{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T13:25:05Z","timestamp":1760016305277,"version":"3.40.3"},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584591"},{"type":"electronic","value":"9783319584607"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58460-7_6","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T11:08:42Z","timestamp":1494587322000},"page":"74-89","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A User-Centered Model for Usable Security and Privacy"],"prefix":"10.1007","author":[{"given":"Denis","family":"Feth","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Maier","sequence":"additional","affiliation":[]},{"given":"Svenja","family":"Polst","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"issue":"12","key":"6_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A Adams","year":"1999","unstructured":"Adams, A., Sasse, A.: Users are not the enemy. Commun. ACM 42(12), 40\u201346 (1999)","journal-title":"Commun. ACM"},{"unstructured":"Al-Saleh, M.: Fine-grained reasoning about the security and usability trade-off in modern security tools. Dissertation, The University of New Mexico (2011)","key":"6_CR2"},{"issue":"5","key":"6_CR3","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MSP.2013.110","volume":"11","author":"J Blythe","year":"2013","unstructured":"Blythe, J., Koppel, R., Smith, S.W.: Circumvention of security: good users do bad things. IEEE Secur. Priv. 11(5), 80\u201383 (2013)","journal-title":"IEEE Secur. Priv."},{"key":"6_CR4","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.cose.2008.11.001","volume":"28","author":"RA Botha","year":"2009","unstructured":"Botha, R.A., Furnell, S.M., Clarke, N.L.: From desktop to mobile: examining the security experience. Comput. Secur. 28, 130\u2013137 (2009)","journal-title":"Comput. Secur."},{"issue":"5","key":"6_CR5","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MSP.2016.95","volume":"14","author":"DD Caputo","year":"2016","unstructured":"Caputo, D.D., Pfleeger, S.L., Sasse, A., Ammann, P., Offutt, J., Deng, L.: Barriers to usable security? Three organizational case studies. IEEE Secur. Priv. 14(5), 22\u201332 (2016)","journal-title":"IEEE Secur. Priv."},{"doi-asserted-by":"crossref","unstructured":"Choong, Y.-Y., Theofanos, M.: What 4,500+ people can tell you \u2013 employees\u2019 attitudes toward organizational password policy do matter. In: Human Aspects of Information Security, Privacy, and Trust, pp. 299\u2013310 (2015)","key":"6_CR6","DOI":"10.1007\/978-3-319-20376-8_27"},{"key":"6_CR7","volume-title":"Security and Usability","author":"L Cranor","year":"2005","unstructured":"Cranor, L., Garfinkel, S.: Security and Usability. O\u2019Reilly Media, Inc., Sebastopol (2005)"},{"issue":"5","key":"6_CR8","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MSP.2004.69","volume":"2","author":"L Cranor","year":"2004","unstructured":"Cranor, L., Garfinkel, S.: Secure or usable? IEEE Secur. Priv. 2(5), 16\u201318 (2004)","journal-title":"IEEE Secur. Priv."},{"doi-asserted-by":"crossref","unstructured":"Eljetlawi, A.M., Ithnin, N.: Graphical password: comprehensive study of the usability features of the recognition base graphical password methods. In: Proceedings of the 3rd International Convergence and Hybrid Information Technology ICCIT 2008, vol. 2, pp. 1137\u20131143 (2008)","key":"6_CR9","DOI":"10.1109\/ICCIT.2008.20"},{"unstructured":"Ericsson: Ericsson Mobility Report \u2013 on the pulse of the networked society (2015)","key":"6_CR10"},{"unstructured":"European Commission: Special Eurobarometer 431 - Data Protection (2015)","key":"6_CR11"},{"unstructured":"European Union: Regulation (EU) 2016\/679 of the European parliament and of the Council on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation) (2016)","key":"6_CR12"},{"unstructured":"Evans, D.: The internet of things - how the next evolution of the internet is changing everything (2011)","key":"6_CR13"},{"unstructured":"Federal State Commission: IoT Privacy & Security in a Connected World (2015)","key":"6_CR14"},{"doi-asserted-by":"crossref","unstructured":"Feth, D.: User-centric