{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:03:05Z","timestamp":1725490985093},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540747994"},{"type":"electronic","value":"9783540748007"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-74800-7_11","type":"book-chapter","created":{"date-parts":[[2007,9,6]],"date-time":"2007-09-06T16:17:17Z","timestamp":1189095437000},"page":"141-155","source":"Crossref","is-referenced-by-count":22,"title":["Usability Challenges in Security and Privacy Policy-Authoring Interfaces"],"prefix":"10.1007","author":[{"given":"Robert W.","family":"Reeder","sequence":"first","affiliation":[]},{"given":"Clare-Marie","family":"Karat","sequence":"additional","affiliation":[]},{"given":"John","family":"Karat","sequence":"additional","affiliation":[]},{"given":"Carolyn","family":"Brodie","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1-2","key":"11_CR1","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.ijhcs.2005.04.011","volume":"63","author":"J. Karat","year":"2005","unstructured":"Karat, J., Karat, C.-M., Brodie, C., Feng, J.: Privacy in information technology: Designing to enable privacy policy management in organizations. International Journal of Human-Computer Studies\u00a063(1-2), 153\u2013174 (2005)","journal-title":"International Journal of Human-Computer Studies"},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/1143120.1143124","volume-title":"Proceedings of the Second Symposium on Usable Privacy and Security (SOUPS 2006)","author":"X. Cao","year":"2006","unstructured":"Cao, X., Iverson, L.: Intentional access management: Making access control usable for end-users. In: Proceedings of the Second Symposium on Usable Privacy and Security (SOUPS 2006), pp. 20\u201331. ACM Press, New York (2006)"},{"key":"11_CR3","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1145\/642611.642636","volume-title":"Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems(CHI 2003)","author":"N.S. Good","year":"2003","unstructured":"Good, N.S., Krekelberg, A.: Usability and privacy: a study of Kazaa P2P file-sharing. In: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems(CHI 2003), April 2003, pp. 137\u2013144. ACM Press, New York (2003)"},{"issue":"1-2","key":"11_CR4","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.ijhcs.2005.04.009","volume":"63","author":"R.A. Maxion","year":"2005","unstructured":"Maxion, R.A., Reeder, R.W.: Improving user-interface dependability through mitigation of human error. International Journal of Human-Computer Studies\u00a063(1-2), 25\u201350 (2005)","journal-title":"International Journal of Human-Computer Studies"},{"issue":"2","key":"11_CR5","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/1165734.1165735","volume":"13","author":"L.F. Cranor","year":"2006","unstructured":"Cranor, L.F., Guduru, P., Arjula, M.: User interfaces for privacy agents. ACM Transactions on Computer-Human Interaction\u00a013(2), 135\u2013178 (2006)","journal-title":"ACM Transactions on Computer-Human Interaction"},{"key":"11_CR6","unstructured":"U.S. Senate Sergeant at Arms: Report on the investigation into improper access to the Senate Judiciary Committee\u2019s computer system (2004), available at http:\/\/judiciary.senate.gov\/testimony.cfm?id=1085&wit_id=2514"},{"key":"11_CR7","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1145\/1124772.1124787","volume-title":"Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems(CHI 2006)","author":"C.-M. Karat","year":"2006","unstructured":"Karat, C.-M., Karat, J., Brodie, C., Feng, J.: Evaluating interfaces for privacy policy rule authoring. In: Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems(CHI 2006), pp. 83\u201392. ACM Press, New York (2006)"},{"key":"11_CR8","unstructured":"Lederer, S., Mankoff, J., Dey, A.K., Beckmann, C.P.: Managing personal information disclosure in ubiquitous computing environments. Technical Report UCB-CSD-03-1257, University of California, Berkeley, Berkeley, CA (2003), available at http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/2003\/CSD-03-1257.pdf"},{"key":"11_CR9","unstructured":"Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise Privacy Architecture Language (EPAL 1.2). W3C Member Submission 10-Nov-2003 (2003), available at http:\/\/www.w3.org\/Submission\/EPAL"},{"key":"11_CR10","series-title":"Lecture Notes in Computer Science","first-page":"17","volume-title":"Management of Multimedia Networks and Services","author":"E.S. Al-Shaer","year":"2003","unstructured":"Al-Shaer, E.S., Hamed, H.H.: Firewall Policy Advisor for anomaly discovery and rule editing. In: Marshall, A., Agoulmine, N. (eds.) MMNS 2003. LNCS, vol.