{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,6,1]],"date-time":"2022-06-01T18:50:51Z","timestamp":1654109451140},"reference-count":13,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[1991,6,1]],"date-time":"1991-06-01T00:00:00Z","timestamp":675734400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Security"],"published-print":{"date-parts":[[1991,6]]},"DOI":"10.1016\/0167-4048(91)90109-q","type":"journal-article","created":{"date-parts":[[2002,10,11]],"date-time":"2002-10-11T09:56:18Z","timestamp":1034330178000},"page":"331-344","source":"Crossref","is-referenced-by-count":8,"title":["Accessibility vs. security: A look at the demand for computer security"],"prefix":"10.1016","volume":"10","author":[{"given":"Gerald V.","family":"Post","sequence":"first","affiliation":[]},{"given":"Karen-Ann","family":"Kievit","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0167-4048(91)90109-Q_BIB1","first-page":"112","article-title":"Common sense and computer security","author":"Buss","year":"1984","journal-title":"Harvard Business Rev."},{"key":"10.1016\/0167-4048(91)90109-Q_BIB2","series-title":"Proc. IEEE Symp. on Security and Privacy","first-page":"14","article-title":"A comparison of commercial and military computer security policies","author":"Clark","year":"1987"},{"key":"10.1016\/0167-4048(91)90109-Q_BIB3","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1016\/0167-4048(88)90334-3","article-title":"On the implications of computer viruses and methods of defense","volume":"7","author":"Cohen","year":"1988","journal-title":"Computer & Security"},{"key":"10.1016\/0167-4048(91)90109-Q_BIB4","series-title":"Computer Security: A Global Challenge","first-page":"207","article-title":"Measuring computer security using software security metrics","author":"Murine","year":"1984"},{"key":"10.1016\/0167-4048(91)90109-Q_BIB5","series-title":"Proc. 1988 IEEE Symp. on Security and Privacy","first-page":"130","article-title":"Implementing commercial data integrity with secure capabilities","author":"Karger","year":"1988"},{"issue":"3","key":"10.1016\/0167-4048(91)90109-Q_BIB6","first-page":"247","article-title":"Formal models for computer security","volume":"13","author":"Landwehr","year":"1981","journal-title":"Commun. ACM"},{"key":"10.1016\/0167-4048(91)90109-Q_BIB7","first-page":"61","article-title":"Management Policies and Procedures Needed for Effective Computer Security","author":"Madnick","year":"1978","journal-title":"Sloan Manage. Rev."},{"key":"10.1016\/0167-4048(91)90109-Q_BIB8","series-title":"Crime by Computer","author":"Parker","year":"1976"},{"key":"10.1016\/0167-4048(91)90109-Q_BIB9","first-page":"308","article-title":"Computer Security Management","author":"Parker","year":"1981"},{"issue":"5","key":"10.1016\/0167-4048(91)90109-Q_BIB10","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1016\/0167-4048(87)90014-9","article-title":"Improving operating system security","volume":"6","author":"Post","year":"1987","journal-title":"Computers & Security"},{"key":"10.1016\/0167-4048(91)90109-Q_BIB11","series-title":"Proc. 8th Int. Conf. on Information Systems","first-page":"277","article-title":"Controlling computer abuse: an empirical study of effective security countermeasures","author":"Straub","year":"1987"},{"issue":"5","key":"10.1016\/0167-4048(91)90109-Q_BIB12","doi-asserted-by":"crossref","first-page":"484","DOI":"10.1145\/42411.42412","article-title":"Stalking the wily hacker","volume":"31","author":"Stroll","year":"1988","journal-title":"Commun. ACM"},{"key":"10.1016\/0167-4048(91)90109-Q_BIB13","series-title":"Computer Capers","author":"Whiteside","year":"1978"}],"container-title":["Computers &amp; Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016740489190109Q?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:016740489190109Q?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,10]],"date-time":"2019-04-10T23:55:28Z","timestamp":1554940528000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/016740489190109Q"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991,6]]},"references-count":13,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1991,6]]}},"alternative-id":["016740489190109Q"],"URL":"https:\/\/doi.org\/10.1016\/0167-4048(91)90109-q","relation":{},"ISSN":["0167-4048"],"issn-type":[{"value":"0167-4048","type":"print"}],"subject":[],"published":{"date-parts":[[1991,6]]}}}