{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,17]],"date-time":"2026-01-17T02:24:34Z","timestamp":1768616674522,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,11]],"date-time":"2018-01-11T00:00:00Z","timestamp":1515628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,11]]},"DOI":"10.1145\/3183586.3183590","type":"proceedings-article","created":{"date-parts":[[2018,4,25]],"date-time":"2018-04-25T12:22:34Z","timestamp":1524658954000},"page":"85-87","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Fear of cybercrime and the compliance with information security policies"],"prefix":"10.1145","author":[{"given":"Jaffar Ahmad","family":"Alalwan","sequence":"first","affiliation":[{"name":"Institute of Public Administration, Dammam, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2018,1,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Ajzen I. \"The theory of planned behavior \" Organizational Behavior and Human Decision Processes 50X 1991 179--211  Ajzen I. \"The theory of planned behavior \" Organizational Behavior and Human Decision Processes 50X 1991 179--211","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"e_1_3_2_1_2_1","volume-title":"Cyber-Crime Fear and Victimization: An Analysis of a National Survey","author":"Alshalan A.","year":"2009","unstructured":"Alshalan , A. ( 2009 ). Cyber-Crime Fear and Victimization: An Analysis of a National Survey . Alshalan, A. (2009). Cyber-Crime Fear and Victimization: An Analysis of a National Survey."},{"key":"e_1_3_2_1_3_1","volume-title":"W. W. (1998) \"The partial least squares approach for structural equation modelling,\" In Modern Methods for Business Research (Ed, Marcoulides","author":"Saarbr\u00fccken","unstructured":"Saarbr\u00fccken : VDM Verlag Dr. M\u00fcller Chin , W. W. (1998) \"The partial least squares approach for structural equation modelling,\" In Modern Methods for Business Research (Ed, Marcoulides , G. A.) Lawrence Erlbaum Associates , Hillsdale , 295--336 Saarbr\u00fccken: VDM Verlag Dr. M\u00fcller Chin, W. W. (1998) \"The partial least squares approach for structural equation modelling,\" In Modern Methods for Business Research (Ed, Marcoulides, G. A.) Lawrence Erlbaum Associates, Hillsdale, 295--336"},{"key":"e_1_3_2_1_4_1","volume-title":"The measurement of fear of crime,\" Sociological Inquiry","author":"Ferraro K. F.","year":"1987","unstructured":"Ferraro , K. F. , & LaGrange , R. ( 1987 ). \" The measurement of fear of crime,\" Sociological Inquiry . Ferraro, K. F., & LaGrange, R. (1987). \"The measurement of fear of crime,\" Sociological Inquiry."},{"key":"e_1_3_2_1_5_1","volume-title":"Attitude, Intention and Behavior: An Introduction to Theory and Research, MA","author":"Fishbein M.","year":"1975","unstructured":"Fishbein , M. and Ajzen , I. , Belief , Attitude, Intention and Behavior: An Introduction to Theory and Research, MA , Addison-Wesley , 1975 Fishbein, M. and Ajzen, I., Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research, MA, Addison-Wesley, 1975"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0305-0483(00)00021-9"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azq066"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1177\/026975809600400201"},{"key":"e_1_3_2_1_10_1","volume-title":"The epidemiology of worry and generalized anxiety disorder,\" in G. C. L. Davey and A. Wells, eds, Worry and its Psychological Disorders: Theory, Assessment and Treatment","author":"Holaway R. M.","year":"2006","unstructured":"Holaway , R. M. , Rodebaugh , T. L. and Heimberg , R. G . ( 2006 ), \" The epidemiology of worry and generalized anxiety disorder,\" in G. C. L. Davey and A. Wells, eds, Worry and its Psychological Disorders: Theory, Assessment and Treatment , London : John Wiley & Sons Ltd . Holaway, R. M., Rodebaugh, T. L. and Heimberg, R. G. (2006), \"The epidemiology of worry and generalized anxiety disorder,\" in G. C. L. Davey and A. Wells, eds, Worry and its Psychological Disorders: Theory, Assessment and Treatment, London: John Wiley & Sons Ltd."