{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T04:09:12Z","timestamp":1751256552037,"version":"3.41.0"},"reference-count":138,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"abstract":"<jats:p>This article describes how as access to the Internet has increased, cybersecurity has become important, with businesses and the government spending much time and resources to combat cyber attacks. The purpose of this article was to review the existing literature related to cybersecurity. Specifically, the review synthesizes the empirical research in (1) various types of cyber attacks, (2) contributing factors related to cybersecurity behavior, and (3) strategi to improve cybersecurity behavior. The most developed line of research in this area has been focusing on the strategies to improve cybersecurity behavior, showing a questionable trend of quickly creating solutions before fully conceptualizing the problem.<\/jats:p>","DOI":"10.4018\/ijcbpl.2017100106","type":"journal-article","created":{"date-parts":[[2018,1,29]],"date-time":"2018-01-29T14:28:40Z","timestamp":1517236120000},"page":"68-82","source":"Crossref","is-referenced-by-count":7,"title":["Cyber Attacks, Contributing Factors, and Tackling Strategies"],"prefix":"10.4018","volume":"7","author":[{"given":"Samantha","family":"Bordoff","sequence":"first","affiliation":[{"name":"University at Albany, SUNY, Albany, NY, USA"}]},{"given":"Quan","family":"Chen","sequence":"additional","affiliation":[{"name":"University at Albany, SUNY, Albany, NY, USA"}]},{"given":"Zheng","family":"Yan","sequence":"additional","affiliation":[{"name":"University at Albany, SUNY, Albany, NY, USA"}]}],"member":"2432","reference":[{"key":"IJCBPL.2017100106-0","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2012.708787"},{"key":"IJCBPL.2017100106-1","doi-asserted-by":"publisher","DOI":"10.4018\/jicte.2012040108"},{"issue":"1","key":"IJCBPL.2017100106-2","first-page":"72","article-title":"Student experiential learning of cyber security through virtualization.","volume":"7","author":"R. C.Anderson","year":"2014","journal-title":"Journal of Research in Innovative Teaching"},{"key":"IJCBPL.2017100106-3","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2006.00787.x"},{"key":"IJCBPL.2017100106-4","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.05.046"},{"key":"IJCBPL.2017100106-5","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2011.6"},{"issue":"1","key":"IJCBPL.2017100106-6","first-page":"46","article-title":"An analysis of the growth of computer and Internet security breaches.","volume":"12","author":"K.Bagchi","year":"2003","journal-title":"Communications of the Association for Information Systems"},{"issue":"6","key":"IJCBPL.2017100106-7","first-page":"34","article-title":"Managing the data loss crisis.","volume":"55","author":"D.Bartlett","year":"2008","journal-title":"Risk Management"},{"key":"IJCBPL.2017100106-8","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2009.09.001"},{"key":"IJCBPL.2017100106-9","doi-asserted-by":"publisher","DOI":"10.1002\/sys.20182"},{"key":"IJCBPL.2017100106-10","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.sj.8350047"},{"key":"IJCBPL.2017100106-11","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.01.039"},{"issue":"3","key":"IJCBPL.2017100106-12","first-page":"55","article-title":"Cybersecurity: Who\u2019s watching the store?","volume":"19","author":"B.Berkowitz","year":"2003","journal-title":"Issues in Science and Technology"},{"key":"IJCBPL.2017100106-13","doi-asserted-by":"publisher","DOI":"10.1177\/0967010613478323"},{"key":"IJCBPL.2017100106-14","doi-asserted-by":"publisher","DOI":"10.1007\/s10657-008-9053-y"},{"key":"IJCBPL.2017100106-15","doi-asserted-by":"crossref","unstructured":"Bojanc, & Jerman-Bla\u017ei\u010d, B. (2008). An economic modeling approach to information security risk management. International Journal of Information Management, 28(5), 