{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T07:33:31Z","timestamp":1770968011854,"version":"3.50.1"},"reference-count":7,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2003,3]]},"DOI":"10.1080\/08874417.2003.11647525","type":"journal-article","created":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T16:28:45Z","timestamp":1722616125000},"page":"118-126","source":"Crossref","is-referenced-by-count":1,"title":["CDC's New Epidemic: An Investigation into Awareness, Attitudes, Actions, and Knowledge of Computer Viruses among Students Utilizing Campus Computer Labs"],"prefix":"10.1080","volume":"43","author":[{"given":"Kathaleena Edward","family":"Monds","sequence":"first","affiliation":[{"name":"Albany State University, Albany, Georgia 31705"}]},{"given":"Chiou-Pirng","family":"Wang","sequence":"additional","affiliation":[{"name":"Albany State University, Albany, Georgia 31705"}]}],"member":"301","published-online":{"date-parts":[[2016,2]]},"reference":[{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1999.0361"},{"key":"e_1_2_1_3_1","first-page":"56","volume-title":"IEEE Spectrum","author":"Cass S.","year":"2001","unstructured":"Cass, S. \u201cAnatomy of Malice,\u201d IEEE Spectrum, 2001, pp. 56\u201360."},{"key":"e_1_2_1_4_1","first-page":"710","volume-title":"Ensuring Integrity and Availability","author":"Dean T.","year":"2001","unstructured":"Dean, T. \u201cNet+ Guide to Networking,\u201d Ensuring Integrity and Availability, 2001, p. 710."},{"key":"e_1_2_1_5_1","first-page":"1","volume-title":"All About Viruses, Worms and Trojans","author":"Delger H.","year":"2001","unstructured":"Delger, H. \u201cComputer Virus Help,\u201d All About Viruses, Worms and Trojans, http:\/\/pages.prodigy.net\/henri_delger\/allabout.htm, 2001, pp. 1\u20132."},{"key":"e_1_2_1_6_1","volume-title":"PC Magazine","author":"Machrone B.","year":"2001","unstructured":"Machrone, B. \u201cComputer Viruses: Myth vs. Reality,\u201d PC Magazine reprint from 11\/19\/96. http:\/\/www.zdnet.com\/pcmag\/issues\/1520\/pcmg0032.htm, 2001."},{"issue":"34","key":"e_1_2_1_7_1","first-page":"19","article-title":"\u201cThe 10 Most Unwanted: 2001's Most Popular Viruses,\u201d","volume":"105","author":"Trembly A.C.","year":"2001","unstructured":"Trembly, A.C. \u201cThe 10 Most Unwanted: 2001's Most Popular Viruses,\u201d Life & Health Financial Services, 105:34, 2001, p. 19.","journal-title":"Life & Health Financial Services"},{"key":"e_1_2_1_8_1","volume-title":"2001 Self-Assessment of Controls Questionnaire","author":"University of Tennessee","year":"2001","unstructured":"University of Tennessee. 2001 Self-Assessment of Controls Questionnaire, http:\/\/128.169.233.77\/default.htm, 2001."}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2003.11647525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,2]],"date-time":"2024-08-02T16:30:51Z","timestamp":1722616251000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2003.11647525"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003,3]]},"references-count":7,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2003,3]]}},"alternative-id":["10.1080\/08874417.2003.11647525"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2003.11647525","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2003,3]]}}}