{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T04:31:27Z","timestamp":1726374687697},"reference-count":16,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2021,1,22]],"date-time":"2021-01-22T00:00:00Z","timestamp":1611273600000},"content-version":"vor","delay-in-days":21,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Procedia Computer Science"],"published-print":{"date-parts":[[2021]]},"DOI":"10.1016\/j.procs.2021.01.118","type":"journal-article","created":{"date-parts":[[2021,2,23]],"date-time":"2021-02-23T01:54:31Z","timestamp":1614045271000},"page":"173-181","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":18,"special_numbering":"C","title":["Evaluating cybersecurity attitudes and behaviors in Portuguese healthcare institutions"],"prefix":"10.1016","volume":"181","author":[{"given":"Paulo","family":"Nunes","sequence":"first","affiliation":[]},{"given":"M\u00e1rio","family":"Antunes","sequence":"additional","affiliation":[]},{"given":"Carina","family":"Silva","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.procs.2021.01.118_bib1","unstructured":"James Scott. \u201cWhat the health sector needs to know about cryptocurrency technologies, blockchain and cryptojacking attacks\"; Available from: Institute for Critical Infrastructure Technology; May 2018; https:\/\/irishtechnews.ie\/what-the-health-sector-needs-to-know-about-cryptocurrency-technologies-blockchain-and-cryptojacking-attacks\/"},{"key":"10.1016\/j.procs.2021.01.118_bib2","doi-asserted-by":"crossref","first-page":"610","DOI":"10.24818\/jamis.2017.04009","article-title":"\"Exploring cybercrime-realities and challenges.\"","volume":"16.4","author":"Stanciu","year":"2017","journal-title":"Accounting and Management Information Systems"},{"key":"10.1016\/j.procs.2021.01.118_bib3","series-title":"Data Management, Analytics and Innovation","first-page":"403","article-title":"\"A Comprehensive Survey on Ransomware Attack: A Growing Havoc Cyberthreat.\"","author":"Tandon","year":"2019"},{"key":"10.1016\/j.procs.2021.01.118_bib4","first-page":"624","article-title":"\"A socio-technical approach to preventing, mitigating, and recovering from ransomware attacks.\"","volume":"7.02","author":"Sittig","year":"2016","journal-title":"Applied clinical informatics"},{"key":"10.1016\/j.procs.2021.01.118_bib5","unstructured":"Tara Seals; \u201c One Year After WannaCry: A Fundamentally Changed Threat Landscape\"; Available at https:\/\/threatpost.com\/one-year-after-wannacry-a-fundamentally-changed-threat-landscape\/132047\/"},{"issue":"7","key":"10.1016\/j.procs.2021.01.118_bib6","doi-asserted-by":"crossref","first-page":"e00346","DOI":"10.1016\/j.heliyon.2017.e00346","article-title":"\"Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours\"","volume":"3","author":"Hadlington","year":"2017","journal-title":"Heliyon."},{"key":"10.1016\/j.procs.2021.01.118_bib7","unstructured":"Henry Gleitman, James Gross, Daniel Reisberg; \u201cPsychology\"; 8th ed; ISBN 978-0-393-11726-4; Editor: Sheri L. Snavely; 2011"},{"key":"10.1016\/j.procs.2021.01.118_bib8","doi-asserted-by":"crossref","first-page":"2873","DOI":"10.1145\/2702123.2702249","article-title":"\"Scaling the Security Wall: Developing a Security Behavior Intentions Scale (SeBIS)\"","volume":"1","author":"Egelman","year":"2015","journal-title":"Proc ACM CHI\u201915 Conf Hum Factors Comput Syst [Internet]."},{"key":"10.1016\/j.procs.2021.01.118_bib9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3233\/THC-161263","article-title":"\"Cybersecurity in healthcare: A systematic review of modern threats and trends.\"","volume":"25.1","author":"Kruse","year":"2017","journal-title":"Technology and Health Care"},{"key":"10.1016\/j.procs.2021.01.118_bib10","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.cose.2017.01.004","article-title":"\"The Human Aspects of Information Security Questionnaire (HAIS-Q): Two further validation studies.\"","volume":"66","author":"Parsons","year":"2017","journal-title":"Comput Secur"},{"key":"10.1016\/j.procs.2021.01.118_bib11","doi-asserted-by":"crossref","first-page":"46","DOI":"10.4018\/978-1-5225-4053-3.ch003","article-title":"\"The Human Factor in Cybersecurity\"","author":"Hadlington","year":"2018","journal-title":"Psychological and Behavioral Examinations in Cybersecurity [Internet]"},{"key":"10.1016\/j.procs.2021.01.118_bib12","first-page":"1","article-title":"\"Impulsivity and Risky Cybersecurity Behaviors: A Replication\"","author":"Aivazpour","year":"2018","journal-title":"Proc Am Conf Inf Syst."},{"key":"10.1016\/j.procs.2021.01.118_bib13","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.cose.2015.10.002","article-title":"\"Analysis of personal information security behavior and awareness.\"","volume":"56","author":"\u00d6\u011f\u00fct\u00e7\u00fc","year":"2016","journal-title":"Computers & Security"},{"issue":"24","key":"10.1016\/j.procs.2021.01.118_bib14","doi-asserted-by":"crossref","first-page":"3186","DOI":"10.1097\/00007632-200012150-00014","article-title":"\"Guidelines for the process of cross-cultural adaptation of self-report measures.\"","volume":"25","author":"Beaton","year":"2000","journal-title":"Spine"},{"key":"10.1016\/j.procs.2021.01.118_bib15","doi-asserted-by":"crossref","first-page":"572","DOI":"10.1136\/bmj.314.7080.572","article-title":"\"Statistics notes: Cronbach\u2019s alpha\"","volume":"314","author":"Bland","year":"1997","journal-title":"British Medical Journal"},{"key":"10.1016\/j.procs.2021.01.118_bib16","series-title":"\"Discovering Statistics Using SPSS for Windows\"","author":"Field","year":"2000"}],"container-title":["Procedia Computer Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050921001563?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1877050921001563?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2021,5,22]],"date-time":"2021-05-22T17:22:21Z","timestamp":1621704141000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1877050921001563"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"references-count":16,"alternative-id":["S1877050921001563"],"URL":"https:\/\/doi.org\/10.1016\/j.procs.2021.01.118","relation":{},"ISSN":["1877-0509"],"issn-type":[{"value":"1877-0509","type":"print"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Evaluating cybersecurity attitudes and behaviors in Portuguese healthcare institutions","name":"articletitle","label":"Article Title"},{"value":"Procedia Computer Science","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.procs.2021.01.118","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2021 The Author(s). Published by Elsevier B.V.","name":"copyright","label":"Copyright"}]}}