{"id":"https://openalex.org/W2095172608","doi":"https://doi.org/10.4018/ijcwt.2012070101","title":"Internet Study","display_name":"Internet Study","publication_year":2012,"publication_date":"2012-07-01","ids":{"openalex":"https://openalex.org/W2095172608","doi":"https://doi.org/10.4018/ijcwt.2012070101","mag":"2095172608"},"language":"en","primary_location":{"id":"doi:10.4018/ijcwt.2012070101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2012070101","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063411302","display_name":"Igor Bernik","orcid":"https://orcid.org/0000-0003-1644-5672"},"institutions":[{"id":"https://openalex.org/I37696226","display_name":"University of Maribor","ror":"https://ror.org/01d5jce07","country_code":"SI","type":"education","lineage":["https://openalex.org/I37696226"]}],"countries":["SI"],"is_corresponding":true,"raw_author_name":"Igor Bernik","raw_affiliation_strings":["Faculty of Criminal Justice and Security, University of Maribor, Ljubljana, Slovenia"],"affiliations":[{"raw_affiliation_string":"Faculty of Criminal Justice and Security, University of Maribor, Ljubljana, Slovenia","institution_ids":["https://openalex.org/I37696226"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5063411302"],"corresponding_institution_ids":["https://openalex.org/I37696226"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.1813603,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"2","issue":"3","first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/cyberspace","display_name":"Cyberspace","score":0.9581007957458496},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.9555953145027161},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.7578041553497314},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6657047867774963},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5304500460624695},{"id":"https://openalex.org/keywords/legislation","display_name":"Legislation","score":0.4405510723590851},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.39457955956459045},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.21138995885849},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.14386340975761414},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.11335363984107971}],"concepts":[{"id":"https://openalex.org/C2781241145","wikidata":"https://www.wikidata.org/wiki/Q204606","display_name":"Cyberspace","level":3,"score":0.9581007957458496},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.9555953145027161},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.7578041553497314},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6657047867774963},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5304500460624695},{"id":"https://openalex.org/C2777351106","wikidata":"https://www.wikidata.org/wiki/Q49371","display_name":"Legislation","level":2,"score":0.4405510723590851},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.39457955956459045},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.21138995885849},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.14386340975761414},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.11335363984107971}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/ijcwt.2012070101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/ijcwt.2012070101","pdf_url":null,"source":{"id":"https://openalex.org/S4210168647","display_name":"International Journal of Cyber Warfare and Terrorism","issn_l":"1947-3435","issn":["1947-3435","1947-3443"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Cyber Warfare and Terrorism","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jcwt00:v:2:y:2012:i:3:p:1-11","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/ijcwt.2012070101","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7799999713897705,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1602619638","https://openalex.org/W2105992541","https://openalex.org/W2608928925","https://openalex.org/W3111792730","https://openalex.org/W3124351849","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2368745349","https://openalex.org/W2131575257","https://openalex.org/W2372005904","https://openalex.org/W144012884","https://openalex.org/W3167675181","https://openalex.org/W2360897455","https://openalex.org/W2377660959","https://openalex.org/W2789356246","https://openalex.org/W2980609844","https://openalex.org/W3047430301"],"abstract_inverted_index":{"The":[0,136,218],"authors":[1,99,159],"present":[2,160],"public":[3],"comprehension":[4],"and":[5,10,34,57,68,125,152,181,203,230],"attitudes":[6],"towards":[7],"cyber":[8,179],"threats":[9,180],"cybercrime":[11,50,124],"in":[12,66,109,170,192,201,221],"Slovenia.":[13],"Cyberspace":[14],"has":[15],"become":[16],"a":[17,101,183],"wide":[18],"area":[19],"which":[20,103],"can":[21,174,236],"be":[22,237],"exploited":[23],"through":[24],"various":[25],"criminal":[26],"activities,":[27],"considering":[28],"that":[29,163],"access":[30],"to":[31,72,84,88,128,189,206],"information":[32,55,186],"technology":[33,56],"the":[35,40,47,58,64,69,81,91,94,98,107,115,121,132,140,148,153,158,199],"Internet":[36,59,96,108],"is":[37,114],"ubiquitous.":[38],"As":[39],"number":[41,48],"of":[42,49,54,93,120,123,131,134,139,150,155,178,185,198,213,216,242],"users":[43,53,144,229],"grows,":[44],"so":[45],"does":[46],"incidences.":[51],"Regrettably,":[52],"know":[60,204],"too":[61],"little":[62],"about":[63,80],"dangers":[65],"cyberspace":[67,202,228],"protective":[70],"measures":[71],"maximize":[73],"security;":[74],"they":[75,235],"are":[76,182,196,210,224],"also":[77],"poorly":[78],"informed":[79],"legislation":[82],"pertaining":[83],"cybercrime.":[85,146,217,243],"In":[86],"order":[87],"accurately":[89],"gauge":[90],"knowledge":[92],"average":[95],"user,":[97],"conducted":[100],"survey":[102,113],"was":[104],"posted":[105],"on":[106,187],"spring":[110],"2011.":[111],"This":[112],"basis":[116,149],"for":[117,226,239],"an":[118,126],"examination":[119],"perception":[122],"attempt":[127],"make":[129],"sense":[130],"fear":[133],"it.":[135],"statistical":[137],"analysis":[138],"questionnaires":[141],"show,":[142],"how":[143,188,205],"perceive":[145],"On":[147],"theory":[151],"results":[154],"their":[156],"research,":[157],"basic":[161],"guidelines":[162,173],"can,":[164],"if":[165],"respected,":[166],"minimize":[167],"security":[168],"risks":[169,200],"cyberspace.":[171,193],"These":[172],"help":[175],"increase":[176],"awareness":[177],"source":[184],"safely":[190],"interact":[191],"Users":[194],"who":[195],"aware":[197],"deal":[207],"with":[208],"them":[209],"less":[211],"afraid":[212],"becoming":[214],"victims":[215],"insights":[219],"acquired":[220],"this":[222],"study":[223,241],"useful":[225],"all":[227],"have":[231],"practical":[232],"value":[233],"as":[234],"used":[238],"further":[240]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
