Array
(
    [responseDate] => 2023-12-18T09:03:17Z
    [request] => https://revistas.marilia.unesp.br/index.php/bjis/oai
    [GetRecord] => SimpleXMLElement Object
        (
            [record] => SimpleXMLElement Object
                (
                    [header] => SimpleXMLElement Object
                        (
                            [identifier] => oai:ojs.revistas.marilia.unesp.br:article/5920
                            [datestamp] => 2022-06-20T17:42:31Z
                            [setSpec] => Array
                                (
                                    [0] => bjis:ARTIGOS
                                    [1] => driver
                                )

                        )

                    [metadata] => SimpleXMLElement Object
                        (
                            [dc] => SimpleXMLElement Object
                                (
                                    [title] => Array
                                        (
                                            [0] => The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information
                                            [1] => The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information
                                        )

                                    [creator] => Array
                                        (
                                            [0] => Ohtoshi, Paulo Hideo
                                            [1] => Duque, Cláudio Gottschalg
                                        )

                                    [subject] => Array
                                        (
                                            [0] => Information Behavior
                                            [1] => Information Need
                                            [2] => Information Seek
                                            [3] => Information Use
                                            [4] => Information Security
                                            [5] => Cryptography
                                        )

                                    [description] => Array
                                        (
                                            [0] => This paper presents a user study of information security and cryptography professionals, focusing on the use of information behavior models. The methodological procedure proposed in this paper uses as a base model the information behavior model proposed by Choo et al. (2000), which divides human information behavior into three processes: information need, seek and use. The exploratory, descriptive and quali-quantitative study was carried out with 50 professionals from the Brazilian Community of Information Security and Cryptography (Comsic) through questionnaires, interviews and documentary analysis. Four subgroups were identified: cryptographic algorithms and protocols research group, cryptographic hardware and firmware development group, network security professionals group, and information security managers group.
                                            [1] => This paper presents a user study of information security and cryptography professionals, focusing on the use of information behavior models. The methodological procedure proposed in this paper uses as a base model the information behavior model proposed by Choo et al. (2000), which divides human information behavior into three processes: information need, seek and use. The exploratory, descriptive and quali-quantitative study was carried out with 50 professionals from the Brazilian Community of Information Security and Cryptography (Comsic) through questionnaires, interviews and documentary analysis. Four subgroups were identified: cryptographic algorithms and protocols research group, cryptographic hardware and firmware development group, network security professionals group, and information security managers group.
                                        )

                                    [publisher] => Faculdade de Filosofia e Ciências
                                    [date] => 2017-10-09
                                    [type] => Array
                                        (
                                            [0] => info:eu-repo/semantics/article
                                            [1] => info:eu-repo/semantics/publishedVersion
                                        )

                                    [format] => application/pdf
                                    [identifier] => Array
                                        (
                                            [0] => https://revistas.marilia.unesp.br/index.php/bjis/article/view/5920
                                            [1] => 10.36311/1981-1640.2017.v11n3.02.p6
                                        )

                                    [source] => Array
                                        (
                                            [0] => Brazilian Journal of Information Science: Research Trends; Vol. 11 No. 3 (2017)
                                            [1] => Brazilian Journal of Information Science: Research Trends; Vol. 11 Núm. 3 (2017)
                                            [2] => Brazilian Journal of Information Science: research trends; v. 11 n. 3 (2017)
                                            [3] => 1981-1640
                                        )

                                    [language] => eng
                                    [relation] => https://revistas.marilia.unesp.br/index.php/bjis/article/view/5920/4664
                                    [rights] => Array
                                        (
                                            [0] => Copyright (c) 2017 Paulo Hideo Ohtoshi, Cláudio Gottschalg Duque
                                            [1] => https://creativecommons.org/licenses/by-sa/4.0
                                        )

                                )

                        )

                )

        )

)