Factors Influencing Players’ Susceptibility to Social Engineering in Social Gaming Networks
Social gaming networks have become a new phenomenon, especially for young people, who may become addicted to some extent. However, this phenomenon also increases their susceptibility to hacking, cyber-attack, and other types of security breaches. Various studies have found that current technology is...
Ausführliche Beschreibung
Autor*in: |
Ahmad Alturki [verfasserIn] Nora Alshwihi [verfasserIn] Abdullah Algarni [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2020 |
---|
Schlagwörter: |
---|
Übergeordnetes Werk: |
In: IEEE Access - IEEE, 2014, 8(2020), Seite 97383-97391 |
---|---|
Übergeordnetes Werk: |
volume:8 ; year:2020 ; pages:97383-97391 |
Links: |
---|
DOI / URN: |
10.1109/ACCESS.2020.2995619 |
---|
Katalog-ID: |
DOAJ013292277 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | DOAJ013292277 | ||
003 | DE-627 | ||
005 | 20230307031206.0 | ||
007 | cr uuu---uuuuu | ||
008 | 230226s2020 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1109/ACCESS.2020.2995619 |2 doi | |
035 | |a (DE-627)DOAJ013292277 | ||
035 | |a (DE-599)DOAJ70e31845c4104b3c8692d75d0da1bab5 | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
050 | 0 | |a TK1-9971 | |
100 | 0 | |a Ahmad Alturki |e verfasserin |4 aut | |
245 | 1 | 0 | |a Factors Influencing Players’ Susceptibility to Social Engineering in Social Gaming Networks |
264 | 1 | |c 2020 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
520 | |a Social gaming networks have become a new phenomenon, especially for young people, who may become addicted to some extent. However, this phenomenon also increases their susceptibility to hacking, cyber-attack, and other types of security breaches. Various studies have found that current technology is inadequate in terms of online security. Thus, researchers have started to pay attention to the human aspect of security, which is based on interactions with strangers who may trick other gamers into revealing personal or financial information, that is, social engineering. There is little in the social gaming network literature to help players, researchers, and organizations to address the human aspect of online security, and thus there is a need to investigate the factors affecting this aspect of security. The current study aims to identify the factors influencing social engineering victimization in social gaming networks. The model developed in this study is based on the health belief model and cooperation and competition theory. The results show that the perceived severity of the threat, perceived barriers, perceived benefits, self-efficacy, competition, and cooperation are significant factors in the prediction of social engineering victimization. | ||
650 | 4 | |a Social engineering | |
650 | 4 | |a social gaming networks | |
650 | 4 | |a competition | |
650 | 4 | |a cooperation | |
650 | 4 | |a susceptibility | |
650 | 4 | |a health belief model | |
653 | 0 | |a Electrical engineering. Electronics. Nuclear engineering | |
700 | 0 | |a Nora Alshwihi |e verfasserin |4 aut | |
700 | 0 | |a Abdullah Algarni |e verfasserin |4 aut | |
773 | 0 | 8 | |i In |t IEEE Access |d IEEE, 2014 |g 8(2020), Seite 97383-97391 |w (DE-627)728440385 |w (DE-600)2687964-5 |x 21693536 |7 nnns |
773 | 1 | 8 | |g volume:8 |g year:2020 |g pages:97383-97391 |
856 | 4 | 0 | |u https://doi.org/10.1109/ACCESS.2020.2995619 |z kostenfrei |
856 | 4 | 0 | |u https://doaj.org/article/70e31845c4104b3c8692d75d0da1bab5 |z kostenfrei |
856 | 4 | 0 | |u https://ieeexplore.ieee.org/document/9096355/ |z kostenfrei |
856 | 4 | 2 | |u https://doaj.org/toc/2169-3536 |y Journal toc |z kostenfrei |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_DOAJ | ||
912 | |a GBV_ILN_11 | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_31 | ||
912 | |a GBV_ILN_39 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_105 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_161 | ||
912 | |a GBV_ILN_170 | ||
912 | |a GBV_ILN_213 | ||
912 | |a GBV_ILN_230 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_293 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_4012 | ||
912 | |a GBV_ILN_4037 | ||
912 | |a GBV_ILN_4112 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4126 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4323 | ||
912 | |a GBV_ILN_4324 | ||
912 | |a GBV_ILN_4325 | ||
912 | |a GBV_ILN_4335 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4367 | ||
912 | |a GBV_ILN_4700 | ||
951 | |a AR | ||
952 | |d 8 |j 2020 |h 97383-97391 |
author_variant |
a a aa n a na a a aa |
---|---|
matchkey_str |
article:21693536:2020----::atrifuniglyrssetblttscaegneign |
hierarchy_sort_str |
2020 |
callnumber-subject-code |
TK |
publishDate |
2020 |
allfields |
