{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T23:26:45Z","timestamp":1777505205155,"version":"3.51.4"},"reference-count":22,"publisher":"Informa UK Limited","issue":"1-3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2016,4,4]]},"DOI":"10.1080\/19393555.2015.1132800","type":"journal-article","created":{"date-parts":[[2016,1,22]],"date-time":"2016-01-22T01:09:17Z","timestamp":1453424957000},"page":"32-38","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":15,"title":["Cyber crime risk awareness in Kyrgyz Republic"],"prefix":"10.1080","volume":"25","author":[{"given":"Rita","family":"Ismailova","sequence":"first","affiliation":[]},{"given":"Gulshat","family":"Muhametjanova","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,1,21]]},"reference":[{"issue":"1","key":"CIT0001","first-page":"41","volume":"12","author":"Akin M. S.","year":"2013","journal-title":"International Journal of Information Technology and Business Management"},{"issue":"6","key":"CIT0002","first-page":"30","volume":"2","author":"Arfi N.","year":"2014","journal-title":"International Journal for Research in Applied Science and Engineering Technology"},{"issue":"2","key":"CIT0003","first-page":"7","volume":"2","author":"Arfi N.","year":"2014","journal-title":"International Journal for Advance Research in Engineering and Technology"},{"key":"CIT0004","volume-title":"Information assurance: Managing organizational IT security risks","author":"Boyce J.","year":"2002"},{"issue":"3","key":"CIT0005","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","volume":"34","author":"Bulgurcu B.","year":"2010","journal-title":"MIS Quarterly"},{"issue":"1","key":"CIT0006","first-page":"1","volume":"24","author":"Chen C. C.","year":"2006","journal-title":"Information Technology Learning and Performance Journal"},{"issue":"1","key":"CIT0007","first-page":"1","volume":"3","author":"Ciardhu\u00e1in S. \u00d3.","year":"2004","journal-title":"International Journal of Digital Evidence"},{"key":"CIT0008","first-page":"54","author":"Claburn T.","year":"2005","journal-title":"InformationWeek"},{"issue":"3","key":"CIT0010","first-page":"1723","volume":"8","author":"Fakeh S. K. W.","year":"2012","journal-title":"Journal of Applied Sciences Research"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1109\/MTS.2011.940293"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1080\/01639620601131065"},{"key":"CIT0013","author":"Howard J. D.","year":"1998","journal-title":"Sandia National Laboratories"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1109\/44.476633"},{"issue":"2","key":"CIT0016","doi-asserted-by":"crossref","DOI":"10.1007\/s10209-017-0541-0","volume":"16","author":"Ismailova R.","year":"2015","journal-title":"Universal Access in Information Society"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1051676"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.4"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1016\/j.promfg.2015.07.621"},{"key":"CIT0027","volume-title":"Information Security Awareness: An Application of Psychological Factors\u2013A Study in Malaysia","author":"Ong L.","year":"2014"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1108\/09685220010371394"},{"key":"CIT0029","unstructured":"Tabachnick, B. G. & Fidell, L. S. (2001).Using multivariate statistics(6th ed.). Boston, MA: Allyn & Bacon."},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2014.998844"},{"issue":"5","key":"CIT0033","first-page":"14","volume":"2","author":"\u041a\u0443\u0442\u043d\u0430\u0435\u0432\u0430 \u041d.","year":"2014","journal-title":"per Concordiam"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2015.1132800","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T22:27:31Z","timestamp":1567549651000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2015.1132800"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,21]]},"references-count":22,"journal-issue":{"issue":"1-3","published-online":{"date-parts":[[2016,3]]},"published-print":{"date-parts":[[2016,4,4]]}},"alternative-id":["10.1080\/19393555.2015.1132800"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2015.1132800","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,1,21]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}