{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T14:01:25Z","timestamp":1772200885209,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,6]],"date-time":"2023-12-06T00:00:00Z","timestamp":1701820800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,6]]},"DOI":"10.1145\/3628454.3629472","type":"proceedings-article","created":{"date-parts":[[2023,11,28]],"date-time":"2023-11-28T19:43:41Z","timestamp":1701200621000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Enhancing Cybersecurity Resilience: A Comprehensive Analysis of Human Factors and Security Practices Aligned with the NIST Cybersecurity Framework"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9722-7185","authenticated-orcid":false,"given":"Rohani","family":"Rohan","sequence":"first","affiliation":[{"name":"King Mongkut's University of Technology Thonburi, Thailand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2238-4290","authenticated-orcid":false,"given":"Borworn","family":"Papasratorn","sequence":"additional","affiliation":[{"name":"King Mongkut's University of Technology Thonburi, Thailand"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-8460-559X","authenticated-orcid":false,"given":"Wichian","family":"Chutimaskul","sequence":"additional","affiliation":[{"name":"King Mongkut's University of Technology Thonburi, Thailand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0519-5594","authenticated-orcid":false,"given":"Jari","family":"Hautam\u00e4ki","sequence":"additional","affiliation":[{"name":"JAMK University of Applied Sciences, Finland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0352-8647","authenticated-orcid":false,"given":"Suree","family":"Funilkul","sequence":"additional","affiliation":[{"name":"King Mongkut's University of Technology Thonburi, Thailand"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7305-1015","authenticated-orcid":false,"given":"Debajyoti","family":"Pal","sequence":"additional","affiliation":[{"name":"King Mongkut's University of Technology Thonburi, Thailand"}]}],"member":"320","published-online":{"date-parts":[[2023,12,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10257-022-00575-2"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2022.107376"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2023.107702"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111519"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/bdcc7020073"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2023.102258"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2022.2101160"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2015.1028448"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1037\/e578902012-242"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apgeog.2016.12.015"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-021-10806-7"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3469886"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","unstructured":"N'guessan Yves Roland Douha Karen Renaud Yuzo Taenaka and Youki Kadobayashi. 2023. Smart home cybersecurity awareness and behavioral incentives. Inf. Comput. Secur. (2023). DOI:https:\/\/doi.org\/10.1108\/ICS-03-2023-0032","DOI":"10.1108\/ICS-03-2023-0032"},{"key":"e_1_3_2_1_14_1","volume-title":"The new users","author":"ENISA.","year":"2010","unstructured":"ENISA. 2010. The new users \u2019 guide: Inf. Secur. (2010). Retrieved from https:\/\/www.enisa.europa.eu\/publications\/archive\/copy_of_new-users-guide"},{"key":"e_1_3_2_1_15_1","volume-title":"Information security awareness initiatives: Current practice and the measurement of success. July","author":"European Network and Information Security Agency (ENISA) and ENISA. 2007.","year":"2007","unstructured":"European Network and Information Security Agency (ENISA) and ENISA. 2007. Information security awareness initiatives: Current practice and the measurement of success. July (2007), 24."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2017.e00346"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.12.003"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-022-11121-5"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-022-11121-5"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIC48465.2019.00047"},{"key":"e_1_3_2_1_21_1","first-page":"5","article-title":"A toolkit approach to information security awareness and education","volume":"2017","author":"Korovessis Peter","year":"2017","unstructured":"Peter Korovessis, Steven Furnell, Maria Papadaki, and Paul Haskell-Dowland. 2017. A toolkit approach to information security awareness and education. J. Cybersecurity Educ. Res. Pract. 2017, 2 (2017), 5.","journal-title":"J. Cybersecurity Educ. Res. Pract."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.3390\/su15043814"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/08874417.2022.2031347"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.25300\/misq\/2022\/15713"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.25147\/ijcsr.2017.001.1.123"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.techsoc.2021.101823"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21155119"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.3390\/s21155119"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103266"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.01.004"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.01.004"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2013.12.003"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600160.3605072"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10111-021-00683-y"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3590777.3590802"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468784.3468789"},{"key":"e_1_3_2_1_37_1","unstructured":"Richard Siedzik. 2014. Implementing the NIST Cybersecurity Framework. Retrieved from https:\/\/www.isaca.org\/cyber"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/KST57286.2023.10086884"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Rohani Rohan Suree Funilkul Debajyoti Pal and Wichian Chutimaskul. 2021. Understanding of Human Factors in Cybersecurity: A Systematic Literature Review. (2021) 133\u2013140.","DOI":"10.1109\/ComPE53109.2021.9752358"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2021.3095385"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.heliyon.2023.e14234"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.3390\/su15076019"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.3390\/jcp2030029"},{"key":"e_1_3_2_1_44_1","volume-title":"an information security survival kit. In","author":"Security Baseline COBIT","year":"2007","unstructured":"COBIT Security Baseline: an information security survival kit. In (2nd ed.). IT Governance Institute 2nd edition, 2007. Retrieved from www.itgi.org","edition":"2"},{"key":"e_1_3_2_1_45_1","volume-title":"Special Publication 800-16.","author":"Security Training Requirements Information Technology","year":"1998","unstructured":"Information Technology Security Training Requirements: A Role- and Performance-Based Model, Special Publication 800-16. . National Institute of Standards and Technology (NIST) (1998). Retrieved from http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-16\/800-%0A16.pdffile:\/\/\/C:\/Users\/Rohani Rohan\/Downloads\/Protection Motivation Theory.pdf"}],"event":{"name":"IAIT 2023: 13th International Conference on Advances in Information Technology","location":"Bangkok Thailand","acronym":"IAIT 2023"},"container-title":["Proceedings of the 13th International Conference on Advances in Information Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3628454.3629472","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3628454.3629472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T23:45:39Z","timestamp":1755906339000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3628454.3629472"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,6]]},"references-count":45,"alternative-id":["10.1145\/3628454.3629472","10.1145\/3628454"],"URL":"https:\/\/doi.org\/10.1145\/3628454.3629472","relation":{},"subject":[],"published":{"date-parts":[[2023,12,6]]},"assertion":[{"value":"2023-12-06","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}