{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T12:36:33Z","timestamp":1761395793927,"version":"3.28.0"},"reference-count":56,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,10,1]],"date-time":"2020-10-01T00:00:00Z","timestamp":1601510400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,10]]},"DOI":"10.1109\/rivf48685.2020.9140781","type":"proceedings-article","created":{"date-parts":[[2020,7,15]],"date-time":"2020-07-15T21:32:06Z","timestamp":1594848726000},"page":"1-7","source":"Crossref","is-referenced-by-count":4,"title":["Network Analytics for Improving Students\u2019 Cybersecurity Awareness in Online Learning Systems"],"prefix":"10.1109","author":[{"given":"Minh","family":"Hoang T. B","sequence":"first","affiliation":[]},{"given":"Duy","family":"Dang-Pham","sequence":"additional","affiliation":[]},{"given":"Ai-Phuong","family":"Hoang","sequence":"additional","affiliation":[]},{"given":"Bao","family":"Le Gia","sequence":"additional","affiliation":[]},{"given":"Mathews","family":"Nkhoma","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Analyzing Social Networks","year":"2013","author":"borgatti","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2016.12.003"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1177\/0961000615624527"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2012.04.016"},{"key":"ref31","article-title":"Facebook Is Still Leaking Data More Than One Year After Cambridge Analytica","author":"nuhez","year":"2019","journal-title":"Forbes"},{"key":"ref30","article-title":"Cambridge Analytica: The Turning Point In The Crisis About Big Data","author":"stroud","year":"2018","journal-title":"Forbes"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.10.025"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1111\/j.1745-493X.2009.03166.x"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11036-018-1004-4"},{"key":"ref34","first-page":"74","article-title":"Assessing Digital Literacy Skills Using a Self-Administered Questionnaire","volume":"6","author":"komlayut","year":"2017","journal-title":"Rev Integr Bus Econ Res"},{"key":"ref28","first-page":"213","article-title":"Towards data protection compliance","author":"zannone","year":"2010","journal-title":"Security and Cryptography (SECRYPT) Proceedings of the 2010 International Conference"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/978\/1\/012037"},{"key":"ref29","first-page":"191","article-title":"Role-and relationship-based identity management for privacy-enhanced e-learning","volume":"21","author":"anwar","year":"2011","journal-title":"Int J Artif Intell Educ"},{"article-title":"Changing education through ICT in developing countries","year":"2013","author":"georgsen","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.28945\/1415"},{"key":"ref20","article-title":"THREAT MODEL FOR USER SECURITY IN E-LEARNING SYSTEMS","volume":"1","author":"nickolova","year":"2007","journal-title":"Int J \"Information Technol Knowledge \""},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICITST.2009.5402507"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.4018\/jcit.2006100103"},{"key":"ref24","first-page":"728","article-title":"Cyber Security Concerns in E-Learning Education","author":"bandara","year":"2014","journal-title":"Proceedings of ICERI2014 Conference"},{"article-title":"Hackers Demand $2 Million From Monroe","year":"2019","author":"mckenzie","key":"ref23"},{"key":"ref26","first-page":"307","article-title":"Fingerprint based identity authentication for online examination system","volume":"3","author":"liu","year":"2010","journal-title":"2nd International Workshop on Education Technology and Computer Science ETCS 2010"},{"key":"ref25","first-page":"3548","article-title":"Analysis and impact of cyber threats on online social networks","author":"trivedi","year":"2016","journal-title":"Proceedings of the 10th INDIACom 2016 3rd International Conference on Computing for Sustainable Global Development INDIACom 2016"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1609\/aimag.v37i2.2630"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s10648-014-9276-0"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1504\/IJAMC.2008.016212"},{"key":"ref55","first-page":"30","article-title":"Penetrating the fog: analytics in learning and education","volume":"46","author":"siemens","year":"2011","journal-title":"EDUCAUSE Review"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-02738-8_16"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47987-2_8"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s11412-007-9006-4"},{"key":"ref10","first-page":"42","article-title":"A global e-learning framework","author":"khan","year":"2010","journal-title":"E-learning"},{"key":"ref11","first-page":"247","article-title":"Identifying Success Factors for e-Learning in Higher Education","author":"al-fraihat","year":"2017","journal-title":"International Conference E-Learning"},{"article-title":"Introduction to social network methods","year":"2005","author":"hanneman","key":"ref40"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICALT.2005.236"},{"key":"ref13","first-page":"1","article-title":"Security in Learning Management Systems: Designing collaborative learning activities in secure information systems","author":"moneo","year":"2012","journal-title":"Open Educ Eur eLearning Pap"},{"year":"2018","key":"ref14","article-title":"Understanding Security of the Cloud: from Adoption Benefits to Threats and Concerns"},{"year":"2019","key":"ref15","article-title":"SolarWinds Research Reveals Negligent Users as Top Cybersecurity Threat to German Organisations"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.23"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2017.1352028"},{"key":"ref18","article-title":"A Call for Research on Home Users&#x2019; Information Security Behaviour","author":"li","year":"2011","journal-title":"15th Pacific Asia Conference on Information Systems (PACIS)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3243"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/nha3.20108"},{"key":"ref3","first-page":"30","article-title":"Technology Advancement in developing countries during Digital Age","volume":"1","author":"miah","year":"2012","journal-title":"International Journal of Applied Science and Technology"},{"key":"ref6","article-title":"Obama seeks $19B for cybersecurity in 2017, a 36% increase","author":"forrest","year":"2016","journal-title":"Tech Republic"},{"article-title":"Student digital experience tracker 2017: The voice of 22,000 UK learners","year":"2017","author":"newman","key":"ref5"},{"key":"ref8","first-page":"41","article-title":"The need to address mobile device security in the higher education IT curriculum","volume":"24","author":"patten","year":"2013","journal-title":"J Inf Syst Educ"},{"key":"ref7","article-title":"Chinese Hackers Target Universities in Pursuit of Maritime Military Secrets","author":"volz","year":"2019","journal-title":"The Wall Street Journal"},{"article-title":"Health insurance fraud detection using social network analytics","year":"2008","author":"bisker","key":"ref49"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(06)70430-4"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICAICT.2013.6722696"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0308-5"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ITSIM.2008.4631996"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9531.2010.01225.x"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.18637\/jss.v024.i04"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.2307\/41703480"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2004.00162.x"}],"event":{"name":"2020 RIVF International Conference on Computing and Communication Technologies (RIVF)","start":{"date-parts":[[2020,10,14]]},"location":"Ho Chi Minh, Vietnam","end":{"date-parts":[[2020,10,15]]}},"container-title":["2020 RIVF International Conference on Computing and Communication Technologies (RIVF)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9138608\/9140725\/09140781.pdf?arnumber=9140781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:51:18Z","timestamp":1656453078000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9140781\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,10]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/rivf48685.2020.9140781","relation":{},"subject":[],"published":{"date-parts":[[2020,10]]}}}