{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T08:23:09Z","timestamp":1758874989984,"version":"3.41.2"},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/cybersa.2019.8899648","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T18:18:43Z","timestamp":1574705923000},"page":"1-4","source":"Crossref","is-referenced-by-count":4,"title":["The determinants of individual cyber security behaviours: Qualitative research among French students"],"prefix":"10.1109","author":[{"given":"Bertrand","family":"Venard","sequence":"first","affiliation":[{"name":"Oxford Internet Institute, University of Oxford,Oxford,UK"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.1.13"},{"journal-title":"Ibid","year":"2009","author":"herath","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.2307\/3250959"},{"key":"ref30","first-page":"400","article-title":"On-line activities, guardianship, and malware infection: An examination of routine activities theory","volume":"3","author":"bossler","year":"2009","journal-title":"International Journal of Cyber Criminology"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00491"},{"journal-title":"Ibid","year":"2009","author":"rhee","key":"ref11"},{"journal-title":"Computer security-threats vulnerabilities and countermeasures","year":"1989","author":"smith","key":"ref12"},{"journal-title":"Principles of Information Security","year":"2003","author":"whitman","key":"ref13"},{"key":"ref14","article-title":"Cyber Effect: An Expert in Cyberpsychology Explains how Technology is Shaping Our Children, Our Behavior, and Our Values-and what We Can Do about it","author":"aiken","year":"2017","journal-title":"Spiegel & Grau"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2018\/13853"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.02.019"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011902718709"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.12.040"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.05.046"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1111\/j.0011-1348.2005.00024.x"},{"journal-title":"Big Data A Revolution That Will Transform How We Live Work and Think","year":"2013","author":"mayer-sch\u00f6nberger","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.2307\/2089195"},{"journal-title":"Cybercrime Vandalizing the Information Society","year":"2002","author":"furnell","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.065"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2009.02.005"},{"journal-title":"Cybersecurity in the single market","first-page":"104","year":"2017","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.1.01"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.05.008"},{"key":"ref2","article-title":"Crime and the Internet. Cybercrimes and Cyberfears","author":"wall","year":"2001","journal-title":"Cybercrimes are usually divided between computer-focus-crimes (that appeared with the appearance of internet such as computer hacking) and the computer-assisted-crimes (that pre-exist internet and are just experienced differently in the digital world such as harassment)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2015.1028448"},{"key":"ref1","first-page":"171","article-title":"EU","year":"2015","journal-title":"Cyber Security"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.01.002"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.12"},{"journal-title":"Why penetration testing is a limited use choice for sound cyber security practice","year":"2014","author":"valli","key":"ref21"},{"journal-title":"Ibid","year":"2018","author":"siponen","key":"ref24"},{"journal-title":"Secrets and Lies Digital Security in a Networked World","year":"2011","author":"schneier","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.11.004"},{"journal-title":"Ibid","year":"2018","author":"moody","key":"ref25"}],"event":{"name":"2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","start":{"date-parts":[[2019,6,3]]},"location":"Oxford, UK","end":{"date-parts":[[2019,6,4]]}},"container-title":["2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8892713\/8899350\/08899648.pdf?arnumber=8899648","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T18:24:11Z","timestamp":1753986251000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8899648\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2019.8899648","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}