{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T07:37:49Z","timestamp":1742801869973,"version":"3.28.0"},"reference-count":12,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/saci.2015.7208226","type":"proceedings-article","created":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T17:52:02Z","timestamp":1440093122000},"page":"345-348","source":"Crossref","is-referenced-by-count":1,"title":["Security awareness and social responsability"],"prefix":"10.1109","author":[{"given":"Gabor","family":"Vanderer","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref4","first-page":"32","article-title":"Gender stereotypes","author":"kelemen","year":"2008","journal-title":"I-business"},{"key":"ref3","article-title":"The M-Factor: How the Millennial Generation Is Rocking the Workplace","author":"lancaster","year":"2010","journal-title":"Harper Collins"},{"key":"ref10","first-page":"79","article-title":"4th generation warfare","author":"somkuti","year":"2012"},{"key":"ref6","first-page":"27","article-title":"Y-Generation - clinical psychological symptoms and social psyhology relations in the information age","author":"tari","year":"2010"},{"key":"ref11","first-page":"84","article-title":"New trends in kiber crime","author":"s\u00e1gi","year":"2014","journal-title":"Kommunik&#x00E1;ci&#x00F3; conference thesis book"},{"year":"2014","key":"ref5"},{"key":"ref12","first-page":"269","author":"rajnai","year":"2004","journal-title":"Les radios de l'avenir pour les arm&#x00E9;es ZRINYI MIKLOS NEMZETV&#x00C9;DELMI EGYETEM KIADV&#x00C1;NYA"},{"year":"2015","key":"ref8"},{"article-title":"Knowledge of basic financial concepts of the twenty-year-olds in the light of the results of a questionnaire survey","year":"2013","author":"csisz\u00e1rik-kocsir","key":"ref7"},{"key":"ref2","first-page":"165","article-title":"Security issues of mobile devices","author":"nyikes","year":"2014","journal-title":"Kommunik&#x00E1;ci&#x00F3; conference thesis book"},{"volume":"41","journal-title":"Hungarian ecict","year":"1997","key":"ref9"},{"year":"2015","key":"ref1","article-title":"Newest provision technologies"}],"event":{"name":"2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics (SACI)","start":{"date-parts":[[2015,5,21]]},"location":"Timisoara, Romania","end":{"date-parts":[[2015,5,23]]}},"container-title":["2015 IEEE 10th Jubilee International Symposium on Applied Computational Intelligence and Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7165000\/7208165\/07208226.pdf?arnumber=7208226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T18:31:58Z","timestamp":1490380318000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7208226\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":12,"URL":"https:\/\/doi.org\/10.1109\/saci.2015.7208226","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}