{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T14:04:22Z","timestamp":1771509862679,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642393440","type":"print"},{"value":"9783642393457","type":"electronic"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39345-7_11","type":"book-chapter","created":{"date-parts":[[2013,7,1]],"date-time":"2013-07-01T08:08:43Z","timestamp":1372666123000},"page":"100-109","source":"Crossref","is-referenced-by-count":7,"title":["A Comparison of American and German Folk Models of Home Computer Security"],"prefix":"10.1007","author":[{"given":"Michaela","family":"Kauer","sequence":"first","affiliation":[]},{"given":"Sebastian","family":"G\u00fcnther","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Storck","sequence":"additional","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Asgharpour, F., Liu, D., Camp, L.J.: Mental models of computer security risks. In: Workshop on the Economics of Information Security (WEIS) (2007)","DOI":"10.1007\/978-3-540-77366-5_34"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Balfanz, D., Durfee, G., Smetters, D.K., Grinter, R.E.: In Search of Usable Security: Five Lessons from the Field. In: IEEE Security & Privacy, pp. 19\u201324 (2004)","DOI":"10.1109\/MSP.2004.71"},{"key":"11_CR3","unstructured":"Camp, L.J., Wolfram, C.: Pricing security. In: Proc. of the Information Survivability Workshop (2000)"},{"key":"11_CR4","unstructured":"Hudson, K., Herr, T., Blanche, A., Cross, A.: The european union and internet data privacy. Politics & Policy publication, \n                    \n                      http:\/\/politicsandpolicy.org\/article\/european-union-and-internet-data-privacy"},{"key":"11_CR5","unstructured":"Johnson-Laird, P., Girotto, V., Legrenzi, P.: Mental models: a gentle guide for outsiders (1998), \n                    \n                      http:\/\/icos.groups.si.umich.edu\/gentleintro.html"},{"key":"11_CR6","unstructured":"Liu, D., Asgharpour, F., Camp, L.J.: Risk communication in Security Using Mental Models (2008)"},{"key":"11_CR7","unstructured":"Raja, F., Hawkey, K., Beznosov, K.: Revealing Hidden Context: Improving Mental Models of Personal Firewall Users. In: Proc. of the fifth Symposium on Usable Privacy and Security, SOUPS 2009, Mountainview, CA, USA, July 15-17, pp. 1:1\u20131:12 (2009)"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Wash, R.: Folk models of home computer security. In: Proc. of the Sixth Symposium on Usable Privacy and Security, SOUPS 2010, New York, NY, USA, pp. 11:1\u201311:16 (2010)","DOI":"10.1145\/1837110.1837125"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39345-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T21:46:26Z","timestamp":1582407986000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39345-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642393440","9783642393457"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39345-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}