{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:14:05Z","timestamp":1729678445721,"version":"3.28.0"},"reference-count":40,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.23919\/icitst.2017.8356359","type":"proceedings-article","created":{"date-parts":[[2018,5,10]],"date-time":"2018-05-10T19:01:01Z","timestamp":1525978861000},"page":"116-122","source":"Crossref","is-referenced-by-count":3,"title":["An analysis of home user security awareness &amp; education"],"prefix":"10.23919","author":[{"given":"Fayez","family":"Alotaibi","sequence":"first","affiliation":[]},{"given":"Nathan","family":"Clarke","sequence":"additional","affiliation":[]},{"given":"Steven","family":"Furnell","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"1","article-title":"Low User Awareness Against Social Malware: An Empirical Study and Design of a Security Awareness Application","author":"karavaras","year":"2016","journal-title":"13th Eur Mediterr Middle East Conf Inf Syst (EMCIS 2016)"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1109\/IMCTL.2015.7359553"},{"year":"2014","author":"cetto","journal-title":"Friend Inspector A Serious Game to Enhance Privacy Awareness in Social Networks","key":"ref33"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1007\/978-3-642-39377-8_7"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.3844\/jcssp.2013.159.168"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1007\/978-3-642-39377-8_29"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1109\/IMCTL.2015.7359553"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1109\/HICSS.2015.670"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/CCAA.2015.7148381"},{"key":"ref34","first-page":"104","article-title":"Design and Field Evaluation of Pass Sec: Raising and Sustaining Web Surfer Risk Awareness","author":"volkamer","year":"2015","journal-title":"Trust and Trustworthy Computing 8th International Conference TRUST 2015"},{"year":"2016","journal-title":"National Cyber Security Alliance | StaySafeOnline org","key":"ref10"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1109\/SP.2012.23"},{"year":"2016","journal-title":"Online Safety-YouthSpark Hub","key":"ref11"},{"year":"2016","journal-title":"Google Safety Centre","key":"ref12"},{"year":"2016","journal-title":"Norton Security Center A Complete Online Security Resource","key":"ref13"},{"year":"2016","journal-title":"UK Safer Internet Centre","key":"ref14"},{"year":"2016","journal-title":"Information Advice and Support to Keep Children Safe Online","key":"ref15"},{"year":"2016","journal-title":"Childnet International","key":"ref16"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1016\/j.cose.2010.08.001"},{"key":"ref18","first-page":"163","article-title":"Towards an automated security awareness system in a virtualized environment","author":"labuschagne","year":"2012","journal-title":"11 th European Conference on Information Warfare and Security 2012 ECIW 2012"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ICITST.2009.5402560"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1007\/978-3-642-40779-6_14"},{"year":"2015","author":"taylo","journal-title":"Biggest cybersecurity threats in 2016","key":"ref4"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1007\/978-3-642-33448-1_36"},{"year":"2015","journal-title":"Adults Media Use and Attitudes","key":"ref3"},{"year":"2011","journal-title":"2011 NCSA \/ McAfee Internet Home Users Survey","key":"ref6"},{"key":"ref29","first-page":"65","article-title":"No Educating Children about Internet Safety through Digital Game Based Learning","volume":"1","author":"juhari","year":"2013","journal-title":"Int J Interact Digit Media"},{"year":"2016","journal-title":"2016 Internet Security Threat Report","key":"ref5"},{"key":"ref8","first-page":"217","article-title":"Study of internet security threats among home users","author":"rao","year":"2012","journal-title":"2012 Fourth Int Conf Comput Asp Soc Networks"},{"year":"2013","journal-title":"2013 NATIONAL ONLINE SAFETY STUDY","key":"ref7"},{"year":"2016","journal-title":"Future 2020 | Internet use reaches 5 billion worldwide","key":"ref2"},{"year":"2016","journal-title":"Get Safe Online | Free online security advice","key":"ref9"},{"year":"2016","journal-title":"Number of internet users worldwide 2005-2016 | Statista","key":"ref1"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1108\/09685221011048346"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/ICSMC.2011.6083845"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1016\/j.cose.2010.08.001"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1109\/i-Society18435.2011.5978543","article-title":"Design a mobile game for home computer users to prevent from phishing attacks","author":"arachchilage","year":"2011","journal-title":"Int Conf Inf Soc (i-Society 2011)"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/2078827.2078830"},{"key":"ref26","first-page":"19","article-title":"Web-based risk analysis for home users","author":"magaya","year":"2012","journal-title":"Proc 10th Aust Inf Secur Manag Conf AISM 2012"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/ISSA.2011.6027538"}],"event":{"name":"2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)","start":{"date-parts":[[2017,12,11]]},"location":"Cambridge","end":{"date-parts":[[2017,12,14]]}},"container-title":["2017 12th International Conference for Internet Technology and Secured Transactions (ICITST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8354335\/8356324\/08356359.pdf?arnumber=8356359","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,1]],"date-time":"2020-11-01T16:20:18Z","timestamp":1604247618000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8356359\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":40,"URL":"https:\/\/doi.org\/10.23919\/icitst.2017.8356359","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}