{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T22:29:36Z","timestamp":1759530576394,"version":"3.41.2"},"reference-count":3,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2007,10,16]],"date-time":"2007-10-16T00:00:00Z","timestamp":1192492800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.emeraldinsight.com\/page\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Info Mngmnt &amp; Comp Security"],"published-print":{"date-parts":[[2007,10,16]]},"DOI":"10.1108\/09685220710831116","type":"journal-article","created":{"date-parts":[[2007,9,29]],"date-time":"2007-09-29T07:02:57Z","timestamp":1191049377000},"page":"372-381","source":"Crossref","is-referenced-by-count":4,"title":["User\u2010centred security applied to the development of a management information system"],"prefix":"10.1108","volume":"15","author":[{"given":"Marcus","family":"Nohlberg","sequence":"first","affiliation":[]},{"given":"Johannes","family":"B\u00e4ckstr\u00f6m","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"key":"b5","doi-asserted-by":"crossref","unstructured":"Furnell, S.M., Jusoh, A., Katsabas, D. and Dowland, P. (2006), \u201cConsidering the usability of end\u2010user security software\u201d,Proceedings of 21st IFIP International Information Security Conference (IFIP SEC 2006), Karlstad, Sweden, May 22\u201024, pp. 307\u201016.","DOI":"10.1007\/0-387-33406-8_26"},{"key":"b14","unstructured":"Simon, R.T. and Zurko, M.E. (1996), \u201cUser\u2010centered security\u201d,Proceedings of the UCLA Conference on New Security Paradigms Workshops, September 17\u201020, available at: http:\/\/portal.acm.org\/citation.cfm?id\u2009=\u2009304859 (accessed 5 August 2006)."},{"key":"b15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.05.002"}],"container-title":["Information Management &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/09685220710831116","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full\/10.1108\/09685220710831116","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:09:03Z","timestamp":1753402143000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/15\/5\/372-381\/180964"}},"subtitle":[],"editor":[{"given":"Steven","family":"Furnell","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2007,10,16]]},"references-count":3,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2007,10,16]]}},"alternative-id":["10.1108\/09685220710831116"],"URL":"https:\/\/doi.org\/10.1108\/09685220710831116","relation":{},"ISSN":["0968-5227"],"issn-type":[{"type":"print","value":"0968-5227"}],"subject":[],"published":{"date-parts":[[2007,10,16]]}}}