{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T21:13:13Z","timestamp":1771017193187,"version":"3.50.1"},"reference-count":44,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2015,3]]},"DOI":"10.1080\/08874417.2015.11645769","type":"journal-article","created":{"date-parts":[[2016,4,11]],"date-time":"2016-04-11T09:55:47Z","timestamp":1460368547000},"page":"29-37","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":16,"title":["Education and Prevention Relationships on Security Incidents for Home Computers"],"prefix":"10.1080","volume":"55","author":[{"given":"Garry L.","family":"White","sequence":"first","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2015,12,10]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.12.005"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2012.10845654"},{"issue":"7","key":"CIT0003","first-page":"1","volume":"25","author":"Britt P.","year":"2008","journal-title":"Information Today"},{"issue":"1","key":"CIT0004","first-page":"31","volume":"34","author":"Brown C.P.","year":"1990","journal-title":"Security Management"},{"issue":"4","key":"CIT0005","first-page":"20","volume":"52","author":"Clarra C. I.","year":"2011","journal-title":"Journal of Computer Information Systems"},{"issue":"2711","key":"CIT0006","first-page":"19a","volume":"202","year":"2009","journal-title":"New Scientist"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1145\/2398356.2398377"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.009"},{"issue":"3","key":"CIT0010","first-page":"24","volume":"21","author":"Gage D.","year":"1996","journal-title":"Info World Canada"},{"issue":"10","key":"CIT0011","first-page":"24","volume":"28","author":"Grau J.","year":"1984","journal-title":"Security Management"},{"issue":"8","key":"CIT0012","first-page":"47","volume":"30","author":"Greenberg M.","year":"1986","journal-title":"Security Management"},{"issue":"5","key":"CIT0013","first-page":"49","volume":"8","author":"Kieke R. L.","year":"2006","journal-title":"Journal of Health Care Compliance"},{"key":"CIT0014","volume-title":"Financial Times","author":"Kim T.","year":"2004"},{"issue":"3","key":"CIT0015","first-page":"66","volume":"78","author":"Kirkpatrick J.","year":"2006","journal-title":"Machine Design"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.06.010"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1108\/09685221011095236"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2009.03.002"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1145\/1325555.1325569"},{"issue":"4","key":"CIT0020","first-page":"195","volume":"16","author":"Luo X.","year":"2007","journal-title":"Information Security Journal"},{"key":"CIT0021","first-page":"35","volume":"1194","author":"McLaughlin K.","year":"2006","journal-title":"CRN"},{"issue":"2","key":"CIT0022","first-page":"91","volume":"14","author":"Mensch S.","year":"2011","journal-title":"Academy of Information and Management Sciences Journal"},{"key":"CIT0023","unstructured":"Mitnick, K. (2002). The Art of Deception. John Wiley & sons, Hoboken, NJ. (p. 3)."},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.11.010"},{"issue":"3","key":"CIT0025","first-page":"40","volume":"27","author":"O'Dell R.","year":"2008","journal-title":"Rural Telecommunications"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1080\/10658980701747237"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1201\/1079.07366981\/45423.33.1.20050701\/89329.1"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1108\/09670730510586986"},{"issue":"4","key":"CIT0029","doi-asserted-by":"crossref","first-page":"757","DOI":"10.2307\/25750704","volume":"34","author":"Puhakainen P.","year":"2010","journal-title":"MIS Quarterly"},{"issue":"1","key":"CIT0030","first-page":"60","volume":"17","author":"Radcliff D.","year":"1997","journal-title":"Software Magazine"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.07.008"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.001"},{"key":"CIT0033","volume-title":"Status of security awareness in business organizations and colleges of business: an alnaysis of training and education, policies, and social engineering testing","author":"Rotvoid G.","year":"2007"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.01.002"},{"key":"CIT0035","volume-title":"Wall Street Journal","author":"Schultz E. E.","year":"2012"},{"issue":"2","key":"CIT0036","first-page":"10","volume":"22","author":"Sherizen S.","year":"1984","journal-title":"Data Management"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1108\/09685220010371394"},{"key":"CIT0038","volume-title":"CYBERSECURITY EXPERTS SEE NEED TO MODIFY \u2018REACTIVE\u2019 STRATEGY","author":"Stanton L.","year":"2010"},{"issue":"4","key":"CIT0039","first-page":"44","volume":"54","author":"Wagley J.","year":"2010","journal-title":"Security Management"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1521\/jscp.1996.15.1.1"},{"issue":"1","key":"CIT0041","first-page":"35","volume":"11","author":"White G.","year":"2010","journal-title":"Issues in Information Systems"},{"key":"CIT0042","volume-title":"PROCEEDINGS of the 2012 Annual Information Systems Educators Conference (ISECON)","author":"White G.","year":"2012"},{"issue":"3","key":"CIT0043","doi-asserted-by":"crossref","first-page":"9","DOI":"10.19030\/rbis.v15i3.5398","volume":"15","author":"Wolf M.","year":"2011","journal-title":"The Review of Business Information Systems"},{"issue":"4","key":"CIT0044","first-page":"407","volume":"23","author":"Yoon C.","year":"2012","journal-title":"Journal of Information Systems Education"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10256018808623883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,6]],"date-time":"2019-09-06T12:58:30Z","timestamp":1567774710000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2015.11645769"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3]]},"references-count":44,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2015,12,10]]},"published-print":{"date-parts":[[2015,3]]}},"alternative-id":["10.1080\/08874417.2015.11645769"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2015.11645769","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,3]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}