Array
(
    [0] => stdClass Object
        (
            [journal] => stdClass Object
                (
                    [id_jnl] => 4
                )

        )

    [1] => stdClass Object
        (
            [section] => stdClass Object
                (
                    [section] => 110
                )

        )

    [2] => stdClass Object
        (
            [title] => Array
                (
                    [0] => The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information@en
                    [1] => The information behavior of Information Security and Cryptography professionals: how these professionals seek and use information@pt
                )

        )

    [3] => stdClass Object
        (
            [abstract] => Array
                (
                    [0] => This paper presents a user study of information security and cryptography professionals, focusing on the use of information behavior models. The methodological procedure proposed in this paper uses as a base model the information behavior model proposed by Choo et al. (2000), which divides human information behavior into three processes: information need, seek and use. The exploratory, descriptive and quali-quantitative study was carried out with 50 professionals from the Brazilian Community of Information Security and Cryptography (Comsic) through questionnaires, interviews and documentary analysis. Four subgroups were identified: cryptographic algorithms and protocols research group, cryptographic hardware and firmware development group, network security professionals group, and information security managers group.@en
                    [1] => This paper presents a user study of information security and cryptography professionals, focusing on the use of information behavior models. The methodological procedure proposed in this paper uses as a base model the information behavior model proposed by Choo et al. (2000), which divides human information behavior into three processes: information need, seek and use. The exploratory, descriptive and quali-quantitative study was carried out with 50 professionals from the Brazilian Community of Information Security and Cryptography (Comsic) through questionnaires, interviews and documentary analysis. Four subgroups were identified: cryptographic algorithms and protocols research group, cryptographic hardware and firmware development group, network security professionals group, and information security managers group.@pt
                )

        )

    [4] => stdClass Object
        (
            [author] => Array
                (
                    [0] => Paulo Hideo Ohtoshi
                    [1] => Cláudio Gottschalg Duque
                )

        )

    [5] => stdClass Object
        (
            [subject] => Array
                (
                    [0] => Information behavior@pt
                    [1] => Information need@pt
                    [2] => Information seek@pt
                    [3] => Information use@pt
                    [4] => Information security@pt
                    [5] => Cryptography@pt
                )

        )

    [6] => stdClass Object
        (
            [source] => stdClass Object
                (
                    [vol] => 11
                    [nr] => 3
                    [year] => 2017
                    [theme] => 
                )

        )

    [7] => stdClass Object
        (
            [datePub] => Array
                (
                    [0] => 2017-10-09
                )

        )

    [8] => stdClass Object
        (
            [DOI] => Array
                (
                    [0] => stdClass Object
                        (
                            [type] => DOI
                            [value] => Array
                                (
                                    [0] => 10.36311/1981-1640.2017.v11n3.02.p6
                                )

                        )

                )

        )

    [9] => stdClass Object
        (
            [http] => Array
                (
                    [0] => stdClass Object
                        (
                            [type] => HTTP
                            [value] => Array
                                (
                                    [0] => https://revistas.marilia.unesp.br/index.php/bjis/article/view/5920
                                )

                        )

                    [1] => stdClass Object
                        (
                            [type] => HTTP
                            [value] => Array
                                (
                                    [0] => https://revistas.marilia.unesp.br/index.php/bjis/article/view/5920/4664
                                )

                        )

                )

        )

    [10] => stdClass Object
        (
            [language] => Array
                (
                    [0] => en
                )

        )

    [11] => stdClass Object
        (
            [license] => Array
                (
                    [0] => Copr
                    [1] => by-sa/4.0
                )

        )

)