security: optimization of the security-usability trade-off. In: Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering - ESEC\/FSE 2015, pp. 1034\u20131037 (2015)","key":"6_CR15","DOI":"10.1145\/2786805.2803195"},{"key":"6_CR16","doi-asserted-by":"publisher","first-page":"773","DOI":"10.1007\/s11623-010-0210-4","volume":"34","author":"S Fischer-H\u00fcbner","year":"2010","unstructured":"Fischer-H\u00fcbner, S., Iacono, L., M\u00f6ller, S.: Usable security und privacy. Datenschutz und Datensicherheit - DuD 34, 773\u2013782 (2010)","journal-title":"Datenschutz und Datensicherheit - DuD"},{"doi-asserted-by":"crossref","unstructured":"Fogg, B.: A behavior model for persuasive design. In: Proceedings of the 4th International Conference on Persuasive Technology 2009, pp. 40:1\u201340:7 (2009)","key":"6_CR17","DOI":"10.1145\/1541948.1541999"},{"issue":"6","key":"6_CR18","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1016\/j.cose.2007.06.003","volume":"26","author":"S Furnell","year":"2007","unstructured":"Furnell, S.: Making security usable: are things improving? Comput. Secur. 26(6), 434\u2013443 (2007)","journal-title":"Comput. Secur."},{"issue":"1","key":"6_CR19","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.cose.2005.12.004","volume":"25","author":"S Furnell","year":"2006","unstructured":"Furnell, S., Jusoh, A., Katsabas, D.: The challenges of understanding and using security: a survey of end-users. Comput. Secur. 25(1), 27\u201335 (2006)","journal-title":"Comput. Secur."},{"key":"6_CR20","first-page":"234","volume":"31","author":"S Garfinkel","year":"2005","unstructured":"Garfinkel, S.: Design principles and patterns for computer systems that are simultaneously secure and usable. Gene 31, 234\u2013239 (2005)","journal-title":"Gene"},{"issue":"2","key":"6_CR21","first-page":"1","volume":"5","author":"S Garfinkel","year":"2014","unstructured":"Garfinkel, S., Lipford, H.R.: Usable security: history, themes, and challenges. Synth. Lect. Inf. Secur. Priv. Trust 5(2), 1\u2013124 (2014)","journal-title":"Synth. Lect. Inf. Secur. Priv. Trust"},{"unstructured":"Gartzke, U., Roebel, M.: Balancing privacy and user experience: the challenge of the digital age (2016). http:\/\/techonomy.com\/2016\/01\/balancing-privacy-and-user-experience-the-challenge-of-the-digital-age\/","key":"6_CR22"},{"doi-asserted-by":"crossref","unstructured":"Good, N., Krekelberg, A.: Usability and privacy: a study of KaZaA P2P file-sharing. In: Proceedings of the Conference on Human Factors in Computing Systems CHI, no. 5, p. 137 (2003)","key":"6_CR23","DOI":"10.1145\/642611.642636"},{"unstructured":"Herzog, A., Shahmehri, N.: Usable set-up of runtime security policies. In: Proceedings of the International Symposium on Human Aspects of Information Security and Assurance (HAISA 2007), Plymouth, UK, 10 July 2007, pp. 99\u2013113 (2007)","key":"6_CR24"},{"unstructured":"IControl Networks: 2015 State of the Smart Home Report (2015)","key":"6_CR25"},{"doi-asserted-by":"crossref","unstructured":"Inglesant, P., Sasse, M.A.: The true cost of unusable password policies: password use in the wild, pp. 383\u2013392 (2010)","key":"6_CR26","DOI":"10.1145\/1753326.1753384"},{"issue":"1","key":"6_CR27","doi-asserted-by":"publisher","first-page":"5","DOI":"10.3390\/fi8010005","volume":"8","author":"U Ismail","year":"2016","unstructured":"Ismail, U., Islam, S., Ouedraogo, M., Weippl, E.: A framework for security transparency in cloud computing. Futur. Internet 8(1), 5 (2016)","journal-title":"Futur. Internet"},{"unstructured":"ISO 9241-210: Ergonomics of human-system interaction\u2014Part 210: Human-centred design for interactive systems (2010)","key":"6_CR28"},{"unstructured":"ISO 27000 Series: Information security management systems","key":"6_CR29"},{"unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M.K., Rubin, A.D.: The design and analysis of graphical passwords. In: Proceedings of the 8th USENIX Security Symposium, 23\u201336 August 1999","key":"6_CR30"},{"unstructured":"Jung, C., Eitel, A., Feth, D., Rudolph, M.: Dealing with uncertainty in context-aware mobile applications. In: Mobility 