{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:15:22Z","timestamp":1725747322460},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642410970"},{"type":"electronic","value":"9783642410987"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41098-7_9","type":"book-chapter","created":{"date-parts":[[2013,9,4]],"date-time":"2013-09-04T13:16:01Z","timestamp":1378300561000},"page":"131-143","source":"Crossref","is-referenced-by-count":11,"title":["Socio-Technical Study on the Effect of Trust and Context When Choosing WiFi Names"],"prefix":"10.1007","author":[{"given":"Ana","family":"Ferreira","sequence":"first","affiliation":[]},{"given":"Jean-Louis","family":"Huynen","sequence":"additional","affiliation":[]},{"given":"Vincent","family":"Koenig","sequence":"additional","affiliation":[]},{"given":"Gabriele","family":"Lenzini","sequence":"additional","affiliation":[]},{"given":"Salvador","family":"Rivas","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Borgida, E., Nisbett, R.E.: The Differential Impact of Abstract vs. Concrete Information on Decisions. J. of Applied Social Phychology, 258\u2013271 (1977)","DOI":"10.1111\/j.1559-1816.1977.tb00750.x"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1086\/296365","volume":"59","author":"A. Tversky","year":"1986","unstructured":"Tversky, A., Kahneman, D.: Rational Choice and The Framining of Decisions. J. Business\u00a059, 251\u2013278 (1986)","journal-title":"J. Business"},{"key":"9_CR3","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-540-70525-3_5","volume-title":"Deontic Logic in Computer Science","author":"R. Anderson","year":"2008","unstructured":"Anderson, R.: Information Security Economics - and Beyond. In: van der Meyden, R., van der Torre, L. (eds.) DEON 2008. LNCS (LNAI), vol.\u00a05076, p. 49. Springer, Heidelberg (2008)"},{"key":"9_CR4","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A. Adams","year":"1999","unstructured":"Adams, A., Sasse, A.: Users Are Not the Enemy. Comm. ACM\u00a042, 40\u201346 (1999)","journal-title":"Comm. ACM"},{"issue":"4","key":"9_CR5","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/1330311.1330320","volume":"51","author":"R. West","year":"2008","unstructured":"West, R.: The Psychology of Security. Communication of the ACM\u00a051(4), 34\u201338 (2008)","journal-title":"Communication of the ACM"},{"key":"9_CR6","first-page":"581","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2006","author":"R. Dhamija","year":"2006","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2006, pp. 581\u2013590. ACM, New York (2006)"},{"key":"9_CR7","unstructured":"Sunshine, J., Egelman, S., Almuhimedi, H., Atri, N., Cranor, L.F.: Crying wolf: An empirical study of SSL warning effectiveness. In: Proc. of USENIX 2009 (2009)"},{"key":"9_CR8","unstructured":"Gambetta, D.: Can We Trust Trust? In: Gambetta, D. (ed.) Trust: Making and Breaking Cooperative Relatioins, ch. 13, pp. 213\u2013237. Basil Blackwell (2000)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Castelfranchi, C., Falcone, R.: Trust Theory: A Socio-Cognitive and Computational Model. Wiley (2010)","DOI":"10.1002\/9780470519851"},{"key":"9_CR10","unstructured":"R Development Core Team, R: A Language and Environment for Statistical Computing, R Foundation for Statistical Computing, Vienna, Austria (2008), \n                    \n                      http:\/\/www.R-project.org\n                    \n                    \n                  , ISBN 3-900051-07-0"},{"key":"9_CR11","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1214\/ss\/1009212520","volume":"14","author":"E.L. Lehmann","year":"1999","unstructured":"Lehmann, E.L.: \u2019Student\u2019 and small-sample theory. Statistical Science\u00a014, 418\u2013426 (1999)","journal-title":"Statistical Science"},{"issue":"6","key":"9_CR12","doi-asserted-by":"publisher","first-page":"80","DOI":"10.2307\/3001968","volume":"1","author":"F. Wilcoxon","year":"1945","unstructured":"Wilcoxon, F.: Individual comparisons by ranking methods. Biometrics Bulletin\u00a01(6), 80\u201383 (1945)","journal-title":"Biometrics Bulletin"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41098-7_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T01:51:48Z","timestamp":1558057908000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41098-7_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642410970","9783642410987"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41098-7_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}