, J.: Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems pp. 373\u2013382 (2010)","DOI":"10.1145\/1753326.1753383"},{"issue":"5","key":"637_CR45","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1515\/itit-2016-0008","volume":"58","author":"S Das","year":"2016","unstructured":"Das, S.: Social cybersecurity: understanding and leveraging social influence to increase security sensitivity. It-inf. Technol 58(5), 237\u2013245 (2016). https:\/\/doi.org\/10.1515\/itit-2016-0008","journal-title":"It-inf. Technol"},{"key":"637_CR46","doi-asserted-by":"publisher","unstructured":"Rader, E., Wash, R., & Brooks, B.: Stories as informal lessons about security. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 1\u201317 (2012). https:\/\/doi.org\/10.1145\/2335356.2335364","DOI":"10.1145\/2335356.2335364"},{"key":"637_CR47","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.1007\/s10796-019-09927-9","volume":"22","author":"H-J Kam","year":"2020","unstructured":"Kam, H.-J., Mattson, T., Goel, S.: A cross industry study of institutional pressures on organizational effort to raise information security awareness. Inf. Syst. Front. 22, 1241\u20131264 (2020). https:\/\/doi.org\/10.1007\/s10796-019-09927-9","journal-title":"Inf. Syst. Front."},{"key":"637_CR48","doi-asserted-by":"publisher","unstructured":"Watson, H., Moju-Igbene, E., Kumari, A., Das, S.: \u201cWe Hold Each Other Accountable\u201d: unpacking How Social Groups Approach Cybersecurity and Privacy Together. Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. (2020). https:\/\/doi.org\/10.1145\/3313831.3376605","DOI":"10.1145\/3313831.3376605"},{"key":"637_CR49","unstructured":"United Nations Development Programme. Human Development Report 2020\u2014The next frontier:Human Development and the Anthropocene. (2020). http:\/\/hdr.undp.org\/sites\/default\/files\/hdr2020.pdf. Accessed 12 July 2021"},{"key":"637_CR50","unstructured":"National Bureau of Statistics of China. 2020 China statistical yearbook. China Statistics Press. (2021). http:\/\/www.stats.gov.cn\/tjsj\/ndsj\/2020\/indexeh.htm. Accessed 2 Aug 2021"},{"key":"637_CR51","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/3380799.3380803","volume":"51","author":"Z Aivazpour","year":"2020","unstructured":"Aivazpour, Z., Rao, V.S.: (Chino): information disclosure and privacy paradox. ACM SIGMIS Database DATABASE Adv. Inf. Syst. 51, 14\u201336 (2020). https:\/\/doi.org\/10.1145\/3380799.3380803","journal-title":"ACM SIGMIS Database DATABASE Adv. Inf. Syst."},{"key":"637_CR52","doi-asserted-by":"publisher","first-page":"81","DOI":"10.2307\/2348619","volume":"44","author":"SR Lipsitz","year":"1995","unstructured":"Lipsitz, S.R., Parzen, M.: Sample size calculations for non-randomized studies. Statistician 44, 81 (1995). https:\/\/doi.org\/10.2307\/2348619","journal-title":"Statistician"},{"key":"637_CR53","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1177\/0894439317729340","volume":"36","author":"B Mei","year":"2017","unstructured":"Mei, B., Brown, G.T.L.: Conducting online surveys in China. Soc. Sci. Comput. Rev. 36, 721\u2013734 (2017). https:\/\/doi.org\/10.1177\/0894439317729340","journal-title":"Soc. Sci. Comput. Rev."},{"key":"637_CR54","first-page":"21","volume":"2","author":"NM Razali","year":"2011","unstructured":"Razali, N.M., Wah, Y.B.: Power comparisons of Shapiro-Wilk, Kolmogorov-Smirnov, Lilliefors and Anderson-Darling tests. J. Stat. Model. Anal. 2, 21\u201333 (2011)","journal-title":"J. Stat. Model. Anal."},{"key":"637_CR55","doi-asserted-by":"publisher","unstructured":"Jin, R.: Discussion on the Teaching Reform of Computer Fundamental Course for non-computer Majors in Applied Universities [\u5e94\u7528\u578b\u672c\u79d1\u9662\u6821\u975e\u8ba1\u7b97\u673a\u4e13\u4e1a\u300a\u8ba1\u7b97\u673a\u57fa\u7840\u300b\u6559\u5b66\u6539\u9769\u63a2\u8ba8]. Fujian Comput. 10, 174\u2013175 (2018). https:\/\/doi.org\/10.16707\/j.cnki.fjpc.2018.10.088","DOI":"10.16707\/j.cnki.fjpc.2018.10.088"},{"key":"637_CR56","unstructured":"Chen, S.: Research on VC + + Curriculum Construction for Non-computer Major Postgraduate Students [\u975e\u8ba1\u7b97\u673a\u4e13\u4e1a\u7814\u7a76\u751f VC + +\u8bfe\u7a0b\u5efa\u8bbe\u7814\u7a76]. J. Lanzhou Inst. Educ. 35, 80\u201381, 145 (2019)"},{"key":"637_CR57","doi-asserted-by":"publisher","unstructured":"A. Farooq, J. Isoaho, S. Virtanen and J. Isoaho, \"Information security awareness in educational institution: an analysis of students' individual factors,\" IEEE Trustcom\/BigDataSE\/ISPA, 2015, pp. 352\u2013359 (2015) https:\/\/doi.org\/10.1109\/Trustcom.2015.394","DOI":"10.1109\/Trustcom.2015.394"},{"key":"637_CR58","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/6775980","author":"MA Alqahtani","year":"2022","unstructured":"Alqahtani, M.A.: Cybersecurity awareness based on software and e-mail security with statistical analysis. Comput. Intell. Neurosci. (2022). https:\/\/doi.org\/10.1155\/2022\/6775980","journal-title":"Comput. Intell. Neurosci."