{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:24:02Z","timestamp":1766067842421},"reference-count":111,"publisher":"Informa UK Limited","issue":"12","funder":[{"name":"Zhejiang Provincial Philosophy and Social Science Planning Project","award":["21NDJC308YBM"],"award-info":[{"award-number":["21NDJC308YBM"]}]},{"name":"China's National Social Science Later-stage Project","award":["21FJKB013"],"award-info":[{"award-number":["21FJKB013"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2024,9,9]]},"DOI":"10.1080\/0144929x.2023.2260876","type":"journal-article","created":{"date-parts":[[2023,10,10]],"date-time":"2023-10-10T14:16:07Z","timestamp":1696947367000},"page":"2799-2820","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":5,"title":["Validation and application of the human aspects of information security questionnaire for undergraduates: effects of gender, discipline and grade level"],"prefix":"10.1080","volume":"43","author":[{"given":"XiaoShu","family":"Xu","sequence":"first","affiliation":[{"name":"School of Foreign Studies, Wenzhou University, Wenzhou, People\u2019s Republic of China"}]},{"given":"Wilson Cheong Hin","family":"Hong","sequence":"additional","affiliation":[{"name":"Centre for Teaching and Learning Enhancement, Macao Institute for Tourism Studies, Macao, People\u2019s Republic of China"}]},{"given":"Kimberly","family":"Kolletar-Zhu","sequence":"additional","affiliation":[{"name":"School of Foreign Studies, Wenzhou University, Wenzhou, People\u2019s Republic of China"}]},{"given":"YunFeng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Centre for Portuguese Studies, Macao Polytechnic University, Macao, People\u2019s Republic of China"}]},{"given":"ChunYang","family":"Chi","sequence":"additional","affiliation":[{"name":"Editorial Department of Journal, Wenzhou Polytechnic, Wenzhou, People\u2019s Republic of China"}]}],"member":"301","published-online":{"date-parts":[[2023,10,10]]},"reference":[{"key":"e_1_3_2_2_1","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-105-6.ch018"},{"key":"e_1_3_2_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.12.151"},{"key":"e_1_3_2_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2011.5971959"},{"key":"e_1_3_2_5_1","doi-asserted-by":"publisher","DOI":"10.1108\/GKMC-12-2021-0209"},{"key":"e_1_3_2_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/01655515221127609"},{"key":"e_1_3_2_7_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0219649216500076"},{"issue":"3","key":"e_1_3_2_8_1","first-page":"276","article-title":"Cybersecurity Awareness Level: The Case of Saudi Arabia University Students","volume":"12","author":"Aljohni W.","year":"2021","unstructured":"Aljohni, W., N. Elfadil, M. Jarajreh, and M. Gasmelsied. 2021. \u201cCybersecurity Awareness Level: The Case of Saudi Arabia University Students.\u201d Int. J. Adv. Comput. Sci. Appl. 12 (3): 276\u2013281.","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"key":"e_1_3_2_9_1","first-page":"798","volume-title":"A Handbook of Social Psychology","author":"Allport G.","year":"1935","unstructured":"Allport, G. 1935. \u201cAttitudes.\u201d In A Handbook of Social Psychology, edited by C. Murchinson, 798\u2013844. Worcester, Mass: Clark Univ. Press."},{"key":"e_1_3_2_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2021.e06016"},{"key":"e_1_3_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2014.7038814"},{"key":"e_1_3_2_12_1","doi-asserted-by":"publisher","DOI":"10.21203\/rs.3.rs-1977578\/v1"},{"key":"e_1_3_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.12.040"},{"key":"e_1_3_2_14_1","doi-asserted-by":"publisher","DOI":"10.1177\/0266666921997512"},{"key":"e_1_3_2_15_1","unstructured":"ASPERSKY. 2020. Education Report available at: https:\/\/media.kasperskycontenthub.com\/wpcontent\/uploads\/sites\/43\/2020\/09\/04113558\/education_report_04092020_2.pdf accessed: December 9."},{"key":"e_1_3_2_16_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1954.tb00174.x"},{"key":"e_1_3_2_17_1","doi-asserted-by":"crossref","unstructured":"Berki E. C. S. Kandel Y. Zhao and S. A. Chaudhary. 