{"id":"https://openalex.org/W2611407646","doi":"https://doi.org/10.1007/978-3-319-58553-6_8","title":"A Linguistic Approach to Information Security Awareness Education in a Healthcare Environment","display_name":"A Linguistic Approach to Information Security Awareness Education in a Healthcare Environment","publication_year":2017,"publication_date":"2017-01-01","ids":{"openalex":"https://openalex.org/W2611407646","doi":"https://doi.org/10.1007/978-3-319-58553-6_8","mag":"2611407646"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-319-58553-6_8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-58553-6_8","pdf_url":null,"source":{"id":"https://openalex.org/S4210185096","display_name":"IFIP advances in information and communication technology","issn_l":"1868-422X","issn":["1868-422X","1868-4238"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP Advances in Information and Communication Technology","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://inria.hal.science/hal-01690968","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007887941","display_name":"Lynette Drevin","orcid":"https://orcid.org/0000-0001-9370-8216"},"institutions":[{"id":"https://openalex.org/I27765905","display_name":"North-West University","ror":"https://ror.org/010f1sq29","country_code":"ZA","type":"education","lineage":["https://openalex.org/I27765905"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Lynette Drevin","raw_affiliation_strings":["Computer Science and Information Systems, North-West University, Potchefstroom, South Africa","North-West University [Potchefstroom]"],"affiliations":[{"raw_affiliation_string":"Computer Science and Information Systems, North-West University, Potchefstroom, South Africa","institution_ids":["https://openalex.org/I27765905"]},{"raw_affiliation_string":"North-West University [Potchefstroom]","institution_ids":["https://openalex.org/I27765905"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065158139","display_name":"Hennie Kruger","orcid":"https://orcid.org/0000-0001-8514-4422"},"institutions":[{"id":"https://openalex.org/I27765905","display_name":"North-West University","ror":"https://ror.org/010f1sq29","country_code":"ZA","type":"education","lineage":["https://openalex.org/I27765905"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Hennie Kruger","raw_affiliation_strings":["Computer Science and Information Systems, North-West University, Potchefstroom, South Africa","North-West University [South Aftrica]"],"affiliations":[{"raw_affiliation_string":"Computer Science and Information Systems, North-West University, Potchefstroom, South Africa","institution_ids":["https://openalex.org/I27765905"]},{"raw_affiliation_string":"North-West University [South Aftrica]","institution_ids":["https://openalex.org/I27765905"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5028023560","display_name":"Anna-Marie Bell","orcid":null},"institutions":[{"id":"https://openalex.org/I129615261","display_name":"Vaal University of Technology","ror":"https://ror.org/05ey7mm31","country_code":"ZA","type":"education","lineage":["https://openalex.org/I129615261"]},{"id":"https://openalex.org/I27765905","display_name":"North-West University","ror":"https://ror.org/010f1sq29","country_code":"ZA","type":"education","lineage":["https://openalex.org/I27765905"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Anna-Marie Bell","raw_affiliation_strings":["Computer Science and Information Systems, North-West University, Potchefstroom, South Africa","North-West University [Vaal Triangle Campus, Vanderbijlpark, South Africa]"],"affiliations":[{"raw_affiliation_string":"Computer Science and Information Systems, North-West University, Potchefstroom, South Africa","institution_ids":["https://openalex.org/I27765905"]},{"raw_affiliation_string":"North-West University [Vaal Triangle Campus, Vanderbijlpark, South Africa]","institution_ids":["https://openalex.org/I129615261","https://openalex.org/I27765905"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113489996","display_name":"Tjaart Steyn","orcid":null},"institutions":[{"id":"https://openalex.org/I27765905","display_name":"North-West University","ror":"https://ror.org/010f1sq29","country_code":"ZA","type":"education","lineage":["https://openalex.org/I27765905"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Tjaart Steyn","raw_affiliation_strings":["Computer Science and Information Systems, North-West University, Potchefstroom, South Africa","North-West University [South Aftrica]"],"affiliations":[{"raw_affiliation_string":"Computer Science and