{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:42:31Z","timestamp":1753922551611},"reference-count":76,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2022,5,4]]},"DOI":"10.1080\/08874417.2020.1864680","type":"journal-article","created":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T17:39:49Z","timestamp":1619631589000},"page":"560-571","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":6,"title":["Generation Z: Cyber-Attack Awareness Training Effectiveness"],"prefix":"10.1080","volume":"62","author":[{"given":"Garry","family":"White","sequence":"first","affiliation":[{"name":"Texas State University, San Marcos, TX, USA"}]}],"member":"301","published-online":{"date-parts":[[2021,4,28]]},"reference":[{"key":"cit0001","unstructured":"Tamkin E 10 years after the landmark attack on Estonia, is the world better prepared for cyber threats? Foreign Policy (FP); 2017 Apr 27. [accessed 2018 Oct 31]. https:\/\/foreignpolicy.com\/2017\/04\/27\/10-years-after-the-landmark-attack-on-estonia-is-the-world-better-prepared-for-cyber-threats\/."},{"key":"cit0002","unstructured":"Turak N The next 9\/11 will be a cyberattack, security expert warns. CNBC; 2018 June 1. [accessed 2018 Nov 3]. https:\/\/www.cnbc.com\/2018\/06\/01\/the-next-911-will-be-a-cyberattack-security-expert-warns.html."},{"key":"cit0003","unstructured":"Sussman B Revealed: details of \u2018first of its kind\u2019 disruptive power grid attack. Secure World, Seguro Group Inc; 2019 Oct 8. [accessed 2019 Dec 15]. https:\/\/www.secureworldexpo.com\/industry-news\/first-u.s.power-grid-attack-details."},{"key":"cit0004","unstructured":"Fazzini K Warnings about a massive cyberattack aren\u2019t new- intelligence officials have raised the red flags for years. CNBC; 2018 July 24. [accessed 2018 Nov 3]. https:\/\/www.cnbc.com\/2018\/07\/24\/cyberattack-warnings-from-us-intelligence-officials-are-not-new.html."},{"key":"cit0005","unstructured":"Kirkpatrick DD, Nixon R U.S.U.K. Warning on cyberattacks includes private homes. New York Times; 2018 Apr 16. [accessed 2018 Nov 3]. https:\/\/www.nytimes.com\/2018\/04\/16\/world\/europe\/us-uk-russia-cybersecurity-threat.html."},{"key":"cit0006","unstructured":"Lawler D, Swan J. Special report: America\u2019s greatest threat is a hurricane-force cyberattack. Axios; 2018 Aug 4. [accessed 2018 Oct 31]. https:\/\/www.axios.com\/americas-greatest-threat-hurricane-force-cyberattack-67ff9c98-1cb8-4358-9d9e-e8c26836dec3.html."},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.001"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2011.940293"},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.107"},{"key":"cit0010","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1016\/B978-0-12-816203-3.00004-6","volume-title":"Emerging cyber threats and cognitive vulnerabilities","author":"Bada M","year":"2020"},{"key":"cit0011","unstructured":"Worrall S Is the United States prepared for a massive cyberattack. National Geographic; 2015 Nov 8. [accessed 2018 Oct 31]. https:\/\/news.nationalgeographic.com\/2015\/11\/151108-cybercrime-cyberattack-ted-koppel-computers-hacking-internet-ngbooktalk\/."},{"key":"cit0012","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1037\/11106-001","volume-title":"Master lectures series. Cataclysms, crises, and catastrophes: psychology in action","author":"Baum A","year":"1987"},{"key":"cit0013","doi-asserted-by":"publisher","DOI":"10.1177\/0013916583153004"},{"key":"cit0014","unstructured":"Roth A, Nakashima E. Massive cyberattack hits Europe with widespread ransom demands. Washington Post; 2017 June 27. [accessed 2018 Nov 6]. https:\/\/www.washingtonpost.com\/world\/europe\/ukraines-government-key-infrastructure-hit-in-massive-cyberattack\/2017\/06\/27\/7d22c7dc-5b40-11e7-9fc6-c7ef4bc58d13_story.html?noredirect=on&utm_term=.258c0d474ca7."},{"key":"cit0015","unstructured":"Cimpanu C Largest cyber-attack in Georgia\u2019s history link to hacked web hosting provider. ZDNet, Trend Micro; 2019 Oct 28. [accessed 2019 Nov 9]. https:\/\/www.zdnet.com\/article\/largest-cyber-attack-in-georgias-history-linked-to-hacked-web-hosting-provider\/."