{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:13:10Z","timestamp":1761621190328,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/asonam.2014.6921663","type":"proceedings-article","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T20:12:38Z","timestamp":1414008758000},"page":"704-711","source":"Crossref","is-referenced-by-count":10,"title":["The security awareness paradox: A case study"],"prefix":"10.1109","author":[{"given":"Muhammad Adnan","family":"Tariq","sequence":"first","affiliation":[]},{"given":"Joel","family":"Brynielsson","sequence":"additional","affiliation":[]},{"given":"Henrik","family":"Artman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"Why johnny can't encrypt: A usability evaluation of pgp 5.0","author":"whitten","year":"1999","journal-title":"Proceedings of the 8th USENIX Security Symposium"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.11.004"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2013.08.006"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1080\/19393550802492487"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.1145\/1234772.1234786","article-title":"Looking for trouble: Understanding end-user security management","author":"gross","year":"2007","journal-title":"Proceedings of the 2007 Symposium on Computer Human Interaction for the Management of Information Technology Ser CHIMIT'07"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-008-9909-7"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.192"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/304851.304859"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.60"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1521\/jscp.1996.15.1.53"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1521\/jscp.1996.15.1.1"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.001"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/1330311.1330320"},{"journal-title":"Social Research Methods","year":"2001","author":"bryman","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.2001.00099.x"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.07.001"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.09.010"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/0960-2593(91)90013-Y"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0308-5"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/143457.143468"},{"key":"2","doi-asserted-by":"crossref","first-page":"523","DOI":"10.2307\/25750690","article-title":"Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness","volume":"34","author":"bulgurcu","year":"2010","journal-title":"MIS Quarterly"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.11.010"},{"key":"1","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/503345.503348","article-title":"Five dimensions of information security awareness","volume":"31","author":"siponen","year":"2001","journal-title":"Computers and Society"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.02.005"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.12.004"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.022"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.04.005"},{"key":"8","doi-asserted-by":"crossref","first-page":"983","DOI":"10.1016\/j.cose.2012.08.004","article-title":"Power to the people? the evolving recognition of human aspects of security","volume":"31","author":"furnell","year":"2012","journal-title":"Computers & Security"}],"event":{"name":"2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","start":{"date-parts":[[2014,8,17]]},"location":"China","end":{"date-parts":[[2014,8,20]]}},"container-title":["2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6911097\/6921526\/06921663.pdf?arnumber=6921663","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,16]],"date-time":"2019-08-16T14:12:02Z","timestamp":1565964722000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6921663\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/asonam.2014.6921663","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}