2017. \u201cComparative Study of Cyber-Security Knowledge in Higher Education Institutes of Five Countries.\u201d Proceedings of EDULEARN17 Conference 3rd-5th Barcelona Spain.","DOI":"10.21125\/edulearn.2017.1591"},{"key":"e_1_3_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.07.003"},{"key":"e_1_3_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5218-8_4"},{"key":"e_1_3_2_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20459"},{"key":"e_1_3_2_21_1","doi-asserted-by":"publisher","DOI":"10.4085\/1947-380X-6.1.27"},{"key":"e_1_3_2_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.08.002"},{"key":"e_1_3_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.106"},{"key":"e_1_3_2_24_1","doi-asserted-by":"publisher","DOI":"10.23962\/10539\/23572"},{"key":"e_1_3_2_25_1","doi-asserted-by":"publisher","DOI":"10.3390\/info13040192"},{"key":"e_1_3_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.05.005"},{"key":"e_1_3_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02310555"},{"key":"e_1_3_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2691517.2691521"},{"key":"e_1_3_2_29_1","doi-asserted-by":"publisher","DOI":"10.1515\/itit-2016-0008"},{"key":"e_1_3_2_30_1","first-page":"177","volume-title":"Answering Questions: Methodology for Determining Cognitive and Communicative Processes in Survey Research","author":"DeMaio T. J.","year":"1996","unstructured":"DeMaio, T. J., and J. M. Rothgeb. 1996. \u201cCognitive Interviewing Techniques: In the lab and in the Field.\u201d In Answering Questions: Methodology for Determining Cognitive and Communicative Processes in Survey Research, edited by N. Schwartz, and S. Sudman, 177\u2013195. San Francisco: Jossey-Bass."},{"key":"e_1_3_2_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-1765(02)00045-9"},{"key":"e_1_3_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858265"},{"key":"e_1_3_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702249"},{"key":"e_1_3_2_34_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1339\/1\/012098"},{"key":"e_1_3_2_35_1","unstructured":"FireEye Inc. Cyber threats to the Education Industry. White Paper. 2016. Library Catalog. Available online: www.fireeye.com (accessed on 28 January 2021)."},{"key":"e_1_3_2_36_1","first-page":"477","volume-title":"Readings in Attitude Theory and Measurement","author":"Fishbein M.","year":"1967","unstructured":"Fishbein, M. 1967. \u201cAttitude and the Prediction of Behavior.\u201d In Readings in Attitude Theory and Measurement, edited by M. Fishbein, 477\u2013492. New York: John Wiley & Sons."},{"issue":"10","key":"e_1_3_2_37_1","first-page":"767","article-title":"Cyber Security Awareness Among University Students: A Case Study","volume":"29","author":"Gabra A. A.","year":"2020","unstructured":"Gabra, A. A., M. B. Sirat, S. Hajar, and I. B. Dauda. 2020. \u201cCyber Security Awareness Among University Students: A Case Study.\u201d Int. J. Adv. Scie. Tech. 29 (10S): 767\u2013776.","journal-title":"Int. J. Adv. Scie. Tech."},{"issue":"1","key":"e_1_3_2_38_1","first-page":"383","article-title":"\u00d6\u011frencilerinin \u0130nternet Kullan\u0131m Bi\u00e7imleri: Riskli Davran\u0131\u015flar ve F\u0131rsatlar","volume":"24","author":"G\u00f6k\u00e7earslan \u015e","year":"2016","unstructured":"G\u00f6k\u00e7earslan, \u015e, and S. Sefero\u011flu. 2016. \u201c\u00d6\u011frencilerinin \u0130nternet Kullan\u0131m Bi\u00e7imleri: Riskli Davran\u0131\u015flar ve F\u0131rsatlar.\u201d Kastamonu E\u011fitim Dergisi 24 (1): 383\u2013404.","journal-title":"Kastamonu E\u011fitim Dergisi"},{"key":"e_1_3_2_39_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.103.2.265"},{"key":"e_1_3_2_40_1","doi-asserted-by":"publisher","DOI":"10.29228\/JASSS.44135"},{"key":"e_1_3_2_41_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1998.tb01123.x"},{"key":"e_1_3_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s100219900011"},{"key":"e_1_3_2_43_1","doi-asserted-by":"publisher","DOI":"10.7801\/68"},{"key":"e_1_3_2_44_1","unstructured":"Haeussinger F. and J. Kranz. 