413-422.","DOI":"10.1016\/j.ijinfomgt.2008.02.002"},{"key":"IJCBPL.2017100106-16","doi-asserted-by":"publisher","DOI":"10.1515\/jhsem-2012-0038"},{"key":"IJCBPL.2017100106-17","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2015\/v8i7\/67760"},{"key":"IJCBPL.2017100106-18","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2014.04.006"},{"key":"IJCBPL.2017100106-19","first-page":"653","article-title":"Building on executive order 13, 636 to encourage information sharing for cybersecurity purposes.","volume":"37","author":"J. J.Broggi","year":"2014","journal-title":"Harv. JL & Pub. Pol\u2019y"},{"key":"IJCBPL.2017100106-20","doi-asserted-by":"publisher","DOI":"10.2307\/25750690"},{"key":"IJCBPL.2017100106-21","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(13)70062-9"},{"key":"IJCBPL.2017100106-22","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2004.12.005"},{"key":"IJCBPL.2017100106-23","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2006.10855789"},{"key":"IJCBPL.2017100106-24","doi-asserted-by":"publisher","DOI":"10.1080\/1057610X.2013.813273"},{"key":"IJCBPL.2017100106-25","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2013.10.005"},{"key":"IJCBPL.2017100106-26","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-014-9551-y"},{"key":"IJCBPL.2017100106-27","first-page":"27","article-title":"Cybersecurity strategy: A primer for policy makers and those on the front line.","volume":"4","author":"S. R.Chabinsky","year":"2010","journal-title":"J. Nat\u2019l Sec. L. & Pol\u2019y"},{"key":"IJCBPL.2017100106-28","article-title":"Security enhancement for smartphone using biometrics in cyber-physical systems.","author":"S. H.Chae","year":"2014","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"IJCBPL.2017100106-29","doi-asserted-by":"publisher","DOI":"10.1080\/01449290601156817"},{"key":"IJCBPL.2017100106-30","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-013-0266-3"},{"journal-title":"At the Nexus of Cybersecurity and Public Policy: Some Basic Concepts and Issues","year":"2014","author":"D.Clark","key":"IJCBPL.2017100106-31"},{"key":"IJCBPL.2017100106-32","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.83"},{"key":"IJCBPL.2017100106-33","doi-asserted-by":"publisher","DOI":"10.1007\/s10669-013-9484-z"},{"journal-title":"Cybersecurity Today and Tomorrow: Pay Now or Pay Later","year":"2002","key":"IJCBPL.2017100106-34"},{"key":"IJCBPL.2017100106-35","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2006.10.005"},{"key":"IJCBPL.2017100106-36","doi-asserted-by":"publisher","DOI":"10.2345\/0899-8205-48.s1.26"},{"key":"IJCBPL.2017100106-37","doi-asserted-by":"publisher","DOI":"10.1016\/S1071-5819(03)00041-7"},{"key":"IJCBPL.2017100106-38","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222310210"},{"key":"IJCBPL.2017100106-39","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.108"},{"key":"IJCBPL.2017100106-40","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.17"},{"key":"IJCBPL.2017100106-41","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.10.003"},{"key":"IJCBPL.2017100106-42","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2009.01245.x"},{"key":"IJCBPL.2017100106-43","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(15)70007-3"},{"key":"IJCBPL.2017100106-44","first-page":"58","article-title":"Cybersecurity in the private sector.","author":"A.Etzioni","year":"2011","journal-title":"Issues in Science and Technology"},{"key":"IJCBPL.2017100106-45","doi-asserted-by":"crossref","unstructured":"Farber, D. (2003). Fame, but no riches, for cybersecurity. Spectrum, 40(1), 51-52.","DOI":"10.1109\/MSPEC.2003.1159731"},{"key":"IJCBPL.2017100106-46","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(07)70117-3"},{"key":"IJCBPL.2017100106-47","doi-asserted-by":"publisher","DOI":"10.1145\/2508701"},{"issue":"2","key":"IJCBPL.2017100106-48","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MSP.2011.180","article-title":"Basing cybersecurity training on user perceptions.","author":"S. M.Furman","year":"2011","journal-title":"IEEE Security and