{"id":"https://openalex.org/W4362496442","doi":"https://doi.org/10.1109/kst57286.2023.10086884","title":"Information Security Awareness in Higher Education Institutes: A Work in Progress","display_name":"Information Security Awareness in Higher Education Institutes: A Work in Progress","publication_year":2023,"publication_date":"2023-02-21","ids":{"openalex":"https://openalex.org/W4362496442","doi":"https://doi.org/10.1109/kst57286.2023.10086884"},"language":"en","primary_location":{"id":"doi:10.1109/kst57286.2023.10086884","is_oa":false,"landing_page_url":"https://doi.org/10.1109/kst57286.2023.10086884","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Conference on Knowledge and Smart Technology (KST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014751531","display_name":"Rohani Rohan","orcid":"https://orcid.org/0000-0002-9722-7185"},"institutions":[{"id":"https://openalex.org/I60837268","display_name":"King Mongkut's University of Technology Thonburi","ror":"https://ror.org/0057ax056","country_code":"TH","type":"education","lineage":["https://openalex.org/I60837268"]}],"countries":["TH"],"is_corresponding":true,"raw_author_name":"Rohani Rohan","raw_affiliation_strings":["King Mongkut&#x2019;s University of Technology Thonburi,School of Information Technology,Bangkok,Thailand"],"affiliations":[{"raw_affiliation_string":"King Mongkut&#x2019;s University of Technology Thonburi,School of Information Technology,Bangkok,Thailand","institution_ids":["https://openalex.org/I60837268"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024169757","display_name":"Suree Funilkul","orcid":"https://orcid.org/0000-0003-0352-8647"},"institutions":[{"id":"https://openalex.org/I60837268","display_name":"King Mongkut's University of Technology Thonburi","ror":"https://ror.org/0057ax056","country_code":"TH","type":"education","lineage":["https://openalex.org/I60837268"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Suree Funilkul","raw_affiliation_strings":["King Mongkut&#x2019;s University of Technology Thonburi,School of Information Technology,Bangkok,Thailand"],"affiliations":[{"raw_affiliation_string":"King Mongkut&#x2019;s University of Technology Thonburi,School of Information Technology,Bangkok,Thailand","institution_ids":["https://openalex.org/I60837268"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5051049024","display_name":"Wichian Chutimaskul","orcid":"https://orcid.org/0009-0000-8460-559X"},"institutions":[{"id":"https://openalex.org/I60837268","display_name":"King Mongkut's University of Technology Thonburi","ror":"https://ror.org/0057ax056","country_code":"TH","type":"education","lineage":["https://openalex.org/I60837268"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Wichian Chutimaskul","raw_affiliation_strings":["King Mongkut&#x2019;s University of Technology Thonburi,School of Information Technology,Bangkok,Thailand"],"affiliations":[{"raw_affiliation_string":"King Mongkut&#x2019;s University of Technology Thonburi,School of Information Technology,Bangkok,Thailand","institution_ids":["https://openalex.org/I60837268"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014539478","display_name":"Prasert Kanthmanon","orcid":null},"institutions":[{"id":"https://openalex.org/I60837268","display_name":"King Mongkut's University of Technology Thonburi","ror":"https://ror.org/0057ax056","country_code":"TH","type":"education","lineage":["https://openalex.org/I60837268"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Prasert Kanthmanon","raw_affiliation_strings":["King Mongkut&#x2019;s University of Technology Thonburi,School of Information Technology,Bangkok,Thailand"],"affiliations":[{"raw_affiliation_string":"King Mongkut&#x2019;s University of Technology Thonburi,School of Information Technology,Bangkok,Thailand","institution_ids":["https://openalex.org/I60837268"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5018183180","display_name":"Borworn Papasratorn","orcid":"https://orcid.org/0000-0002-2238-4290"},"institutions":[{"id":"https://openalex.org/I60837268","display_name":"King Mongkut's University of Technology Thonburi","ror":"https://ror.org/0057ax056","country_code":"TH","type":"education","lineage":["https://openalex.org/I60837268"]}],"countries":["TH"],"is_corresponding":false,"raw_author_name":"Borworn Papasratorn","raw_affiliation_strings":["King Mongkut&#x2019;s University of Technology Thonburi,School of Information Technology,Bangkok,Thailand"],"affiliations":[{"raw_affiliation_string":"King Mongkut&#x2019;s University of Technology Thonburi,School of Information Technology,Bangkok,Thailand","institution_ids":["https://openalex.org/I60837268"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5046949056","display_name":"Debajyoti Pal","orcid":"https://orcid.org/0000-0002-7305-1015"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Debajyoti Pal","raw_affiliation_strings":["King Mongkut&#x2019;s University of Technology Thonburi,School of IT,Innovative Cognitive Computing Research Center (IC2),Bangkok,Thailand"],"affiliations":[{"raw_affiliation_string":"King Mongkut&#x2019;s University of Technology Thonburi,School of IT,Innovative Cognitive Computing Research Center (IC2),Bangkok,Thailand","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5014751531"],"corresponding_institution_ids":["https://openalex.org/I60837268"],"apc_list":null,"apc_paid":null,"fwci":6.8919,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.96854368,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9936000108718872,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.656541109085083},{"id":"https://openalex.org/keywords/higher-education","display_name":"Higher education","score":0.6487876176834106},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.6187257766723633},{"id":"https://openalex.org/keywords/security-awareness","display_name":"Security awareness","score":0.5644952058792114},{"id":"https://openalex.org/keywords/knowledge-management","display_name":"Knowledge management","score":0.5490588545799255},{"id":"https://openalex.org/keywords/information-security-management","display_name":"Information