{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T16:05:18Z","timestamp":1774368318646,"version":"3.50.1"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319076195","type":"print"},{"value":"9783319076201","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07620-1_28","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:55:03Z","timestamp":1402404903000},"page":"318-329","source":"Crossref","is-referenced-by-count":12,"title":["A Conceptual Framework to Study Socio-Technical Security"],"prefix":"10.1007","author":[{"given":"Ana","family":"Ferreira","sequence":"first","affiliation":[]},{"given":"Jean-Louis","family":"Huynen","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Koenig","sequence":"additional","affiliation":[]},{"given":"Gabriele","family":"Lenzini","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"28_CR1","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/1330311.1330320","volume":"51","author":"R. West","year":"2008","unstructured":"West, R.: The Psychology of Security. Communication of the ACM\u00a051(4), 34\u201338 (2008)","journal-title":"Communication of the ACM"},{"key":"28_CR2","doi-asserted-by":"publisher","first-page":"1124","DOI":"10.1126\/science.185.4157.1124","volume":"185","author":"A. Tversky","year":"1974","unstructured":"Tversky, A., Kahneman, D.: Judgment under uncertainty: Heuristics and biases. Science\u00a0185, 1124\u20131131 (1974)","journal-title":"Science"},{"issue":"2","key":"28_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1754393.1754396","volume":"10","author":"P. Kumaraguru","year":"2010","unstructured":"Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L.F., Hong, J.: Teaching johnny not to fall for phish. ACM Trans. Internet Technol.\u00a010(2), 7:1\u20137:31 (2010)","journal-title":"ACM Trans. Internet Technol."},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Parkin, S., van Moorsel, A., Inglesant, P.G., Sasse, M.A.: A Stealth Approach to Usable Security: Helping IT Security Managers to Identify Workable Security Solutions. In: Proc. of NSPW 2010, Sept. 21-23, pp. 33\u201350. ACM (2010)","DOI":"10.1145\/1900546.1900553"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Tembe, R., Hong, K.W., Murphy-Hill, E., Mayhorn, C., Kelley, C.: American and indian conceptualizations of phishing. In: Proc. of STAST 2013, pp. 37\u201345. IEEE (2013)","DOI":"10.1109\/STAST.2013.10"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Volkamer, M., Stockhardt, S., Bartsch, S., Kauer, M.: Adopting the cmu\/apwg anti-phishing landing page idea for germany. In: Proc. of STAST 2013, pp. 46\u201352. IEEE (2013)","DOI":"10.1109\/STAST.2013.12"},{"issue":"6","key":"28_CR7","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s00779-005-0347-6","volume":"9","author":"J.E. Bardram","year":"2005","unstructured":"Bardram, J.E.: The trouble with login: on usability and computer security in ubiquitous computing. Personal and Ubiquit. Comput.\u00a09(6), 357\u2013367 (2005)","journal-title":"Personal and Ubiquit. Comput."},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Weerasinghe, D., Rakocevic, V., Rajarajan, M.: Security framework for mobile banking. In: Trustworthy Ubiquitous Computing, Atlantis Ambient and Pervasive Intelligence, vol.\u00a06, pp. 207\u2013225 (2012)","DOI":"10.2991\/978-94-91216-71-8_10"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Ferreira, A., Giustolisi, R., Huynen, J., Koenig, V., Lenzini, G.: Studies in socio- technical security analysis: Authentication of identities with tls certificates. In: Proc. of the 12th IEEE TrustComm 2013, pp. 1553\u20131558 (2013)","DOI":"10.1109\/TrustCom.2013.190"},{"key":"28_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-642-41098-7_9","volume-title":"Security and Trust Management","author":"A. Ferreira","year":"2013","unstructured":"Ferreira, A., Huynen, J.-L., Koenig, V., Lenzini, G., Rivas, S.: Socio-technical study on the effect of trust and context when choosing wifi names. In: Accorsi, R., Ranise, S. (eds.) STM 2013. LNCS, vol.