{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T09:27:12Z","timestamp":1726133232601},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030831639"},{"type":"electronic","value":"9783030831646"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-83164-6_3","type":"book-chapter","created":{"date-parts":[[2021,8,15]],"date-time":"2021-08-15T23:03:01Z","timestamp":1629068581000},"page":"32-43","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Information Security Education and Self-perception of Privacy Protection Risk in Mobile Web in Obstetrics Students from Peru"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-9610-5573","authenticated-orcid":false,"given":"Augusto Felix","family":"Olaza-Magui\u00f1a","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4563-5427","authenticated-orcid":false,"given":"Yuliana Mercedes","family":"De La Cruz-Ramirez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,16]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"Trabelsi, Z., Zeidan, S., Saleous, H.: Teaching emerging DDoS attacks on firewalls: a case study of the blacknurse attack. In: 2019 IEEE Global Engineering Education Conference (EDUCON), Dubai, pp. 977\u2013985. IEEE (2019). https:\/\/doi.org\/10.1109\/EDUCON.2019.8725133","key":"3_CR1","DOI":"10.1109\/EDUCON.2019.8725133"},{"key":"3_CR2","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/978-3-030-00214-5_14","volume-title":"Recent Developments in Mechatronics and Intelligent Robotics","author":"S Guan","year":"2019","unstructured":"Guan, S., Zhang, H., Cao, G., Wang, X., Han, X.: The practice of the college students\u2019 network security quality education. In: Deng, K., Yu, Z., Patnaik, S., Wang, J. (eds.) ICMIR 2018. AISC, vol. 856, pp. 110\u2013114. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-00214-5_14"},{"key":"3_CR3","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1007\/978-3-319-69096-4_66","volume-title":"Advances in Intelligent Systems and Interactive Applications","author":"S Wang","year":"2018","unstructured":"Wang, S., Qu, Y., Zheng, L., Xiao, Y., Shi, H.: Exploration of information security education of university students. In: Xhafa, F., Patnaik, S., Zomaya, A.Y. (eds.) IISA 2017. AISC, vol. 686, pp. 476\u2013480. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-69096-4_66"},{"doi-asserted-by":"publisher","unstructured":"L\u00f8vgren, D., Li, J., Oyetoyan, T.: A data-driven security game to facilitate information security education. In: 2019 IEEE\/ACM 41st International Conference on Software Engineering: Companion Proceedings (ICSE-Companion), Montreal, pp. 256\u2013257. IEEE (2019). https:\/\/doi.org\/10.1109\/ICSE-Companion.2019.00102","key":"3_CR4","DOI":"10.1109\/ICSE-Companion.2019.00102"},{"issue":"10","key":"3_CR5","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1097\/CIN.0000000000000665","volume":"38","author":"K-Y Lin","year":"2020","unstructured":"Lin, K.-Y.: Application of a blended assessment strategy to enhance student interest and effectiveness in learning: case study with information security literacy. Comput. Inform. Nurs. 38(10), 508\u2013514 (2020). https:\/\/doi.org\/10.1097\/CIN.0000000000000665","journal-title":"Comput. Inform. Nurs."},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"101340","DOI":"10.1016\/j.cose.2018.05.003","volume":"87","author":"E Park","year":"2019","unstructured":"Park, E., Kim, J., Wile, L., Park, Y.: Factors affecting intention to disclose patients\u2019 health information. Comput. Secur. 87, 101340 (2019). https:\/\/doi.org\/10.1016\/j.cose.2018.05.003","journal-title":"Comput. Secur."