{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:26:35Z","timestamp":1767338795745},"reference-count":9,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,10,6]],"date-time":"2022-10-06T00:00:00Z","timestamp":1665014400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,10,6]]},"DOI":"10.1109\/iccr56254.2022.9995935","type":"proceedings-article","created":{"date-parts":[[2023,1,3]],"date-time":"2023-01-03T16:53:52Z","timestamp":1672764832000},"page":"01-04","source":"Crossref","is-referenced-by-count":2,"title":["Pendekar Siber: Empowering Young People to Combat Cyber Threats"],"prefix":"10.1109","author":[{"given":"Nurul Nuha","family":"Abdul Molok","sequence":"first","affiliation":[{"name":"International Islamic University Malaysia,Faculty of Information and Communication Technology,Department of Information Systems,Kuala Lumpur,Malaysia"}]},{"given":"Zahidah","family":"Zulkifli","sequence":"additional","affiliation":[{"name":"International Islamic University Malaysia,Faculty of Information and Communication Technology,Department of Information Systems,Kuala Lumpur,Malaysia"}]},{"given":"Mohamed Ridza","family":"Wahiddin","sequence":"additional","affiliation":[{"name":"Islamic Science University of Malaysia [Retired],Negeri Sembilan,Malaysia"}]}],"member":"263","reference":[{"journal-title":"Health Psychology","article-title":"&#x2018;Gaming Disorder&#x2019; Is Now an Official Medical Condition, According to the WHO","year":"2019","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1177\/0957456519889956"},{"journal-title":"Ministry of Communication and Multimedia Malaysia","article-title":"Global shortage of cybersecurity talent","year":"2022","key":"ref9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4018\/IJCEE.2016010101"},{"key":"ref3","article-title":"Parents' roles in mitigating cyber threats to children in the new norm","author":"abdul molok","year":"0","journal-title":"Proceedings of National Population Conference"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.18178\/ijiet.2020.10.5.1393"},{"key":"ref5"},{"key":"ref2","article-title":"Cyber safety vs. cybersecurity: Whats the difference?","author":"waugh","year":"2019","journal-title":"DZone Security Zone"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-04-2017-0025"}],"event":{"name":"2022 International Conference on Cyber Resilience (ICCR)","start":{"date-parts":[[2022,10,6]]},"location":"Dubai, United Arab Emirates","end":{"date-parts":[[2022,10,7]]}},"container-title":["2022 International Conference on Cyber Resilience (ICCR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9995718\/9995732\/09995935.pdf?arnumber=9995935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,30]],"date-time":"2023-01-30T14:57:35Z","timestamp":1675090655000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9995935\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,6]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/iccr56254.2022.9995935","relation":{},"subject":[],"published":{"date-parts":[[2022,10,6]]}}}