Information Systems, North-West University, Potchefstroom, South Africa","institution_ids":["https://openalex.org/I27765905"]},{"raw_affiliation_string":"North-West University [South Aftrica]","institution_ids":["https://openalex.org/I27765905"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5007887941"],"corresponding_institution_ids":["https://openalex.org/I27765905"],"apc_list":null,"apc_paid":null,"fwci":1.8203,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.86545896,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"87","last_page":"97"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.983299970626831,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9710999727249146,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vocabulary","display_name":"Vocabulary","score":0.707161009311676},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.687690019607544},{"id":"https://openalex.org/keywords/health-care","display_name":"Health care","score":0.6502163410186768},{"id":"https://openalex.org/keywords/security-awareness","display_name":"Security awareness","score":0.616965115070343},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.5527127385139465},{"id":"https://openalex.org/keywords/test","display_name":"Test (biology)","score":0.5106633305549622},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.49846553802490234},{"id":"https://openalex.org/keywords/certified-information-security-manager","display_name":"Certified Information Security Manager","score":0.4954131841659546},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4417553246021271},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.4250560402870178},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4145185351371765},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.41164177656173706},{"id":"https://openalex.org/keywords/public-relations","display_name":"Public relations","score":0.4037695527076721},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.32864832878112793},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.2906113266944885},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.22930610179901123},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.20272770524024963},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.19405826926231384},{"id":"https://openalex.org/keywords/linguistics","display_name":"Linguistics","score":0.07645487785339355}],"concepts":[{"id":"https://openalex.org/C2777601683","wikidata":"https://www.wikidata.org/wiki/Q6499736","display_name":"Vocabulary","level":2,"score":0.707161009311676},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.687690019607544},{"id":"https://openalex.org/C160735492","wikidata":"https://www.wikidata.org/wiki/Q31207","display_name":"Health care","level":2,"score":0.6502163410186768},{"id":"https://openalex.org/C2778652015","wikidata":"https://www.wikidata.org/wiki/Q7445019","display_name":"Security awareness","level":3,"score":0.616965115070343},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.5527127385139465},{"id":"https://openalex.org/C2777267654","wikidata":"https://www.wikidata.org/wiki/Q3519023","display_name":"Test (biology)","level":2,"score":0.5106633305549622},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.49846553802490234},{"id":"https://openalex.org/C180823521","wikidata":"https://www.wikidata.org/wiki/Q1662502","display_name":"Certified Information Security Manager","level":5,"score":0.4954131841659546},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4417553246021271},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.4250560402870178},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4145185351371765},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.41164177656173706},{"id":"https://openalex.org/C39549134","wikidata":"https://www.wikidata.org/wiki/Q133080","display_name":"Public relations","level":1,"score":0.4037695527076721},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.32864832878112793},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.2906113266944885},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.22930610179901123},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.20272770524024963},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.19405826926231384},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.07645487785339355},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/978-3-319-58553-6_8","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-319-58553-6_8","pdf_url":null,"source":{"id":"https://openalex.org/S4210185096","display_name":"IFIP advances