\u00a02839, pp. 17\u201330. Springer, Heidelberg (2003)"},{"key":"11_CR11","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5657.001.0001","volume-title":"Protocol Analysis: Verbal Reports as Data","author":"K.A. Ericsson","year":"1993","unstructured":"Ericsson, K.A., Simon, H.A.: Protocol Analysis: Verbal Reports as Data. MIT Press, Cambridge, MA (1993)"},{"key":"11_CR12","first-page":"8","volume-title":"Proceedings of the 2006 Symposium on Usable Privacy and Security (SOUPS 2006)","author":"C. Brodie","year":"2006","unstructured":"Brodie, C., Karat, C.M., Karat, J.: An empirical study of natural language parsing of privacy policy rules using the SPARCLE policy workbench. In: Proceedings of the 2006 Symposium on Usable Privacy and Security (SOUPS 2006), July 2006, pp. 8\u201319. ACM Press, New York (2006)"},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1109\/POLICY.2005.25","volume-title":"Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005)","author":"D. Agrawal","year":"2005","unstructured":"Agrawal, D., Giles, J., Lee, K.-W., Lobo, J.: Policy ratification. In: Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2005), June 2005, pp. 223\u2013232. IEEE Computer Society Press, Los Alamitos (2005)"},{"key":"11_CR14","series-title":"Lecture Notes in Computer Science","first-page":"196","volume-title":"Software Engineering Education in the Modern Age","author":"K. Fisler","year":"2006","unstructured":"Fisler, K., Krishnamurthi, S., Meyerovich, L.A., Tschantz, M.C.: Verification and change-impact analysis of access-control policies. In: Inverardi, P., Jazayeri, M. (eds.) ICSE 2005. LNCS, vol.\u00a04309, pp. 196\u2013205. Springer, Heidelberg (2006)"},{"key":"11_CR15","unstructured":"Lederer, S., Hong, J.I., Jiang, X., Dey, A.K., Landay, J.A., Mankoff, J.: Towards everyday privacy for ubiquitous computing. Technical Report UCB-CSD-03-1283, University of California, Berkeley, Berkeley, CA (2003), available at http:\/\/www.eecs.berkeley.edu\/Pubs\/TechRpts\/2003\/CSD-03-1283.pdf"},{"key":"11_CR16","unstructured":"Cranor, L.F.: Web Privacy with P3P. O\u2019Reilly, Sebastopol, CA (2002)"},{"key":"11_CR17","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1109\/SECPRI.1999.766718","volume-title":"Proceedings 1999 IEEE Symposium on Security and Privacy","author":"M.E. Zurko","year":"1999","unstructured":"Zurko, M.E., Simon, R., Sanfilippo, T.: A user-centered, modular authorization service built on an RBAC foundation. In: Proceedings 1999 IEEE Symposium on Security and Privacy, May 1999, pp. 57\u201371. IEEE Computer Society Press, Los Alamitos (1999)"},{"issue":"3","key":"11_CR18","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1145\/77481.77486","volume":"33","author":"R. Molich","year":"1990","unstructured":"Molich, R., Nielsen, J.: Improving a human-computer dialogue. Communications of the ACM\u00a033(3), 338\u2013348 (1990)","journal-title":"Communications of the ACM"},{"issue":"6","key":"11_CR19","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/s00779-004-0304-9","volume":"8","author":"S. Lederer","year":"2004","unstructured":"Lederer, S., Hong, J., Dey, A.K., Landay, J.: Personal privacy through understanding and action: Five pitfalls for designers. Personal and Ubiquitous Computing\u00a08(6), 440\u2013454 (2004)","journal-title":"Personal and Ubiquitous Computing"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2007"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74800-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,22]],"date-time":"2021-08-22T21:57:01Z","timestamp":1629669421000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74800-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540747994","9783540748007"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74800-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}