Privacy"},{"key":"IJCBPL.2017100106-49","doi-asserted-by":"publisher","DOI":"10.1287\/isre.1050.0053"},{"key":"IJCBPL.2017100106-50","doi-asserted-by":"publisher","DOI":"10.2214\/AJR.12.9651"},{"key":"IJCBPL.2017100106-51","unstructured":"Gewirtz, D. (2011). When it comes to cyber-attack, does the left prefer cyberattack and the right cyber attack? Zdnet.com. Retrieved from http:\/\/www.zdnet.com\/article\/when-it-comes-to-cyber-attack-does-the-left-prefer-cyberattack-and-the-right-cyber-attack\/"},{"key":"IJCBPL.2017100106-52","doi-asserted-by":"publisher","DOI":"10.1016\/j.jaccpubpol.2015.05.001"},{"key":"IJCBPL.2017100106-53","first-page":"103","article-title":"Will there be cybersecurity legislation.","volume":"4","author":"J.Grant","year":"2010","journal-title":"J. Nat\u2019l Sec. L. & Pol\u2019y"},{"key":"IJCBPL.2017100106-54","doi-asserted-by":"publisher","DOI":"10.1080\/03601270903183065"},{"key":"IJCBPL.2017100106-55","doi-asserted-by":"publisher","DOI":"10.2202\/1547-7355.1426"},{"key":"IJCBPL.2017100106-56","doi-asserted-by":"publisher","DOI":"10.1089\/tmj.2012.0022"},{"key":"IJCBPL.2017100106-57","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2014.974429"},{"key":"IJCBPL.2017100106-58","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2013.21"},{"key":"IJCBPL.2017100106-59","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2012.00420.x"},{"issue":"1-2","key":"IJCBPL.2017100106-60","first-page":"2","article-title":"Control mechanisms in information security: A principal agent perspective.","volume":"5","author":"T.Herath","year":"2009","journal-title":"International Journal of Business Governance and Ethics"},{"key":"IJCBPL.2017100106-61","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2013.25"},{"key":"IJCBPL.2017100106-62","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.181"},{"key":"IJCBPL.2017100106-63","doi-asserted-by":"publisher","DOI":"10.1111\/exsy.12039"},{"key":"IJCBPL.2017100106-64","doi-asserted-by":"crossref","unstructured":"Hsu, C., Lee, J. N., & Straub, D. W. (2012). Institutional influences on information systems security innovations. Information systems research, 23(3 Part 2), 918-939.","DOI":"10.1287\/isre.1110.0393"},{"key":"IJCBPL.2017100106-65","doi-asserted-by":"publisher","DOI":"10.1080\/01449290701679361"},{"key":"IJCBPL.2017100106-66","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2011.07.007"},{"key":"IJCBPL.2017100106-67","doi-asserted-by":"publisher","DOI":"10.1177\/1748895812448086"},{"key":"IJCBPL.2017100106-68","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2014.934286"},{"key":"IJCBPL.2017100106-69","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.02.005"},{"key":"IJCBPL.2017100106-70","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2011.632650"},{"key":"IJCBPL.2017100106-71","doi-asserted-by":"publisher","DOI":"10.1080\/02681102.2013.814040"},{"key":"IJCBPL.2017100106-72","first-page":"1663","article-title":"Investing in a centralized cybersecurity infrastructure: Why hacktivism can and should influence cybersecurity reform.","volume":"92","author":"B. B.Kelly","year":"2012","journal-title":"BUL Rev."},{"key":"IJCBPL.2017100106-73","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2013.24"},{"key":"IJCBPL.2017100106-74","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.08.006"},{"key":"IJCBPL.2017100106-75","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.08.001"},{"key":"IJCBPL.2017100106-76","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.06.010"},{"key":"IJCBPL.2017100106-77","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12037"},{"key":"IJCBPL.2017100106-78","doi-asserted-by":"publisher","DOI":"10.1111\/isj.12063"},{"key":"IJCBPL.2017100106-79","doi-asserted-by":"crossref","unstructured":"Luiijf, E., Besseling, K., & De Graaf, P. (2013). Nineteen national cyber security strategies. International Journal of Critical Infrastructures 6, 9(1-2), 