{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T16:40:51Z","timestamp":1775234451758,"version":"3.50.1"},"reference-count":51,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2023,5,4]]},"DOI":"10.1080\/08874417.2022.2101160","type":"journal-article","created":{"date-parts":[[2022,7,25]],"date-time":"2022-07-25T15:37:59Z","timestamp":1658763479000},"page":"695-705","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":14,"title":["Development of a Scale to Measure Cybercrime-Awareness on Social Media"],"prefix":"10.1080","volume":"63","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6513-4569","authenticated-orcid":false,"given":"Ibrahim","family":"Arpaci","sequence":"first","affiliation":[{"name":"Bandirma Onyedi Eylul University, Balikesir, Turkey"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0737-1966","authenticated-orcid":false,"given":"Omer","family":"Aslan","sequence":"additional","affiliation":[{"name":"Bandirma Onyedi Eylul University, Balikesir, Turkey"}]}],"member":"301","published-online":{"date-parts":[[2022,7,25]]},"reference":[{"key":"cit0001","unstructured":"Photon Research Team. Cybercrime and dark web research. How cybercriminals weaponize social media. [accessed 2022 July 5]. https:\/\/www.digitalshadows.com\/blog-and-research\/how-cybercriminals-weaponize-social-media."},{"key":"cit0002","unstructured":"Threat Post. Cybercrime getting more sophisticated: how to protect your business? [accessed 2022 July 5]. https:\/\/threatpost.com\/cybercrime-more-sophisticated\/179676."},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.1177\/0266666921997512"},{"key":"cit0004","unstructured":"Ate\u015f E. Siber su\u00e7 fark\u0131ndal\u0131k \u00f6l\u00e7e\u011fi geli\u015ftirme: ge\u00e7erlik ve g\u00fcvenirlik \u00e7al\u0131\u015fmas\u0131 [Master\u2019s thesis]. Tokat (TR): Gaziosmanpasa University; 2021."},{"key":"cit0005","unstructured":"Kaspersky. Tips on how to protect yourself against cybercrime. [accessed 2022 July 5]. https:\/\/www.kaspersky.com\/resource-center\/threats\/what-is-cybercrime."},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1109\/access.2019.2963724"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/7501894"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.1109\/access.2021.3087316"},{"key":"cit0009","unstructured":"Morgan S. 2019\/2020 Cybersecurity Almanac: 100 facts, figures, predictions and statistics. [accessed 2022 July 5]. https:\/\/cybersecurityventures.com\/cybersecurity-almanac-2019."},{"key":"cit0010","unstructured":"Chadd K. The history of cybersecurity. [accessed 2022 July 5]. https:\/\/blog.avast.com\/history-of-cybersecurity-avast."},{"key":"cit0011","volume-title":"Computer security basics: computer security","author":"Lehtinen R","year":"2006"},{"key":"cit0012","unstructured":"Trend Micro. What you need to know about the LockerGoga ransomware. [accessed 2022 July 5]. https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cyber-attacks\/what-you-need-to-know-about-the-lockergoga-ransomware"},{"key":"cit0013","unstructured":"Research and Analysis. CovidLock: android ransomware spreading amid COVID-19 epidemic; 2020 [accessed 2022 July 5]. https:\/\/cyware.com\/research-and-analysis\/covidlock-android-ransomware-spreading-amid-covid-19-epidemic-4a5b."},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1016\/s1361-3723(13)70053-8"},{"key":"cit0015","unstructured":"Zaharia A. 300+ terrifying cybercrime and cybersecurity statistics (2022 edition). Comparitech. [accessed 2022 July 5]. https:\/\/www.comparitech.com\/vpn\/cybersecurity-cyber-crime-statistics-facts-trends\/."},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1080\/07481187.2021.1923588"},{"key":"cit0017","unstructured":"Mohsin M. 10 Facebook statistics every marketer should know in 2021. [accessed 2022 July 5]. https:\/\/www.oberlo.com\/blog\/facebook-statistics."},{"key":"cit0018","unstructured":"The Defence Works. How social media is used in cybercrimes. [accessed 2022 July 5]. https:\/\/thedefenceworks.com\/services\/cyber-and-security-awareness\/guides\/how-social-media-is-used-in-cybercrimes\/."},{"key":"cit0019","unstructured":"Lazic M. 39 worrying cyber crime statistics [updated for 2022]. LegalJobs. [accessed 2022 July 5]. https:\/\/legaljobs.io\/blog\/cyber-crime-statistics\/."