{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T10:27:53Z","timestamp":1744194473531},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1109\/mocast.2018.8376578","type":"proceedings-article","created":{"date-parts":[[2018,6,11]],"date-time":"2018-06-11T19:29:45Z","timestamp":1528745385000},"page":"1-4","source":"Crossref","is-referenced-by-count":17,"title":["Information security awareness of greek higher education students \u2014 Preliminary findings"],"prefix":"10.1109","author":[{"given":"Adam P.","family":"Filippidis","sequence":"first","affiliation":[]},{"given":"Constantinos S.","family":"Hilas","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Filippidis","sequence":"additional","affiliation":[]},{"given":"Anastasios","family":"Politis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICT4M.2010.5971884"},{"journal-title":"The Good Research Guide","year":"2014","author":"denscombe","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.5194\/nhess-9-1307-2009"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1185448.1185544"},{"journal-title":"Research methods for business students","year":"2009","author":"saunders","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/NCIA.2013.6725324"},{"key":"ref4","first-page":"24","article-title":"Five Dimensions of Information Security Awareness","author":"mikko","year":"2001","journal-title":"ACM SIGCAS Computers and Society Volume 31 Issue 2 June 2001 New York NY USA ACM"},{"key":"ref3","article-title":"Web User&#x2019; Knowledge and Their Behavior towards Security Threats and Vulnerabilities","author":"akram","year":"2015","journal-title":"4th International Conference on Advanced Computer Science Applications and Technologies (ACSAT)"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2899415.2959087"},{"key":"ref5","article-title":"Evaluation of Users, Awareness and Their Reaction on Information Security","author":"akram","year":"2015","journal-title":"4th International Conference on Advanced Computer Science Applications and Technologies"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAT.2014.31"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1233341.1233441"},{"key":"ref2","article-title":"Assessment Methodology for the Categorization of ICT System Users Security Awareness","author":"solic","year":"2012","journal-title":"MIPRO 2012 Opatija Croatia"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2011.6027505"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom.2015.394"}],"event":{"name":"2018 7th International Conference on Modern Circuits and Systems Technologies (MOCAST)","start":{"date-parts":[[2018,5,7]]},"location":"Thessaloniki","end":{"date-parts":[[2018,5,9]]}},"container-title":["2018 7th International Conference on Modern Circuits and Systems Technologies (MOCAST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8370368\/8376555\/08376578.pdf?arnumber=8376578","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,2]],"date-time":"2018-07-02T21:27:04Z","timestamp":1530566824000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8376578\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/mocast.2018.8376578","relation":{},"subject":[],"published":{"date-parts":[[2018,5]]}}}