2013. \u201cInformation Security Awareness: Its Antecedents and Mediating Effects on Security Compliant Behavior.\u201d ICIS 2013 Proceedings. Retrieved from https:\/\/aisel.aisnet.org\/icis2013\/proceedings\/SecurityOfIS\/9."},{"key":"e_1_3_2_45_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685221111153537"},{"key":"e_1_3_2_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-014-2346-x"},{"key":"e_1_3_2_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2016.01.002"},{"key":"e_1_3_2_48_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"e_1_3_2_49_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2018.1432996"},{"key":"e_1_3_2_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-022-11121-5"},{"key":"e_1_3_2_51_1","first-page":"1","article-title":"Security Awareness: The First Step in Information Security Compliance Behavior","author":"Hwang I.","year":"2019","unstructured":"Hwang, I., R. Wakefield, S. Kim, and T. Kim. 2019. \u201cSecurity Awareness: The First Step in Information Security Compliance Behavior.\u201d Journal of Computer Information Systems, 1\u201312.","journal-title":"Journal of Computer Information Systems"},{"key":"e_1_3_2_52_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2014.934286"},{"key":"e_1_3_2_53_1","unstructured":"Ingerman B. L. and C. Yang. 2011. Top 10 IT issues 2011. Educause Review May\/June 26\u201340."},{"key":"e_1_3_2_54_1","unstructured":"ISO\/IEC 27002. 2022. Information Security Cybersecurity and Privacy Protection \u2014 Information Security Controls. https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso-iec:27002:ed-3:v2:en."},{"key":"e_1_3_2_55_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15328007SEM1001_6"},{"key":"e_1_3_2_56_1","first-page":"174","article-title":"Discussion on the Teaching Reform of Computer Fundamental Course for non-Computer Majors in Applied Universities [\u5e94\u7528\u578b\u672c\u79d1\u9662\u6821\u975e\u8ba1\u7b97\u673a\u4e13\u4e1a\u300a\u8ba1\u7b97\u673a\u57fa\u7840\u300b\u6559\u5b66\u6539\u9769\u63a2\u8ba8]","volume":"10","author":"Jin R.","year":"2018","unstructured":"Jin, R. 2018. \u201cDiscussion on the Teaching Reform of Computer Fundamental Course for non-Computer Majors in Applied Universities [\u5e94\u7528\u578b\u672c\u79d1\u9662\u6821\u975e\u8ba1\u7b97\u673a\u4e13\u4e1a\u300a\u8ba1\u7b97\u673a\u57fa\u7840\u300b\u6559\u5b66\u6539\u9769\u63a2\u8ba8].\u201d Fujian Comput. 10: 174\u2013175.","journal-title":"Fujian Comput."},{"key":"e_1_3_2_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-006-9131-4"},{"key":"e_1_3_2_58_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2015.06.003"},{"key":"e_1_3_2_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11528-014-0806-x"},{"key":"e_1_3_2_60_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2012.11645611"},{"key":"e_1_3_2_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02291575"},{"key":"e_1_3_2_62_1","doi-asserted-by":"crossref","unstructured":"Kearney P. 2010. Security: The Human Factor; IT Governance Publishing Cambridgeshire ISBN 9781591392538.","DOI":"10.2307\/j.ctt5hh5gj"},{"key":"e_1_3_2_63_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2013.828803"},{"key":"e_1_3_2_64_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-01-2013-0005"},{"key":"e_1_3_2_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/CINTI.2016.7846406"},{"key":"e_1_3_2_66_1","volume-title":"Principles and Practice of Structural Equation Modeling","author":"Kline R. B.","year":"2016","unstructured":"Kline, R. B. 2016. Principles and Practice of Structural Equation Modeling. 4th ed. New York: The Guilford Press.","edition":"4"},{"key":"e_1_3_2_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.02.008"},{"key":"e_1_3_2_68_1","doi-asserted-by":"crossref","unstructured":"Kusumawati A. 2018. \u201cInformation Security Awareness: study on a Government Agency.