{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:35:45Z","timestamp":1730320545150,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T00:00:00Z","timestamp":1556755200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/P011454\/1"],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,2]]},"DOI":"10.1145\/3290607.3312786","type":"proceedings-article","created":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T15:55:05Z","timestamp":1556639705000},"page":"1-6","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["What is 'Cyber Security'?"],"prefix":"10.1145","author":[{"given":"Simon L.","family":"Jones","sequence":"first","affiliation":[{"name":"University of Bath, Bath, United Kingdom"}]},{"given":"Emily I. M.","family":"Collins","sequence":"additional","affiliation":[{"name":"University of Bath, Bath, Somerset, United Kingdom"}]},{"given":"Ana","family":"Levordashka","sequence":"additional","affiliation":[{"name":"University of Bath, Bath, United Kingdom"}]},{"given":"Kate","family":"Muir","sequence":"additional","affiliation":[{"name":"University of Bath, Bath, Somerset, United Kingdom"}]},{"given":"Adam","family":"Joinson","sequence":"additional","affiliation":[{"name":"University of Bath, Bath, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2019,5,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58460-7_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1746-1561.2009.00447.x"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979421"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858273"},{"key":"e_1_3_2_1_5_1","article-title":"Age differences in privacy attitudes, literacy and privacy management on Facebook. Cyberpsychology","volume":"10","author":"Kezer Murat","year":"2016","journal-title":"Journal of Psychosocial Research on Cyberspace"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2007.11.004"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2305316.2305332"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025831"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3274408"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/01650250344000406"},{"volume":"242","volume-title":"Proc. of the first instructional conference on machine learning","author":"Juan","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3191528"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Ryan West Christopher Mayhorn Jefferson Hardee and Jeremy Mendel. 2009. The weakest link: A psychological perspective on why users make poor security decisions. In Social and Human elements of information security: Emerging Trends and countermeasures. IGI Global 43--60. Ryan West Christopher Mayhorn Jefferson Hardee and Jeremy Mendel. 2009. The weakest link: A psychological perspective on why users make poor security decisions. In Social and Human elements of information security: Emerging Trends and countermeasures. IGI Global 43--60.","DOI":"10.4018\/978-1-60566-036-3.ch004"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2014.0179"}],"event":{"name":"CHI '19: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Glasgow Scotland Uk","acronym":"CHI '19"},"container-title":["Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3290607.3312786","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,6]],"date-time":"2023-01-06T18:05:37Z","timestamp":1673028337000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290607.3312786"}},"subtitle":["Differential Language of Cyber Security Across the Lifespan"],"short-title":[],"issued":{"date-parts":[[2019,5,2]]},"references-count":15,"alternative-id":["10.1145\/3290607.3312786","10.1145\/3290607"],"URL":"https:\/\/doi.org\/10.1145\/3290607.3312786","relation":{},"subject":[],"published":{"date-parts":[[2019,5,2]]},"assertion":[{"value":"2019-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}