{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T22:40:02Z","timestamp":1755902402851,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T00:00:00Z","timestamp":1726099200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ministry of Culture and Innovation of Hungary","award":["TKP2021-NKTA-51"],"award-info":[{"award-number":["TKP2021-NKTA-51"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,9,12]]},"DOI":"10.1145\/3670243.3670262","type":"proceedings-article","created":{"date-parts":[[2024,8,7]],"date-time":"2024-08-07T11:53:02Z","timestamp":1723031582000},"page":"195-202","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["The relationship between the dark triad personality and cybersecurity"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7308-9304","authenticated-orcid":false,"given":"Peter","family":"Banyasz","sequence":"first","affiliation":[{"name":"Department of Cybersecurity, Ludovika University of Public Service, Hungary"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-9920-2185","authenticated-orcid":false,"given":"Pal Karoly","family":"Laska","sequence":"additional","affiliation":[{"name":"Doctoral School of Military Engineering, Ludovika University of Public Service, Hungary"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7191-4924","authenticated-orcid":false,"given":"Tamas","family":"Szadeczky","sequence":"additional","affiliation":[{"name":"Department of Cybersecurity, Ludovika University of Public Service, Hungary"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-4824-0923","authenticated-orcid":false,"given":"Kincso Boroka","family":"Vaczi","sequence":"additional","affiliation":[{"name":"John Lukacs Institute for Strategy and Politics, Ludovika University of Public Service, Hungary"}]}],"member":"320","published-online":{"date-parts":[[2024,9,12]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1348\/135910704773891096"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1108\/AJIM-12-2019-0371"},{"key":"e_1_3_2_1_3_1","volume-title":"Network Software Security and User Incentives. Retrieved","author":"August Terrence","year":"2024","unstructured":"Terrence August and Tunay I. Tunca. 2004. Network Software Security and User Incentives. Retrieved April 27, 2024 from https:\/\/papers.ssrn.com\/abstract=1708220"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.paid.2017.12.018"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5897\/AJBM11.067"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.8"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"key":"e_1_3_2_1_8_1","volume-title":"Research Handbook on Political Propaganda","author":"Carroll David R.","year":"2024","unstructured":"David R. Carroll. 2021. Cambridge Analytica. In Research Handbook on Political Propaganda. Edward Elgar Publishing, 41\u201350. Retrieved April 27, 2024 from https:\/\/www.elgaronline.com\/edcollchap\/edcoll\/9781789906417\/9781789906417.00010.xml"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2018.8551371"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.05.037"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1070.0160"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022823221146"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.12.036"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2007.02.002"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2013.12.026"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2020.102498"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2009.01.001"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1146\/annurev-orgpsych-032117-104451"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/01421590802637941"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2016.11.065"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.10"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0040291"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2007.206"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0092-6566(02)00505-6"},{"key":"e_1_3_2_1_26_1","volume-title":"Excessive use of the Internet, life satisfaction and personality factors. Suvremena psihologija 15, 1 (July","author":"Raki\u0107-Baji\u0107 Gorana","year":"2012","unstructured":"Gorana Raki\u0107-Baji\u0107 and Vladimir Hedrih. 2012. Excessive use of the Internet, life satisfaction and personality factors. Suvremena psihologija 15, 1 (July 2012), 119\u2013130."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2751957.2751971"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1.3.255"},{"key":"e_1_3_2_1_29_1","unstructured":"J\u00f6rg Uffen Michael H. Breitner J\u00f6rg Uffen and Michael H. Breitner. 1AD. Management of Technical Security Measures: An Empirical Examination of Personality Traits and Behavioral Intentions. https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/978-1-4666-8111-8.ch039. Retrieved April 27 2024 from https:\/\/www.igi-global.com\/gateway\/chapter\/www.igi-global.com\/gateway\/chapter\/125323"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.03.001"}],"event":{"name":"CEEeGov 2024: Central and Eastern European eDem and eGov Days 2024","acronym":"CEEeGov 2024","location":"Budapest Hungary"},"container-title":["Proceedings of the Central and Eastern European eDem and eGov Days 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3670243.3670262","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3670243.3670262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T22:02:03Z","timestamp":1755900123000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3670243.3670262"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,12]]},"references-count":30,"alternative-id":["10.1145\/3670243.3670262","10.1145\/3670243"],"URL":"https:\/\/doi.org\/10.1145\/3670243.3670262","relation":{},"subject":[],"published":{"date-parts":[[2024,9,12]]},"assertion":[{"value":"2024-09-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}