{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T09:48:06Z","timestamp":1725443286399},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1109\/ccnc.2011.5766529","type":"proceedings-article","created":{"date-parts":[[2011,5,13]],"date-time":"2011-05-13T18:16:45Z","timestamp":1305310605000},"page":"523-524","source":"Crossref","is-referenced-by-count":0,"title":["Security considered harmful a case study of tradeoff between security and usability"],"prefix":"10.1109","author":[{"given":"Masaki","family":"Minami","sequence":"first","affiliation":[]},{"given":"Kuniyasu","family":"Suzaki","sequence":"additional","affiliation":[]},{"given":"Takashi","family":"Okumura","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Bridging the consumer ehealth and public health through diagnostic decision support system","year":"2011","author":"okumura","key":"ref4"},{"key":"ref3","article-title":"Efficient and Context-aware access control for pervasive medical sensor net-works","author":"morchon","year":"2010","journal-title":"PerHealth 2010 Proceedings of the First IEEE PerCom Workshop on Pervasive Healthcare"},{"journal-title":"Security guidelines for health information systems","year":"2010","key":"ref6"},{"journal-title":"Salesforce CRM Ideas","year":"0","key":"ref5"},{"key":"ref8","first-page":"14","article-title":"Why johnny can't encrypt: a usability evaluation of pgp 5.0","author":"whitten","year":"1999","journal-title":"SSYM'99 Proceedings of the 8th conference on USENIX Security Symposium"},{"journal-title":"Summary of the HIPAA Privacy Rule","year":"2005","key":"ref7"},{"key":"ref2","article-title":"Masako Kaneko Keiko Takenoue and Kikuko Ohta","author":"minami","year":"2003","journal-title":"e-CARE Project Overview"},{"key":"ref1","first-page":"554","article-title":"Role Based Access Control","author":"ferraiolo","year":"1992","journal-title":"15th National Computer Security Conference"}],"event":{"name":"2011 IEEE Consumer Communications and Networking Conference (CCNC)","start":{"date-parts":[[2011,1,9]]},"location":"Las Vegas, NV, USA","end":{"date-parts":[[2011,1,12]]}},"container-title":["2011 IEEE Consumer Communications and Networking Conference (CCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5762824\/5766312\/05766529.pdf?arnumber=5766529","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T06:07:53Z","timestamp":1490076473000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5766529\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/ccnc.2011.5766529","relation":{},"subject":[],"published":{"date-parts":[[2011,1]]}}}