{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T17:06:38Z","timestamp":1768410398575,"version":"3.49.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,6]]},"DOI":"10.1109\/iccr56254.2022.9995864","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T21:53:52Z","timestamp":1672782832000},"page":"1-5","source":"Crossref","is-referenced-by-count":7,"title":["The effectiveness of Women 4IR Cyber 3A #Aware, Avoid, Act Program in Malaysia"],"prefix":"10.1109","author":[{"given":"Siti Baizura","family":"Mohd Yusof","sequence":"first","affiliation":[{"name":"Royal Police Malaysia,Department of Commercial Crime Investigation,Bukit Aman,Wilayah Persekutuan"}]},{"given":"Siti Norul","family":"Huda Sheikh Abdullah","sequence":"additional","affiliation":[{"name":"Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Bangi,Malaysia"}]},{"given":"Masnizah","family":"Mohd","sequence":"additional","affiliation":[{"name":"Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Bangi,Malaysia"}]},{"given":"Noridayu","family":"Adnan","sequence":"additional","affiliation":[{"name":"Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Bangi,Malaysia"}]},{"given":"Raja Jamilah","family":"Raja Yusof","sequence":"additional","affiliation":[{"name":"International Muslim Women Union, Malaysia Branch,Shah Alam,Selangor"}]},{"given":"Umi Asma'","family":"Mokhtar","sequence":"additional","affiliation":[{"name":"Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Bangi,Malaysia"}]},{"given":"Azah Anir","family":"Norman","sequence":"additional","affiliation":[{"name":"Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Bangi,Malaysia"}]},{"given":"Wan Fariza","family":"Paizi Fauzi","sequence":"additional","affiliation":[{"name":"Universiti Kebangsaan Malaysia,Faculty of Information Science and Technology,Bangi,Malaysia"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Penipu ambil peluang musim Covid-19","author":"Mulia","year":"2021","journal-title":"Utusan Malaysia"},{"issue":"2","key":"ref2","first-page":"10","article-title":"Keterdedahan wanita terhadap risiko buli siber dalam media digital semasa penguatkuasaan Perintah Kawalan Pergerakan (PKP)","volume":"6","author":"Meerangani","year":"2020","journal-title":"JurnalUlwan"},{"key":"ref3","year":"2020","journal-title":"Jenayah siber meningkat ketika pandemik COVID-19 - PBB. BH Online"},{"key":"ref4","article-title":"4,327 kes jenayah siber libat kerugian RM77 juta dilaporkan","author":"Adnan","year":"2021","journal-title":"Sinar Harian"},{"key":"ref5","first-page":"1","article-title":"Kesedaran dan Amalan Keselamatan Siber dalam Kalangan Pengguna Internet di Malaysia","author":"Pitchan","year":"2017","journal-title":"Universiti Putra Malaysia"},{"issue":"2","key":"ref6","first-page":"16","article-title":"Analisis keselamatan siber dari perspektif persekitaran sosial: Kajian terhadap pengguna internet di Lembah Klang","volume":"14","author":"Pitchan","year":"2017","journal-title":"E- Bangi: Journal of Social Sciences and Humanities"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.15405\/epsbs.2020.10.02.40"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIS49240.2020.9257660"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.26735\/krvi8434"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.17576\/apjitm-2018-0702(02)-10"},{"issue":"4","key":"ref11","first-page":"549","article-title":"The Social Media Privacy Model: Privacy and Communication in the Light of Social Media Affordances","volume-title":"Communication Theory","volume":"31","author":"Trepte","year":"2021"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.17576\/jkmjc-2021-3701-22"},{"key":"ref13","first-page":"56","article-title":"Elemen AI-Hirz dan Kedudukannya dalam Jenayah Siber Masa Kini","author":"Meerangani","year":"2019","journal-title":"Journal of Contemporary Islamic Studies Yang"},{"issue":"3","key":"ref14","first-page":"296","article-title":"Strategi komunikasi penjenayah cinta siber terhadap wanita profesional","volume-title":"Jurnal Komunikasi: Malaysian Journal of Communication","volume":"36","author":"Alavi","year":"2020"},{"issue":"3","key":"ref15","first-page":"408","article-title":"Developments in the global law enforcement of cyber-crime","volume-title":"Policing","volume":"29","author":"Broadhurst","year":"2006"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.17576\/jkmjc-2018-3404-07"},{"key":"ref17","first-page":"60","article-title":"Psikologi Kemangsaan Jenayah Penipuan Komersil: Tinjauan Literatur","volume":"1","author":"Murad","year":"2019","journal-title":"Jurnal Psikologi Keselamatan"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/1828\/1\/012107"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.11113\/jt.v72.2333"},{"key":"ref20","article-title":"Malaysia siap siaga hadapi ancaman siber","author":"Karim","year":"2021","journal-title":"BHOnline"},{"issue":"4","key":"ref21","first-page":"1","article-title":"Jenayah cinta siber di Malaysia: Suatu penelitian terhadap pengalaman mangsa","volume":"16","author":"Ismail","year":"2019","journal-title":"E- Bangi: Journal of Social Sciences and Humanities"},{"issue":"6","key":"ref22","first-page":"1","article-title":"Buli Siber: Ketidaksantunan Bahasa dan Etika Media Sosial Dalam Kalangan Remaja Malaysia (Cyberbullying in Malaysia: Understanding Youngsters \u2018 Ethics and Impoliteness Strategies in Social Media)","volume":"16","author":"Shaari","year":"2019","journal-title":"E- Bangi: Journal of Social Sciences and Humanities"},{"key":"ref23","first-page":"38","article-title":"Buli siber dalam kalangan remaja Malaysia","author":"Saper","year":"2020","journal-title":"Seminar Antarabangsa Kaunseling Islam"},{"key":"ref24","article-title":"Mahkamah khas siber akan diperluas","author":"Afzan","year":"2018","journal-title":"BH Online"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.32890\/jps.21.2018.11558"}],"event":{"name":"2022 International Conference on Cyber Resilience (ICCR)","location":"Dubai, United Arab Emirates","start":{"date-parts":[[2022,10,6]]},"end":{"date-parts":[[2022,10,7]]}},"container-title":["2022 International Conference on Cyber Resilience (ICCR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9995718\/9995732\/09995864.pdf?arnumber=9995864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,1]],"date-time":"2024-02-01T12:36:39Z","timestamp":1706790999000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9995864\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iccr56254.2022.9995864","relation":{},"subject":[],"published":{"date-parts":[[2022,10,6]]}}}