{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:31:19Z","timestamp":1773408679193,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319076195","type":"print"},{"value":"9783319076201","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07620-1_4","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:55:03Z","timestamp":1402404903000},"page":"33-44","source":"Crossref","is-referenced-by-count":5,"title":["An Assessment Framework for Usable-Security Based on Decision Science"],"prefix":"10.1007","author":[{"given":"Yasser M.","family":"Hausawi","sequence":"first","affiliation":[]},{"given":"William H.","family":"Allen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"12","key":"4_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A. Adams","year":"1999","unstructured":"Adams, A., Sasse, M.A.: Users are not the enemy. Communications of the ACM\u00a042(12), 40\u201346 (1999)","journal-title":"Communications of the ACM"},{"issue":"1","key":"4_CR2","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/PL00010356","volume":"6","author":"A.I. Anton","year":"2001","unstructured":"Anton, A.I., Carter, R.A., Dagnino, A., Dempster, J.H., Siege, D.F.: Deriving goals from a use-case based requirements specification. Requirements Engineering\u00a06(1), 63\u201373 (2001)","journal-title":"Requirements Engineering"},{"key":"4_CR3","unstructured":"Bosch, J.: Design and use of software architectures: adopting and evolving a product-line approach. Pearson Education (2000)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-540-74800-7_9","volume-title":"Human-Computer Interaction \u2013 INTERACT 2007","author":"C. Braz","year":"2007","unstructured":"Braz, C., Seffah, A., M\u2019Raihi, D.: Designing a trade-off between usability and security: A metrics based-model. In: Baranauskas, C., Abascal, J., Barbosa, S.D.J. (eds.) INTERACT 2007. LNCS, vol.\u00a04663, pp. 114\u2013126. Springer, Heidelberg (2007)"},{"key":"4_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/978-3-642-02463-4_19","volume-title":"Conceptual Modeling: Foundations and Applications","author":"L. Chung","year":"2009","unstructured":"Chung, L., do Prado Leite, J.C.S.: On non-functional requirements in software engineering. In: Borgida, A.T., Chaudhri, V.K., Giorgini, P., Yu, E.S. (eds.) Conceptual Modeling: Foundations and Applications. LNCS, vol.\u00a05600, pp. 363\u2013379. Springer, Heidelberg (2009)"},{"key":"4_CR6","unstructured":"Clemens, R.T., Reilly, T.: Making hard decisions with decision tools\u00ae (2001)"},{"issue":"5","key":"4_CR7","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2004.69","volume":"2","author":"L.F. Cranor","year":"2004","unstructured":"Cranor, L.F., Garfinkel, S.: Guest editors\u2019 introduction: Secure or usable? IEEE Security & Privacy\u00a02(5), 16\u201318 (2004)","journal-title":"IEEE Security & Privacy"},{"issue":"3","key":"4_CR8","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/1125864.1125889","volume":"13","author":"A.J. DeWitt","year":"2006","unstructured":"DeWitt, A.J., Kuljis, J.: Is usable security an oxymoron? Interactions\u00a013(3), 41\u201344 (2006)","journal-title":"Interactions"},{"issue":"2","key":"4_CR9","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2008.49","volume":"6","author":"R. Dhamija","year":"2008","unstructured":"Dhamija, R., Dusseault, L.: The seven flaws of identity management: Usability and security challenges. IEEE Security & Privacy\u00a06(2), 24\u201329 (2008)","journal-title":"IEEE Security & Privacy"},{"key":"4_CR10","unstructured":"Ferre, X.: Integration of usability techniques into the software development process. In: International Conference on Software Engineering (Bridging the gaps between software engineering and human-computer interaction), pp. 28\u201335 (2003)"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Ferreira, A., Rusu, C., Roncagliolo, S.: Usability and security patterns. In: Second International Conferences on Advances in Computer-Human Interactions, ACHI 2009, pp. 301\u2013305. IEEE (2009)","DOI":"10.1109\/ACHI.2009.21"},{"issue":"1","key":"4_CR12","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1504\/IJESDF.2007.013589","volume":"1","author":"I. Flechais","year":"2007","unstructured":"Flechais, I., Mascolo, C., Sasse, A.: Integrating security and usability into the requirements and design process. International Journal of Electronic Security and Digital Forensics\u00a01(1), 12\u201326 (2007)","journal-title":"International Journal of Electronic Security and Digital Forensics"},{"key":"4_CR13","unstructured":"Folmer, E., van Gurp, J., Bosch, J.: Scenario-based assessment of software architecture usability. In: ICSE Workshop on SE-HCI, Citeseer, pp. 61\u201368 (2003)"},{"key":"4_CR14","unstructured":"Garfinkel, S.: Design Principles and Patterns for Computer Systems that are Simultaneously Secure and Usable. PhD thesis, Massachusetts Institute of Technology (2005)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Gorton, I.: Software quality attributes. In: Essential Software Architecture, pp. 23\u201338 (2011)","DOI":"10.1007\/978-3-642-19176-3_3"},{"key":"4_CR16","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1007\/978-3-642-39473-7_23","volume-title":"HCI International 2013 - Posters\u2019 Extended Abstracts","author":"Y.M. Hausawi","year":"2013","unstructured":"Hausawi, Y.M., Mayron, L.M.: Towards usable and secure natural language processing systems. In: Stephanidis, C. (ed.) HCII 2013, Part I. CCIS, vol.\u00a0373, pp. 109\u2013113. Springer, Heidelberg (2013)"},{"key":"4_CR17","unstructured":"WD\u00a0ISO. 9241-11. ergonomic requirements for office work with visual display terminals (VDTs). In: The International Organization for Standardization (1998)"},{"issue":"11","key":"4_CR18","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/1592761.1592773","volume":"52","author":"B. Lampson","year":"2009","unstructured":"Lampson, B.: Privacy and security usable security: How to get it. Communications of the ACM\u00a052(11), 25\u201327 (2009)","journal-title":"Communications of the ACM"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-642-39188-0_21","volume-title":"Universal Access in Human-Computer Interaction. Design Methods, Tools, and Interaction Techniques for eInclusion","author":"L.M. Mayron","year":"2013","unstructured":"Mayron, L.M., Hausawi, Y., Bahr, G.S.: Secure, usable biometric authentication systems. In: Stephanidis, C., Antona, M. (eds.) UAHCI 2013, Part I. LNCS, vol.\u00a08009, pp. 195\u2013204. Springer, Heidelberg (2013)"},{"key":"4_CR20","unstructured":"OWASP. Risk rating methodology (2013)"},{"key":"4_CR21","unstructured":"Pfleeger, C.P., Pfleeger, S.L.: Security in Computing. Prentice Hall PTR (2006)"},{"key":"4_CR22","unstructured":"Robertson, J., Robertson, S.: Volere requirements specification template: Edition January 14 (2009)"},{"key":"4_CR23","unstructured":"Sommerville, I., Sawyer, P.: Requirements engineering: a good practice guide. John Wiley & Sons, Inc. (1997)"},{"issue":"1","key":"4_CR24","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.cose.2008.09.008","volume":"28","author":"C.S. Weir","year":"2009","unstructured":"Weir, C.S., Douglas, G., Carruthers, M., Jack, M.: User perceptions of security, convenience and usability for e-banking authentication tokens. Computers & Security\u00a028(1), 47\u201362 (2009)","journal-title":"Computers & Security"},{"key":"4_CR25","unstructured":"Whitten, A.: Making Security Usable. PhD thesis, Princeton University (2004)"},{"key":"4_CR26","unstructured":"Whitten, A., Tygar, D.: Why johnny can\u2019t encrypt: A usability evaluation of pgp 5.0. In: Proceedings of the 8th USENIX Security Symposium, vol.\u00a099, McGraw-Hill (1999)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07620-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T23:13:58Z","timestamp":1582413238000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07620-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076195","9783319076201"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07620-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}