},{"doi-asserted-by":"publisher","unstructured":"Adawiyah, R., Hidayanto, A., Chandra, I., Samik, R.: Identification of how health information security awareness (HISA) influence in patient\u2019 health information protection awareness (PHIPA). In: 2019 5th International Conference on Computing Engineering and Design (ICCED), Singapore, pp. 1\u20136. IEEE (2019). https:\/\/doi.org\/10.1109\/ICCED46541.2019.9161123","key":"3_CR7","DOI":"10.1109\/ICCED46541.2019.9161123"},{"issue":"3","key":"3_CR8","doi-asserted-by":"publisher","first-page":"206","DOI":"10.4258\/hir.2016.22.3.206","volume":"22","author":"Y Song","year":"2016","unstructured":"Song, Y., et al.: Revision of the measurement tool for patients\u2019 health information protection awareness. Healthc. Inf. Res. 22(3), 206\u2013216 (2016). https:\/\/doi.org\/10.4258\/hir.2016.22.3.206","journal-title":"Healthc. Inf. Res."},{"issue":"4","key":"3_CR9","doi-asserted-by":"publisher","first-page":"664","DOI":"10.3390\/SYM12040664","volume":"12","author":"R Kumar","year":"2020","unstructured":"Kumar, R., et al.: Fuzzy-based symmetrical multi-criteria decision-making procedure for evaluating the impact of harmful factors of healthcare information security. Symmetry 12(4), 664 (2020). https:\/\/doi.org\/10.3390\/SYM12040664","journal-title":"Symmetry"},{"key":"3_CR10","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.cose.2016.10.011","volume":"65","author":"E Park","year":"2017","unstructured":"Park, E., Kim, J., Park, Y.: The role of information security learning. Comput. Secur. 65, 64\u201376 (2017). https:\/\/doi.org\/10.1016\/j.cose.2016.10.011","journal-title":"Comput. Secur."},{"unstructured":"Esp\u00edritu, W., Machuca, C., Subauste, D.: Reference model for health data security management supported in a blockchain platform. In: VI Iberoamerican Conference of Computer Human Interaction, HCI 2020, Arequipa, pp. 185\u2013193. CEUR-WS (2020)","key":"3_CR11"},{"unstructured":"Instituto Nacional de Estad\u00edstica e Inform\u00e1tica: Encuesta nacional de hogares. INEI, Lima (2018)","key":"3_CR12"},{"unstructured":"World Medical Association. Declaration of Helsinki \u2013 Ethical principles for medical research involving human subjects. https:\/\/www.wma.net\/policies-post\/wma-declaration-of-helsinki-ethical-principles-for-medical-research-involving-human-subjects\/. Accessed 9 Jan 2021","key":"3_CR13"},{"key":"3_CR14","volume-title":"Security and Authentication: Perspectives, Management and Challenges","author":"O Song","year":"2017","unstructured":"Song, O., Connie, T., Sayeed, M.: Security and Authentication: Perspectives, Management and Challenges. Nova Science Publishers Inc., Melaka (2017)"},{"key":"3_CR15","doi-asserted-by":"publisher","first-page":"1002","DOI":"10.1007\/978-981-33-4572-0_144","volume-title":"Big Data Analytics for Cyber-Physical System in Smart City: BDCPS 2020, 28\u201329 December 2020, Shanghai, China","author":"J Qian","year":"2021","unstructured":"Qian, J.: Practice path and security mechanism of \u201cInternet\u2009+\u2009Education\u201d in the era of artificial intelligence. In: Atiquzzaman, M., Yen, N., Zheng, Xu. (eds.) Big Data Analytics for Cyber-Physical System in Smart City: BDCPS 2020, 28\u201329 December 2020, Shanghai, China, pp. 1002\u20131011. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-33-4572-0_144"},{"issue":"6","key":"3_CR16","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.1007\/s12553-020-00470-1","volume":"10","author":"E Maserat","year":"2020","unstructured":"Maserat, E., Jafari, F., Mohammadzadeh, Z., Alizadeh, M., Torkamannia, A.: COVID-19 & an NGO and university developed interactive portal: a perspective from Iran. Heal. Technol. 