{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:40:33Z","timestamp":1725838833623},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319260952"},{"type":"electronic","value":"9783319260969"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-26096-9_25","type":"book-chapter","created":{"date-parts":[[2015,11,24]],"date-time":"2015-11-24T16:18:35Z","timestamp":1448381915000},"page":"247-250","source":"Crossref","is-referenced-by-count":9,"title":["Security is Beautiful"],"prefix":"10.1007","author":[{"given":"Giampaolo","family":"Bella","sequence":"first","affiliation":[]},{"given":"Luca","family":"Vigan\u00f2","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,25]]},"reference":[{"key":"25_CR1","unstructured":"Acquisti, A.: The Economics of Privacy. \n                    http:\/\/www.heinz.cmu.edu\/~acquisti\/economics-privacy.htm"},{"key":"25_CR2","unstructured":"Anderson, R.: Economics and Security Resource Page. \n                    http:\/\/www.cl.cam.ac.uk\/~rja14\/econsec.html"},{"issue":"11","key":"25_CR3","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1145\/2629487","volume":"57","author":"T August","year":"2014","unstructured":"August, T., August, R., Shin, H.: Designing user incentives for cybersecurity. Commun. ACM 57(11), 43\u201346 (2014)","journal-title":"Commun. ACM"},{"issue":"5","key":"25_CR4","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MSP.2013.110","volume":"11","author":"J Blythe","year":"2013","unstructured":"Blythe, J., Koppel, R., Smith, S.W.: Circumvention of security: good users do bad things. IEEE Secur. Priv. 11(5), 80\u201383 (2013)","journal-title":"IEEE Secur. Priv."},{"volume-title":"The Economics of Information Security and Privacy","year":"2013","key":"25_CR5","unstructured":"B\u00f6hme, R. (ed.): The Economics of Information Security and Privacy. Springer, Heidelberg (2013)"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Karlof, C., Tygar, J.D., Wagner, D.: Conditioned-safe ceremonies and a user study of an application to web authentication. In: SOUPS 2009: Proceedings of the 5th Symposium on Usable Privacy and Security. ACM Press (2009)","DOI":"10.1145\/1572532.1572578"},{"issue":"11","key":"25_CR7","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/1592761.1592773","volume":"52","author":"B Lampson","year":"2009","unstructured":"Lampson, B.: Usable security: how to get it. Commun. ACM 52(11), 25\u201327 (2009)","journal-title":"Commun. ACM"},{"issue":"3","key":"25_CR8","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MIC.2008.50","volume":"12","author":"BD Payne","year":"2008","unstructured":"Payne, B.D., Edwards, W.K.: A brief introduction to usable security. IEEE Internet Comput. 12(3), 13\u201321 (2008)","journal-title":"IEEE Internet Comput."},{"key":"25_CR9","unstructured":"Peppa Pig, Series 3, Episode 38, \u201cThe Secret Club\u201d (2010)"},{"key":"25_CR10","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-642-21424-0_9","volume-title":"Future Challenges in Security and Privacy for Academia and Industry","author":"K Radke","year":"2011","unstructured":"Radke, K., Boyd, C., Gonzalez Nieto, J., Brereton, M.: Ceremony analysis: strengths and weaknesses. In: Camenisch, J., Fischer-H\u00fcbner, S., Murayama, Y., Portmann, A., Rieder, C. (eds.) SEC 2011. IFIP AICT, vol. 354, pp. 104\u2013115. Springer, Heidelberg (2011)"},{"key":"25_CR11","unstructured":"Visualisation and Other Methods of Expression (2012). \n                    http:\/\/vome.org.uk\/"},{"key":"25_CR12","unstructured":"Wash, R., Mackie-Mason, J.K.: Incentive-centered design for information security. In: HOTSEC 2006: Proceedings of the 1st Conference on USENIX Workshop on Hot Topics in Security. USENIX Association (2006)"}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXIII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-26096-9_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T17:20:06Z","timestamp":1559323206000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-26096-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319260952","9783319260969"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-26096-9_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}