{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T22:49:37Z","timestamp":1725922177375},"publisher-location":"Cham","reference-count":10,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319710747"},{"type":"electronic","value":"9783319710754"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-71075-4_7","type":"book-chapter","created":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T12:37:18Z","timestamp":1511872638000},"page":"60-68","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Simulating Perceptions of Security"],"prefix":"10.1007","author":[{"given":"Paul","family":"Wernick","sequence":"first","affiliation":[]},{"given":"Bruce","family":"Christianson","sequence":"additional","affiliation":[]},{"given":"Joseph","family":"Spring","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,29]]},"reference":[{"issue":"4","key":"7_CR1","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1007\/s13347-013-0128-5","volume":"26","author":"B Christianson","year":"2013","unstructured":"Christianson, B.: Living in an impossible world: real-izing the consequences of intransitive trust. Philos. Technol. 26(4), 411\u2013429 (2013)","journal-title":"Philos. Technol."},{"key":"7_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1007\/978-3-662-45921-8_4","volume-title":"Security Protocols XVIII","author":"S Clark","year":"2014","unstructured":"Clark, S., Blaze, M., Smith, J.: Blood in the water: are there honeymoon effects outside software? In: Christianson, B., Malcolm, J. (eds.) Security Protocols 2010. LNCS, vol. 7061, pp. 12\u201317. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-662-45921-8_4"},{"key":"7_CR3","unstructured":"Leverett, E., Clayton, R., Anderson, R.: Standardisation and certification of the \u2018Internet of Things\u2019. In: Proceedings of WEIS 2017 (2017)"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1007\/978-3-642-25867-1_20","volume-title":"Security Protocols XIX","author":"Y Murayama","year":"2011","unstructured":"Murayama, Y., Fujihara, Y., Nishioka, D.: The sense of security and a countermeasure for the false sense. In: Christianson, B., Crispo, B., Malcolm, J., Stajano, F. (eds.) Security Protocols 2011. LNCS, vol. 7114, pp. 205\u2013214. Springer, Heidelberg (2011). \nhttps:\/\/doi.org\/10.1007\/978-3-642-25867-1_20"},{"key":"7_CR5","unstructured":"Robinson, D.: Windows 10 backlash: which? demands compo for forced upgrades; The Register (2016). \nwww.theregister.co.uk\/2016\/09\/22\/windows_10_backlash_begins_which_calls_for_upgrade_compensation\/\n\n. Accessed 21 Nov 2016"},{"key":"7_CR6","unstructured":"System Dynamics Society: What is System Dynamics? (2016). \nhttp:\/\/www.systemdynamics.org\/what-is-s\/\n\n. Accessed 7 Dec 2016"},{"key":"7_CR7","unstructured":"Tepper, F.: Updating to iOS 10 is bricking some iPhones and iPads; TechCrunch (2016). \nhttps:\/\/techcrunch.com\/2016\/09\/13\/updating-to-ios-10-is-bricking-some-iphones-and-ipads\/\n\n. Accessed 11 Oct 2016"},{"key":"7_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-319-26096-9_13","volume-title":"Security Protocols XXIII","author":"DR Thomas","year":"2015","unstructured":"Thomas, D.R., Beresford, A.R., Coudray, T., Sutcliffe, T., Taylor, A.: The lifetime of android api vulnerabilities: case study on the javascript-to-java interface. In: Christianson, B., \u0160venda, P., Maty\u00e1\u0161, V., Malcolm, J., Stajano, F., Anderson, J. (eds.) Security Protocols 2015. LNCS, vol. 9379, pp. 126\u2013138. Springer, Cham (2015). \nhttps:\/\/doi.org\/10.1007\/978-3-319-26096-9_13"},{"key":"7_CR9","unstructured":"Ventana Systems, Inc. (2016). \nhttps:\/\/vensim.com\/\n\n. Accessed 7 Dec 2016"},{"key":"7_CR10","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/S0164-1212(99)00012-6","volume":"46","author":"P Wernick","year":"1999","unstructured":"Wernick, P., Lehman, M.M.: Software process dynamic modelling for FEAST\/1. J. Syst. Softw. 46, 193\u2013201 (1999)","journal-title":"J. Syst. Softw."}],"container-title":["Lecture Notes in Computer Science","Security Protocols XXV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-71075-4_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,11,28]],"date-time":"2017-11-28T12:38:42Z","timestamp":1511872722000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-71075-4_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319710747","9783319710754"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-71075-4_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}