{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:48:38Z","timestamp":1730278118757,"version":"3.28.0"},"reference-count":9,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/ithet.2016.7760758","type":"proceedings-article","created":{"date-parts":[[2016,12,1]],"date-time":"2016-12-01T16:42:57Z","timestamp":1480610577000},"page":"1-6","source":"Crossref","is-referenced-by-count":3,"title":["Level of the information security awareness of the mechanical engineering students"],"prefix":"10.1109","author":[{"given":"Gabor","family":"Kiss","sequence":"first","affiliation":[]},{"given":"Antonia","family":"Szasz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"417","article-title":"A Comparison of Informatics Skills by schooltypes in the 9&#x2013;10th grades in Hungary","volume":"2","author":"gabor","year":"2011","journal-title":"International Journal of Advanced Research in Computer Science"},{"key":"ref3","first-page":"419","article-title":"Experiences in teaching data concealment and data encryption to engineering undergraduates","author":"gabor","year":"0","journal-title":"IEEE Catalog Number CFP10587-CDR IEEE Xplore digital library"},{"key":"ref6","first-page":"99","article-title":"About passwords","volume":"10","author":"andr\u00e1s","year":"2008","journal-title":"Acta Polytechnica Hungarica"},{"key":"ref5","first-page":"395","article-title":"The survey measuring the informatics skills of the entering Students at Budapest Tech, Banki Donat Faculty of Mechanical and Safety Engineering","author":"gabor","year":"2009","journal-title":"IEEE Xplore digital library Digital Object Identifier 10 1109\/SISY 2009 5291125"},{"key":"ref8","first-page":"83","article-title":"Misunderstanding how Passwords Work","author":"andras","year":"2016","journal-title":"Management Enterprise and Benchmarking in the 21st Century"},{"key":"ref7","first-page":"121","article-title":"Life is Short. Have another Affair - Password Security","author":"andras","year":"2015"},{"key":"ref2","first-page":"31","article-title":"Wie kann man die Steganographie und Kryptographie bekannt machen?","author":"gabor","year":"2005","journal-title":"Informatik und Schule Infos 2005"},{"key":"ref9","first-page":"3","article-title":"Jelszavakr&#x00F3;l &#x2014; ipar&#x00E1;gi legrosszabb gyakorlatok","volume":"7","author":"andras","year":"2015","journal-title":"GAZD&#x00C1;LKOD&#x00C1;S- &#x00C9;S SZERVEZ&#x00C9;STUDOM&#x00C1;NYI FOLY&#x00D3;IRAT A VIRTU&#x00C1;LIS INT&#x00C9;ZET K&#x00D6;Z&#x00C9;P-EUR&#x00D3;PA KUTAT&#x00C1;S&#x00C1;RA K&#x00D6;ZLEM&#x00C9;NYEI"},{"key":"ref1","first-page":"149","article-title":"Nethaboruk kora","author":"andr\u00e1s","year":"2013","journal-title":"Zbornik medzinarodnej vedeckej konferencie Univerzity J Selyeho Komarno"}],"event":{"name":"2016 15th International Conference on Information Technology Based Higher Education and Training (ITHET)","start":{"date-parts":[[2016,9,8]]},"location":"Istanbul, Turkey","end":{"date-parts":[[2016,9,10]]}},"container-title":["2016 15th International Conference on Information Technology Based Higher Education and Training (ITHET)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7740414\/7760693\/07760758.pdf?arnumber=7760758","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,12,19]],"date-time":"2016-12-19T22:50:59Z","timestamp":1482187859000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7760758\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":9,"URL":"https:\/\/doi.org\/10.1109\/ithet.2016.7760758","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}