\u201d In: 2018 International Conference on Sustainable Information Engineering and Technology (SIET). IEEE 224\u20139.","DOI":"10.1109\/SIET.2018.8693168"},{"key":"e_1_3_2_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.192"},{"key":"e_1_3_2_70_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJMIE.2017.084926"},{"key":"e_1_3_2_71_1","doi-asserted-by":"publisher","DOI":"10.1108\/17468771011032796"},{"key":"e_1_3_2_72_1","doi-asserted-by":"publisher","DOI":"10.12700\/APH.18.8.2021.8.4"},{"key":"e_1_3_2_73_1","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-10-2012-0060"},{"key":"e_1_3_2_74_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.065"},{"key":"e_1_3_2_75_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0028085"},{"key":"e_1_3_2_76_1","doi-asserted-by":"publisher","DOI":"10.1177\/0894439317729340"},{"key":"e_1_3_2_77_1","volume-title":"Applied Logistic Regression Analysis","author":"Menard S.","year":"2001","unstructured":"Menard, S. 2001. Applied Logistic Regression Analysis. 2nd ed. Thousand Oaks, CA: Sage.","edition":"2"},{"key":"e_1_3_2_78_1","doi-asserted-by":"publisher","DOI":"10.1108\/JSIT-01-2014-0007"},{"issue":"1","key":"e_1_3_2_79_1","first-page":"12","article-title":"Changes in Knowledge, Attitudes, and Behavior as a Result of a Community-Based AIDS Prevention Program","volume":"2","author":"Miller T. E.","year":"1990","unstructured":"Miller, T. E., C. Booraem, J. V. Flowers, and A. E. Iversen. 1990. \u201cChanges in Knowledge, Attitudes, and Behavior as a Result of a Community-Based AIDS Prevention Program.\u201d AIDS Education and Prevention 2 (1): 12\u201323.","journal-title":"AIDS Education and Prevention"},{"key":"e_1_3_2_80_1","volume-title":"The Art of Deception","author":"Mitnik K.","year":"2002","unstructured":"Mitnik, K., and W. Simon. 2002. The Art of Deception. New York: Wiley Publishing."},{"key":"e_1_3_2_81_1","doi-asserted-by":"publisher","DOI":"10.1002\/1097-4679(198903)45:2<239::AID-JCLP2270450210>3.0.CO;2-1"},{"key":"e_1_3_2_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.10.002"},{"key":"e_1_3_2_83_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.01.004"},{"key":"e_1_3_2_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.12.003"},{"key":"e_1_3_2_85_1","unstructured":"Parsons K. A. McCormac M. R. Pattinson M. A. Butavicius and C. Jerram. 2013. \u201cAn Analysis of Information Security Vulnerabilities at Three Australian Government Organisations.\u201d Proceedings of the European Information Security Multi-Conference EISMC 34-44."},{"key":"e_1_3_2_86_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-03-2017-0017"},{"key":"e_1_3_2_87_1","volume-title":"Proceedings of the 10th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2016)","author":"Pattinson M.","year":"2016","unstructured":"Pattinson, M., M. Butavicius, K. Parsons, A. McCormac, D. Calic, and C. Jerram. 2016. \u201cThe Information Security Awareness of Bank Employees.\u201d In Proceedings of the 10th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2016), edited by S. M. Furnell, and N. L. Clarke. Frankfurt, Germany: PONEMON INSTITUTE and IBM, Cost of a Data Breach Report. Available at: https:\/\/www.ibm.com\/security\/digital-assets\/cost-data-breach-report, accessed: January 9, 2021."},{"key":"e_1_3_2_88_1","first-page":"57","volume-title":"Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015)","author":"Pattinson M.","year":"2015","unstructured":"Pattinson, M., M. Butavicius, K. Parsons, A. McCormac, and C. Jerram. 2015. \u201cExamining Attitudes Toward Information Security Behaviour Using Mixed Methods.\u201d In Proceedings of the Ninth International Symposium on Human Aspects of Information Security & Assurance (HAISA 2015), edited by S. Furnell, and N. Clarke, 57\u201370. Mytilene, Greece: Centre for Security, Commun. Netw. Resea."},{"key":"e_1_3_2_89_1","doi-asserted-by":"publisher","DOI":"10.1108\/K-12-2014-0283"},{"key":"e_1_3_2_90_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2012.747234"},{"key":"e_1_3_2_91_1","volume-title":"Mediji in srednjes\u02c7olci v Sloveniji 2016","author":"Rek M.","year":"2016","unstructured":"Rek, M., and B. K. Milanovski. 2016. Mediji in srednjes\u02c7olci v Sloveniji 2016. Ljubljana: Fakulteta za druz\u02c7bene vede, Arhiv druz\u02c7boslovnih podatkov."