{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:14:40Z","timestamp":1750306480448,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,12,11]],"date-time":"2015-12-11T00:00:00Z","timestamp":1449792000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,12,11]]},"DOI":"10.1145\/2837185.2837237","type":"proceedings-article","created":{"date-parts":[[2016,4,7]],"date-time":"2016-04-07T22:22:33Z","timestamp":1460067753000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["The urgent need for an enforced awareness programme to create internet security awareness in nigeria"],"prefix":"10.1145","author":[{"given":"Tiwalade","family":"Adelola","sequence":"first","affiliation":[{"name":"Loughborough University, Loughborough, UK"}]},{"given":"Ray","family":"Dawson","sequence":"additional","affiliation":[{"name":"Loughborough University, Loughborough, UK"}]},{"given":"Firat","family":"Batmaz","sequence":"additional","affiliation":[{"name":"Loughborough University, Loughborough, UK"}]}],"member":"320","published-online":{"date-parts":[[2015,12,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Adkinson W. F. Eisenach J. A. and Lenard T. M. 2002. Privacy online: A report on the information practices and policies of commercial web sites. Progress and Freedom Foundation Washington DC.  Adkinson W. F. Eisenach J. A. and Lenard T. M. 2002. Privacy online: A report on the information practices and policies of commercial web sites. Progress and Freedom Foundation Washington DC."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2002.1048502"},{"key":"e_1_3_2_1_3_1","unstructured":"Symantec Norton 2012. Norton Cybercrime Report \" 2012.  Symantec Norton 2012. Norton Cybercrime Report \" 2012."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.01.001"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.05.006"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.08.001"},{"key":"e_1_3_2_1_7_1","unstructured":"Wolf Park and Digital Jewels 2014. The Nigerian Cyber threat barometer report.  Wolf Park and Digital Jewels 2014. The Nigerian Cyber threat barometer report."},{"key":"e_1_3_2_1_8_1","unstructured":"Dlamini I. Taute B. and Radebe J. 2011. Framework for an African policy towards creating cyber security awareness.  Dlamini I. Taute B. and Radebe J. 2011. Framework for an African policy towards creating cyber security awareness."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.005"},{"first-page":"600","volume-title":"Springer","author":"Blythe J. M.","key":"e_1_3_2_1_10_1"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.18489\/sacj.v52i0.201"},{"key":"e_1_3_2_1_12_1","unstructured":"National Initiative for Cybersecurity Education 2015-last update The National Initiative for Cybersecurity Education (NICE). Available: http:\/\/csrc.nist.gov\/nice\/awareness.html [8\/20\/2015 2015].  National Initiative for Cybersecurity Education 2015-last update The National Initiative for Cybersecurity Education (NICE). Available: http:\/\/csrc.nist.gov\/nice\/awareness.html [8\/20\/2015 2015]."},{"key":"e_1_3_2_1_13_1","unstructured":"UK Government Cabinet Office 2013-last update Protecting and promoting the UK in a digital world: 2 years on. Available: https:\/\/www.gov.uk\/government\/news\/protecting-and-promoting-the-uk-in-a-digital-world-2-years-on [08\/20 2015].  UK Government Cabinet Office 2013-last update Protecting and promoting the UK in a digital world: 2 years on. Available: https:\/\/www.gov.uk\/government\/news\/protecting-and-promoting-the-uk-in-a-digital-world-2-years-on [08\/20 2015]."},{"key":"e_1_3_2_1_14_1","unstructured":"Internet Live Stats 2015-last update Number of Internet Users (2015) - Internet Live Stats. Available: http:\/\/www.internetlivestats.com\/internet-users\/#byregion [8\/24\/2015 2015]  Internet Live Stats 2015-last update Number of Internet Users (2015) - Internet Live Stats. Available: http:\/\/www.internetlivestats.com\/internet-users\/#byregion [8\/24\/2015 2015]"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCIA.2013.6725324"},{"volume-title":"SQM (Software Quality Management) and INSPIRE (International conference for Process Improvement, Research and Education) Conference, 30th","year":"2015","author":"Adelola T.