{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T08:59:31Z","timestamp":1766048371848},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642346378"},{"type":"electronic","value":"9783642346385"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34638-5_7","type":"book-chapter","created":{"date-parts":[[2012,10,17]],"date-time":"2012-10-17T15:14:46Z","timestamp":1350486886000},"page":"80-85","source":"Crossref","is-referenced-by-count":3,"title":["Methodology for a Field Study of Anti-malware Software"],"prefix":"10.1007","author":[{"given":"Fanny","family":"Lalonde L\u00e9vesque","sequence":"first","affiliation":[]},{"given":"Carlton R.","family":"Davis","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 M.","family":"Fernandez","sequence":"additional","affiliation":[]},{"given":"Sonia","family":"Chiasson","sequence":"additional","affiliation":[]},{"given":"Anil","family":"Somayaji","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Anti-Malware Testing Standards Organization: AMTSO testability guidelines. Tech. rep. (May 2011), http:\/\/www.amtso.org\/documents.html"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Botta, D., Werlinger, R., Gagn\u00e9, A., Beznosov, K., Iverson, L., Fels, S., Fisher, B.: Towards understanding it security professionals and their tools. In: ACM Symposium on Usable Privacy and Security (SOUPS). ACM (2007)","DOI":"10.1145\/1280680.1280693"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Brostoff, S., Sasse, M.: Are Passfaces more usable than passwords? A field trial investigation. In: British Human-Computer Interaction Conference (HCI) (2000)","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Chiasson, S., Biddle, R., van Oorschot, P.C.: A second look at the usability of click-based graphical passwords. In: ACM Symposium on Usable Privacy and Security (SOUPS) (2007)","DOI":"10.1145\/1280680.1280682"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"De Luca, A., Langheinrich, M., Hussmann, H.: Towards understanding ATM security: a field study of real world ATM use. In: ACM Symposium on Usable Privacy and Security (SOUPS) (2010)","DOI":"10.1145\/1837110.1837131"},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Florencio, D., Herley, C.: A large-scale study of WWW password habits. In: ACM World Wide Web Conference (WWW) (2007)","DOI":"10.1145\/1242572.1242661"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Gordon, S., Ford, R.: Real world anti-virus product reviews and evaluations - the current state of affairs. In: 19th National Information Systems Security Conference (NISSC) (1996)","DOI":"10.1016\/S1353-4858(00)90009-6"},{"key":"7_CR8","unstructured":"Harley, D., Lee, A.: Who will test the testers? In: 18th Virus Bulletin International Conference (2008)"},{"key":"7_CR9","unstructured":"Ko\u0161in\u00e1r, P., Malcho, J., Marko, R., Harley, D.: AV testing exposed. In: 20th Virus Bulletin International Conference (2010)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Rode, J.A.: Digital parenting: designing children\u2019s safety. In: British HCI Conference (BCS-HCI) (2009)","DOI":"10.14236\/ewic\/HCI2009.29"},{"key":"7_CR11","unstructured":"Somayaji, A., Li, Y., Inoue, H., Fernandez, J.M., Ford, R.: Evaluating security products with clinical trials. In: Workshop on Cyber Security Experimentation and Test (CSET) (2009)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Stone-Gross, B., Abman, R., Kemmerer, R.A., Kruegel, C.: The underground economy of fake antivirus software. In: Workshop on the Economics of Information Security (WEIS) (2011)","DOI":"10.1007\/978-1-4614-1981-5_4"},{"key":"7_CR13","unstructured":"Vrabec, J., Harley, D.: Real performance? In: EICAR Annual Conference (2010)"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Wash, R.: Folk models of home computer security. In: ACM Symposium on Usable Privacy and Security (SOUPS) (2010)","DOI":"10.1145\/1837110.1837125"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34638-5_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T13:02:35Z","timestamp":1620133355000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34638-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642346378","9783642346385"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34638-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}