3-31.","DOI":"10.1504\/IJCIS.2013.051608"},{"key":"IJCBPL.2017100106-80","doi-asserted-by":"publisher","DOI":"10.1016\/S1754-4548(10)70090-5"},{"key":"IJCBPL.2017100106-81","doi-asserted-by":"publisher","DOI":"10.1111\/1745-9125.12028"},{"key":"IJCBPL.2017100106-82","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(14)70049-2"},{"issue":"2","key":"IJCBPL.2017100106-83","doi-asserted-by":"crossref","first-page":"103","DOI":"10.69554\/FARC5224","article-title":"Cyber security: A critical examination of information sharing versus data sensitivity issues for organisations at risk of cyber attack.","volume":"7","author":"J.Mallinder","year":"2014","journal-title":"Journal of Business Continuity & Emergency Planning"},{"key":"IJCBPL.2017100106-84","doi-asserted-by":"publisher","DOI":"10.1016\/S0267-3649(04)00021-4"},{"key":"IJCBPL.2017100106-85","doi-asserted-by":"publisher","DOI":"10.1057\/cpcs.2012.4"},{"key":"IJCBPL.2017100106-86","doi-asserted-by":"publisher","DOI":"10.1080\/10911359.2013.775040"},{"key":"IJCBPL.2017100106-87","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2014.224"},{"key":"IJCBPL.2017100106-88","doi-asserted-by":"publisher","DOI":"10.1080\/01402390.2012.742013"},{"key":"IJCBPL.2017100106-89","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.23"},{"key":"IJCBPL.2017100106-90","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.09.014"},{"key":"IJCBPL.2017100106-91","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2013.04.004"},{"key":"IJCBPL.2017100106-92","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2008.11.010"},{"key":"IJCBPL.2017100106-93","doi-asserted-by":"publisher","DOI":"10.1515\/jhsem-2014-0031"},{"key":"IJCBPL.2017100106-94","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2009.05.009"},{"key":"IJCBPL.2017100106-95","doi-asserted-by":"publisher","DOI":"10.1145\/1538788.1538820"},{"key":"IJCBPL.2017100106-96","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.73"},{"key":"IJCBPL.2017100106-97","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMp1404358"},{"key":"IJCBPL.2017100106-98","doi-asserted-by":"publisher","DOI":"10.1038\/4641260a"},{"key":"IJCBPL.2017100106-99","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2011.12.010"},{"key":"IJCBPL.2017100106-100","doi-asserted-by":"publisher","DOI":"10.1177\/002070201206700111"},{"key":"IJCBPL.2017100106-101","doi-asserted-by":"crossref","unstructured":"Proctor, R. W., & Chen, J. (2015). The role of human factors\/ergonomics in the science of security decision making and action selection in cyberspace. Human Factors: The Journal of the Human Factors and Ergonomics Society.","DOI":"10.1177\/0018720815585906"},{"key":"IJCBPL.2017100106-102","doi-asserted-by":"publisher","DOI":"10.1016\/j.giq.2015.02.001"},{"key":"IJCBPL.2017100106-103","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.02.013"},{"key":"IJCBPL.2017100106-104","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2013.20"},{"key":"IJCBPL.2017100106-105","doi-asserted-by":"publisher","DOI":"10.2345\/0899-8205-49.3.197"},{"key":"IJCBPL.2017100106-106","doi-asserted-by":"publisher","DOI":"10.1007\/s10669-013-9473-2"},{"key":"IJCBPL.2017100106-107","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.98"},{"key":"IJCBPL.2017100106-108","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2010.11.013"},{"key":"IJCBPL.2017100106-109","doi-asserted-by":"publisher","DOI":"10.4018\/ijkm.2014040105"},{"key":"IJCBPL.2017100106-110","doi-asserted-by":"publisher","DOI":"10.1126\/science.1224321"},{"key":"IJCBPL.2017100106-111","doi-asserted-by":"publisher","DOI":"10.18352\/ijc.343"},{"key":"IJCBPL.2017100106-112","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.01.046"},{"key":"IJCBPL.2017100106-113","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2014.10.006"},{"key":"IJCBPL.2017100106-114","doi-asserted-by":"publisher","DOI":"10.1080\/15536548.2012.10845664"},{"key":"IJCBPL.2017100106-115","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2015.04.011"},{"key":"IJCBPL.2017100106-116","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.07.001"},{"key":"IJCBPL.2017100106-117","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(14)70556-1"},{"key":"IJCBPL.2017100106-118","doi-asserted-by":"publisher","DOI":"10.1080\/01449290903121386"},{"key":"IJCBPL.2017100106-119","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2013.05.010"},{"key":"IJCBPL.2017100106-120","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.04.068"},{"issue":"8","key":"IJCBPL.2017100106-121","first-page":"18","article-title":"Taking