{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T17:02:54Z","timestamp":1749661374087,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319076195"},{"type":"electronic","value":"9783319076201"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07620-1_1","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:55:03Z","timestamp":1402404903000},"page":"3-10","source":"Crossref","is-referenced-by-count":1,"title":["On Supporting Security and Privacy-Preserving Interaction through Adaptive Usable Security"],"prefix":"10.1007","author":[{"given":"Marios","family":"Belk","sequence":"first","affiliation":[]},{"given":"Christos","family":"Fidas","sequence":"additional","affiliation":[]},{"given":"Panagiotis","family":"Germanakos","sequence":"additional","affiliation":[]},{"given":"George","family":"Samaras","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Department of Homeland Security: A Roadmap for Cybersecurity Research (2009), \n                    \n                      http:\/\/www.cyber.st.dhs.gov\/docs\/DHS-Cybersecurity-Roadmap.pdf"},{"key":"1_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72079-9","volume-title":"The Adaptive Web: Methods and Strategies of Web Personalization","author":"P. Brusilovsky","year":"2007","unstructured":"Brusilovsky, P., Kobsa, A., Nejdl, W.: The Adaptive Web: Methods and Strategies of Web Personalization. Springer, Heidelberg (2007)"},{"issue":"12","key":"1_CR3","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A. Adams","year":"1999","unstructured":"Adams, A., Sasse, M.A.: Users Are Not the Enemy: Why Users Compromise Security Mechanisms and How to Take Remedial Measures. J. Communications of the ACM.\u00a042(12), 40\u201346 (1999)","journal-title":"J. Communications of the ACM."},{"key":"1_CR4","unstructured":"Cranor, L., Garfinkel, S.: O\u2019Reilly Media, Inc. (2005)"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Shay, R., Kelley, P., Komanduri, S., Mazurek, M., Ur, B., Vidas, T., Bauer, L., Christin, N., Cranor, L.: Correct Horse Battery Staple: Exploring the Usability of System-assigned Passphrases. In: ACM Symposium on Usable Privacy and Security, Article 7, 20 pages. ACM Press, New York (2012)","DOI":"10.1145\/2335356.2335366"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Biddle, R., Chiasson, S., van Oorschot, P.: Graphical Passwords: Learning from the First Twelve Years. J. ACM Computing Surveys\u00a044(4), 41 pages (2012)","DOI":"10.1145\/2333112.2333114"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Fidas, C.A., Voyiatzis, A.G., Avouris, N.M.: When security meets usability: A user-centric approach on a crossroads priority problem. In: Proc. of Panhellenic Conference on Informatics, PCI 2010, pp. 112\u2013117. IEEE Computer Society (2010)","DOI":"10.1109\/PCI.2010.17"},{"key":"1_CR8","unstructured":"Norman, D.: The Design of Everyday Things. Psychology of Everyday Action. New York (1988)"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Su, X., Khoshgoftaar, T.: A Survey of Collaborative Filtering Techniques. J. Advances in Artificial Intelligence, Article 4, 19 pages (2009)","DOI":"10.1155\/2009\/421425"},{"issue":"3-4","key":"1_CR10","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1080\/0144341910110301","volume":"11","author":"R. Riding","year":"1991","unstructured":"Riding, R., Cheema, I.: Cognitive Styles \u2013 An Overview and Integration. J. Educational Psychology\u00a011(3-4), 193\u2013215 (1991)","journal-title":"J. Educational Psychology"},{"key":"1_CR11","doi-asserted-by":"crossref","unstructured":"Schecter, S.E., Dhamija, R., Ozment, A., Fischer, I.: The Emperor\u2019s New Security Indicators: An evaluation of website authentication and the effect of role playing on usability studies. In: Proc. of IEEE Symposium on Security and Privacy (2007)","DOI":"10.1109\/SP.2007.35"},{"key":"1_CR12","doi-asserted-by":"crossref","unstructured":"Falk, L., Prakash, A., Borders, K.: Analyzing Websites for User-Visible Security Design Flaws. In: Proc. of Symposium on Usable Privacy and Security, pp. 117\u2013126. ACM Press (2008)","DOI":"10.1145\/1408664.1408680"},{"key":"1_CR13","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/966389.966390","volume":"47","author":"L. Ahn von","year":"2004","unstructured":"von Ahn, L., Blum, M., Langford, J.: Telling Humans and Computers Apart Automatically. J. Communications of the ACM\u00a047, 56\u201360 (2004)","journal-title":"J. Communications of the ACM"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Fidas, C., Voyiatzis, A., Avouris, N.: On the Necessity of User-friendly CAPTCHA. In: Proc. of Human Factors in Computing Systems, CHI 2011, pp. 2623\u20132626. ACM Press (2011)","DOI":"10.1145\/1978942.1979325"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-540-72079-9_11","volume-title":"The Adaptive Web","author":"B. Smyth","year":"2007","unstructured":"Smyth, B.: Case-based recommendation. In: Brusilovsky, P., Kobsa, A., Nejdl, W. (eds.) Adaptive Web 2007. LNCS, vol.\u00a04321, pp. 342\u2013376. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07620-1_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T23:14:06Z","timestamp":1582413246000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07620-1_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076195","9783319076201"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07620-1_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}