{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T00:00:17Z","timestamp":1725494417236},"publisher-location":"Boston, MA","reference-count":9,"publisher":"Springer US","isbn-type":[{"type":"print","value":"9780387723662"},{"type":"electronic","value":"9780387723679"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-0-387-72367-9_18","type":"book-chapter","created":{"date-parts":[[2007,11,9]],"date-time":"2007-11-09T23:12:08Z","timestamp":1194649928000},"page":"205-216","source":"Crossref","is-referenced-by-count":0,"title":["A Practical Usability Evaluation of Security Features in End-User Applications"],"prefix":"10.1007","author":[{"given":"S. M.","family":"Furnell","sequence":"first","affiliation":[]},{"given":"D.","family":"Katsabas","sequence":"additional","affiliation":[]},{"given":"P. S.","family":"Dowland","sequence":"additional","affiliation":[]},{"given":"F.","family":"Reid","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","unstructured":"Whitten, A. and Tygar, J. D. 1999. \u201cWhy Johnny can\u2019t Encrypt: A usability Evaluation of PGP 5.0\u201d, Proceedings of the 8th USENIX Security Symposium, Washington, D.C., USA, August 23-26, pp 169\u2013184."},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"DeWitt, A.J. and Kuljis, J. 2006. \u201cAligning usability and security: a usability study of Polaris\u201d, Proceedings of the Second Symposium on Usable Privacy and Security (SOUPS\u2019 06), Pittsburgh, Pennsylvania, USA, July 12-14, pp1\u20137.","DOI":"10.1145\/1143120.1143122"},{"key":"18_CR3","unstructured":"Cranor, L.F. and Garfinkel, S. 2005. Security and Usability: Designing Secure Systems That People Can Use. O\u2019Reilly. ISBN 0596008279."},{"key":"18_CR4","volume-title":"Grand Research Challenges in Information Systems","author":"CRA. 2003.","year":"2003","unstructured":"CRA. 2003. Grand Research Challenges in Information Systems, Computing Research Association, Washington DC, September 2003. \n                    http:\/\/www.cra.org\/reports\/gc.systems.pdf\n                    \n                  ."},{"key":"18_CR5","unstructured":"Furnell, S.M., Jusoh, A. and Katsabas, D. 2006. \u201cThe challenges of understanding and using security: A survey of end-users\u201d, Computers & Security, vol. 25, no. 1, pp27\u201335."},{"key":"18_CR6","unstructured":"Nielson, J. 1994. \u201cEstimating the number of subjects needed for a thinking aloud test\u201d, International Journal of Human-Computer Studies, vol. 41, no. 3, pp385\u2013397."},{"key":"18_CR7","unstructured":"Lewis, C. and Rieman, J. 1993\/1994. Chapter 5 in Task-Centred User Inferface Design-A Practical Introduction. See \n                    http:\/\/www.hcibib.org\/tcuid"},{"key":"18_CR8","unstructured":"Furnell, S.M. 2005. \u201cWhy users cannot use security\u201d, Computers & Security, vol. 24, no. 4, pp274\u2013279."},{"key":"18_CR9","unstructured":"Koch, T. 2004. \u201cOutlook Express and Windows XP Service Pack 2: Several Problems or Superior Protection?\u201d, 21 October 2004, \n                    http:\/\/www.microsoft.com\/windows\/ie\/community\/columns\/oeandsp2.mspx\n                    \n                  ."}],"container-title":["IFIP International Federation for Information Processing","New Approaches for Security, Privacy and Trust in Complex Environments"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-72367-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T04:18:41Z","timestamp":1551068321000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-72367-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9780387723662","9780387723679"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-72367-9_18","relation":{},"ISSN":["1571-5736"],"issn-type":[{"type":"print","value":"1571-5736"}],"subject":[],"published":{"date-parts":[[2007]]}}}