{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T09:11:09Z","timestamp":1774170669260,"version":"3.50.1"},"reference-count":90,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100002671","name":"Universiti Tunku Abdul Rahman, Kampar, Perak, Malaysia","doi-asserted-by":"publisher","award":["IPSR\/RMC\/UTARRF\/2020-C1\/M04"],"award-info":[{"award-number":["IPSR\/RMC\/UTARRF\/2020-C1\/M04"]}],"id":[{"id":"10.13039\/501100002671","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1109\/access.2021.3097144","type":"journal-article","created":{"date-parts":[[2021,7,20]],"date-time":"2021-07-20T20:22:42Z","timestamp":1626812562000},"page":"99339-99363","source":"Crossref","is-referenced-by-count":41,"title":["Extracting Key Factors of Cyber Hygiene Behaviour Among Software Engineers: A Systematic Literature Review"],"prefix":"10.1109","volume":"9","author":[{"given":"Shadab","family":"Kalhoro","sequence":"first","affiliation":[]},{"given":"Mobashar","family":"Rehman","sequence":"additional","affiliation":[]},{"given":"Vasaki","family":"Ponnusamy","sequence":"additional","affiliation":[]},{"given":"Farhan Bashir","family":"Shaikh","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2015.11.009"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-018-2337-2"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-016-3495-y"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-020-00111-0"},{"key":"ref76","year":"2021","journal-title":"Cyber Security Statistics Trends & Data"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1177\/1550147717741463"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.03.003"},{"key":"ref39","author":"greenwald","year":"2016","journal-title":"Employers Face Growing Risk in Tax Season"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.015"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2017.1334499"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-017-0752-1"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-4255-1_1"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2017.05.391"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2014.2306328"},{"key":"ref31","author":"van horenbeeck","year":"2018","journal-title":"Cybersecurity Culture Norms and Values"},{"key":"ref30","article-title":"Empirical analysis of socio-cognitive factors affecting security behaviours and practices of smartphone users","author":"simpson deb","year":"2016"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00447"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(16)30079-3"},{"key":"ref35","first-page":"1","article-title":"Individual cyber security: Empowering employees to resist spear phishing to prevent identity theft and ransomware attacks","volume":"13","author":"thomas","year":"2018","journal-title":"International Business Management"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1080\/10919392.2018.1484598"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1108\/FS-02-2018-0020"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1108\/INTR-10-2019-0400"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1108\/IMCS-02-2013-0014"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-03-2018-0037"},{"key":"ref28","author":"dzazali","year":"2006","journal-title":"Social factors influencing the information security maturity of Malaysian public service organisation An empirical analysis"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1108\/JSIT-02-2018-0028"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.015"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-019-0200-y"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1016\/j.dcan.2019.01.005","article-title":"A systematic literature review of blockchain cyber security","volume":"6","author":"taylor","year":"2020","journal-title":"Digit Commun Netw"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1080\/01449290701679361"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2869847"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2048028"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3026063"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4304\/jait.3.3.176-183"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.08.002"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/00396338.2012.709391"},{"key":"ref22","article-title":"Guidelines for performing systematic literature reviews in software engineering","author":"kitchenham","year":"2004"},{"key":"ref21","first-page":"1","article-title":"Cybersecurity workforce development directions","author":"dodge","year":"2012","journal-title":"Proc HAISA"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1080\/03601270903183065"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3015669"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2017.1352028"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2014.0179"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-03-2018-0031"},{"key":"ref51","article-title":"Cyber security awareness campaigns: Why do they fail to change behaviour?","author":"bada","year":"2019","journal-title":"arXiv 1901 02672"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijsu.2010.02.007"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.2888766"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1108\/MRR-04-2013-0085"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2544381"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.03.002"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-07-2018-0080"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1108\/JRF-06-2014-0079"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.02.005"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/W-FiCloud.2018.00036"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.01.039"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1177\/1534484305278283"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2010.010623"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.10.005"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2012.708787"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.12.037"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2004.1357885"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.05.008"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"792","DOI":"10.1016\/j.infsof.2010.03.006","article-title":"Systematic literature reviews in software engineering&#x2014;A tertiary study","volume":"52","author":"kitchenham","year":"2010","journal-title":"Inf Softw Technol"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.14419\/ijet.v7i3.4.14674"},{"key":"ref17","first-page":"93","author":"laws","year":"2018","journal-title":"Guidelines for Cyber Hygiene in Online Education"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2019.01.108"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101731"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1080\/10580530.2015.1117842"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2811290"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.5121\/ijnsa.2013.5402"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2895690"},{"key":"ref4","article-title":"Using phishing to test social engineering awareness of financial employees","author":"long","year":"2013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.2307\/25750694"},{"key":"ref6","author":"seidenberger","year":"2016","journal-title":"A New Role for Human Resource Managers Social Engineering Defense"},{"key":"ref5","article-title":"The magazine for the IT professional. The charted institute for IT; British computer society","author":"pike","year":"2011"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.3390\/fi11040089"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.12.040"},{"key":"ref86","first-page":"8145","article-title":"Cyber-hygiene: The key concept for cyber security in cyberspace","volume":"83","author":"singh","year":"2020","journal-title":"Test Eng Manage"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.27"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-06-2020-0240"},{"key":"ref87","article-title":"The impact of cyber security on SMEs","author":"amrin","year":"2014"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.12.003"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"304","DOI":"10.1016\/j.chb.2014.05.046","article-title":"Security awareness of computer users: A phishing threat avoidance perspective","volume":"38","author":"arachchilage","year":"2014","journal-title":"Comput Hum Behav"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2019.113160"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.10.017"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3007867"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2017.e00346"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2937347"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1391949.1391950"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102003"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3006358"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/9312710\/09483948.pdf?arnumber=9483948","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T09:40:13Z","timestamp":1643190013000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9483948\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":90,"URL":"https:\/\/doi.org\/10.1109\/access.2021.3097144","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]}}}