{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T22:53:51Z","timestamp":1772232831631,"version":"3.50.1"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T00:00:00Z","timestamp":1669593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,28]],"date-time":"2022-11-28T00:00:00Z","timestamp":1669593600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 1565375,CNS 1814518"],"award-info":[{"award-number":["CNS 1565375,CNS 1814518"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,11,28]]},"DOI":"10.1109\/milcom55135.2022.10017736","type":"proceedings-article","created":{"date-parts":[[2023,1,24]],"date-time":"2023-01-24T19:14:24Z","timestamp":1674587664000},"page":"687-692","source":"Crossref","is-referenced-by-count":6,"title":["Integrating Human Intelligence to Bypass Information Asymmetry in Procurement Decision-Making"],"prefix":"10.1109","author":[{"given":"Peter J.","family":"Caven","sequence":"first","affiliation":[{"name":"Luddy School of Informatics, Computing, and Engineering Indiana University,Bloomington,United States"}]},{"given":"Shakthidhar Reddy","family":"Gopavaram","sequence":"additional","affiliation":[{"name":"Luddy School of Informatics, Computing, and Engineering Indiana University,Bloomington,United States"}]},{"given":"L. Jean","family":"Camp","sequence":"additional","affiliation":[{"name":"Luddy School of Informatics, Computing, and Engineering Indiana University,Bloomington,United States"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-349-24002-9_9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77366-5_34"},{"key":"ref3","article-title":"Rapid evidence assessment on labelling schemes and implications for consumer iot security","author":"Blythe","year":"2018","journal-title":"Technical Report, DCMS London"},{"key":"ref4","article-title":"SBOM vulnerability assessment & corresponding requirements","author":"Camp","year":"2021","journal-title":"NTIA Response to Notice and Request for Comments on Software Bill of Materials Elements and Considerations"},{"key":"ref5","article-title":"Lessons for labeling from risk communication","author":"Camp","year":"2021","journal-title":"Response to Call for Papers on Cybersecurity Labeling Programs for Consumers: Internet of Things (loT) Devices and Software"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1086\/267790"},{"key":"ref7","volume-title":"Certified Information Systems Security Professional","author":"Chapple","year":"2018"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.copsyc.2020.06.006"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335358"},{"key":"ref10","article-title":"Commission of the European Communities","year":"1991","journal-title":"Information technology security evaluation criteria (ITSEC): Preliminary harmonised criteria. Technical report"},{"key":"ref11","article-title":"Common criteria for information technology security evaluation, version 3.1, revision 5","author":"Criteria","year":"2017","journal-title":"Technical report"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/BF02310555"},{"key":"ref13","article-title":"Department of Commerce","journal-title":"The minimum elements for a software bill of materials (SBOM)"},{"key":"ref14","article-title":"Department of Defense Instruction","year":"2019","journal-title":"Cybersecurity - DoDI 8500.01. Technical report, US Department of Defense"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00043"},{"key":"ref16","volume-title":"Specification for CMU loT security and privacy label","author":"Emami-Naeini"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2307\/270774"},{"key":"ref18","article-title":"Federal Bureau of Investigation","volume-title":"loT poses opportunities for cyber crime","year":"2015"},{"key":"ref19","article-title":"Federal Trade Commission","journal-title":"FTC report on internet of things urges companies to adopt best practices to address consumer privacy and security risks"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-0394.2005.00299.x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.5220\/0010295205580565"},{"key":"ref22","article-title":"Going Beyond Labels","volume-title":"Workshop and Call for Papers on Cybersecurity Labeling Programs for Consumers: Internet of Things (loT) Devices and Software","author":"Gopavaram","year":"2021"},{"key":"ref23","article-title":"International Organization for Standardization","year":"2009","journal-title":"Information technology - security techniques - evaluation criteria for it security. Technical report"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0227800"},{"key":"ref25","article-title":"Security and privacy controls for information systems and organizations","volume-title":"Technical Report NIST Special Publication 800\u201353 Revision 5, U.S. Department of Commerce","year":"2020"},{"key":"ref26","article-title":"Joint Task Force Interagency Working Group","volume-title":"Assessing security and privacy controls in information systems and organizations. Technical Report NIST Special Publication 800\u201353A Revision 5, U.S. Department of Commerce","year":"2022"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837122"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/c2010-0-64844-9"},{"key":"ref29","article-title":"Building Code for the Internet of Things","author":"Lindqvist","year":"2017","journal-title":"IEEE Computer Society"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3410160"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2020.2987780"},{"key":"ref32","first-page":"333","article-title":"National Highway Traffic Safety Administration","volume-title":"Cybersecurity best practices for modern vehicles. Report No. DOT HS","volume":"812","year":"2016"},{"key":"ref33","article-title":"National Institute of Standards and Technology","year":"2021","journal-title":"Draft baseline security criteria for consumer loT devices. Technical report"},{"key":"ref34","article-title":"National Institute of Standards and Technology","year":"2022","journal-title":"Recommended criteria for cybersecurity labeling for consumer internet of things (loT) products. Technical report, U.S. Department of Commerce"},{"key":"ref35","article-title":"National Institute of Standards and Technology","year":"2022","journal-title":"Recommended criteria for cybersecurity labeling of consumer software. Technical report, U.S. Department of Commerce"},{"key":"ref36","article-title":"National Telecommunications and Information Administrator","year":"2020","journal-title":"Framing software component transparency: Establishing a common software bill of materials (SBOM)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-12r1"},{"key":"ref38","article-title":"Online Trust Alliance","volume-title":"OTA internet of things","year":"2019"},{"key":"ref39","article-title":"Open Web Application Security Project","volume-title":"OWASP loT project","year":"2019"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-160v2r1"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-66r1"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.6028\/nist.cswp.02122014"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.4079\/pp.v26i0.19289"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3168716"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.5116\/ijme.4dfb.8dfd"},{"key":"ref46","article-title":"National Telecommunications and Information Administration","volume-title":"Software suppliers playbook: SBOM production and provision","year":"2021"},{"key":"ref47","volume-title":"Executive order 14028 on improving the nations cybersecurity","year":"2021"},{"key":"ref48","first-page":"565","article-title":"Warnings and risk communication","volume":"16","author":"Wogalter","year":"1999","journal-title":"Safety Science"}],"event":{"name":"MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)","location":"Rockville, MD, USA","start":{"date-parts":[[2022,11,28]]},"end":{"date-parts":[[2022,12,2]]}},"container-title":["MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10017432\/10017302\/10017736.pdf?arnumber=10017736","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T06:40:46Z","timestamp":1707806446000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10017736\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,28]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/milcom55135.2022.10017736","relation":{},"subject":[],"published":{"date-parts":[[2022,11,28]]}}}