{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T05:16:02Z","timestamp":1734153362441,"version":"3.30.2"},"reference-count":52,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T00:00:00Z","timestamp":1723766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T00:00:00Z","timestamp":1723766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,8,16]]},"DOI":"10.1109\/besc64747.2024.10780536","type":"proceedings-article","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T19:07:29Z","timestamp":1734030449000},"page":"1-5","source":"Crossref","is-referenced-by-count":0,"title":["Research Proposal on Security As a Behavior: Enhancing Social Media Fraud Reporting Intentions"],"prefix":"10.1109","author":[{"given":"Eiman A.","family":"Al-Hamad","sequence":"first","affiliation":[{"name":"College of Science and Engineering, Hamad Bin Khalifa University,Doha,Qatar"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2023.102258"},{"key":"ref2","first-page":"06","article-title":"The role of user behaviour in improving cyber security management","volume":"12","author":"Bello","year":"2021","journal-title":"Front. Psychol."},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.11.015"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.15604\/ejss.2021.09.02.004"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3007867"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.12.040"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1108\/PIJPSM-08-2019-0134"},{"volume":"2024","journal-title":"The threat from fraud","article-title":"National crime agency","key":"ref8"},{"journal-title":"Annual Fraud Report","article-title":"UK Finance","year":"2024","key":"ref9"},{"volume":"2024","journal-title":"Value of e-commerce losses to online payment fraud worldwide from 2020 to 2023","author":"Statista","key":"ref10"},{"journal-title":"An Introduction to Co-design","author":"Burkett","key":"ref11"},{"journal-title":"Co-creation and designing of public services","key":"ref12","article-title":"The United Arab Emirates\u2019 government portal"},{"journal-title":"Social-norms-definitions-2021","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1177\/1477370820941405"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1177\/1477370818773610"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1177\/0894439321999311"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.52922\/ti148355"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1177\/0011128715620428"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijlcj.2018.08.001"},{"volume":"2024","journal-title":"Internet crime complaint centre (IC3)","article-title":"Internet crime complaint centre","key":"ref20"},{"volume":"2024","journal-title":"ActionFraud","article-title":"National Fraud & Cybercrime Reporting Center","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/15564886.2021.2018080"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1108\/PIJPSM-07-2019-0122"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.192"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-69746-3_2"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.1998.tb01685.x"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1037\/10523-026"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1177\/0275074014535241"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.5130\/acis2018.co"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.01.002"},{"journal-title":"UK cybercrime, victims and reporting: a systematic review","year":"2023","author":"Sikra","key":"ref31"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.02428"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3389\/fcomp.2021.656873"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1179\/2047480615z.000000000329"},{"journal-title":"Guidelines for performing Systematic Literature Reviews in Software Engineering","year":"2021","author":"Kitchenham","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-08-2022-0139"},{"volume":"2024","journal-title":"TGM research: market research and online panels","article-title":"TGM Research","key":"ref37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-012-1270-1"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0271289"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/j.jrp.2006.02.001"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1177\/0146167201272002"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1177\/07342829231161884"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1177\/0020852315585950"},{"journal-title":"Need for cognition","author":"Coelho","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICITACEE55701.2022.9924092"},{"key":"ref46","first-page":"02","author":"Akoka","year":"2024","journal-title":"Design science research: progression, schools of thought and research themes"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.02428"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1037\/0278-6133.27.3.379"},{"volume":"2024","journal-title":"The vocabulary for event recording and incident sharing","key":"ref49"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1080\/14719037.2019.1619810"},{"volume":"2024","journal-title":"scamwatch","article-title":"National anti-scam centre","key":"ref51"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-98438-0_12"}],"event":{"name":"2024 11th International Conference on Behavioural and Social Computing (BESC)","start":{"date-parts":[[2024,8,16]]},"location":"Harbin, China","end":{"date-parts":[[2024,8,18]]}},"container-title":["2024 11th International Conference on Behavioural and Social Computing (BESC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10779601\/10780446\/10780536.pdf?arnumber=10780536","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T06:29:23Z","timestamp":1734071363000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10780536\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,16]]},"references-count":52,"URL":"https:\/\/doi.org\/10.1109\/besc64747.2024.10780536","relation":{},"subject":[],"published":{"date-parts":[[2024,8,16]]}}}