{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T23:23:47Z","timestamp":1777505027893,"version":"3.51.4"},"reference-count":22,"publisher":"Informa UK Limited","issue":"4-5","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2019,9,3]]},"DOI":"10.1080\/19393555.2019.1685142","type":"journal-article","created":{"date-parts":[[2019,10,28]],"date-time":"2019-10-28T06:55:04Z","timestamp":1572245704000},"page":"127-135","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":15,"title":["Cybercrime risk awareness rate among students in Central Asia: A comparative study in Kyrgyzstan and Kazakhstan"],"prefix":"10.1080","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0308-2315","authenticated-orcid":false,"given":"Rita","family":"Ismailova","sequence":"first","affiliation":[{"name":"Department of Computer Engineering, Kyrgyz Turkish Manas University, Bishkek, Kyrgyzstan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9423-6302","authenticated-orcid":false,"given":"Gulshat","family":"Muhametjanova","sequence":"additional","affiliation":[{"name":"Department of Applied Mathematics and Informatics, Kyrgyz Turkish Manas University, Bishkek, Kyrgyzstan"}]},{"given":"Tun\u00e7 Durmu\u015f","family":"Medeni","sequence":"additional","affiliation":[{"name":"Department of Management Information Systems, Yildirim Beyazit Universitesi, Ankara, Turkey"}]},{"given":"Ihsan Tolga","family":"Medeni","sequence":"additional","affiliation":[{"name":"Department of Management Information Systems, Yildirim Beyazit Universitesi, Ankara, Turkey"}]},{"given":"Demet","family":"Soylu","sequence":"additional","affiliation":[{"name":"Department of Information and Documentation Management, Yildirim Beyazit Universitesi, Ankara, Turkey"}]},{"given":"Omar Azimbek","family":"Dossymbekuly","sequence":"additional","affiliation":[{"name":"Higher school of economics and business, Al-Farabi Kazakh National University, Almaty, Kazakhstan"}]}],"member":"301","published-online":{"date-parts":[[2019,10,27]]},"reference":[{"key":"e_1_3_1_2_1","unstructured":"Aloul F. A. (2010 November). Information security awareness in UAE: A survey paper . In 2010 International Conference for internet technology and secured transactions. London United Kingdom (pp. 1\u20136). IEEE."},{"key":"e_1_3_1_3_1","doi-asserted-by":"publisher","DOI":"10.4304\/jait.3.3.176-183"},{"key":"e_1_3_1_5_1","doi-asserted-by":"crossref","unstructured":"Farooq A. & Kakakhel S. R. U. (2013 December). Information security awareness: Comparing perceptions and training preferences . In 2013 2nd National Conference on Information Assurance (NCIA). Rawalpindi Pakistan (pp. 53\u201357). IEEE.","DOI":"10.1109\/NCIA.2013.6725324"},{"key":"e_1_3_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2007.03.001"},{"key":"e_1_3_1_7_1","unstructured":"Gendina N. (2013). Media and information literacy in Russia and the countries of the Commonwealth of Independent States (CIS). Conceptual Relationship of Information Literacy and Media Literacy 102\u2013128."},{"key":"e_1_3_1_8_1","doi-asserted-by":"crossref","unstructured":"Gunjan V. K. Kumar A. & Avdhanam S. (2013 September). A survey of cyber crime in India . In 2013 15th International Conference on Advanced Computing Technologies (ICACT). Rajampet India (pp. 1\u20136). IEEE.","DOI":"10.1109\/ICACT.2013.6710503"},{"issue":"1","key":"e_1_3_1_9_1","article-title":"Quantitative versus qualitative methods: Understanding why quantitative methods are predominant in criminology and criminal justice","volume":"1","author":"Higgins G. E.","year":"2009","unstructured":"Higgins, G. E. (2009). Quantitative versus qualitative methods: Understanding why quantitative methods are predominant in criminology and criminal justice. Journal of Theoretical & Philosophical Criminology, 1(1), 23\u201337.","journal-title":"Journal of Theoretical & Philosophical Criminology"},{"key":"e_1_3_1_10_1","doi-asserted-by":"crossref","unstructured":"Ifinedo P. & Akinnuwesi B. A. (2014 October). Employees\u2019 non-malicious counterproductive computer security behaviors (CCSB) in Nigeria and Canada: An empirical and comparative analysis . In 2014 IEEE 6th International Conference on Adaptive Science & Technology (ICAST). Covenant University Ota Nigeria (pp. 1\u20137). IEEE.","DOI":"10.1109\/ICASTECH.2014.7068109"},{"key":"e_1_3_1_11_1","unstructured":"International Telecommunication Union (ITU). (2017) Global Cybersecurity Index (GCI) 2017 . Retrieved from https:\/\/www.itu.int\/dms_pub\/itu-d\/opb\/str\/d-str-gci.01-2017-pdf-e.pdf"},{"key":"e_1_3_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2015.1132800"},{"key":"e_1_3_1_13_1","volume-title":"A cross-cultural perspective of information security collective efficacy","author":"Kim D.","year":"2013","unstructured":"Kim, D., Ryu, Y., & Kwark, Y. (2013). A cross-cultural perspective of information security collective efficacy. In Proceedings of the 34th International Conference on Information Systems (ICIS). Milano, Italy."