{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T01:53:54Z","timestamp":1767837234108,"version":"3.49.0"},"reference-count":56,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2018,7,3]]},"DOI":"10.1080\/08874417.2016.1233001","type":"journal-article","created":{"date-parts":[[2016,10,28]],"date-time":"2016-10-28T21:03:47Z","timestamp":1477688627000},"page":"244-252","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":5,"title":["The Impact of Online Training on Facebook Privacy"],"prefix":"10.1080","volume":"58","author":[{"given":"Karen H.","family":"Smith","sequence":"first","affiliation":[{"name":"Texas State University, San Marcos, TX, USA"}]},{"given":"Francis A.","family":"M\u00e9ndez Mediavilla","sequence":"additional","affiliation":[{"name":"Texas State University, San Marcos, TX, USA"}]},{"given":"Garry L.","family":"White","sequence":"additional","affiliation":[{"name":"Texas State University, San Marcos, TX, USA"}]}],"member":"301","published-online":{"date-parts":[[2016,10,28]]},"reference":[{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.12.005"},{"key":"CIT0004","volume-title":"Business driven information systems. New York (NY): McGraw-Hill\/Irwin","author":"Baltzan P","year":"2011"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.56.5.805"},{"issue":"1","key":"CIT0006","first-page":"31","volume":"34","author":"Brown CP.","year":"1990","journal-title":"Secur Manage"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1177\/0146167208320061"},{"issue":"1","key":"CIT0008","first-page":"39","volume":"14","author":"Butler E","year":"2011","journal-title":"Hum Commun"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2011.11.011"},{"issue":"4","key":"CIT0010","first-page":"20","volume":"52","author":"Claar CL","year":"2012","journal-title":"J Comput Inf Syst"},{"issue":"6","key":"CIT0011","first-page":"42","volume":"209","author":"Collins JC.","year":"2010","journal-title":"J Accountancy"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"issue":"1","key":"CIT0014","first-page":"83","volume":"15","author":"Debatin Bernhard JP","year":"2009","journal-title":"BN. Facebook and online privacy: Attitudes, behaviors, and unintended consequences. J Comput\u2010Mediated Commun."},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1080\/01449290410001715723"},{"key":"CIT0016","volume-title":"Email to Facebook users from Facebook\u2019s Global Chief Privacy Officer","author":"Egan E.","year":"2015"},{"issue":"3","key":"CIT0018","first-page":"24","volume":"21","author":"Gage D.","year":"1996","journal-title":"Info World Canada"},{"issue":"10","key":"CIT0019","first-page":"25","volume":"28","author":"Grau J.","year":"1984","journal-title":"Secur Manage"},{"key":"CIT0021","author":"Johnson BR.","year":"2007","journal-title":"ProQuest"},{"key":"CIT0022","first-page":"2374252","author":"Joinson AN","year":"2007","journal-title":"Oxford Handbook Internet Psychol"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1080\/07370020903586662"},{"issue":"01","key":"CIT0024","author":"Kasriel D.","year":"2012","journal-title":"Passport Euromonitor Int"},{"issue":"5","key":"CIT0025","first-page":"49","volume":"8","author":"Kieke R.","year":"2006","journal-title":"J Health Care Compliance"},{"issue":"3","key":"CIT0026","first-page":"66","volume":"78","author":"Kirkpatrick J.","year":"2006","journal-title":"Mach Des"},{"key":"CIT0027","first-page":"231","author":"Kuczerawy A","year":"2010","journal-title":"Berlin Heidelberg: Springer"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00071.x"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1080\/10658980701576412"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-009-9206-8"},{"issue":"2","key":"CIT0033","first-page":"91","volume":"14","author":"Mensch S","year":"2011","journal-title":"Acad Inf Manage Sci J"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2000.tb02308.x"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2001.tb00101.x"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2011.11.007"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-6606.2006.00070.x"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.11.012"},{"key":"CIT0039","volume-title":"Psychometric theory","author":"Nunnally J.","year":"1978","edition":"2"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1080\/10658980701747237"},{"key":"CIT0041","unstructured":"Orwell G. 1984. New York (NY): Harcourt Brace Jovanovich; 1956."},{"issue":"7","key":"CIT0043","first-page":"23","volume":"30","author":"Ramsey G","year":"2010","journal-title":"Licensing Journal"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.54.5.890"},{"key":"CIT0045","first-page":"18","volume-title":"Catalyst","author":"Reisz S.","year":"2005"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.07.008"},{"key":"CIT0047","doi-asserted-by":"publisher","DOI":"10.1080\/02568543.2014.978919"},{"key":"CIT0048","volume-title":"Stay safe, productive on social networks. eWeek","author":"Sarrel M.","year":"2010"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511625138"},{"key":"CIT0050","first-page":"38","volume-title":"Harv Mag","author":"Shaw J.","year":"2009"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1108\/09685220010371394"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1145\/163298.163349"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.4018\/ijthi.2014040105"},{"key":"CIT0054","unstructured":"Steel E, Vascellaro JE. Facebook, MySpace confront privacy loophole. Wall Street J. 2010;21."},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1287\/isre.13.1.36.97"},{"key":"CIT0056","volume-title":"Relationships among demographic variables","author":"Vasquez-Colina MD.","year":"2005"},{"issue":"5","key":"CIT0057","first-page":"54","volume":"52","author":"Wagley J.","year":"2008","journal-title":"Security Manage"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.2307\/1321160"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2011.01559.x"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2015.11645769"},{"key":"CIT0061","first-page":"1435","volume-title":"Proceedings of the Information Systems Educators Conference ISSN","year":"2012"},{"issue":"12","key":"CIT0062","first-page":"798","volume":"12","author":"Heng Xu","year":"2011","journal-title":"J Assoc Inf Syst"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20530"},{"issue":"4","key":"CIT0064","first-page":"407","volume":"23","author":"Yoon C","year":"2012","journal-title":"J Inf Syst Edu"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2016.1233001","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,4,3]],"date-time":"2018-04-03T13:49:45Z","timestamp":1522763385000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2016.1233001"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,28]]},"references-count":56,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2016,10,28]]},"published-print":{"date-parts":[[2018,7,3]]}},"alternative-id":["10.1080\/08874417.2016.1233001"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2016.1233001","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,28]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}