{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T06:00:57Z","timestamp":1775282457097,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030032500","type":"print"},{"value":"9783030032517","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-03251-7_13","type":"book-chapter","created":{"date-parts":[[2018,11,23]],"date-time":"2018-11-23T02:12:07Z","timestamp":1542939127000},"page":"114-125","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Intentionality and Agency in Security"],"prefix":"10.1007","author":[{"given":"Kat","family":"Krol","sequence":"first","affiliation":[]},{"given":"David","family":"Llewellyn-Jones","sequence":"additional","affiliation":[]},{"given":"Seb","family":"Aebischer","sequence":"additional","affiliation":[]},{"given":"Claudio","family":"Dettoni","sequence":"additional","affiliation":[]},{"given":"Frank","family":"Stajano","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,24]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Anderson, R.: Why information security is hard\u2014An economic perspective. In: Computer Security Applications Conference (ACSAC 2001), pp. 358\u2013365. IEEE (2001)","DOI":"10.1109\/ACSAC.2001.991552"},{"key":"13_CR2","unstructured":"Apple Support: How to unlock your Mac with your Apple Watch, January 2018. https:\/\/support.apple.com\/en-us\/HT206995"},{"key":"13_CR3","unstructured":"BBC: \u2018Relay crime\u2019 theft caught on camera, November 2017. http:\/\/www.bbc.co.uk\/news\/av\/uk-42132804\/relay-crime-theft-caught-on-camera"},{"issue":"1","key":"13_CR4","first-page":"65","volume":"3","author":"J Currie","year":"2011","unstructured":"Currie, J., Walker, R.: Traffic congestion and infant health: Evidence from E-ZPass. Am. Econ. J.: Appl. Econ. 3(1), 65\u201390 (2011)","journal-title":"Am. Econ. J.: Appl. Econ."},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Emms, M., Arief, B., Freitas, L., Hannon, J., van Moorsel, A.: Harvesting high value foreign currency transactions from EMV contactless credit cards without the PIN. In: Conference on Computer and Communications Security (CCS), pp. 716\u2013726. ACM (2014)","DOI":"10.1145\/2660267.2660312"},{"key":"13_CR6","unstructured":"Emms, M., van Moorsel, A.: Practical attack on contactless payment cards. In: HCI2011 Workshop\u2014Health, Wealth and Identity Theft (2011)"},{"key":"13_CR7","unstructured":"Francillon, A., Danev, B., Capkun, S.: Relay attacks on passive keyless entry and start systems in modern cars. In: Network and Distributed System Security Symposium (NDSS) (2011)"},{"key":"13_CR8","doi-asserted-by":"crossref","unstructured":"Herley, C.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: New Security Paradigms Workshop (NSPW 2009), pp. 133\u2013144. ACM (2009)","DOI":"10.1145\/1719030.1719050"},{"issue":"1","key":"13_CR9","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/MSP.2013.134","volume":"12","author":"C Herley","year":"2014","unstructured":"Herley, C.: More is not the answer. IEEE Secur. Priv. 12(1), 14\u201319 (2014)","journal-title":"IEEE Secur. Priv."},{"key":"13_CR10","unstructured":"Hirose, M.: Newly Obtained Records Reveal Extensive Monitoring of E-ZPass Tags Throughout New York, April 2015. https:\/\/www.aclu.org\/blog\/privacy-technology\/location-tracking\/newly-obtained-records-reveal-extensive-monitoring-e-zpass"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Jia, H., Wu, M., Jung, E., Shapiro, A., Sundar, S.S.: Balancing human agency and object agency: An end-user interview study of the Internet of Things. In: ACM Conference on Ubiquitous Computing, pp. 1185\u20131188. ACM (2012)","DOI":"10.1145\/2370216.2370470"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Krol, K., Philippou, E., De Cristofaro, E., Sasse, M.A.: \u201cThey brought in the horrible key ring thing!