},{"key":"cit0016","unstructured":"McDuling J America is the prime target of international cyberattacks. Quartz; 2014 Feb 27. [accessed 2018 Nov 11]. https:\/\/qz.com\/180700\/america-is-the-prime-target-of-international-cyberattacks\/."},{"key":"cit0017","unstructured":"Krauss C Cyberattack shows vulnerability of gas pipeline network. New York Times; 2018 Apr 4. [accessed 2018 Nov 11]. https:\/\/www.nytimes.com\/2018\/04\/04\/business\/energy-environment\/pipeline-cyberattack.html."},{"key":"cit0018","unstructured":"Blinder A, Perlroth N A cyberattack hobbles atlanta, and security experts shudder. New York Times; 2018 Mar 27. [accessed 2018 Nov 5]. https:\/\/www.nytimes.com\/2018\/03\/27\/us\/cyberattack-atlanta-ransomware.html."},{"key":"cit0019","unstructured":"Shamma T Atlanta paralyzed for more than a week by cyber attack. NPR; 2018 Mar 30, NPR (transcript). [accessed 2018 Oct 31]. https:\/\/www.npr.org\/2018\/03\/30\/598386485\/atlanta-paralyzed-for-more-than-a-week-by-cyber-attack."},{"key":"cit0020","unstructured":"Newman LH Atlanta spent $2.6M to recover from a $52,000 ransomware scare. Wired; 2018 Apr 23. [accessed 2018 Nov 5]. https:\/\/www.wired.com\/story\/atlanta-spent-26m-recover-from-ransomware-scare\/."},{"key":"cit0021","unstructured":"Rogers J U.S. Power grid still prime cyber target. The Street; 2011 Oct 26. [accessed 2018 Nov 5]. https:\/\/www.thestreet.com\/story\/11290254\/1\/us-power-grid-still-prime-cyber-target.html."},{"key":"cit0022","unstructured":"Panetta LE Remarks by secretary panetta on cybersecurity to the business executives for national security, New York City; 2012 Oct 11. U.S. Department of Defense News Transcripts. [accessed 2018 Oct 31]. http:\/\/archive.defense.gov\/transcripts\/transcript.aspx?transcriptid=5136."},{"issue":"42","key":"cit0023","first-page":"1459","volume":"122","author":"Brickenstein R","year":"1980","journal-title":"MMW Munch Med Wochenschr"},{"issue":"3","key":"cit0024","first-page":"245","volume":"53","author":"Singer TJ","year":"1982","journal-title":"Aviat Space Environ Med"},{"key":"cit0025","author":"Loong LH","year":"2018","journal-title":"SMB World Asia (Online)"},{"key":"cit0026","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.009"},{"key":"cit0027","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.01.002"},{"key":"cit0028","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.11.010"},{"key":"cit0029","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.12.005"},{"issue":"5","key":"cit0030","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1108\/09685221011095236","volume":"18","author":"Kruger H","year":"2010","journal-title":"Inf Manage Comput Secur"},{"issue":"3","key":"cit0031","first-page":"9","volume":"15","author":"Wolf M","year":"2011","journal-title":"Rev Business Inf Syst"},{"key":"cit0032","doi-asserted-by":"publisher","DOI":"10.1201\/1079.07366981\/45423.33.1.20050701\/89329.1"},{"key":"cit0033","first-page":"407","volume":"23","author":"Yoon C","year":"2012","journal-title":"J Inf Syst Edu"},{"key":"cit0034","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2009.03.002"},{"key":"cit0035","unstructured":"Rotvoid G, Landry R (2007). Status of security awareness in business organizations and colleges of business: an analysis of training and education, policies, and social engineering testing. Dissertation, University of North Dakota."},{"key":"cit0036","first-page":"1","volume":"25","author":"Britt P","year":"2008","journal-title":"Inf Today"},{"key":"cit0037","first-page":"20","volume":"52","author":"Claar CL","year":"2012","journal-title":"J Comput Inf Syst"},{"key":"cit0038","first-page":"35","volume":"1194","author":"McLaughlin K","year":"2006","journal-title":"CRN"},{"key":"cit0039","first-page":"91","volume":"14","author":"Mensch S","year":"2011","journal-title":"Acad Inf Manage Sci J"},{"key":"cit0040","doi-asserted-by":"publisher","DOI":"10.1108\/09670730510586986"},{"key":"cit0041","doi-asserted-by":"publisher","DOI":"10.2307\/25750704"},{"key":"cit0042","first-page":"44","volume":"54","author":"Wagley J","year":"2010","journal-title":"Secur Manage"},{"key":"cit0043","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.84.5.888."