10.1109/ACCESS.2020.2995619 doi (DE-627)DOAJ013292277 (DE-599)DOAJ70e31845c4104b3c8692d75d0da1bab5 DE-627 ger DE-627 rakwb eng TK1-9971 Ahmad Alturki verfasserin aut Factors Influencing Players’ Susceptibility to Social Engineering in Social Gaming Networks 2020 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Social gaming networks have become a new phenomenon, especially for young people, who may become addicted to some extent. However, this phenomenon also increases their susceptibility to hacking, cyber-attack, and other types of security breaches. Various studies have found that current technology is inadequate in terms of online security. Thus, researchers have started to pay attention to the human aspect of security, which is based on interactions with strangers who may trick other gamers into revealing personal or financial information, that is, social engineering. There is little in the social gaming network literature to help players, researchers, and organizations to address the human aspect of online security, and thus there is a need to investigate the factors affecting this aspect of security. The current study aims to identify the factors influencing social engineering victimization in social gaming networks. The model developed in this study is based on the health belief model and cooperation and competition theory. The results show that the perceived severity of the threat, perceived barriers, perceived benefits, self-efficacy, competition, and cooperation are significant factors in the prediction of social engineering victimization. Social engineering social gaming networks competition cooperation susceptibility health belief model Electrical engineering. Electronics. Nuclear engineering Nora Alshwihi verfasserin aut Abdullah Algarni verfasserin aut In IEEE Access IEEE, 2014 8(2020), Seite 97383-97391 (DE-627)728440385 (DE-600)2687964-5 21693536 nnns volume:8 year:2020 pages:97383-97391 https://doi.org/10.1109/ACCESS.2020.2995619 kostenfrei https://doaj.org/article/70e31845c4104b3c8692d75d0da1bab5 kostenfrei https://ieeexplore.ieee.org/document/9096355/ kostenfrei https://doaj.org/toc/2169-3536 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 8 2020 97383-97391 |
spelling |
10.1109/ACCESS.2020.2995619 doi (DE-627)DOAJ013292277 (DE-599)DOAJ70e31845c4104b3c8692d75d0da1bab5 DE-627 ger DE-627 rakwb eng TK1-9971 Ahmad Alturki verfasserin aut Factors Influencing Players’ Susceptibility to Social Engineering in Social Gaming Networks 2020 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Social gaming networks have become a new phenomenon, especially for young people, who may become addicted to some extent. However, this phenomenon also increases their susceptibility to hacking, cyber-attack, and other types of security breaches. Various studies have found that current technology is inadequate in terms of online security. Thus, researchers have started to pay attention to the human aspect of security, which is based on interactions with strangers who may trick other gamers into revealing personal or financial information, that is, social engineering. There is little in the social gaming network literature to help players, researchers, and organizations to address the human aspect of online security, and thus there is a need to investigate the factors affecting this aspect of security. The current study aims to identify the factors influencing social engineering victimization in social gaming networks. The model developed in this study is based on the health belief model and cooperation and competition theory. The results show that the perceived severity of the threat, perceived barriers, perceived benefits, self-efficacy, competition, and cooperation are significant factors in the prediction of social engineering victimization. Social engineering social gaming networks competition cooperation susceptibility health belief model Electrical engineering. Electronics. Nuclear engineering Nora Alshwihi verfasserin aut Abdullah Algarni verfasserin aut In IEEE Access IEEE, 2014 8(2020), Seite 97383-97391 (DE-627)728440385 (DE-600)2687964-5 21693536 nnns volume:8 year:2020 pages:97383-97391 https://doi.org/10.1109/ACCESS.2020.2995619 kostenfrei https://doaj.org/article/70e31845c4104b3c8692d75d0da1bab5 kostenfrei https://ieeexplore.ieee.org/document/9096355/ kostenfrei https://doaj.org/toc/2169-3536 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 8 2020 97383-97391 |
allfields_unstemmed |
10.1109/ACCESS.2020.2995619 doi (DE-627)DOAJ013292277 (DE-599)DOAJ70e31845c4104b3c8692d75d0da1bab5 DE-627 ger DE-627 rakwb eng TK1-9971 Ahmad Alturki verfasserin aut Factors Influencing Players’ Susceptibility to Social Engineering in Social Gaming Networks 2020 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Social gaming networks have become a new phenomenon, especially for young people, who may become addicted to some extent. However, this phenomenon also increases their susceptibility to hacking, cyber-attack, and other types of security breaches. Various studies have found that current technology is inadequate in terms of online security. Thus, researchers have started to pay attention to the human aspect of security, which is based on interactions with strangers who may trick other gamers into revealing personal or financial information, that is, social engineering. There is little in the social gaming network literature to help players, researchers, and organizations to address the human aspect of online security, and thus there is a need to investigate the factors affecting this aspect of security. The current study aims to identify the factors influencing social engineering victimization in social gaming networks. The model developed in this study is based on the health belief model and cooperation and competition theory. The results show that the perceived severity of the threat, perceived barriers, perceived benefits, self-efficacy, competition, and cooperation are significant factors in the prediction of social engineering victimization. Social engineering social gaming networks competition cooperation susceptibility health belief model Electrical engineering. Electronics. Nuclear engineering Nora Alshwihi verfasserin aut Abdullah Algarni verfasserin aut In IEEE Access IEEE, 2014 8(2020), Seite 97383-97391 (DE-627)728440385 (DE-600)2687964-5 21693536 nnns volume:8 year:2020 pages:97383-97391 https://doi.org/10.1109/ACCESS.2020.2995619 kostenfrei https://doaj.org/article/70e31845c4104b3c8692d75d0da1bab5 kostenfrei https://ieeexplore.ieee.org/document/9096355/ kostenfrei https://doaj.org/toc/2169-3536 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 8 2020 97383-97391 |
