{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:09:09Z","timestamp":1758269349615,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T00:00:00Z","timestamp":1709769600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T00:00:00Z","timestamp":1709769600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,3,7]]},"DOI":"10.1109\/ictas59620.2024.10507133","type":"proceedings-article","created":{"date-parts":[[2024,4,25]],"date-time":"2024-04-25T17:39:17Z","timestamp":1714066757000},"page":"57-62","source":"Crossref","is-referenced-by-count":3,"title":["Bibliometric analysis of Cybersecurity in e-learning systems and big data"],"prefix":"10.1109","author":[{"given":"Farshida","family":"Jahoor","sequence":"first","affiliation":[{"name":"Independent Institute of Education,Johannesburg,South Africa (RSA)"}]},{"given":"Meera K.","family":"Joseph","sequence":"additional","affiliation":[{"name":"Independent Institute of Education,Varsity College,Johannesburg,RSA"}]},{"given":"Natasha","family":"Madhav","sequence":"additional","affiliation":[{"name":"Independent Institute of Education,Johannesburg,RSA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1166\/asl.2018.13028"},{"key":"ref2","article-title":"The challenge of participatory technologies for teaching and learning at Ontario universities","author":"Albert","year":"2007","journal-title":"Council of Ontario Universities."},{"key":"ref3","first-page":"128","article-title":"Cyber security threat analysis in higher education institutions as a result of distance learning","volume":"3","author":"Alexei","year":"2021","journal-title":"International Journal of Scientific and Technology Research"},{"key":"ref4","doi-asserted-by":"crossref","DOI":"10.3390\/bdcc5020023","volume-title":"Assessment of cybersecurity awareness among students of Majmaah University","author":"Alharbi","year":"2021"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.21125\/inted.2020.1323"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.3390\/fi15090293"},{"key":"ref7","first-page":"154","article-title":"Cyber-security","volume-title":"The Routledge Handbook of New Security Studies","author":"Cavelty","year":"2010"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-8156-9.ch013"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2021.04.070"},{"issue":"1","key":"ref10","article-title":"Cyber security awareness among university students: A case study","volume-title":"Readers insight.Net","volume":"2","author":"Gabra","year":"2020"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.2992966"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3000179"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-023-09722-7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1177\/097325860500100104"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2021.3130248"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.egyr.2021.08.126"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-10-2015-0094"},{"issue":"24","key":"ref19","first-page":"81","article-title":"Technology acceptance model and e-learning","volume":"21","author":"Masrom","year":"2007","journal-title":"Technology"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3145\/epi.2020.ene.03"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1108\/JEAS-03-2022-0072"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.2478\/cait-2019-0023"},{"issue":"1","key":"ref23","first-page":"177","article-title":"16. Adoption of e-Learning in Indonesian Higher Education: Innovation or Irritation?","volume":"22","author":"Putro","year":"2023","journal-title":"Membelajarkan Diri Menulis Membukukan Tulisan"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.98038"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.4018\/jcit.2006100103"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1108\/MANM-07-2023-0026"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICISCT47635.2019.9011971"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.rico.2023.100204"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1086\/209170"},{"issue":"2","key":"ref30","first-page":"284","article-title":"Importance of cyber security awareness and e-learning motivation for cyber security in reshaping the education","volume":"15","author":"Tisma","year":"2021","journal-title":"Journal of Information Systems & Operations Management"},{"key":"ref31","article-title":"VOSviewer manual","volume":"1","author":"Van Eck","year":"2011","journal-title":"Manual for VOSviewer Version"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-017-2300-7"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-5915.2008.00192.x"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.3390\/info12100405"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICECA55336.2022.10009524"}],"event":{"name":"2024 Conference on Information Communications Technology and Society (ICTAS)","start":{"date-parts":[[2024,3,7]]},"location":"Durban, South Africa","end":{"date-parts":[[2024,3,8]]}},"container-title":["2024 Conference on Information Communications Technology and Society (ICTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10507104\/10507105\/10507133.pdf?arnumber=10507133","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T18:26:06Z","timestamp":1714760766000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10507133\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,7]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/ictas59620.2024.10507133","relation":{},"subject":[],"published":{"date-parts":[[2024,3,7]]}}}