{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:28:23Z","timestamp":1760171303318},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T00:00:00Z","timestamp":1719446400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,6,27]],"date-time":"2024-06-27T00:00:00Z","timestamp":1719446400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,6,27]]},"DOI":"10.1109\/ecai61503.2024.10607585","type":"proceedings-article","created":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T17:51:28Z","timestamp":1722361888000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Assessing Cybersecurity Awareness among The Hashemite University Students In Terms Of Computer Usage"],"prefix":"10.1109","author":[{"given":"Ashraf H.","family":"Aljammal","sequence":"first","affiliation":[{"name":"The Hashemite University,Prince Al Hussein bin Abdullah II Faculty of Information Technology,Department of Computer Science and Applications,Zarqa,Jordan"}]},{"given":"Ahmad","family":"Qawasmeh","sequence":"additional","affiliation":[{"name":"The Hashemite University,Prince Al Hussein bin Abdullah II Faculty of Information Technology,Department of Computer Science and Applications,Zarqa,Jordan"}]},{"given":"Salah","family":"Taamneh","sequence":"additional","affiliation":[{"name":"The Hashemite University,Prince Al Hussein bin Abdullah II Faculty of Information Technology,Department of Computer Science and Applications,Zarqa,Jordan"}]},{"given":"Fadi","family":"Wedyan","sequence":"additional","affiliation":[{"name":"Lewis University,Department of Engineering, Computing, and Mathematical Sciences,Romeoville,Illinois,USA"}]},{"given":"Mamoon","family":"Obiedat","sequence":"additional","affiliation":[{"name":"The Hashemite University,Prince Al Hussein bin Abdullah II Faculty of Information Technology,Department of Information Technology,Zarqa,Jordan"}]},{"given":"Hani Bani","family":"Salameh","sequence":"additional","affiliation":[{"name":"The Hashemite University,Prince Al Hussein bin Abdullah II Faculty of Information Technology,Department of Software Engineering,Zarqa,Jordan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRCICN50933.2020.9296178"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3064814.3064831"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3390\/info9050110"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3991\/ijim.v17i05.37575"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-816203-3.00004-6"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-04-2017-0025"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.3389\/fpsyg.2020.01390"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1108\/JIC-05-2019-0112"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/spy2.126"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2022.107532"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2021.0120334"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.30564\/ese.v2i2.2477"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc5020023"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.31580\/sps.v2i1.1320"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3390\/app12052589"},{"key":"ref16","first-page":"290","article-title":"Do you really trust","volume-title":"Advances in Human Factors in Cybersecurity: Proceedings of the AHFE 2017 International Conference on Human Factors in Cybersecurity","author":"Moallem"}],"event":{"name":"2024 16th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)","start":{"date-parts":[[2024,6,27]]},"location":"Iasi, Romania","end":{"date-parts":[[2024,6,28]]}},"container-title":["2024 16th International Conference on Electronics, Computers and Artificial Intelligence (ECAI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10606968\/10606970\/10607585.pdf?arnumber=10607585","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T16:17:35Z","timestamp":1722442655000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10607585\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,27]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ecai61503.2024.10607585","relation":{},"subject":[],"published":{"date-parts":[[2024,6,27]]}}}