allfieldsGer |
10.1109/ACCESS.2020.2995619 doi (DE-627)DOAJ013292277 (DE-599)DOAJ70e31845c4104b3c8692d75d0da1bab5 DE-627 ger DE-627 rakwb eng TK1-9971 Ahmad Alturki verfasserin aut Factors Influencing Players’ Susceptibility to Social Engineering in Social Gaming Networks 2020 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Social gaming networks have become a new phenomenon, especially for young people, who may become addicted to some extent. However, this phenomenon also increases their susceptibility to hacking, cyber-attack, and other types of security breaches. Various studies have found that current technology is inadequate in terms of online security. Thus, researchers have started to pay attention to the human aspect of security, which is based on interactions with strangers who may trick other gamers into revealing personal or financial information, that is, social engineering. There is little in the social gaming network literature to help players, researchers, and organizations to address the human aspect of online security, and thus there is a need to investigate the factors affecting this aspect of security. The current study aims to identify the factors influencing social engineering victimization in social gaming networks. The model developed in this study is based on the health belief model and cooperation and competition theory. The results show that the perceived severity of the threat, perceived barriers, perceived benefits, self-efficacy, competition, and cooperation are significant factors in the prediction of social engineering victimization. Social engineering social gaming networks competition cooperation susceptibility health belief model Electrical engineering. Electronics. Nuclear engineering Nora Alshwihi verfasserin aut Abdullah Algarni verfasserin aut In IEEE Access IEEE, 2014 8(2020), Seite 97383-97391 (DE-627)728440385 (DE-600)2687964-5 21693536 nnns volume:8 year:2020 pages:97383-97391 https://doi.org/10.1109/ACCESS.2020.2995619 kostenfrei https://doaj.org/article/70e31845c4104b3c8692d75d0da1bab5 kostenfrei https://ieeexplore.ieee.org/document/9096355/ kostenfrei https://doaj.org/toc/2169-3536 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 8 2020 97383-97391 |
allfieldsSound |
10.1109/ACCESS.2020.2995619 doi (DE-627)DOAJ013292277 (DE-599)DOAJ70e31845c4104b3c8692d75d0da1bab5 DE-627 ger DE-627 rakwb eng TK1-9971 Ahmad Alturki verfasserin aut Factors Influencing Players’ Susceptibility to Social Engineering in Social Gaming Networks 2020 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Social gaming networks have become a new phenomenon, especially for young people, who may become addicted to some extent. However, this phenomenon also increases their susceptibility to hacking, cyber-attack, and other types of security breaches. Various studies have found that current technology is inadequate in terms of online security. Thus, researchers have started to pay attention to the human aspect of security, which is based on interactions with strangers who may trick other gamers into revealing personal or financial information, that is, social engineering. There is little in the social gaming network literature to help players, researchers, and organizations to address the human aspect of online security, and thus there is a need to investigate the factors affecting this aspect of security. The current study aims to identify the factors influencing social engineering victimization in social gaming networks. The model developed in this study is based on the health belief model and cooperation and competition theory. The results show that the perceived severity of the threat, perceived barriers, perceived benefits, self-efficacy, competition, and cooperation are significant factors in the prediction of social engineering victimization. Social engineering social gaming networks competition cooperation susceptibility health belief model Electrical engineering. Electronics. Nuclear engineering Nora Alshwihi verfasserin aut Abdullah Algarni verfasserin aut In IEEE Access IEEE, 2014 8(2020), Seite 97383-97391 (DE-627)728440385 (DE-600)2687964-5 21693536 nnns volume:8 year:2020 pages:97383-97391 https://doi.org/10.1109/ACCESS.2020.2995619 kostenfrei https://doaj.org/article/70e31845c4104b3c8692d75d0da1bab5 kostenfrei https://ieeexplore.ieee.org/document/9096355/ kostenfrei https://doaj.org/toc/2169-3536 Journal toc kostenfrei GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 AR 8 2020 97383-97391 |
language |
English |
source |
In IEEE Access 8(2020), Seite 97383-97391 volume:8 year:2020 pages:97383-97391 |
sourceStr |