\u00a08203, pp. 131\u2013143. Springer, Heidelberg (2013)"},{"key":"28_CR11","first-page":"1","volume-title":"Proc. of the SOUPS 2011","author":"F. Zhu","year":"2011","unstructured":"Zhu, F., Carpenter, S., Kulkarni, A., Kolimi, S.: Reciprocity attacks. In: Proc. of the SOUPS 2011, pp. 9:1\u20139:14. ACM, New York (2011)"},{"issue":"2","key":"28_CR12","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MSECP.2003.1193216","volume":"1","author":"I. Arce","year":"2003","unstructured":"Arce, I.: The weakest link revisited. IEEE Security Privacy\u00a01(2), 72\u201376 (2003)","journal-title":"IEEE Security Privacy"},{"key":"28_CR13","unstructured":"Cranor, L.F.: A Framework for Reasoning About the Human in the Loop. In: Proc. of the 1st Conf. on Usability, Psychology, and Security, pp. 1\u201315. USENIX Association (2008)"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Conti, G., Ahamad, M., Stasko, J.: Attacking information visualization system usability overloading and deceiving the human. In: Proc. of the SOUPS 2005, pp. 89\u2013100. ACM (2005)","DOI":"10.1145\/1073001.1073010"},{"key":"28_CR15","first-page":"117","volume-title":"Proceedings of SOUPS 2008","author":"L. Falk","year":"2008","unstructured":"Falk, L., Prakash, A., Borders, K.: Analyzing websites for user-visible security design flaws. In: Proceedings of SOUPS 2008, pp. 117\u2013126. ACM, New York (2008)"},{"key":"28_CR16","first-page":"1","volume-title":"Proc. of SOUPS 2010","author":"A. Luca De","year":"2010","unstructured":"De Luca, A., Langheinrich, M., Hussmann, H.: Towards understanding atm security: a field study of real world atm use. In: Proc. of SOUPS 2010, pp. 16:1\u201316:10. ACM, New York (2010)"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Janczewski, L., Lingyan, F.: Social engineering-based attacks: Model and new zealand perspective. In: Proc. of IMCSIT 2010, pp. 847\u2013853 (2010)","DOI":"10.1109\/IMCSIT.2010.5680026"},{"key":"28_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s00766-011-0132-1","volume":"18","author":"F. Dalpiaz","year":"2013","unstructured":"Dalpiaz, F., Giorgini, P., Mylopoulos, J.: Adaptive Socio-Technical Systems: a Requirements-Based Approach. Requirements Engineering\u00a018, 1\u201324 (2013)","journal-title":"Requirements Engineering"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Worton, K.: Using socio-technical and resilience frameworks to anticipate threat. In: Proc. of STAST 2012, pp. 19\u201326 (2012)","DOI":"10.1109\/STAST.2012.16"},{"key":"28_CR20","unstructured":"Pavkovic, N., Perkov, L.: Social engineering toolkit x2014; a systematic approach to social engineering. In: Proc. of MIPRO 2011, pp. 1485\u20131489 (2011)"},{"key":"28_CR21","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-642-30436-1_23","volume-title":"Information Security and Privacy Research","author":"G. Bella","year":"2012","unstructured":"Bella, G., Coles-Kemp, L.: Layered Analysis of Security Ceremonies. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol.\u00a0376, pp. 273\u2013286. Springer, Heidelberg (2012)"},{"issue":"2","key":"28_CR22","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/TIT.1983.1056650","volume":"29","author":"D. Dolev","year":"1983","unstructured":"Dolev, D., Yao, A.: On the security of public-key protocols. IEEE Transaction on Information Theory\u00a029(2), 198\u2013208 (1983)","journal-title":"IEEE Transaction on Information Theory"},{"key":"28_CR23","doi-asserted-by":"crossref","unstructured":"Bella, G., Giustolisi, R., Lenzini, G.: Socio-Technical Formal Analysis of TLS Certificate Validation in Modern Browsers. In: Proc. of PST 2013. IFIP, pp. 309\u2013316 (2013)","DOI":"10.1109\/PST.2013.6596067"},{"key":"28_CR24","series-title":"IFIP AICT","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/978-3-642-38323-6_23","volume-title":"Trust Management VII","author":"G. Bella","year":"2013","unstructured":"Bella, G., Giustolisi, R., Lenzini, G.: A Socio-Technical Understanding of TLS Certificate Validation. In: Fern\u00e1ndez-Gago, C., Martinelli, F., Pearson, S., Agudo, I. (eds.) Trust Management VII. IFIP AICT, vol.\u00a0401, pp. 281\u2013288. Springer, Heidelberg (2013)"},{"key":"28_CR25","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.: Model Checking. MIT Press (1999)"},{"key":"28_CR26","doi-asserted-by":"crossref","unstructured":"Godfrey-Smith, P.: Theory and Reality: An Introduction to the Philosophy of Science. Science and Its Conceptual Foundations. Univ. of Chicago Press (2003)","DOI":"10.7208\/chicago\/9780226300610.001.0001"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07620-1_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T23:11:43Z","timestamp":1582413103000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07620-1_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076195","9783319076201"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07620-1_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}