in information and communication technology","issn_l":"1868-422X","issn":["1868-422X","1868-4238"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IFIP Advances in Information and Communication Technology","raw_type":"book-chapter"},{"id":"pmh:oai:HAL:hal-01690968v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01690968","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"10th IFIP World Conference on Information Security Education (WISE), May 2017, Rome, Italy. pp.87-97, &#x27E8;10.1007/978-3-319-58553-6_8&#x27E9;","raw_type":"Conference papers"},{"id":"pmh:oai:repository.nwu.ac.za:10394/24988","is_oa":false,"landing_page_url":"https://link.springer.com/chapter/10.1007%2F978-3-319-58553-6_8","pdf_url":null,"source":{"id":"https://openalex.org/S4306402268","display_name":"Boloka Institutional Repository (North-west University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I114027177","host_organization_name":"University of North Carolina at Chapel Hill","host_organization_lineage":["https://openalex.org/I114027177"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Presentation"}],"best_oa_location":{"id":"pmh:oai:HAL:hal-01690968v1","is_oa":true,"landing_page_url":"https://inria.hal.science/hal-01690968","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"10th IFIP World Conference on Information Security Education (WISE), May 2017, Rome, Italy. pp.87-97, &#x27E8;10.1007/978-3-319-58553-6_8&#x27E9;","raw_type":"Conference papers"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.46000000834465027,"display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":25,"referenced_works":["https://openalex.org/W154069690","https://openalex.org/W1508960492","https://openalex.org/W1579117723","https://openalex.org/W1705979295","https://openalex.org/W1903961850","https://openalex.org/W1968546913","https://openalex.org/W1985453879","https://openalex.org/W2023681199","https://openalex.org/W2038313485","https://openalex.org/W2039988846","https://openalex.org/W2076806793","https://openalex.org/W2095584182","https://openalex.org/W2098727156","https://openalex.org/W2110505891","https://openalex.org/W2117776331","https://openalex.org/W2119054568","https://openalex.org/W2128232860","https://openalex.org/W2144241984","https://openalex.org/W2149068264","https://openalex.org/W2165529641","https://openalex.org/W2332345511","https://openalex.org/W2412451118","https://openalex.org/W4245584581","https://openalex.org/W4300870773","https://openalex.org/W6634690980"],"related_works":["https://openalex.org/W4310892428","https://openalex.org/W2891666484","https://openalex.org/W2056794087","https://openalex.org/W2362334938","https://openalex.org/W4293770853","https://openalex.org/W1974991139","https://openalex.org/W3048948897","https://openalex.org/W330653092","https://openalex.org/W1011453537","https://openalex.org/W2007996913"],"abstract_inverted_index":{"It":[0],"is":[1,8,41,63],"widely":[2],"accepted":[3],"that":[4,12,105,114,135],"healthcare":[5,35,47,74,94],"information":[6,36,48,106,144],"security":[7,13,37,49,70,83,107,145],"extremely":[9],"important":[10],"and":[11,38,76,91],"breaches":[14,50],"will":[15],"have":[16],"serious":[17],"consequences":[18],"in":[19,79,82,96,143],"many":[20],"areas.":[21],"Despite":[22],"controls,":[23],"such":[24],"as":[25,28,30,65,123,125],"legal":[26],"frameworks,":[27],"well":[29,124],"ongoing":[31],"research":[32],"projects":[33],"into":[34],"privacy,":[39],"there":[40],"still":[42],"an":[43],"alarming":[44],"number":[45],"of":[46,73],"reported":[51],"annually.":[52],"In":[53],"this":[54],"paper,":[55],"a":[56,60,66,97],"linguistic":[57],"approach,":[58],"utilizing":[59],"vocabulary":[61],"test,":[62],"proposed":[64,137],"tool":[67],"to":[68,77,93],"determine":[69],"awareness":[71,84,108,146],"levels":[72,109],"workers":[75,95],"assist":[78],"educating":[80],"them":[81],"aspects.":[85],"A":[86],"vocabulary-measuring":[87],"instrument":[88],"was":[89],"developed":[90],"distributed":[92],"large":[98],"South":[99],"African":[100],"hospital":[101],"group.":[102],"Results":[103],"indicated":[104],"are":[110],"generally":[111],"acceptable,":[112],"but":[113],"potential":[115],"problem":[116],"areas":[117],"exist":[118],"between":[119,126],"certain":[120],"language":[121],"groups,":[122],"different":[127],"business":[128],"functions":[129],"(departments).":[130],"The":[131],"study":[132],"also":[133],"shows":[134],"the":[136],"approach":[138],"may":[139],"offer":[140],"significant":[141],"advantages":[142],"campaigns.":[147]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
