{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:24:50Z","timestamp":1730291090223,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,7]]},"DOI":"10.1109\/pst.2013.6596092","type":"proceedings-article","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T15:54:58Z","timestamp":1379606098000},"page":"366-368","source":"Crossref","is-referenced-by-count":6,"title":["Encouraging second thoughts: Obstructive user interfaces for raising security awareness"],"prefix":"10.1109","author":[{"given":"Tim","family":"Storer","sequence":"first","affiliation":[]},{"given":"Stephen","family":"Marsh","sequence":"additional","affiliation":[]},{"given":"Sylvie","family":"Noel","sequence":"additional","affiliation":[]},{"given":"Babak","family":"Esfandiari","sequence":"additional","affiliation":[]},{"given":"Khalil","family":"El-Khatib","sequence":"additional","affiliation":[]},{"given":"Pam","family":"Briggs","sequence":"additional","affiliation":[]},{"given":"Karen","family":"Renaud","sequence":"additional","affiliation":[]},{"given":"Mehmet Vefa","family":"Bicakci","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The Checklist Manifesto How to Get Things Right","year":"2010","author":"gawande","key":"13"},{"key":"11","first-page":"173","article-title":"Towards an interface causing discomfort for security: A user survey on the factors of discomfort","author":"oikawa","year":"2008","journal-title":"Second International Conference on Secure System Integration and Reliability Improvement"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35694-0_18"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72348-6_12"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29963-6_4"},{"key":"1","article-title":"Defining and investigating device comfort","volume":"321","author":"marsh","year":"2010","journal-title":"Trust Management IV 4th IFIP WG 11 11 International Conference IFIPTM 2010 Ser IFIP Advances in Information and Communication Technology"},{"journal-title":"New in Labs Stop Sending Mail You Later Regret","year":"2008","author":"perlow","key":"10"},{"key":"7","article-title":"Review of information security at hm revenue and customs final report","author":"poynter","year":"2008","journal-title":"HM Stationary Office St Clements House 2-16 Colegate"},{"key":"6","article-title":"The password thicket: Technical and market failures in human authentication on the web","author":"bonneau","year":"2010","journal-title":"The Ninth Workshop on the Economics of Information Security"},{"key":"5","first-page":"169","article-title":"Why johnny can't encrypt: Usability evaluation of pgp 5.0","author":"whitten","year":"1999","journal-title":"Proceedings of the 8th USENIX Security Symposium"},{"key":"4","article-title":"Comfort zones: Location dependent trust and regret management for mobile devices","author":"marsh","year":"2010","journal-title":"Proceedings LocationTrust 2010 Workshop on Location As Context for Trust at IFIPTM 2010"},{"key":"9","article-title":"Invisible, passive, continuous, and multimodal authentication","author":"crawford","year":"2010","journal-title":"Proceedings of the Workshop on Mobile Social Signal Processing to Appear"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1358628.1358699"}],"event":{"name":"2013 Eleventh Annual Conference on Privacy, Security and Trust (PST)","start":{"date-parts":[[2013,7,10]]},"location":"Tarragona, Spain","end":{"date-parts":[[2013,7,12]]}},"container-title":["2013 Eleventh Annual Conference on Privacy, Security and Trust"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6589044\/6596025\/06596092.pdf?arnumber=6596092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T20:40:10Z","timestamp":1490215210000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6596092\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,7]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/pst.2013.6596092","relation":{},"subject":[],"published":{"date-parts":[[2013,7]]}}}