},{"key":"e_1_3_2_1_11_1","unstructured":"Internet Compliant Center annual report available from: http:\/\/www.ic3.gov\/media\/annualreport\/2011_IC3Report.pdf  Internet Compliant Center annual report available from: http:\/\/www.ic3.gov\/media\/annualreport\/2011_IC3Report.pdf"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1093\/bjc\/azp059"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1080\/13501760500091737"},{"key":"e_1_3_2_1_14_1","volume-title":"Solms, Boston","author":"Siponen M. T.","year":"2007","unstructured":"Siponen , M. T. , Pahnila , S. , and Mahmood , A . 2007 . \"Employees' adherence to information security policies: An empirical study,\" in New Approaches for Security, Privacy and Trust in Complex Environments, H. Venter, M. Eloff, L. Labuschagne, J. Eloff, and R. von Solms, Boston : Springer , 133--144 Siponen, M. T., Pahnila, S., and Mahmood, A. 2007. \"Employees' adherence to information security policies: An empirical study,\" in New Approaches for Security, Privacy and Trust in Complex Environments, H. Venter, M. Eloff, L. Labuschagne, J. Eloff, and R. von Solms, Boston: Springer, 133--144"},{"key":"e_1_3_2_1_15_1","volume-title":"C. Pfeiffer & P","author":"Skogan W. G.","year":"1993","unstructured":"Skogan , W. G. ( 1993 ), \" The various meanings of fear,\" In W. Bilsky , C. Pfeiffer & P . Wetzels (eds.), The Fear of Crime and Criminal Victimization, Stuttgart : Enke Skogan, W. G. (1993), \"The various meanings of fear,\" In W. Bilsky, C. Pfeiffer & P. Wetzels (eds.), The Fear of Crime and Criminal Victimization, Stuttgart: Enke"},{"key":"e_1_3_2_1_16_1","volume-title":"Introduction-Cybercrime: Law enforcement, security and surveillance in the information age,\" In D. Thomas & B","author":"Thomas D.","year":"2000","unstructured":"Thomas , D. , & Loader , B. ( 2000 ). \" Introduction-Cybercrime: Law enforcement, security and surveillance in the information age,\" In D. Thomas & B . Loader (Eds.), Cybercrime : Law Enforcement, Security and Surveillance in the Information Age , London : Routledge Thomas, D., & Loader, B. (2000). \"Introduction-Cybercrime: Law enforcement, security and surveillance in the information age,\" In D. Thomas & B. Loader (Eds.), Cybercrime: Law Enforcement, Security and Surveillance in the Information Age, London: Routledge"},{"key":"e_1_3_2_1_17_1","first-page":"681","article-title":"Fear of victimization: Why are women and the elderly more afraid","volume":"65","author":"Warr M.","year":"1984","unstructured":"Warr , M. ( 1984 ), \" Fear of victimization: Why are women and the elderly more afraid ?\" Social Science Quarterly , 65 , 3, 681 -- 702 Warr, M. (1984), \"Fear of victimization: Why are women and the elderly more afraid?\" Social Science Quarterly, 65, 3, 681--702","journal-title":"Social Science Quarterly"}],"event":{"name":"IC4E 2018: 2018 9th International Conference on E-Education, E-Business, E-Management and E-Learning","location":"San Diego California","acronym":"IC4E 2018"},"container-title":["Proceedings of the 9th International Conference on E-Education, E-Business, E-Management and E-Learning"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3183586.3183590","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3183586.3183590","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:12Z","timestamp":1750208892000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3183586.3183590"}},"subtitle":["a theoretical study"],"short-title":[],"issued":{"date-parts":[[2018,1,11]]},"references-count":16,"alternative-id":["10.1145\/3183586.3183590","10.1145\/3183586"],"URL":"https:\/\/doi.org\/10.1145\/3183586.3183590","relation":{},"subject":[],"published":{"date-parts":[[2018,1,11]]},"assertion":[{"value":"2018-01-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}