{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T18:34:37Z","timestamp":1763663677025,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,9]]},"DOI":"10.1109\/iwbis.2017.8275111","type":"proceedings-article","created":{"date-parts":[[2018,2,1]],"date-time":"2018-02-01T21:48:11Z","timestamp":1517521691000},"page":"113-117","source":"Crossref","is-referenced-by-count":3,"title":["Knowledge sharing and electronic word of mouth to promote information security awareness in social network site"],"prefix":"10.1109","author":[{"given":"Puspita Kencana","family":"Sari","sequence":"first","affiliation":[]},{"given":"Adhi","family":"Prasetio","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240404"},{"key":"ref30","first-page":"478","author":"kotler","year":"2012","journal-title":"Marketing Management"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1108\/ITP-10-2014-0232"},{"journal-title":"Consumer Behavior Building Marketing Strategy\/12E","year":"2013","author":"hawkins","key":"ref11"},{"journal-title":"Principles of Marketing","year":"2014","author":"kotler","key":"ref12"},{"key":"ref13","first-page":"544","article-title":"A Trust-based Consumer Decision-making Model in Electronic Commerce: The Role of Trust, Perceived Risk, and Their Antecedents","author":"kin","year":"2008","journal-title":"Decision Support System"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1108\/JRIM-08-2013-0057"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.10.013"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4067\/S0718-18762013000100006"},{"key":"ref17","first-page":"243","article-title":"Analyzing the Impact of Traffic Source on Visit Duration","author":"prasetio","year":"2016","journal-title":"International Journal of Business"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1108\/02634501211231946"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.5539\/ibr.v6n3p58"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21149"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v12i2.64"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/pa.1470"},{"journal-title":"ID-CERT","year":"0","key":"ref3"},{"key":"ref6","first-page":"10862","article-title":"Effectiveness of information security awareness methods based on psychological theories","volume":"v","author":"khan","year":"2011","journal-title":"African Journal of Business Management"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1108\/09596111011018179","article-title":"A conceptual framework of hotel experience and customer-based brand equity: Some research questions and implications","volume":"22","author":"xu","year":"2010","journal-title":"International Journal of Contemporary Hospitality Management"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s11292-014-9222-7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2013.05.010"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.12.037"},{"year":"0","author":"mcgoogan","key":"ref2"},{"key":"ref9","article-title":"The image of Bandung basin national strategic area through Instagram","author":"christin","year":"2016","journal-title":"Proceedings of the 3rd International Hospitality and Tourism Conference IHTC 2016 and 2nd International Seminar on Tourism ISOT 2016"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.4304\/jait.3.3.176-183"},{"key":"ref20","article-title":"Electronic Word-of-Mouth (eWOM) Adoption Model for Information Security Awareness: A Case Study in University Students","author":"prasetio","year":"2016","journal-title":"Smart Collaboration for Business In Technology and Information Industry"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1108\/09685221011095236"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1108\/09685220310500153"},{"journal-title":"Principles of Information Security","year":"2011","author":"whittman","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1108\/03074809910285888"},{"journal-title":"Information Security Fundamentals","year":"2014","author":"peltier","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.02.008"}],"event":{"name":"2017 International Workshop on Big Data and Information Security (IWBIS)","start":{"date-parts":[[2017,9,23]]},"location":"Jakarta","end":{"date-parts":[[2017,9,24]]}},"container-title":["2017 International Workshop on Big Data and Information Security (IWBIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8263128\/8275086\/08275111.pdf?arnumber=8275111","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T04:48:31Z","timestamp":1570682911000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8275111\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/iwbis.2017.8275111","relation":{},"subject":[],"published":{"date-parts":[[2017,9]]}}}