Cybersecurity Seriously.","volume":"60","author":"H.Tuttle","year":"2013","journal-title":"Risk Management"},{"key":"IJCBPL.2017100106-122","unstructured":"United States Office of the White House (USOWH). (2009). Cyberspace policy review: Assuring a trusted and resilient information and communications infrastructure. Retrieved from https:\/\/www.whitehouse.gov\/assets\/documents\/Cyberspace_Policy_Review_final.pdf"},{"key":"IJCBPL.2017100106-123","unstructured":"U.S. Executive Office of the President (USEOP). (2010). The comprehensive national cybersecurity initiative. Retrieved from https:\/\/www.whitehouse.gov\/issues\/foreign-policy\/cybersecurity\/national-initiative"},{"key":"IJCBPL.2017100106-124","unstructured":"U.S. Executive Office of the President (USEOP). (2011) Trustworthy cyberspace: Strategic plan for the federal cyber security research and development program. Retrieved from https:\/\/www.whitehouse.gov\/sites\/default\/files\/microsites\/ostp\/fed_cybersecurity_rd_strategic_plan_2011.pdf"},{"key":"IJCBPL.2017100106-125","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.04.058"},{"key":"IJCBPL.2017100106-126","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.04.002"},{"key":"IJCBPL.2017100106-127","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.03.002"},{"issue":"8","key":"IJCBPL.2017100106-128","doi-asserted-by":"crossref","first-page":"744","DOI":"10.1016\/j.ijhcs.2007.03.007","article-title":"Improving password security and memorability to protect personal and organizational information.","volume":"65","author":"K. P. L.Vu","year":"2007","journal-title":"International Journal of Human-Computer Studies"},{"key":"IJCBPL.2017100106-129","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2012.1"},{"issue":"7350","key":"IJCBPL.2017100106-130","first-page":"142","article-title":"Computer security: Is this the start of cyberwarfare?","volume":"474","author":"S.Weinberger","year":"2011","journal-title":"NATNews"},{"key":"IJCBPL.2017100106-131","doi-asserted-by":"publisher","DOI":"10.1145\/1330311.1330320"},{"key":"IJCBPL.2017100106-132","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2014.0179"},{"key":"IJCBPL.2017100106-133","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2014.1502"},{"key":"IJCBPL.2017100106-134","doi-asserted-by":"publisher","DOI":"10.1126\/science.327.5972.1451-a"},{"key":"IJCBPL.2017100106-135","doi-asserted-by":"publisher","DOI":"10.1126\/science.1181643"},{"key":"IJCBPL.2017100106-136","doi-asserted-by":"publisher","DOI":"10.1016\/j.apergo.2014.04.012"},{"key":"IJCBPL.2017100106-137","unstructured":"Younes, W. (2013). Cybersecurity Education Training and Awareness for K-12 Faculty and Staff in Allegheny County [Doctoral dissertation]. Robert Morris University."}],"container-title":["International Journal of Cyber Behavior, Psychology and Learning"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=198338","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,30]],"date-time":"2025-06-30T02:37:31Z","timestamp":1751251051000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJCBPL.2017100106"}},"subtitle":["The Current Status of the Science of Cybersecurity"],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":138,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.4018\/ijcbpl.2017100106","relation":{},"ISSN":["2155-7136","2155-7144"],"issn-type":[{"type":"print","value":"2155-7136"},{"type":"electronic","value":"2155-7144"}],"subject":[],"published":{"date-parts":[[2017,10]]}}}