In IEEE Access 8(2020), Seite 97383-97391 volume:8 year:2020 pages:97383-97391 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Social engineering social gaming networks competition cooperation susceptibility health belief model Electrical engineering. Electronics. Nuclear engineering |
isfreeaccess_bool |
true |
container_title |
IEEE Access |
authorswithroles_txt_mv |
Ahmad Alturki @@aut@@ Nora Alshwihi @@aut@@ Abdullah Algarni @@aut@@ |
publishDateDaySort_date |
2020-01-01T00:00:00Z |
hierarchy_top_id |
728440385 |
id |
DOAJ013292277 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ013292277</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230307031206.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230226s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1109/ACCESS.2020.2995619</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ013292277</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJ70e31845c4104b3c8692d75d0da1bab5</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK1-9971</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Ahmad Alturki</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Factors Influencing Players’ Susceptibility to Social Engineering in Social Gaming Networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2020</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Social gaming networks have become a new phenomenon, especially for young people, who may become addicted to some extent. However, this phenomenon also increases their susceptibility to hacking, cyber-attack, and other types of security breaches. Various studies have found that current technology is inadequate in terms of online security. Thus, researchers have started to pay attention to the human aspect of security, which is based on interactions with strangers who may trick other gamers into revealing personal or financial information, that is, social engineering. There is little in the social gaming network literature to help players, researchers, and organizations to address the human aspect of online security, and thus there is a need to investigate the factors affecting this aspect of security. The current study aims to identify the factors influencing social engineering victimization in social gaming networks. The model developed in this study is based on the health belief model and cooperation and competition theory. The results show that the perceived severity of the threat, perceived barriers, perceived benefits, self-efficacy, competition, and cooperation are significant factors in the prediction of social engineering victimization.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">social gaming networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">competition</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">cooperation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">susceptibility</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">health belief model</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electrical engineering. Electronics. Nuclear engineering</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Nora Alshwihi</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Abdullah Algarni</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">IEEE Access</subfield><subfield code="d">IEEE, 2014</subfield><subfield code="g">8(2020), Seite 97383-97391</subfield><subfield code="w">(DE-627)728440385</subfield><subfield code="w">(DE-600)2687964-5</subfield><subfield code="x">21693536</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:8</subfield><subfield code="g">year:2020</subfield><subfield code="g">pages:97383-97391</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1109/ACCESS.2020.2995619</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/70e31845c4104b3c8692d75d0da1bab5</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ieeexplore.ieee.org/document/9096355/</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/2169-3536</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">8</subfield><subfield code="j">2020</subfield><subfield code="h">97383-97391</subfield></datafield></record></collection>
|
callnumber-first |
T - Technology |
author |
Ahmad Alturki |
spellingShingle |
Ahmad Alturki misc TK1-9971 misc Social engineering misc social gaming networks misc competition misc cooperation misc susceptibility misc health belief model misc Electrical engineering. Electronics. Nuclear engineering Factors Influencing Players’ Susceptibility to Social Engineering in Social Gaming Networks |
authorStr |
Ahmad Alturki |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)728440385 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut aut |
collection |
DOAJ |
remote_str |
true |
callnumber-label |
TK1-9971 |
illustrated |
Not Illustrated |
issn |
21693536 |
topic_title |
TK1-9971 Factors Influencing Players’ Susceptibility to Social Engineering in Social Gaming Networks Social engineering social gaming networks competition cooperation susceptibility health belief model |
topic |
misc TK1-9971 misc Social engineering misc social gaming networks misc competition misc cooperation misc susceptibility misc health belief model misc Electrical engineering. Electronics. Nuclear engineering |
topic_unstemmed |