security management","score":0.5389429330825806},{"id":"https://openalex.org/keywords/conceptual-framework","display_name":"Conceptual framework","score":0.5105773210525513},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.45153623819351196},{"id":"https://openalex.org/keywords/affect","display_name":"Affect (linguistics)","score":0.4445308744907379},{"id":"https://openalex.org/keywords/conceptual-model","display_name":"Conceptual model","score":0.4369823932647705},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.38405317068099976},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.30851081013679504},{"id":"https://openalex.org/keywords/cloud-computing-security","display_name":"Cloud computing security","score":0.26534563302993774},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21402844786643982},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.18187984824180603},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14775103330612183},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.13407230377197266},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.11374524235725403}],"concepts":[{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.656541109085083},{"id":"https://openalex.org/C120912362","wikidata":"https://www.wikidata.org/wiki/Q136822","display_name":"Higher education","level":2,"score":0.6487876176834106},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.6187257766723633},{"id":"https://openalex.org/C2778652015","wikidata":"https://www.wikidata.org/wiki/Q7445019","display_name":"Security awareness","level":3,"score":0.5644952058792114},{"id":"https://openalex.org/C56739046","wikidata":"https://www.wikidata.org/wiki/Q192060","display_name":"Knowledge management","level":1,"score":0.5490588545799255},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.5389429330825806},{"id":"https://openalex.org/C14224292","wikidata":"https://www.wikidata.org/wiki/Q13600188","display_name":"Conceptual framework","level":2,"score":0.5105773210525513},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.45153623819351196},{"id":"https://openalex.org/C2776035688","wikidata":"https://www.wikidata.org/wiki/Q1606558","display_name":"Affect (linguistics)","level":2,"score":0.4445308744907379},{"id":"https://openalex.org/C13606891","wikidata":"https://www.wikidata.org/wiki/Q2623243","display_name":"Conceptual model","level":2,"score":0.4369823932647705},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.38405317068099976},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.30851081013679504},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.26534563302993774},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21402844786643982},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.18187984824180603},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14775103330612183},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.13407230377197266},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.11374524235725403},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C46312422","wikidata":"https://www.wikidata.org/wiki/Q11024","display_name":"Communication","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/kst57286.2023.10086884","is_oa":false,"landing_page_url":"https://doi.org/10.1109/kst57286.2023.10086884","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 15th International Conference on Knowledge and Smart Technology (KST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W2889135055","https://openalex.org/W2957614917","https://openalex.org/W3006556904","https://openalex.org/W3120055541","https://openalex.org/W3122167728","https://openalex.org/W3127796451","https://openalex.org/W3159994884","https://openalex.org/W3183966114","https://openalex.org/W3185667609","https://openalex.org/W3206355868","https://openalex.org/W4210825380","https://openalex.org/W4226063917","https://openalex.org/W4283719292","https://openalex.org/W4285088641","https://openalex.org/W4286509932","https://openalex.org/W4293545211","https://openalex.org/W4294307841"],"related_works":["https://openalex.org/W2120971814","https://openalex.org/W2508914475","https://openalex.org/W4310892428","https://openalex.org/W4293770853","https://openalex.org/W2356973015","https://openalex.org/W2777401565","https://openalex.org/W2099222119","https://openalex.org/W1974991139","https://openalex.org/W2007996913","https://openalex.org/W4224942254"],"abstract_inverted_index":{"The":[0],"demands":[1],"for":[2,93,108],"information":[3],"security":[4,52,78,87,128],"in":[5,131],"Higher":[6],"Education":[7],"Institutions":[8],"(HEIs)":[9],"are":[10,14,37,99,106],"expanding":[11],"as":[12],"HEIs":[13,109],"vulnerable":[15],"because":[16],"of":[17,20,64,82,114],"the":[18,38,65,112],"involvement":[19],"human":[21],"factors.":[22],"Hence,":[23],"maintaining":[24],"data":[25],"privacy":[26],"is":[27,62],"paramount,":[28],"where":[29],"most":[30,66],"individuals":[31],"interacting":[32],"with":[33,126],"systems":[34],"and":[35,43,51,86,89,105,119],"applications":[36],"main":[39],"stakeholders":[40],"(lecturers,":[41],"students,":[42],"non-academic":[44],"staff).":[45],"In":[46],"this":[47,71],"regard,":[48],"existing":[49],"literature":[50],"experts":[53,129],"claim":[54],"that":[55,101],"enhancing":[56],"users\u2019":[57,103],"Information":[58],"Security":[59],"Awareness":[60],"(ISA)":[61],"one":[63],"effective":[67],"protective":[68],"techniques.":[69],"Therefore,":[70],"study":[72],"aims":[73],"to":[74],"propose":[75],"a":[76],"conceptual":[77,97],"awareness":[79],"framework":[80],"consisting":[81],"devices,":[83],"application":[84],"areas,":[85],"practices":[88],"their":[90,115],"related":[91],"activities":[92],"HEIs.":[94,132],"Moreover,":[95],"five":[96],"dimensions":[98],"suggested":[100],"affect":[102],"ISA":[104,113],"necessary":[107],"while":[110],"measuring":[111],"stakeholders.":[116],"For":[117],"investigating":[118],"understanding":[120],"these":[121],"issues,":[122],"interviews":[123],"were":[124],"conducted":[125],"IT":[127],"working":[130]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":9}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
