{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:56:41Z","timestamp":1740139001120,"version":"3.37.3"},"reference-count":25,"publisher":"Informa UK Limited","issue":"1","funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["IIS-1451172"],"award-info":[{"award-number":["IIS-1451172"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","award":["H98230-14-C-0139"],"award-info":[{"award-number":["H98230-14-C-0139"]}],"id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2017,1,2]]},"DOI":"10.1080\/10447318.2016.1232229","type":"journal-article","created":{"date-parts":[[2016,10,3]],"date-time":"2016-10-03T16:03:32Z","timestamp":1475510612000},"page":"44-54","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["Human Subtlety Proofs: Using Computer Games to Model Cognitive Processes for Cybersecurity"],"prefix":"10.1080","volume":"33","author":[{"given":"Ignacio X.","family":"Dom\u00ednguez","sequence":"first","affiliation":[]},{"given":"Prairie Rose","family":"Goodwin","sequence":"additional","affiliation":[]},{"given":"David L.","family":"Roberts","sequence":"additional","affiliation":[]},{"given":"Robert","family":"St. Amant","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2016,10,3]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.111.4.1036"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1016\/S0079-7421(08)60422-3"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(84)90040-3"},{"volume-title":"Cognitive modeling","year":"2010","author":"Busemeyer J. R.","key":"CIT0009"},{"volume-title":"The psychology of human\u2013computer interaction","year":"1983","author":"Card S.","key":"CIT0010"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22348-8_24"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1037\/h0087351"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4939-2236-9_1"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-5416-8_4"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11391-3_6"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1037\/1076-898X.6.4.322"},{"key":"CIT0022","doi-asserted-by":"crossref","first-page":"245","DOI":"10.5951\/MT.47.4.0245","author":"Kirkpatrick P.","year":"1954","journal-title":"The Mathematics Teacher"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(87)90050-6"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2015.1038124"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci0701_3"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2016.1220103"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1016\/j.actpsy.2011.09.014"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1080\/00140139408964957"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2012.681220"},{"volume-title":"The Stanford encyclopedia of philosophy","year":"2014","author":"Thagard P.","key":"CIT0032"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_18"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.4018\/joeuc.2004070103"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1016\/0001-6918(77)90012-9"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.9"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2016.1232229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T16:12:14Z","timestamp":1657383134000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2016.1232229"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,3]]},"references-count":25,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2016,9,16]]},"published-print":{"date-parts":[[2017,1,2]]}},"alternative-id":["10.1080\/10447318.2016.1232229"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2016.1232229","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"type":"print","value":"1044-7318"},{"type":"electronic","value":"1532-7590"}],"subject":[],"published":{"date-parts":[[2016,10,3]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}