},{"key":"637_CR59","unstructured":"Mutunhu, B., Dube, S., Ncube, N., & Sibanda, S.: Cyber Security Awareness and Education Framework for Zimbabwe Universities: A Case of National University of Science and Technology. Proceedings of the International Conference on Industrial Engineering and Operations Management Nsukka, Nigeria, 5\u20137 April, 2022"},{"key":"637_CR60","doi-asserted-by":"publisher","unstructured":"Moallem, A.: Cyber security awareness among college students. In\u00a0International conference on applied human factors and ergonomics, pp. 79\u201387. Springer, New York (2018) https:\/\/doi.org\/10.1007\/978-3-319-94782-2_8","DOI":"10.1007\/978-3-319-94782-2_8"},{"key":"637_CR61","unstructured":"Li, Y.-L., Li, Y., & Li, A. A study on college Students\u2019 internet information ethics cognition and influencing factors [\u5927\u5b66\u751f\u7f51\u7edc\u4fe1\u606f\u4f26\u7406\u8ba4\u77e5\u4e0e\u5f71\u54cd\u56e0\u7d20\u7814\u7a76]. Information and Documentation Work, 35(2), 10\u201316 (2014). http:\/\/qbzl.ruc.edu.cn\/EN\/abstract\/abstract669.shtml Accessed 10 June 2022"},{"key":"637_CR62","unstructured":"Sun, W.: Investigation of Safety Consciousness of University Students in Dalian City [\u5927\u8fde\u5e02\u5927\u5b66\u751f\u7f51\u7edc\u5b89\u5168\u610f\u8bc6\u8c03\u67e5\u7814\u7a76]., (2018)"},{"key":"637_CR63","doi-asserted-by":"publisher","DOI":"10.21125\/edulearn.2017.1591","author":"E Berki","year":"2017","unstructured":"Berki, E., Kandel, C., Zhao, Y., Chaudhary, S.: Comparative study of cyber-security knowledge in higher education institutes of five countries. Educ. Comput. Sci. (2017). https:\/\/doi.org\/10.21125\/edulearn.2017.1591","journal-title":"Educ. Comput. Sci."},{"key":"637_CR64","doi-asserted-by":"publisher","unstructured":"Senali, M. G., Cripps, H., Meek, S., & Ryan, M. M.: A comparison of Australians, Chinese and Sri Lankans' payment preference at point-of-sale.\u00a0Market. Intell. Plan.\u00a040(1), 18\u201332 (2021). https:\/\/doi.org\/10.1108\/MIP-07-2021-0235","DOI":"10.1108\/MIP-07-2021-0235"},{"key":"637_CR65","doi-asserted-by":"crossref","unstructured":"Mezzour, G., Carley, K.M., Carley, L.R.: An empirical study of global malware encounters. In: Proceedings of the 2015 Symposium and Bootcamp on the Science of Security. ACM, p. 8, (2015)","DOI":"10.1145\/2746194.2746202"},{"key":"637_CR66","unstructured":"Gantz, J.F., Vavra, T., Lim, V.: Unlicensed Software and Cybersecurity Threats, BSA- The Software Alliance, January (2015)"},{"key":"637_CR67","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/s11516-010-0006-1","volume":"5","author":"J Zhao","year":"2010","unstructured":"Zhao, J., Xu, F.: The state of ICT education in China: a literature review. Front. Educ. China 5, 50\u201373 (2010). https:\/\/doi.org\/10.1007\/s11516-010-0006-1","journal-title":"Front. Educ. China"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00637-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-022-00637-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-022-00637-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T14:27:33Z","timestamp":1744208853000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-022-00637-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,24]]},"references-count":67,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["637"],"URL":"https:\/\/doi.org\/10.1007\/s10207-022-00637-z","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,11,24]]},"assertion":[{"value":"11 November 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 November 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose. The authors have no competing interests to declare that are relevant to the content of this article. All authors certify that they have no affiliations with or involvement in any organization or entity with any financial interest or non-financial interest in the subject matter or materials discussed in this manuscript. The authors have no financial or proprietary interests in any material discussed in this article. The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}