},{"key":"e_1_3_2_92_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.07.008"},{"key":"e_1_3_2_93_1","unstructured":"Risk Based Security. 2020. \u201cThe 2019 Year-End Report Data Breach QuickView (Report)\u201d."},{"key":"e_1_3_2_94_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2023.e14234"},{"key":"e_1_3_2_95_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.so.02.080176.001113"},{"key":"e_1_3_2_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/mipro.2015.7160485"},{"key":"e_1_3_2_97_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2021.12.003"},{"key":"e_1_3_2_98_1","unstructured":"Stanton J. P. Mastrangelo K. Stam and J. Jolton. 2004. \u201cBehavioural Information Security: Two End-User Survey Studies of Motivation and Security Practices.\u201d In: AMCIS 2004 Proceedings 175. J. Assco. Inf. Syst. AIS Electronic Library (AISeL) http:\/\/aisel.aisnet.org\/amcis2004\/175."},{"key":"e_1_3_2_99_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.01324"},{"key":"e_1_3_2_100_1","doi-asserted-by":"publisher","DOI":"10.2307\/249551"},{"key":"e_1_3_2_101_1","first-page":"10","article-title":"An Evaluation of Identity-Sharing Behavior in Social Network Communities","volume":"3","author":"Stutzman F.","year":"2006","unstructured":"Stutzman, F. 2006. \u201cAn Evaluation of Identity-Sharing Behavior in Social Network Communities.\u201d International Digital and Media Arts 3: 10\u201318.","journal-title":"International Digital and Media Arts"},{"key":"e_1_3_2_102_1","doi-asserted-by":"crossref","unstructured":"Tarmizi A. I. C. Hapsari A. N. Hidayanto and A. Y. Ly. 2018. \u201cInformation Security Awareness National Nuclear Energy Agency of Indonesia (BATAN).\u201d In: 2018 International Conference on Computing Engineering and Design (ICCED). IEEE 35\u20139.","DOI":"10.1109\/ICCED.2018.00017"},{"key":"e_1_3_2_103_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685221211219191"},{"key":"e_1_3_2_104_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685229810227649"},{"key":"e_1_3_2_105_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi13020039"},{"key":"e_1_3_2_106_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00424"},{"key":"e_1_3_2_107_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.84.3.608"},{"key":"e_1_3_2_108_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101640"},{"key":"e_1_3_2_109_1","unstructured":"Wilson S. R. 2016. \u201cInformation Security Awareness in Higher Education: A Qualitative Case Study Investigation.\u201d ProQuest Dissertations & Theses. ProQuest Number: 10243230."},{"key":"e_1_3_2_110_1","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/978-3-662-43927-2_5","volume-title":"ICT in Education in Global Context: Emerging Trends Report 2013-2014","author":"Wu D.","year":"2014","unstructured":"Wu, D. 2014. \u201cAn Introduction to ICT in Education in China.\u201d In ICT in Education in Global Context: Emerging Trends Report 2013-2014, edited by R. Huang, E. Kinshuk, and J. Price, 65\u201384. Berlin: Springer."},{"key":"e_1_3_2_111_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.02.019"},{"key":"e_1_3_2_112_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2020.1712269"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2023.2260876","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,23]],"date-time":"2024-09-23T12:42:06Z","timestamp":1727095326000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2023.2260876"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,10]]},"references-count":111,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2024,9,9]]}},"alternative-id":["10.1080\/0144929X.2023.2260876"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2023.2260876","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"type":"print","value":"0144-929X"},{"type":"electronic","value":"1362-3001"}],"subject":[],"published":{"date-parts":[[2023,10,10]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-07-09","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-01-21","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-10-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}