{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:46:52Z","timestamp":1740098812715,"version":"3.37.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319525020"},{"type":"electronic","value":"9783319525037"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-52503-7_17","type":"book-chapter","created":{"date-parts":[[2017,1,23]],"date-time":"2017-01-23T07:13:32Z","timestamp":1485155612000},"page":"209-216","source":"Crossref","is-referenced-by-count":1,"title":["A User Study About Security Practices of Less-Literate Smartphone Users"],"prefix":"10.1007","author":[{"given":"Pankaj","family":"Doke","sequence":"first","affiliation":[]},{"given":"Sylvan","family":"Lobo","sequence":"additional","affiliation":[]},{"given":"Anirudha","family":"Joshi","sequence":"additional","affiliation":[]},{"given":"Nupur","family":"Aggarwal","sequence":"additional","affiliation":[]},{"given":"Vivek","family":"Paul","sequence":"additional","affiliation":[]},{"given":"Varun","family":"Mevada","sequence":"additional","affiliation":[]},{"given":"Abhijith","family":"KR","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,1,24]]},"reference":[{"key":"17_CR1","unstructured":"DDW-0000C-08.xlsx. http:\/\/www.censusindia.gov.in\/2011census\/C-series\/C-08\/DDW-0000C-08.xlsx . Accessed 19 Jul 2016"},{"key":"17_CR2","volume-title":"Contextual Design: Defining Customer-Centered Systems","author":"H Beyer","year":"2014","unstructured":"Beyer, H., Holtzblatt, K.: Contextual Design: Defining Customer-Centered Systems. Morgan Kaufmann Publishers Inc., San Francisco (2014)"},{"key":"17_CR3","unstructured":"Chen, J., Paik, M., McCabe, K.: Exploring internet security perceptions and practices in Urban Ghana. In: Symposium on Usable Privacy and Security (SOUPS), July 9\u201311, 2014, Menlo Park, CA (2014)"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Egelman, S., Jain, S., Portnoff, R.S., Liao, K., Consolvo, S., Wagner, D.: Are you ready to lock? In: ACM SIGSAC Conference on Computer and Communications Security, pp. 750\u2013761. ACM (2014)","DOI":"10.1145\/2660267.2660273"},{"issue":"2","key":"17_CR5","first-page":"51","volume":"8","author":"I Medhi","year":"2012","unstructured":"Medhi, I., Menon, R.S., Cutrell, E., Toyama, K.: Correlation between limited education and transfer of learning. Inf. Technol. Int. Dev. 8(2), 51 (2012)","journal-title":"Inf. Technol. Int. Dev."},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Medhi, I., Menon, R.S., Cutrell, E., Toyama, K.: Beyond strict illiteracy: abstracted learning among less-literate users. In: ACM\/IEEE International Conference on Information and Communication Technologies and Development (ICTD 2010), Article 23, p. 9. ACM, New York (2010). doi: http:\/\/dx.doi.org\/10.1145\/2369220.2369241","DOI":"10.1145\/2369220.2369241"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Medhi, I., Patnaik, S., Brunskill, E., Gautama, S.N.N., Thies, W., Toyama, K.: Designing mobile interfaces for novice and low-literacy users. ACM Trans. Comput. Hum. Interact. 18(1), 28, Article 2 (2011). doi: http:\/\/dx.doi.org\/10.1145\/1959022.1959024","DOI":"10.1145\/1959022.1959024"},{"issue":"05","key":"17_CR8","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1017\/S135561779700444X","volume":"3","author":"A Reis","year":"1997","unstructured":"Reis, A., Castro-Caldas, A.: Illiteracy: a cause for biased cognitive development. J. Int. Neuropsychol. Soc. 3(05), 444\u2013450 (1997)","journal-title":"J. Int. Neuropsychol. Soc."},{"key":"17_CR9","doi-asserted-by":"crossref","first-page":"705","DOI":"10.1007\/978-3-540-70540-6_103","volume-title":"Computers Helping People with Special Needs","author":"S Linden van","year":"2008","unstructured":"van Linden, S., Cremers, A.H.M.: Cognitive abilities of functionally illiterate persons relevant to ICT use. In: Miesenberger, K., Klaus, J., Zagler, W., Karshmer, A. (eds.) Computers Helping People with Special Needs, pp. 705\u2013712. Springer, Heidelberg (2008)"},{"issue":"10","key":"17_CR10","doi-asserted-by":"crossref","first-page":"1051","DOI":"10.1037\/0003-066X.52.10.1051","volume":"52","author":"SJ Ceci","year":"1997","unstructured":"Ceci, S.J., Williams, W.M.: Schooling, intelligence, and income. Am. Psychol. 52(10), 1051 (1997)","journal-title":"Am. Psychol."},{"key":"17_CR11","unstructured":"Whitten, W., Tygar, J.D.: Why Johnny can\u2019t encrypt: a usability evaluation of PGP 5.0. In: 8th Conference on USENIX Security Symposium (SSYM 1999), vol. 8, p. 14. USENIX Association, Berkeley (1999)"}],"container-title":["Lecture Notes in Computer Science","Intelligent Human Computer Interaction"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-52503-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,17]],"date-time":"2019-09-17T17:59:17Z","timestamp":1568743157000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-52503-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319525020","9783319525037"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-52503-7_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}