10(6), 1421\u20131426 (2020). https:\/\/doi.org\/10.1007\/s12553-020-00470-1","journal-title":"Heal. Technol."},{"issue":"1","key":"3_CR17","doi-asserted-by":"publisher","first-page":"73","DOI":"10.7739\/jkafn.2020.27.1.73","volume":"27","author":"K Cha","year":"2020","unstructured":"Cha, K., Song, Y.: Factors associated with practice of health information protection among nursing students. J. Korean Acad. Fundam. Nurs. 27(1), 73\u201380 (2020). https:\/\/doi.org\/10.7739\/jkafn.2020.27.1.73","journal-title":"J. Korean Acad. Fundam. Nurs."},{"issue":"4","key":"3_CR18","doi-asserted-by":"publisher","first-page":"169","DOI":"10.32744\/pse.2019.4.14","volume":"40","author":"M Bocharov","year":"2019","unstructured":"Bocharov, M., Simonova, I., Mogarov, M.: The effect of systematically teaching information security on the children\u2019s anxiety level. Perspektivy Nauki i Obrazovania 40(4), 169\u2013182 (2019). https:\/\/doi.org\/10.32744\/pse.2019.4.14","journal-title":"Perspektivy Nauki i Obrazovania"},{"unstructured":"Bocharov, M., Simonova, I., Bocharova, T., Zaika, A.: Information security education system in secondary school and assessment of the level of anxiety of schoolchildren. In: 17th International Conference on Cognition and Exploratory Learning in Digital Age, CELDA 2020, Lisbon, pp. 11\u201318. IADIS Press (2020)","key":"3_CR19"},{"doi-asserted-by":"publisher","unstructured":"Hanyu, L.: Research on data confidentiality and security of computer network password. J. Phys. Conf. Ser. 1648, 022078 (2020). https:\/\/doi.org\/10.1088\/1742-6596\/1648\/2\/022078","key":"3_CR20","DOI":"10.1088\/1742-6596\/1648\/2\/022078"},{"doi-asserted-by":"publisher","unstructured":"He, S., Fu, J., Chen, C., Guo, Z.: Research on password cracking technology based on improved transformer. J. Phys. Conf. Ser. 1631, 012161 (2020). https:\/\/doi.org\/10.1088\/1742-6596\/1631\/1\/012161","key":"3_CR21","DOI":"10.1088\/1742-6596\/1631\/1\/012161"},{"doi-asserted-by":"publisher","unstructured":"Walia, K., Shenoy, S., Cheng, Y.: An empirical analysis on the usability and security of passwords. In: 2020 IEEE 21st International Conference on Information Reuse and Integration for Data Science (IRI), Las Vegas, pp. 1\u20138. IEEE (2020). https:\/\/doi.org\/10.1109\/IRI49571.2020.00009","key":"3_CR22","DOI":"10.1109\/IRI49571.2020.00009"},{"doi-asserted-by":"publisher","unstructured":"Zhang, J., Li, W., Gong, L., Gu, Z., Wu, J.: Targeted malicious email detection using hypervisor-based dynamic analysis and ensemble learning. In: 2019 IEEE Global Communications Conference (GLOBECOM), Waikoloa, pp. 1\u20136. IEEE (2019). https:\/\/doi.org\/10.1109\/GLOBECOM38437.2019.9014069","key":"3_CR23","DOI":"10.1109\/GLOBECOM38437.2019.9014069"},{"key":"3_CR24","series-title":"Lecture Notes on Data Engineering and Communications Technologies","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1007\/978-3-030-32150-5_59","volume-title":"Emerging Trends in Computing and Expert Technology","author":"S Suresh","year":"2020","unstructured":"Suresh, S., Mohan, M., Thyagarajan, C., Kedar, R.: Detection of ransomware in emails through anomaly based detection. In: Hemanth, D.J., Kumar, V.D.A., Malathi, S., Castillo, O., Patrut, B. (eds.) COMET 2019. LNDECT, vol. 35, pp. 604\u2013613. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-32150-5_59"},{"key":"3_CR25","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1007\/978-3-319-23633-9_25","volume-title":"Medical Data Privacy Handbook","author":"D Liginlal","year":"2015","unstructured":"Liginlal, D.: HIPAA and human error: the role of enhanced situation awareness in protecting health information. In: Gkoulalas-Divanis, A., Loukides, G. (eds.) Medical Data Privacy Handbook, pp. 679\u2013696. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-23633-9_25"},{"issue":"6","key":"3_CR26","doi-asserted-by":"publisher","first-page":"5299","DOI":"10.1166\/asl.2017.7363","volume":"23","author":"A Mohamed","year":"2017","unstructured":"Mohamed, A., Chen, L.: Data privacy protection: a study on students awareness of personal data privacy protection in an e-health environment. Adv. Sci. Lett. 23(6), 5299\u20135303 (2017). https:\/\/doi.org\/10.1166\/asl.2017.7363","journal-title":"Adv. Sci. Lett."},{"key":"3_CR27","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1007\/978-3-662-48683-2_34","volume-title":"Applications and Techniques in Information Security","author":"Z Peng","year":"2015","unstructured":"Peng, Z., Feng, X., Tang, L., Zhai, M.: A data recovery method for NTFS files system. In: Niu, W., et al. (eds.) ATIS 2015. CCIS, vol. 557, pp. 379\u2013386. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-48683-2_34"},{"doi-asserted-by":"publisher","unstructured":"Gaidamakin, N., Gibilinda, R., Sinadskiy, N.: File operations information collecting software package used in the information security incidents investigation. In: 2020 Ural Symposium on Biomedical Engineering, Radioelectronics and Information Technology (USBEREIT), Yekaterinburg, pp. 559\u2013562. IEEE (2020). https:\/\/doi.org\/10.1109\/USBEREIT48449.2020.9117671.","key":"3_CR28","DOI":"10.1109\/USBEREIT48449.2020.9117671"},{"issue":"60","key":"3_CR29","doi-asserted-by":"publisher","first-page":"61","DOI":"10.3916\/C60-2019-06","volume":"27","author":"Y Chen","year":"2019","unstructured":"Chen, Y., Wen, C.: Taiwanese university students\u2019 smartphone use and the privacy paradox. Comunicar 27(60), 61\u201370 (2019). https:\/\/doi.org\/10.3916\/C60-2019-06","journal-title":"Comunicar"},{"unstructured":"Dogruel, L., J\u00f6ckel, S.: Risk perception and privacy regulation preferences from a cross-cultural perspective. A qualitative study among German and U.S. smartphone users. Int. J. Commun. 13, 1764\u20131783 (2019)","key":"3_CR30"},{"doi-asserted-by":"publisher","unstructured":"Bai, Y., Gao, C., Goda, B.: Lessons learned from teaching cybersecurity courses during Covid-19. In: Proceedings of the 21st Annual Conference on Information Technology Education, SIGITE 2020, New York, pp. 308\u2013313. Association for Computing Machinery (2020). https:\/\/doi.org\/10.1145\/3368308.3415394","key":"3_CR31","DOI":"10.1145\/3368308.3415394"},{"doi-asserted-by":"publisher","unstructured":"Parthasarathy, S., Murugesan, S.: Overnight transformation to online education due to the COVID-19 pandemic: lessons learned. eLearn 9(1) (2020). https:\/\/doi.org\/10.1145\/3424971.3421471","key":"3_CR32","DOI":"10.1145\/3424971.3421471"}],"container-title":["Lecture Notes in Computer Science","Mobile Web and Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-83164-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,15]],"date-time":"2021-08-15T23:04:30Z","timestamp":1629068670000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-83164-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030831639","9783030831646"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-83164-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"16 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiWIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile Web and Intelligent Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobiwis2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mobiwis.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}