{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T04:44:39Z","timestamp":1768538679708,"version":"3.49.0"},"reference-count":57,"publisher":"Informa UK Limited","issue":"5","funder":[{"name":"no funds, grants, or other support"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Information Security Journal: A Global Perspective"],"published-print":{"date-parts":[[2023,9,3]]},"DOI":"10.1080\/19393555.2022.2088428","type":"journal-article","created":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T10:41:29Z","timestamp":1656412889000},"page":"347-370","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":21,"title":["Cyber hygiene knowledge, awareness, and behavioral practices of university students"],"prefix":"10.1080","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8121-9765","authenticated-orcid":false,"given":"Sabina","family":"Barakovi\u0107","sequence":"first","affiliation":[{"name":"Faculty of Traffic and Communications, University of Sarajevo, Sarajevo, Bosnia and Herzegovina"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6119-6447","authenticated-orcid":false,"given":"Jasmina","family":"Barakovi\u0107 Husi\u0107","sequence":"additional","affiliation":[{"name":"Faculty of Electrical Engineering, University of Sarajevo, Sarajevo, Bosnia and Herzegovina"}]}],"member":"301","published-online":{"date-parts":[[2022,6,28]]},"reference":[{"key":"cit0001","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2012.708787"},{"key":"cit0002","unstructured":"Agency for Statistics of Bosnia and Herzegovina (2021).Demography and social statistics: Higher education in the school year 2020\/2021. [online] https:\/\/bhas.gov.ba\/data\/Publikacije\/Saopstenja\/2021\/EDU_05_2020_Y2_0_BS.pdf"},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v11i3.6605"},{"key":"cit0004","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0173284"},{"key":"cit0005","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.12.040"},{"key":"cit0006","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.05.046"},{"key":"cit0007","doi-asserted-by":"publisher","DOI":"10.11610\/isij.3205"},{"key":"cit0008","doi-asserted-by":"publisher","DOI":"10.1109\/BIHTEL.2016.7775732"},{"key":"cit0009","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9040700"},{"key":"cit0010","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3495-y"},{"key":"cit0011","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101647"},{"key":"cit0012","doi-asserted-by":"publisher","DOI":"10.4102\/sajbm.v4514.138"},{"key":"cit0013","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.08.002"},{"key":"cit0014","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2013.106"},{"key":"cit0015","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.005"},{"key":"cit0016","doi-asserted-by":"publisher","DOI":"10.1037\/h0040957"},{"key":"cit0017","unstructured":"Cybersecurity Ventures (2021).Top 6 cybersecurity predictions and statistics for 2021 to 2025. [Online]. https:\/\/cybersecurityventures.com\/top-5-cybersecurity-facts-figures-predictions-and-statistics-for-2021-to-2025\/"},{"key":"cit0018","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58808-7_5"},{"key":"cit0019","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106255"},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2009.01494.x"},{"key":"cit0021","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.009"},{"issue":"1","key":"cit0022","doi-asserted-by":"crossref","first-page":"3","DOI":"10.62915\/2472-2707.1018","volume":"2017","author":"Dupuis M. J","year":"2017","journal-title":"Journal of Cybersecurity Education, Research and Practice"},{"key":"cit0023","doi-asserted-by":"publisher","DOI":"10.2824\/352617"},{"key":"cit0024","doi-asserted-by":"publisher","DOI":"10.2824\/324042"},{"key":"cit0025","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-52581-1_12"},{"key":"cit0026","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1339\/1\/012098"},{"key":"cit0027","volume-title":"Proceedings og the 2nd USENIX Workshop on Hot Topic in Security HOTSEC\u201907","author":"Flor\u00eancio D.","year":"2007"},{"key":"cit0028","unstructured":"Golla, M., Ho, G., Lohmus, M., Pulluri, M. & Predmiles, E. M. (2021).Driving 2FA adoption at scale: optimizing two-factor authentication notification design patterns. [Online]. https:\/\/www.usenix.org\/system\/files\/sec21-golla.pdf"},{"key":"cit0029","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.015"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.03.007"},{"key":"cit0031","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3006172"},{"key":"cit0032","doi-asserted-by":"publisher","DOI":"10.1108\/13287261211232180"},{"key":"cit0033","unstructured":"IBM SPSS Software. [Online]. http:\/\/www-01.ibm.com\/software\/analytics\/spss\/"},{"key":"cit0034","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2014.934286"},{"key":"cit0035","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2021.116777"},{"key":"cit0036","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2021.3127992"},{"key":"cit0037","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102248"},{"issue":"7","key":"cit0038","first-page":"5","volume":"29","author":"Loukas G.","year":"2016","journal-title":"Cutter IT Journal"},{"key":"cit0039","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03638-6_18"},{"key":"cit0040","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.11.001"},{"key":"cit0041","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.11.004"},{"key":"cit0042","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101731"},{"key":"cit0043","volume-title":"What the public knows about cybersecurity","author":"Olmstead K.","year":"2017"},{"key":"cit0044","doi-asserted-by":"publisher","DOI":"10.1145\/2890509"},{"key":"cit0045","doi-asserted-by":"publisher","DOI":"10.1016\/j.eap.2021.02.012"},{"key":"cit0046","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.12.003"},{"issue":"1","key":"cit0047","first-page":"25","volume":"9","author":"Peacock D.","year":"2017","journal-title":"International Journal of Gender, Science and Technology"},{"key":"cit0048","doi-asserted-by":"publisher","DOI":"10.1002\/itl2.247"},{"key":"cit0049","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2008.06.011"},{"key":"cit0050","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101745"},{"key":"cit0051","doi-asserted-by":"publisher","DOI":"10.1109\/mc.2018.2888766"},{"key":"cit0052","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.05.038"},{"key":"cit0053","unstructured":"Varonis, (2021).13410 must-know cybersecurity statistics and trends for 2021. [Online]. https:\/\/www.varonis.com\/blog\/cybersecurity-statistics\/"},{"key":"cit0054","doi-asserted-by":"crossref","unstructured":"Verizon (2021).Data breach investigations report. [Online]. https:\/\/www.verizon.com\/business\/resources\/reports\/2021-data-breach-investigations-report.pdfx","DOI":"10.1016\/S1361-3723(21)00061-0"},{"key":"cit0055","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2019.113160"},{"key":"cit0056","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2014.0179"},{"key":"cit0057","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2020.1712269"}],"container-title":["Information Security Journal: A Global Perspective"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/19393555.2022.2088428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,27]],"date-time":"2024-09-27T23:15:13Z","timestamp":1727478913000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/19393555.2022.2088428"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,28]]},"references-count":57,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2023,9,3]]}},"alternative-id":["10.1080\/19393555.2022.2088428"],"URL":"https:\/\/doi.org\/10.1080\/19393555.2022.2088428","relation":{},"ISSN":["1939-3555","1939-3547"],"issn-type":[{"value":"1939-3555","type":"print"},{"value":"1939-3547","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,28]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=uiss20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-06-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}