2015, p. 9 (2015)","key":"6_CR31"},{"unstructured":"Kompetenzzentrum f\u00fcr angewandte Sicherheitstechnologie: \u201cBegriffsdefinitionen in KASTEL\u201d. https:\/\/www.kastel.kit.edu\/651.php","key":"6_CR32"},{"unstructured":"Noto, G., Diega, L., Walden, I.: Contracting for the \u2018Internet of Things\u2019: looking into the Nest. Queen Mary School of Law, Legal Studies Research Paper No. 219\/2016 (2016)","key":"6_CR33"},{"unstructured":"Norman, D.: The design of everyday things. Doubled Currency (1988)","key":"6_CR34"},{"issue":"6","key":"6_CR35","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1007\/s11623-009-0072-9","volume":"33","author":"M Rost","year":"2009","unstructured":"Rost, M., Pfitzmann, A.: Datenschutz-Schutzziele \u2013 revisited. Datenschutz und Datensicherheit (DuD) 33(6), 353\u2013358 (2009)","journal-title":"Datenschutz und Datensicherheit (DuD)"},{"unstructured":"Rudolph, M.: User-friendly and tailored policy administration points. In: 1st International Conference on Information Systems Security and Privacy (2015)","key":"6_CR36"},{"issue":"3","key":"6_CR37","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1023\/A:1011902718709","volume":"19","author":"A Sasse","year":"2001","unstructured":"Sasse, A., Brostoff, S., Weirich, D.: Transforming the \u2018Weakest Link\u2019: a human\/computer interaction approach to usable and effective security. BT Technol. J. 19(3), 122\u2013131 (2001)","journal-title":"BT Technol. J."},{"doi-asserted-by":"crossref","unstructured":"Tank, B., Upadhyay, H., Patel, H.: A survey on IoT privacy issues and mitigation techniques. In: Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies - ICTCS 2016, pp. 1\u20134 (2016)","key":"6_CR38","DOI":"10.1145\/2905055.2905057"},{"doi-asserted-by":"crossref","unstructured":"Quay-de la Vallee, H., Walsh, J.M., Zimrin, W., Fisler, K., Krishnamurthi, S.: Usable security as a static-analysis problem. In: Proceedings of the 2013 ACM International Symposium on New Ideas, New Paradigms, and Reflections on Programming & Software - Onward! 2013, pp. 1\u201316 (2013)","key":"6_CR39","DOI":"10.1145\/2509578.2509589"},{"unstructured":"U.S. Department of Health and Human Services: \u201cInstitutional Review Board Guidebook\u201d. https:\/\/archive.hhs.gov\/ohrp\/irb\/irb_guidebook.htm","key":"6_CR40"},{"unstructured":"USecureD Project. https:\/\/www.usecured.de","key":"6_CR41"},{"key":"6_CR42","first-page":"434","volume":"26","author":"A Whitten","year":"2004","unstructured":"Whitten, A.: Making security usable. Comput. Secur. 26, 434\u2013443 (2004)","journal-title":"Comput. Secur."},{"doi-asserted-by":"crossref","unstructured":"Whitten, A., Tygar, J.D.: Usability of security: a case study. Comput. Sci. 1\u201341 (1998)","key":"6_CR43","DOI":"10.1037\/e448702006-001"},{"unstructured":"Whitten, A., Tygar, J.: Why Johnny can\u2019t encrypt: a usability evaluation of PGP 5.0. In: Proceedings of the 8th Conference on USENIX Security Symposium - Volume 8, p. 14. USENIX Association, August 1999","key":"6_CR44"},{"issue":"5","key":"6_CR45","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MSP.2004.64","volume":"2","author":"K-P Yee","year":"2004","unstructured":"Yee, K.-P.: Aligning security and usability. IEEE Secur. Priv. Mag. 2(5), 48\u201355 (2004)","journal-title":"IEEE Secur. Priv. Mag."},{"doi-asserted-by":"crossref","unstructured":"Zurko, M.E., Simon, R.T.: User-centered security. In: Proceedings of the 1996 Workshop on New Security Paradigms - NSPW 1996, pp. 27\u201333 (1996)","key":"6_CR46","DOI":"10.1145\/304851.304859"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58460-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T01:52:48Z","timestamp":1625104368000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58460-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584591","9783319584607"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58460-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Aspects of Information Security, Privacy, and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"has2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}