{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,28]],"date-time":"2025-11-28T12:22:02Z","timestamp":1764332522738,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,4]]},"DOI":"10.1109\/educon.2017.7943091","type":"proceedings-article","created":{"date-parts":[[2017,6,8]],"date-time":"2017-06-08T16:42:10Z","timestamp":1496940130000},"page":"1782-1789","source":"Crossref","is-referenced-by-count":9,"title":["Teaching psychological principles to cybersecurity students"],"prefix":"10.1109","author":[{"given":"Jacqui","family":"Taylor","sequence":"first","affiliation":[]},{"given":"John","family":"McAlaney","sequence":"additional","affiliation":[]},{"given":"Sarah","family":"Hodge","sequence":"additional","affiliation":[]},{"given":"Helen","family":"Thackray","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Richardson","sequence":"additional","affiliation":[]},{"given":"Susie","family":"James","sequence":"additional","affiliation":[]},{"given":"John","family":"Dale","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Computer Ethics","year":"2009","author":"johnson","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1107622.1107630"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1159\/000270857"},{"key":"ref13","first-page":"517","volume":"6","author":"greene","year":"2002","journal-title":"How (and where) does moral judgment work? Trends in Cognitive Science"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1037\/h0100597"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1080\/03075079412331381900"},{"journal-title":"Qualifications obtained by students on HE courses at HEIs in the UK by level of qualification obtained gender and subject area 2012 to 2013 2014","article-title":"Higher Education Statistical Agency","year":"0","key":"ref16"},{"journal-title":"Sex Differences in Cognitive Abilities","year":"1992","author":"halpern","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/0263514950130206"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1111\/1468-005X.00115"},{"journal-title":"ACM Report &#x2018;Toward Curricular Guidelines for Cybersecurity&#x2019; 2013","year":"0","author":"mcgettrick","key":"ref4"},{"key":"ref3","first-page":"686","article-title":"The social psychology of cybersecurity","volume":"29","author":"mcalaney","year":"2016","journal-title":"The Psychologist"},{"key":"ref6","article-title":"The psyche of cybercriminals: A psycho-social perspective","author":"rogers","year":"2010","journal-title":"Cybercrimes A Multidisciplinary Analysis"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TE.2016.2636125"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1177\/089443930202000304"},{"key":"ref7","first-page":"9","article-title":"The role of personality in online self-presentation","author":"fullwood","year":"2015","journal-title":"Cyberpsychology"},{"journal-title":"Influence Science and Practice","year":"2008","author":"cialdini","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2013.763860"},{"journal-title":"Computer Ethics","year":"1985","author":"johnson","key":"ref9"},{"journal-title":"Moral maturity Measuring the development of sociomoral reflection","year":"1992","author":"gibbs","key":"ref20"},{"key":"ref22","article-title":"The Modern American College","author":"kolb","year":"1981","journal-title":"Learning Styles and Disciplinary Differences"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1121341.1121474"},{"journal-title":"Cyber Security Challenge UK 2016","year":"0","key":"ref24"},{"key":"ref23","first-page":"349","article-title":"Handbook of Social Psychological Theories","author":"bandura","year":"2011","journal-title":"The Social Cognitive Theory"}],"event":{"name":"2017 IEEE Global Engineering Education Conference (EDUCON)","start":{"date-parts":[[2017,4,25]]},"location":"Athens, Greece","end":{"date-parts":[[2017,4,28]]}},"container-title":["2017 IEEE Global Engineering Education Conference (EDUCON)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7936435\/7942803\/07943091.pdf?arnumber=7943091","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,27]],"date-time":"2017-06-27T19:44:58Z","timestamp":1498592698000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7943091\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,4]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/educon.2017.7943091","relation":{},"subject":[],"published":{"date-parts":[[2017,4]]}}}