{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:43:59Z","timestamp":1766486639862,"version":"3.37.3"},"reference-count":13,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IT Prof."],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1109\/mitp.2024.3375571","type":"journal-article","created":{"date-parts":[[2024,5,2]],"date-time":"2024-05-02T17:28:26Z","timestamp":1714670906000},"page":"83-89","source":"Crossref","is-referenced-by-count":2,"title":["Cybercrime: Understanding the Current State of Literature and Issues Facing CISOs"],"prefix":"10.1109","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9575-6676","authenticated-orcid":false,"given":"Caitlin","family":"Ferreira","sequence":"first","affiliation":[{"name":"University of Cape Town, Cape Town, South Africa"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1217-6217","authenticated-orcid":false,"given":"Andrew","family":"Park","sequence":"additional","affiliation":[{"name":"University of Victoria, Victoria, BC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3576-994X","authenticated-orcid":false,"given":"Jan","family":"Kietzmann","sequence":"additional","affiliation":[{"name":"University of Victoria, Victoria, BC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3411-0609","authenticated-orcid":false,"given":"Dionysios","family":"Demetis","sequence":"additional","affiliation":[{"name":"University of Hull, U.K."}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8155-6873","authenticated-orcid":false,"given":"Andrew","family":"Flostrand","sequence":"additional","affiliation":[{"name":"Simon Fraser University, Vancouver, BC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3330-0977","authenticated-orcid":false,"given":"Ian","family":"McCarthy","sequence":"additional","affiliation":[{"name":"Simon Fraser University, Vancouver, BC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2750-8184","authenticated-orcid":false,"given":"Leyland","family":"Pitt","sequence":"additional","affiliation":[{"name":"Simon Fraser University, Vancouver, BC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1304-5289","authenticated-orcid":false,"given":"Amir","family":"Dabirian","sequence":"additional","affiliation":[{"name":"California State University Fullerton, Fullerton, CA, USA"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Cybercrime to cost the world $10.5 trillion annually by 2025","volume-title":"Cybercrime Mag.","author":"Morgan","year":"2020"},{"key":"ref2","article-title":"Cybersecurity in this era of polycrisis","volume-title":".\u201d","author":"Moschetta","year":"2024"},{"issue":"2","key":"ref3","first-page":"142","article-title":"Impact of cybercrime: Issues and challenges","volume":"6","author":"Das","year":"2013","journal-title":"Int. J. Eng. Sci. Emerg. Technol."},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.4135\/9781452225708.n4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-800743-3.00012-8"},{"volume-title":"The most prevalent forms of cyber crime","year":"2024","author":"Zandt","key":"ref6"},{"volume-title":"The ascent of the CISO","year":"2024","author":"Wainwright","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1108\/jrme-05-2020-0046"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s11192-009-0146-3"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0172778"},{"volume-title":"Cybercrime poses biggest threat to businesses\u2014As the impact of hackers becomes more destructive","year":"2024","key":"ref11"},{"volume-title":"Nearly half of businesses are being hit by economic crime, with cybercrime the gravest threat. What can they do about it?","year":"2024","author":"Ellerbeck","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.bushor.2022.07.004"}],"container-title":["IT Professional"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6294\/10517288\/10517321.pdf?arnumber=10517321","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T18:54:39Z","timestamp":1714762479000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10517321\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":13,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/mitp.2024.3375571","relation":{},"ISSN":["1520-9202","1941-045X"],"issn-type":[{"type":"print","value":"1520-9202"},{"type":"electronic","value":"1941-045X"}],"subject":[],"published":{"date-parts":[[2024,3]]}}}