{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T01:12:33Z","timestamp":1725498753586},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540773658"},{"type":"electronic","value":"9783540773665"}],"license":[{"start":{"date-parts":[[2007,1,1]],"date-time":"2007-01-01T00:00:00Z","timestamp":1167609600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007]]},"DOI":"10.1007\/978-3-540-77366-5_36","type":"book-chapter","created":{"date-parts":[[2007,12,20]],"date-time":"2007-12-20T13:07:48Z","timestamp":1198156068000},"page":"383-388","source":"Crossref","is-referenced-by-count":2,"title":["A Sense of Security in Pervasive Computing\u2014Is the Light on When the Refrigerator Door Is Closed?"],"prefix":"10.1007","author":[{"given":"Jakob Illeborg","family":"Pagter","sequence":"first","affiliation":[]},{"given":"Marianne Graves","family":"Petersen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Adams, A., Sasse, M.: Users are not the enemy. Communications of the ACM\u00a042, 12 (1999)","DOI":"10.1145\/322796.322806"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Bardram, J.E., Kjr, R., Pedersen, M.: Context-aware user authentication - supporting proximity-based login in pervasive computing. In: UbiComp 2003 (2003)","DOI":"10.1007\/978-3-540-39653-6_8"},{"key":"36_CR3","unstructured":"Calles, S.: Double Game. Violette Editions (2000)"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Cranor, L.F., Garfinkel, S.: Secure or usable? IEEE Security and Privacy\u00a02,5 (2004)","DOI":"10.1109\/MSP.2004.69"},{"key":"36_CR5","doi-asserted-by":"crossref","unstructured":"de Paula, R., Ding, X., Dourish, P., Nies, K., Pillet, B., Redmiles, D., Ren, J., Rode, J., Filho, R.: In the eye of the beholder: A visualization-based approach to information systems security. International Journal of Human Computer Studies Special Issue on HCI Research in Privacy and Security (2005)","DOI":"10.1016\/j.ijhcs.2005.04.021"},{"key":"36_CR6","doi-asserted-by":"crossref","unstructured":"de Paula, R., Ding, X., Dourish, P., Nies, K., Pillet, B., Redmiles, D., Ren, J., Rode, J., Filho, R.: Two experiences designing for effective security. In: Symposium on Usable Privacy and Security (SOUPS) (2005)","DOI":"10.1145\/1073001.1073004"},{"key":"36_CR7","doi-asserted-by":"crossref","unstructured":"Dourish, P., Grinter, R.E., de la Flor, J.D., Joseph, M.: Security in the wild: User strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing 8 (2004)","DOI":"10.1007\/s00779-004-0308-5"},{"key":"36_CR8","first-page":"21","volume-title":"Interactions","author":"W. Gaver","year":"1999","unstructured":"Gaver, W., Dunne, T., Pacenti, E.: Cultural probes. In: Interactions, vol.\u00a06,1, pp. 21\u201329. ACM Press, New York (1999)"},{"key":"36_CR9","unstructured":"Grinter, R.E., Smetters, D.K.: Three challenges for embedding security into applications. In: Proceedings of CHI 2003 Workshop on HCI and Security Systems (2003)"},{"key":"36_CR10","doi-asserted-by":"crossref","unstructured":"Newman, R., Gavette, S., Yonge, L., Anderson, R.: Protecting dometisc powerline communications. In: Symposium on Usable Privacy and Security (SOUPS) (2006)","DOI":"10.1145\/1143120.1143136"},{"key":"36_CR11","first-page":"129","volume-title":"Proceedings of the ACM Conference on Human Factors in Computing Systems, CHI 2003","author":"L. Palen","year":"2003","unstructured":"Palen, L., Dourish, P.: Unpacking \u201dprivacy\u201d for a networked world. In: Proceedings of the ACM Conference on Human Factors in Computing Systems, CHI 2003, pp. 129\u2013136. ACM, New York (2003)"},{"key":"36_CR12","first-page":"1445","volume-title":"Proceedings of CHI 2004","author":"M.G. Petersen","year":"2004","unstructured":"Petersen, M.G.: Remarkable computing\u2014the challenge of designing for the home. In: Proceedings of CHI 2004, pp. 1445\u20131449. ACM Press, New York (2004)"},{"key":"36_CR13","volume-title":"The Experience Economy: Work Is Theater & Every Business a Stage","author":"B.J. Pine","year":"1999","unstructured":"Pine, B.J., Gilmore, J.H.: The Experience Economy: Work Is Theater & Every Business a Stage. Harvard Business School Press, Boston (1999)"},{"key":"36_CR14","doi-asserted-by":"crossref","unstructured":"Smetters, D.K., Grinter, R.E.: Moving from the design of usable security technologies to the design of useful secure applications. In: New Security Paradigms Workshop 2002 (2002)","DOI":"10.1145\/844102.844117"},{"key":"36_CR15","unstructured":"Whitten, A., Tygar, J.: Why jonny can\u2019t encrypt: A usability evaluation of pgp 5.0. In: Proceedings of the Ninth USENIX Security Symposium (1999)"},{"key":"36_CR16","doi-asserted-by":"crossref","unstructured":"Wu, M., Miller, R., Little, G.: Web wallet: Preventing phishing attacks by revealing user intentions. In: Symposium on Usable Privacy and Security (SOUPS) (2006)","DOI":"10.1145\/1143120.1143133"},{"key":"36_CR17","doi-asserted-by":"crossref","unstructured":"Yee, K.-P.: Aligning usability and security. IEEE Security and Privacy\u00a05,2 (2004)","DOI":"10.1109\/MSP.2004.64"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77366-5_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,6]],"date-time":"2019-05-06T03:57:47Z","timestamp":1557115067000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77366-5_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007]]},"ISBN":["9783540773658","9783540773665"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77366-5_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2007]]}}}