},{"key":"e_1_3_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.08.001"},{"key":"e_1_3_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/01436597.2010.518752"},{"key":"e_1_3_1_16_1","doi-asserted-by":"crossref","unstructured":"Mesko G. & Bernik I. (2011 September). Cybercrime: Awareness and fear: Slovenian perspectives . In 2011 European intelligence and security informatics Conference. Athens Greece (pp. 28\u201333). IEEE.","DOI":"10.1109\/EISIC.2011.12"},{"key":"e_1_3_1_17_1","doi-asserted-by":"publisher","DOI":"10.5530\/ijcep.2018.5.4.26"},{"key":"e_1_3_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.07.008"},{"key":"e_1_3_1_19_1","unstructured":"Ruddy M. (2018). Improving regional connectivity with the Asian information superhighway . Retrieved from https:\/\/www.terabitconsulting.com\/mt-content\/uploads\/2018\/01\/20160401-improving-international-connectivity-with-ap-is.pdf."},{"key":"e_1_3_1_20_1","doi-asserted-by":"publisher","DOI":"10.4018\/JGIM"},{"key":"e_1_3_1_21_1","doi-asserted-by":"publisher","DOI":"10.18356\/d54b9179-en"},{"key":"e_1_3_1_22_1","unstructured":"Yayla A. A. (2011 June). Enforcing information security policies through cultural boundaries: A multinational company approach. In ECIS p. 243."},{"issue":"1","key":"e_1_3_1_23_1","article-title":"Fear of cyber crime among college students in the United States: An exploratory study","volume":"8","author":"Yu S.","year":"2014","unstructured":"Yu, S. (2014). Fear of cyber crime among college students in the United States: An exploratory study. International Journal of Cyber Criminology, 8(1), 36\u201346.","journal-title":"International Journal of Cyber Criminology"},{"key":"e_1_3_1_24_1","first-page":"182","article-title":"\u0421\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0421\u0435\u0442\u0438, \u0426\u0438\u0444\u0440\u043e\u0432\u044b\u0435 \u041e\u0431\u0440\u0430\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0420\u0435\u0441\u0443\u0440\u0441\u044b \u0438 \u0413\u0430\u0434\u0436\u0435\u0442\u044b \u0432 \u0423\u0447\u0435\u0431\u043d\u043e\u043c \u041f\u0440\u043e\u0446\u0435\u0441\u0441\u0435 (\u041d\u0430 \u041f\u0440\u0438\u043c\u0435\u0440\u0435 \u041a\u044b\u0440\u0433\u044b\u0437\u0441\u0442\u0430\u043d\u0430)","volume":"8","author":"\u0416\u0443\u043c\u0430\u0431\u0430\u0435\u0432\u0430 \u0427. \u041d.","year":"2018","unstructured":"\u0416\u0443\u043c\u0430\u0431\u0430\u0435\u0432\u0430, \u0427. \u041d., & \u0411\u0440\u0438\u043c\u043a\u0443\u043b\u043e\u0432, \u0423. \u041d. (2018). \u0421\u043e\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0421\u0435\u0442\u0438, \u0426\u0438\u0444\u0440\u043e\u0432\u044b\u0435 \u041e\u0431\u0440\u0430\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u0420\u0435\u0441\u0443\u0440\u0441\u044b \u0438 \u0413\u0430\u0434\u0436\u0435\u0442\u044b \u0432 \u0423\u0447\u0435\u0431\u043d\u043e\u043c \u041f\u0440\u043e\u0446\u0435\u0441\u0441\u0435 (\u041d\u0430 \u041f\u0440\u0438\u043c\u0435\u0440\u0435 \u041a\u044b\u0440\u0433\u044b\u0437\u0441\u0442\u0430\u043d\u0430). \u0421\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0435 \u041d\u0430\u0443\u043a\u043e\u0435\u043c\u043a\u0438\u0435 \u0422\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0438, 8, 182\u2013187. Retrieved from http:\/\/www.top-technologies.ru\/ru\/article\/view?id=37054 [Jumabaeva, Ch.N., Brimkulov U.N. (2018). Social Networks, Digital Educational Resources and Gadgets in the Learning Process (on example of Kyrgyzstan). Modern high technologies, 8, 182\u2013187].","journal-title":"\u0421\u043e\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u044b\u0435 \u041d\u0430\u0443\u043a\u043e\u0435\u043c\u043a\u0438\u0435 \u0422\u0435\u0445\u043d\u043e\u043b\u043e\u0433\u0438\u0438"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2019.1685142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T07:00:34Z","timestamp":1697698834000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2019.1685142"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,3]]},"references-count":22,"journal-issue":{"issue":"4-5","published-print":{"date-parts":[[2019,9,3]]}},"alternative-id":["10.1080\/19393555.2019.1685142"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2019.1685142","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,3]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2019-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}