misc TK1-9971 misc Social engineering misc social gaming networks misc competition misc cooperation misc susceptibility misc health belief model misc Electrical engineering. Electronics. Nuclear engineering |
topic_browse |
misc TK1-9971 misc Social engineering misc social gaming networks misc competition misc cooperation misc susceptibility misc health belief model misc Electrical engineering. Electronics. Nuclear engineering |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
IEEE Access |
hierarchy_parent_id |
728440385 |
hierarchy_top_title |
IEEE Access |
isfreeaccess_txt |
true |
familylinks_str_mv |
(DE-627)728440385 (DE-600)2687964-5 |
title |
Factors Influencing Players’ Susceptibility to Social Engineering in Social Gaming Networks |
ctrlnum |
(DE-627)DOAJ013292277 (DE-599)DOAJ70e31845c4104b3c8692d75d0da1bab5 |
title_full |
Factors Influencing Players’ Susceptibility to Social Engineering in Social Gaming Networks |
author_sort |
Ahmad Alturki |
journal |
IEEE Access |
journalStr |
IEEE Access |
callnumber-first-code |
T |
lang_code |
eng |
isOA_bool |
true |
recordtype |
marc |
publishDateSort |
2020 |
contenttype_str_mv |
txt |
container_start_page |
97383 |
author_browse |
Ahmad Alturki Nora Alshwihi Abdullah Algarni |
container_volume |
8 |
class |
TK1-9971 |
format_se |
Elektronische Aufsätze |
author-letter |
Ahmad Alturki |
doi_str_mv |
10.1109/ACCESS.2020.2995619 |
author2-role |
verfasserin |
title_sort |
factors influencing players’ susceptibility to social engineering in social gaming networks |
callnumber |
TK1-9971 |
title_auth |
Factors Influencing Players’ Susceptibility to Social Engineering in Social Gaming Networks |
abstract |
Social gaming networks have become a new phenomenon, especially for young people, who may become addicted to some extent. However, this phenomenon also increases their susceptibility to hacking, cyber-attack, and other types of security breaches. Various studies have found that current technology is inadequate in terms of online security. Thus, researchers have started to pay attention to the human aspect of security, which is based on interactions with strangers who may trick other gamers into revealing personal or financial information, that is, social engineering. There is little in the social gaming network literature to help players, researchers, and organizations to address the human aspect of online security, and thus there is a need to investigate the factors affecting this aspect of security. The current study aims to identify the factors influencing social engineering victimization in social gaming networks. The model developed in this study is based on the health belief model and cooperation and competition theory. The results show that the perceived severity of the threat, perceived barriers, perceived benefits, self-efficacy, competition, and cooperation are significant factors in the prediction of social engineering victimization. |
abstractGer |
Social gaming networks have become a new phenomenon, especially for young people, who may become addicted to some extent. However, this phenomenon also increases their susceptibility to hacking, cyber-attack, and other types of security breaches. Various studies have found that current technology is inadequate in terms of online security. Thus, researchers have started to pay attention to the human aspect of security, which is based on interactions with strangers who may trick other gamers into revealing personal or financial information, that is, social engineering. There is little in the social gaming network literature to help players, researchers, and organizations to address the human aspect of online security, and thus there is a need to investigate the factors affecting this aspect of security. The current study aims to identify the factors influencing social engineering victimization in social gaming networks. The model developed in this study is based on the health belief model and cooperation and competition theory. The results show that the perceived severity of the threat, perceived barriers, perceived benefits, self-efficacy, competition, and cooperation are significant factors in the prediction of social engineering victimization. |
abstract_unstemmed |
Social gaming networks have become a new phenomenon, especially for young people, who may become addicted to some extent. However, this phenomenon also increases their susceptibility to hacking, cyber-attack, and other types of security breaches. Various studies have found that current technology is inadequate in terms of online security. Thus, researchers have started to pay attention to the human aspect of security, which is based on interactions with strangers who may trick other gamers into revealing personal or financial information, that is, social engineering. There is little in the social gaming network literature to help players, researchers, and organizations to address the human aspect of online security, and thus there is a need to investigate the factors affecting this aspect of security. The current study aims to identify the factors influencing social engineering victimization in social gaming networks. The model developed in this study is based on the health belief model and cooperation and competition theory. The results show that the perceived severity of the threat, perceived barriers, perceived benefits, self-efficacy, competition, and cooperation are significant factors in the prediction of social engineering victimization. |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_DOAJ GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_31 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_95 GBV_ILN_105 GBV_ILN_110 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_213 GBV_ILN_230 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_2014 GBV_ILN_4012 GBV_ILN_4037 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4249 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4335 GBV_ILN_4338 GBV_ILN_4367 GBV_ILN_4700 |