},{"key":"cit0044","doi-asserted-by":"publisher","DOI":"10.1207\/S15327663JCP1201_05"},{"key":"cit0045","doi-asserted-by":"publisher","DOI":"10.1016\/S0148-2963(99)00087-9"},{"key":"cit0046","doi-asserted-by":"publisher","DOI":"10.1016\/0022-4359(94)90037-X"},{"key":"cit0047","first-page":"147","volume-title":"The psychology of learning and motivation: advances in research and theory","volume":"18","author":"Jacoby LL","year":"1984"},{"key":"cit0048","doi-asserted-by":"publisher","DOI":"10.1037\/0003-066X.47.6.802"},{"key":"cit0049","author":"Loureiro S","year":"2011","journal-title":"Aust N Z Market Acad Conf"},{"key":"cit0050","doi-asserted-by":"publisher","DOI":"10.1086\/209573"},{"key":"cit0051","doi-asserted-by":"publisher","DOI":"10.1002\/9780470713143"},{"key":"cit0052","doi-asserted-by":"publisher","DOI":"10.5958\/0976-478X.2017.00050.7"},{"key":"cit0053","volume":"6","author":"Emese C","year":"2016","journal-title":"Acta Technologica Dubnicae"},{"key":"cit0054","first-page":"295","volume":"3","author":"Reeves TC","year":"2008","journal-title":"Handbook Res Edu Commun Technol"},{"key":"cit0055","doi-asserted-by":"publisher","DOI":"10.1556\/JBA.3.2014.015"},{"key":"cit0056","volume-title":"Born digital: understanding the first generation of digital natives","author":"Palfrey J","year":"2008"},{"key":"cit0057","first-page":"214","volume":"13","author":"Kick AL","year":"2015","journal-title":"Competition Forum"},{"key":"cit0058","volume-title":"Presentation to the State of Maryland\u2019s Children Online Privacy Working Group at the Attorney General\u2019s Office in Baltimore, Baltimore, MA","author":"Lenhart A.","year":"2013"},{"key":"cit0059","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2018.1555610"},{"key":"cit0060","first-page":"996","volume":"3","author":"Kaur P","year":"2014","journal-title":"Int J Appl Ser Market Perspect"},{"key":"cit0061","first-page":"1","volume":"4","author":"Sponcil M","year":"2013","journal-title":"J Technol Res"},{"key":"cit0062","doi-asserted-by":"publisher","DOI":"10.1177\/109467050024001"},{"key":"cit0063","first-page":"121","volume":"11","author":"Chapin J","year":"2009","journal-title":"N Am J Psychol"},{"key":"cit0064","doi-asserted-by":"publisher","DOI":"10.1080\/00221309.2011.635724"},{"key":"cit0065","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2016.1232991"},{"key":"cit0066","doi-asserted-by":"publisher","DOI":"10.1002\/9780470713143.ch7"},{"key":"cit0067","doi-asserted-by":"publisher","DOI":"10.1016\/0005-7967(90)90135-6"},{"key":"cit0068","first-page":"265","volume-title":"Worrying: perspectives on theory, assessment, and treatment","author":"Molina S","year":"1994"},{"key":"cit0069","doi-asserted-by":"publisher","DOI":"10.1016\/S0005-7967(98)00027-8"},{"key":"cit0070","doi-asserted-by":"publisher","DOI":"10.1016\/S0005-7967(00)00113-3"},{"key":"cit0071","doi-asserted-by":"publisher","DOI":"10.1016\/S0005-7967(03)00059-7"},{"issue":"11","key":"cit0072","first-page":"1","volume":"15","author":"Winter JCF","year":"2012","journal-title":"Pract Assess Res Eval"},{"key":"cit0073","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.105.1.167"},{"key":"cit0074","volume-title":"Psychometric theory","author":"Nunnally JC","year":"1994"},{"key":"cit0075","volume-title":"Psychological testing","author":"Anastasi A","year":"1988"},{"key":"cit0076","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-3984.1985.tb01065.x"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2020.1864680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,29]],"date-time":"2022-04-29T17:14:00Z","timestamp":1651252440000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2020.1864680"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,28]]},"references-count":76,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,5,4]]}},"alternative-id":["10.1080\/08874417.2020.1864680"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2020.1864680","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,28]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-04-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}