{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:15:37Z","timestamp":1756167337733,"version":"3.44.0"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2012,10,1]],"date-time":"2012-10-01T00:00:00Z","timestamp":1349049600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2012,10,1]],"date-time":"2012-10-01T00:00:00Z","timestamp":1349049600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,10]]},"DOI":"10.1109\/ecrime.2012.6489516","type":"proceedings-article","created":{"date-parts":[[2013,4,5]],"date-time":"2013-04-05T16:57:53Z","timestamp":1365181073000},"page":"1-10","source":"Crossref","is-referenced-by-count":2,"title":["Does context influence responses to firewall warnings?"],"prefix":"10.1109","author":[{"given":"Muhammad","family":"Mahmoud","sequence":"first","affiliation":[{"name":"Department of Systems and Computer Engineering, Carleton University, Ottawa, ON, K1S 5B6, Canada"}]},{"given":"Sonia","family":"Chiasson","sequence":"additional","affiliation":[{"name":"School of Computer Science, Carleton University, Ottawa, ON, K1S 5B6, Canada"}]},{"given":"Ashraf","family":"Matrawy","sequence":"additional","affiliation":[{"name":"Department of Systems and Computer Engineering, Carleton University, Ottawa, ON, K1S 5B6, Canada"}]}],"member":"263","reference":[{"journal-title":"Nonparametric Statistical Methods","year":"1999","author":"hollander","key":"15"},{"journal-title":"Practical Nonparametric Statistics","year":"1999","author":"conover","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655012"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078831"},{"journal-title":"Risk Communication A Mental Models Approach","year":"2002","author":"morgan","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078829"},{"key":"3","first-page":"313","article-title":"Behavioral compliance: Theory, methodology, and results","author":"kalsher","year":"2006","journal-title":"Handbook of Warnings"},{"journal-title":"Secrets and Lies Digital Security in a Networked World","year":"2004","author":"schneier","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1146269.1146280"},{"key":"10","first-page":"245","article-title":"Attention switch and maintenance","author":"wogalter","year":"2006","journal-title":"Handbook of Warnings"},{"key":"7","first-page":"7","article-title":"An algorithm for anomaly-based botnet detection","author":"binkley","year":"2006","journal-title":"SRUTI'06 Proceedings of the 2nd conference on Steps to Reducing Unwanted Traffic on the Internet"},{"key":"6","first-page":"503","article-title":"IRC botchallenger: Creating botnet-resilient networks","volume":"6","author":"mahmoud","year":"2011","journal-title":"Journal of Information Assurance and Security"},{"key":"5","first-page":"11","article-title":"A framework for reasoning about the human in the loop","author":"cranor","year":"2008","journal-title":"Proceedings of the 1st Conference on Usability"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1600176.1600182"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"key":"8","first-page":"3","article-title":"Purposes and scope of warnings","author":"wogalter","year":"2006","journal-title":"Handbook of Warnings"}],"event":{"name":"2012 eCrime Researchers Summit (eCrime 2012)","start":{"date-parts":[[2012,10,23]]},"location":"Las Croabas, PR, USA","end":{"date-parts":[[2012,10,24]]}},"container-title":["2012 eCrime Researchers Summit"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6482713\/6489511\/06489516.pdf?arnumber=6489516","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,25]],"date-time":"2025-08-25T20:18:27Z","timestamp":1756153107000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6489516\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/ecrime.2012.6489516","relation":{},"subject":[],"published":{"date-parts":[[2012,10]]}}}