},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.2478\/acss-2019-0002"},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1767\/1\/012051"},{"key":"cit0022","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2021.102442"},{"key":"cit0023","doi-asserted-by":"publisher","DOI":"10.48009\/2_iis_2021_136-149"},{"key":"cit0024","doi-asserted-by":"publisher","DOI":"10.1007\/s12027-014-0333-4"},{"key":"cit0025","doi-asserted-by":"publisher","DOI":"10.1108\/imds-07-2019-0412"},{"key":"cit0026","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2019.1668738"},{"key":"cit0027","doi-asserted-by":"publisher","DOI":"10.1016\/j.techfore.2015.08.012"},{"key":"cit0028","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-76346-6_54"},{"key":"cit0029","doi-asserted-by":"publisher","DOI":"10.17781\/p002378"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1504\/ijmc.2020.105847"},{"key":"cit0031","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2019.1685142"},{"key":"cit0032","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2021.e06016"},{"key":"cit0033","first-page":"360","volume":"21","author":"Gharieb ME","year":"2021","journal-title":"Int J Comput Netw Secur"},{"key":"cit0034","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc5020023"},{"key":"cit0035","doi-asserted-by":"publisher","DOI":"10.22937\/IJCSNS.2020.20.09.14"},{"key":"cit0036","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2021.105615"},{"key":"cit0037","doi-asserted-by":"publisher","DOI":"10.22937\/IJCSNS.2021.21.3.17"},{"key":"cit0038","volume-title":"Standards for educational and psychological testing","author":"American Educational Research Association, American Psychological Association, National Council on Measurement in Education","year":"1999"},{"key":"cit0039","doi-asserted-by":"publisher","DOI":"10.1177\/109442819800100106"},{"key":"cit0040","volume-title":"Foundations of behavioral research","author":"Kerlinger FN","year":"2008"},{"key":"cit0041","volume-title":"Psychometric Theory","author":"Nunnally JC","year":"1993"},{"key":"cit0042","volume-title":"Handbook of industrial and organizational psychology","author":"Campbell JR","year":"1976"},{"key":"cit0043","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.76.5.732"},{"key":"cit0044","volume-title":"Pearson new international edition. Multivariate data analysis","author":"Hair JF","year":"2014"},{"key":"cit0045","volume-title":"Essentials of Factor Analysis","author":"Child D","year":"2006"},{"key":"cit0046","unstructured":"Erdo\u011fmu\u015f A. \u00dcniversite \u00f6\u011frencilerinin bilgi g\u00fcvenli\u011fi kazan\u0131mlar\u0131n\u0131n, fark\u0131ndal\u0131klar\u0131 \u00fczerindeki etkilerinin analizi: afyon Kocatepe \u00dcniversitesi \u00f6rne\u011fi [Master\u2019s thesis]. Afyon (TR): Afyon Kocatepe University; 2017. [accessed 2022 July 5]. http:\/\/acikerisim.aku.edu.tr\/xmlui\/handle\/11630\/6277"},{"key":"cit0047","doi-asserted-by":"publisher","DOI":"10.1007\/bf02310555"},{"key":"cit0048","volume-title":"Cyber crime and the victimization of women: laws, rights and regulations","author":"Halder D","year":"2011"},{"key":"cit0049","first-page":"283","volume":"14","author":"Nzeakor OF","year":"2020","journal-title":"Int J Cyber Criminol"},{"key":"cit0050","unstructured":"Malby S, Mace R, Holterhof A, Brown C, Kascherus S, Ignatuschtschenko E. Comprehensive study on cybercrime. United Nations Office on Drugs and Crime. [accessed 2022 July 5]. https:\/\/www.unodc.org\/documents\/organized-crime\/UNODC_CCPCJ_EG.4_2013\/CYBERCRIME_STUDY_210213.pdf."},{"key":"cit0051","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.495776"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2022.2101160","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,2]],"date-time":"2023-05-02T20:01:52Z","timestamp":1683057712000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2022.2101160"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,25]]},"references-count":51,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,5,4]]}},"alternative-id":["10.1080\/08874417.2022.2101160"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2022.2101160","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"value":"0887-4417","type":"print"},{"value":"2380-2057","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,25]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-07-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}