{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T20:15:49Z","timestamp":1769199349230,"version":"3.49.0"},"reference-count":0,"publisher":"KSI Research Inc.","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,1]]},"DOI":"10.18293\/seke2022-059","type":"proceedings-article","created":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T03:29:03Z","timestamp":1662348543000},"page":"549-552","source":"Crossref","is-referenced-by-count":3,"title":["Paying Attention to the Insider Threat"],"prefix":"10.18293","volume":"2022","author":[{"given":"Eduardo","family":"Lopez","sequence":"first","affiliation":[]},{"given":"Kamran","family":"Sartipi","sequence":"additional","affiliation":[]}],"member":"7672","published-online":{"date-parts":[[2022,7,1]]},"event":{"name":"The 34th International Conference on Software Engineering and Knowledge Engineering","acronym":"SEKE2022"},"container-title":["International Conferences on Software Engineering and Knowledge Engineering","Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering"],"original-title":[],"deposited":{"date-parts":[[2022,9,11]],"date-time":"2022-09-11T00:48:53Z","timestamp":1662857333000},"score":1,"resource":{"primary":{"URL":"http:\/\/ksiresearchorg.ipage.com\/seke\/seke22paper\/paper059.pdf"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,1]]},"references-count":0,"URL":"https:\/\/doi.org\/10.18293\/seke2022-059","relation":{},"ISSN":["2325-9000"],"issn-type":[{"value":"2325-9000","type":"print"}],"subject":[],"published":{"date-parts":[[2022,7,1]]}}}