{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T21:21:49Z","timestamp":1725830509175},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319248578"},{"type":"electronic","value":"9783319248585"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24858-5_16","type":"book-chapter","created":{"date-parts":[[2015,9,19]],"date-time":"2015-09-19T09:09:52Z","timestamp":1442653792000},"page":"255-264","source":"Crossref","is-referenced-by-count":1,"title":["In Cyber-Space No\u00a0One Can Hear You S $$\\cdot $$ CREAM"],"prefix":"10.1007","author":[{"given":"Ana","family":"Ferreira","sequence":"first","affiliation":[]},{"given":"Jean-Louis","family":"Huynen","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Koenig","sequence":"additional","affiliation":[]},{"given":"Gabriele","family":"Lenzini","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,9]]},"reference":[{"key":"16_CR1","unstructured":"Cranor, L.F.: A framework for reasoning about the human in the loop. Proc. First Conf. Usability Psychol. Secur. 1\u201315 (2008). \nhttp:\/\/portal.acm.org\/citation.cfm?id=1387650"},{"issue":"4","key":"16_CR2","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1007\/s00165-007-0035-6","volume":"19","author":"P Curzon","year":"2007","unstructured":"Curzon, P., Ruksenas, R., Blandford, A.: An approach to formal verification of humancomputer interaction. Form. Aspects Comput. 19(4), 513\u2013550 (2007)","journal-title":"Form. Aspects Comput."},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/978-3-642-34638-5_2","volume-title":"Financial Cryptography and Data Security","author":"M Carlos","year":"2012","unstructured":"Carlos, M., Price, G.: Understanding the weaknesses of human-protocol interaction. In: Blyth, J., Dietrich, S., Camp, L.J. (eds.) FC 2012. LNCS, vol. 7398, pp. 13\u201326. Springer, Heidelberg (2012)"},{"key":"16_CR4","unstructured":"Corporation, M.: CAPEC - Common Attack Pattern Enumeration and Classification (2014). \nhttps:\/\/capec.mitre.org\/"},{"key":"16_CR5","volume-title":"Cognitive reliability and error analysis method CREAM","author":"E Hollnagel","year":"1998","unstructured":"Hollnagel, E.: Cognitive reliability and error analysis method CREAM. Elsevier, Oxford (1998)"},{"key":"16_CR6","unstructured":"Hollnagel, H.: FRAM: The Functional Resonance Analysis Method: Modelling Complex Socio-technical Systems. MPG Books Group (2012)"},{"key":"16_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4471-3812-9","volume-title":"Guide to Applying Human Factors Methods - Human Error and Accident Management in Safety-Critical Systems","author":"PC Cacciabue","year":"2004","unstructured":"Cacciabue, P.C.: Guide to Applying Human Factors Methods - Human Error and Accident Management in Safety-Critical Systems. Springer, Heidelberg (2004)"},{"key":"16_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1007\/978-3-319-07620-1_28","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"A Ferreira","year":"2014","unstructured":"Ferreira, A., Huynen, J.-L., Koenig, V., Lenzini, G.: A conceptual framework to study socio-technical security. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 318\u2013329. Springer, Heidelberg (2014)"},{"issue":"18","key":"16_CR9","doi-asserted-by":"crossref","first-page":"1249","DOI":"10.1177\/154193120705101842","volume":"51","author":"RD Serwy","year":"2007","unstructured":"Serwy, R.D., Rantanen, E.M.: Evaluation of a software implementation of the cognitive reliability and error analysis method (CREAM). Proc. Hum. Factors Ergonomics Soc. Ann. Meet. 51(18), 1249\u20131253 (2007)","journal-title":"Proc. Hum. Factors Ergonomics Soc. Ann. Meet."},{"key":"16_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1007\/978-3-319-20376-8_29","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"A Ferreira","year":"2015","unstructured":"Ferreira, A., Huynen, J.-L., Koenig, V., Lenzini, G., Rivas, S.: Do graphical cues effectively inform users? In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2015. LNCS, vol. 9190, pp. 323\u2013334. Springer, Heidelberg (2015)"},{"key":"16_CR11","unstructured":"Raskin, A.: Tabnabbing: A New Type of Phishing Attack. \nhttp:\/\/www.azarask.in\/blog\/post\/a-new-type-of-phishing-attack\/"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24858-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,5,18]],"date-time":"2017-05-18T15:25:22Z","timestamp":1495121122000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24858-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319248578","9783319248585"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24858-5_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}