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","unstructured":"CSEAN 2015-last update About CSEAN. Available: http:\/\/csean.org.ng\/about-csean\/ [8\/24\/2015 2015].  CSEAN 2015-last update About CSEAN. Available: http:\/\/csean.org.ng\/about-csean\/ [8\/24\/2015 2015]."},{"key":"e_1_3_2_1_18_1","unstructured":"Oludare R. 2015-last update CSEAN kicks off cyber security awareness campaign expansion | The Guardian Nigeria. Available: http:\/\/www.ngrguardiannews.com\/2015\/07\/csean-kicks-off-cyber-security-awareness-campaign-expansion\/ [8\/24\/2015 2015].  Oludare R. 2015-last update CSEAN kicks off cyber security awareness campaign expansion | The Guardian Nigeria. Available: http:\/\/www.ngrguardiannews.com\/2015\/07\/csean-kicks-off-cyber-security-awareness-campaign-expansion\/ [8\/24\/2015 2015]."},{"key":"e_1_3_2_1_19_1","unstructured":"ngCert 2014-last update ngCert About. Available: https:\/\/www.cert.gov.ng\/about [08\/24\/2014 2015].  ngCert 2014-last update ngCert About. Available: https:\/\/www.cert.gov.ng\/about [08\/24\/2014 2015]."},{"key":"e_1_3_2_1_20_1","unstructured":"Information Commissioner's Office For the public [Homepage of Information Commissioner's Office] [Online]. Available: https:\/\/ico.org.uk\/for-the-public\/ [09\/07 2015].  Information Commissioner's Office For the public [Homepage of Information Commissioner's Office] [Online]. Available: https:\/\/ico.org.uk\/for-the-public\/ [09\/07 2015]."},{"key":"e_1_3_2_1_21_1","unstructured":"Central Intelligence Agency 2015-last update The world fact book. Available: https:\/\/www.cia.gov\/library\/publications\/resources\/the-world-factbook\/geos\/ni.html [08\/25 2015].  Central Intelligence Agency 2015-last update The world fact book. Available: https:\/\/www.cia.gov\/library\/publications\/resources\/the-world-factbook\/geos\/ni.html [08\/25 2015]."},{"key":"e_1_3_2_1_22_1","first-page":"5","volume":"2","author":"Adelola T.","year":"2014","journal-title":"Regulation"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/219663.219683"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Wilson M. and Hash J. 2003. Building an information technology security awareness and training program. NIST Special publication 800 pp. 50.  Wilson M. and Hash J. 2003. Building an information technology security awareness and training program. NIST Special publication 800 pp. 50.","DOI":"10.6028\/NIST.SP.800-50"},{"key":"e_1_3_2_1_25_1","unstructured":"HM Government 2013-last update Guiding Principles on Cyber Security. Available: https:\/\/www.gov.uk\/government\/publications\/cyber-security-guiding-principles [08\/25 2015].  HM Government 2013-last update Guiding Principles on Cyber Security. Available: https:\/\/www.gov.uk\/government\/publications\/cyber-security-guiding-principles [08\/25 2015]."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1027802.1027882"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2538862.2538990"},{"key":"e_1_3_2_1_28_1","unstructured":"Stop Think Connect 2015 Last update Keeping the web a safer place for everyone. Available: https:\/\/stopthinkconnect.org [8\/24\/2015 2015].  Stop Think Connect 2015 Last update Keeping the web a safer place for everyone. Available: https:\/\/stopthinkconnect.org [8\/24\/2015 2015]."}],"event":{"name":"iiWAS '15: The 17th International Conference on Information Integration and Web-based Application & Services","acronym":"iiWAS '15","location":"Brussels Belgium"},"container-title":["Proceedings of the 17th International Conference on Information Integration and Web-based Applications &amp; Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2837185.2837237","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2837185.2837237","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:21Z","timestamp":1750225701000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2837185.2837237"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,11]]},"references-count":28,"alternative-id":["10.1145\/2837185.2837237","10.1145\/2837185"],"URL":"https:\/\/doi.org\/10.1145\/2837185.2837237","relation":{},"subject":[],"published":{"date-parts":[[2015,12,11]]},"assertion":[{"value":"2015-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}