title_short |
Factors Influencing Players’ Susceptibility to Social Engineering in Social Gaming Networks |
url |
https://doi.org/10.1109/ACCESS.2020.2995619 https://doaj.org/article/70e31845c4104b3c8692d75d0da1bab5 https://ieeexplore.ieee.org/document/9096355/ https://doaj.org/toc/2169-3536 |
remote_bool |
true |
author2 |
Nora Alshwihi Abdullah Algarni |
author2Str |
Nora Alshwihi Abdullah Algarni |
ppnlink |
728440385 |
callnumber-subject |
TK - Electrical and Nuclear Engineering |
mediatype_str_mv |
c |
isOA_txt |
true |
hochschulschrift_bool |
false |
doi_str |
10.1109/ACCESS.2020.2995619 |
callnumber-a |
TK1-9971 |
up_date |
2024-07-03T16:50:27.915Z |
_version_ |
1803577383103496192 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">DOAJ013292277</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230307031206.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">230226s2020 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1109/ACCESS.2020.2995619</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)DOAJ013292277</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DOAJ70e31845c4104b3c8692d75d0da1bab5</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK1-9971</subfield></datafield><datafield tag="100" ind1="0" ind2=" "><subfield code="a">Ahmad Alturki</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Factors Influencing Players’ Susceptibility to Social Engineering in Social Gaming Networks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2020</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Social gaming networks have become a new phenomenon, especially for young people, who may become addicted to some extent. However, this phenomenon also increases their susceptibility to hacking, cyber-attack, and other types of security breaches. Various studies have found that current technology is inadequate in terms of online security. Thus, researchers have started to pay attention to the human aspect of security, which is based on interactions with strangers who may trick other gamers into revealing personal or financial information, that is, social engineering. There is little in the social gaming network literature to help players, researchers, and organizations to address the human aspect of online security, and thus there is a need to investigate the factors affecting this aspect of security. The current study aims to identify the factors influencing social engineering victimization in social gaming networks. The model developed in this study is based on the health belief model and cooperation and competition theory. The results show that the perceived severity of the threat, perceived barriers, perceived benefits, self-efficacy, competition, and cooperation are significant factors in the prediction of social engineering victimization.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Social engineering</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">social gaming networks</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">competition</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">cooperation</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">susceptibility</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">health belief model</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Electrical engineering. Electronics. Nuclear engineering</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Nora Alshwihi</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="0" ind2=" "><subfield code="a">Abdullah Algarni</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">In</subfield><subfield code="t">IEEE Access</subfield><subfield code="d">IEEE, 2014</subfield><subfield code="g">8(2020), Seite 97383-97391</subfield><subfield code="w">(DE-627)728440385</subfield><subfield code="w">(DE-600)2687964-5</subfield><subfield code="x">21693536</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:8</subfield><subfield code="g">year:2020</subfield><subfield code="g">pages:97383-97391</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1109/ACCESS.2020.2995619</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doaj.org/article/70e31845c4104b3c8692d75d0da1bab5</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://ieeexplore.ieee.org/document/9096355/</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="u">https://doaj.org/toc/2169-3536</subfield><subfield code="y">Journal toc</subfield><subfield code="z">kostenfrei</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_DOAJ</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4012</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4367</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">8</subfield><subfield code="j">2020</subfield><subfield code="h">97383-97391</subfield></datafield></record></collection>
|
score |
7.4013777 |