\u201d Analysing the usability of two-factor authentication in UK online banking. In: NDSS Workshop on Usable Security (USEC) (2015)","DOI":"10.14722\/usec.2015.23001"},{"key":"13_CR13","doi-asserted-by":"crossref","unstructured":"Krol, K., Rahman, M.S., Parkin, S., De Cristofaro, E., Vasserman, E.: An exploratory study of user perceptions of payment methods in the UK and the US. In: NDSS Workshop on Usable Security (USEC) (2016)","DOI":"10.14722\/usec.2016.23018"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Payne, J., Jenkinson, G., Stajano, F., Sasse, M.A., Spencer, M.: Responsibility and tangible security: Towards a theory of user acceptance of security tokens. In: NDSS Workshop on Usable Security (USEC) (2016)","DOI":"10.14722\/usec.2016.23003"},{"key":"13_CR15","unstructured":"SAASPASS: About: What is SAASPASS? February 2018. https:\/\/saaspass.com\/about.html"},{"issue":"5","key":"13_CR16","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MSP.2016.110","volume":"14","author":"MA Sasse","year":"2016","unstructured":"Sasse, M.A., Smith, M., Herley, C., Lipford, H., Vaniea, K.: Debunking security-usability tradeoff myths. IEEE Secur. Priv. 14(5), 33\u201339 (2016)","journal-title":"IEEE Secur. Priv."},{"issue":"4","key":"13_CR17","doi-asserted-by":"publisher","first-page":"1417","DOI":"10.1016\/j.chb.2012.03.004","volume":"28","author":"D-H Shin","year":"2012","unstructured":"Shin, D.-H., Jung, J., Chang, B.-H.: The psychology behind QR codes: User experience perspective. Comput. Hum. Behav. 28(4), 1417\u20131426 (2012)","journal-title":"Comput. Hum. Behav."},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Stajano, F.: Pico: No more passwords! Talk at USENIX Security (2011). https:\/\/www.usenix.org\/conference\/usenix-security-11\/pico-no-more-passwords","DOI":"10.1007\/978-3-642-25867-1_6"},{"key":"13_CR19","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-642-25867-1_6","volume-title":"Security Protocols XIX","author":"Frank Stajano","year":"2011","unstructured":"Stajano, F.: Pico: No more passwords! In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds.) Security Protocols 2011. LNCS, vol. 7114, pp. 49\u201381. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25867-1_6"},{"key":"13_CR20","unstructured":"Transport for London: Card clash, February 2018. https:\/\/tfl.gov.uk\/fares-and-payments\/oyster\/using-oyster\/card-clash"},{"key":"13_CR21","first-page":"623","volume":"3","author":"LM Ulatowski","year":"2007","unstructured":"Ulatowski, L.M.: Recent developments in RFID technology: Weighing utility against potential privacy concerns. J. Law Policy Inf. Soc. 3, 623 (2007)","journal-title":"J. Law Policy Inf. Soc."},{"issue":"3","key":"13_CR22","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"Mark Weiser","year":"1991","unstructured":"Weiser, M.: The computer for the 21st century. Sci. Am. Spec. Issue Commun. Comput. Netw. 265(September), 94\u2013104 (1991)","journal-title":"Scientific American"},{"key":"13_CR23","unstructured":"Windows Support: Lock your Windows 10 PC automatically when you step away from it, April 2018. https:\/\/support.microsoft.com\/en-gb\/help\/4028111\/windows-lock-your-windows-10-pc-automatically-when-you-step-away-from"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXVI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-03251-7_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T05:16:53Z","timestamp":1775279813000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-03251-7_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030032500","9783030032517"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-03251-7_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"Security Protocols","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cambridge International Workshop on Security Protocols","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cambridge","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 March 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 March 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spw2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spw2018.crocs.fi.muni.cz","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"the workshop is invitation only","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"email","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"N\/A% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0.0","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0.0","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"the workshop is invitation only","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}