{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T05:06:26Z","timestamp":1748667986358,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1109\/ccece.2009.5090096","type":"proceedings-article","created":{"date-parts":[[2009,6,29]],"date-time":"2009-06-29T02:25:58Z","timestamp":1246242358000},"page":"77-82","source":"Crossref","is-referenced-by-count":9,"title":["A measurement model for secure and usable e-commerce websites"],"prefix":"10.1109","author":[{"given":"Ricardo Mendoza","family":"Gonzalez","sequence":"first","affiliation":[]},{"given":"Miguel Vargas","family":"Martin","sequence":"additional","affiliation":[]},{"given":"Jaime","family":"Munoz-Arteaga","sequence":"additional","affiliation":[]},{"given":"Francisco","family":"alvarez-Rodriguez","sequence":"additional","affiliation":[]},{"given":"Miguel A.","family":"Garcia-Ruiz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","article-title":"two visual computer network security monitoring tools incorporating operator interface requirements","author":"yurcik","year":"2003","journal-title":"Proc ACM CHI'03 Workshop on Human-Computer Interaction and Security Systems"},{"key":"15","first-page":"206","article-title":"a mathematical model of the finding of usability problems","author":"nielsen","year":"1993","journal-title":"Proc ACM\/IFIP INTERCHI'93 Conference"},{"key":"16","article-title":"service-oriented software system engineering: challenges and practices","author":"padmanabhuni","year":"2005","journal-title":"Security in Service Oriented Architecture Issues standards and Implementation"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/503112.503114"},{"key":"14","doi-asserted-by":"crossref","first-page":"675","DOI":"10.1016\/S0167-4048(03)00006-3","volume":"22","author":"johnston","year":"2003","journal-title":"Security and Human Computer Interfaces"},{"year":"2005","author":"cranor","journal-title":"Security and Usability Designing Secure Systems that People Can Use","key":"11"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1109\/MSP.2008.49"},{"year":"0","author":"basili","journal-title":"The Goal Question Metrics Approach","key":"3"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1145\/1463160.1463163"},{"doi-asserted-by":"publisher","key":"1","DOI":"10.1145\/1132736.1132751"},{"key":"10","article-title":"designing a privacy preference specification interface: a case study","author":"cranor","year":"2003","journal-title":"Proc ACM CHI'03 Workshop on Human-Computer Interaction and Security Systems"},{"year":"0","key":"7"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1007\/978-3-540-74800-7_9"},{"year":"0","key":"5"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1109\/MSP.2006.101"},{"key":"9","first-page":"1","article-title":"a usability study and critique of two password managers","author":"chiasson","year":"2006","journal-title":"Proc 15th USENIX Security Symposium"},{"key":"8","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/978-3-540-74835-9_24","article-title":"graphical password authentication using cued click points","author":"chiasson","year":"2007","journal-title":"Lecture Notes in Computer Science"}],"event":{"name":"2009 Canadian Conference on Electrical and Computer Engineering (CCECE)","start":{"date-parts":[[2009,5,3]]},"location":"St. John's, NL, Canada","end":{"date-parts":[[2009,5,6]]}},"container-title":["2009 Canadian Conference on Electrical and Computer Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5075165\/5090078\/05090096.pdf?arnumber=5090096","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T21:23:43Z","timestamp":1497821023000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5090096\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/ccece.2009.5090096","relation":{},"subject":[],"published":{"date-parts":[[2009,5]]}}}