{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:44:53Z","timestamp":1776113093652,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540883128","type":"print"},{"value":"9783540883135","type":"electronic"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-88313-5_27","type":"book-chapter","created":{"date-parts":[[2008,10,4]],"date-time":"2008-10-04T00:41:44Z","timestamp":1223080904000},"page":"411-427","source":"Crossref","is-referenced-by-count":27,"title":["Exploring User Reactions to New Browser Cues for Extended Validation Certificates"],"prefix":"10.1007","author":[{"given":"Jennifer","family":"Sobey","sequence":"first","affiliation":[]},{"given":"Robert","family":"Biddle","sequence":"additional","affiliation":[]},{"given":"P. C.","family":"van Oorschot","sequence":"additional","affiliation":[]},{"given":"Andrew S.","family":"Patrick","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"27_CR1","unstructured":"CA\/Browser Forum, \n                    \n                      http:\/\/www.cabforum.org\/"},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J.: The Battle Against Phishing: Dynamic Security Skins. In: Proceedings of the Symposium on Usable Privacy and Security (2005)","DOI":"10.1145\/1073001.1073009"},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J., Hearst, M.: Why Phishing Works. In: Human Factors in Computing Systems (CHI 2006), April 22-27 (2006)","DOI":"10.1145\/1124772.1124861"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"Downs, J.S., Holbrook, M., Cranor, L.: Decision Strategies and Susceptibility to Phishing. In: Proc. of the 2006 Symposium on Usable Privacy and Security (July 2006)","DOI":"10.1145\/1143120.1143131"},{"key":"27_CR5","unstructured":"Felton, E., Balfanz, D., Dean, D., Wallach, D.: Web Spoofing: An Internet Con Game. In: Proc. of the 20th National Info. Systems Security Conference (1996)"},{"key":"27_CR6","unstructured":"Franco, R.: Better Website Identification and Extended Validation Certificates in IE7 and Other Browsers, \n                    \n                      http:\/\/blogs.msdn.com\/ie\/archive\/2005\/11\/21\/495507.aspx"},{"key":"27_CR7","unstructured":"Gomes, C., Sellmann, M., Van Es, C., Van Es, H.: Computational Methods for the Generation of Spatially Balanced Latin Squares, \n                    \n                      http:\/\/www.cs.cornell.edu\/gomes\/SBLS.htm"},{"key":"27_CR8","doi-asserted-by":"crossref","unstructured":"Jackson, C., Simon, D.R., Tan, D.S., Barth, A.: An Evaluation of Extended Validation and Picture-in-Picture Phishing Attacks. In: Proc. of Usable Security (2007)","DOI":"10.1007\/978-3-540-77366-5_27"},{"key":"27_CR9","unstructured":"K Desktop Environment, \n                    \n                      http:\/\/www.kde.org"},{"key":"27_CR10","unstructured":"Kumar, M., Garfinkel, T., Boneh, D., Winograd, T.: Gaze-Based Password Entry. In: Proceedings of the 2007 Symposium on Usable Privacy and Security (2007)"},{"key":"27_CR11","unstructured":"Microsoft: Extended Validation SSL Certificates, \n                    \n                      http:\/\/www.microsoft.com\/windows\/products\/winfamily\/ie\/ev\/default.mspx"},{"key":"27_CR12","unstructured":"Microsoft: Internet Explorer 7.0 Features, \n                    \n                      http:\/\/www.microsoft.com\/windows\/products\/winfamily\/ie\/features.mspx"},{"key":"27_CR13","unstructured":"Mozilla: EV-Certs for Firefox, \n                    \n                      http:\/\/mozillalinks.org\/wp\/2007\/05\/ev-certs-for-firefox\/"},{"key":"27_CR14","unstructured":"Nightingale, J.: Personal Communication (September 19, 2007)"},{"key":"27_CR15","unstructured":"Opera Software, \n                    \n                      http:\/\/www.opera.com"},{"key":"27_CR16","doi-asserted-by":"crossref","unstructured":"Schechter, S.E., Dhamija, R., Ozment, A., Fischer, I.: The Emperor\u2019s New Security Indicators. In: Proc. of the 2007 IEEE Symposium on Security and Privacy (May 2007)","DOI":"10.1109\/SP.2007.35"},{"key":"27_CR17","unstructured":"Tobii Technology AB, \n                    \n                      http:\/\/www.tobii.com"},{"key":"27_CR18","unstructured":"Whalen, T., Inkpen, K.: Gathering Evidence: Use of Visual Security Cues in Web Browsing. In: Proc. of Graphics Interface 2005, May 2005, pp. 137\u2013145 (2005)"},{"key":"27_CR19","unstructured":"Whitten, A., Tygar, J.D.: Why Johnny Can\u2019t Encrypt: A Usability Case Study of PGP 5.0. In: Proceedings of the 8th USENIX Security Symposium (August 1999)"},{"key":"27_CR20","unstructured":"Ye, E.Z., Yuan, Y., Smith, S.: Web Spoofing Revisited: SSL and Beyond. Tech. Rep. TR 2002\u2013417, Department of Computer Science, Dartmouth College (2002)"},{"key":"27_CR21","doi-asserted-by":"crossref","unstructured":"Ye, Z., Smith, S., Anthony, D.: Trusted Paths for Browsers. ACM Transactions on Information and System Security, 153\u2013186 (May 2005)","DOI":"10.1145\/1065545.1065546"}],"container-title":["Lecture Notes in Computer Science","Computer Security - ESORICS 2008"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88313-5_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T20:16:35Z","timestamp":1559506595000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88313-5_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540883128","9783540883135"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88313-5_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008]]}}}