{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:32:00Z","timestamp":1729611120341,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/rcis.2017.7956554","type":"proceedings-article","created":{"date-parts":[[2017,6,26]],"date-time":"2017-06-26T16:35:56Z","timestamp":1498494956000},"page":"322-327","source":"Crossref","is-referenced-by-count":0,"title":["System design considerations for risk perception"],"prefix":"10.1109","author":[{"given":"Andrew","family":"M'manga","sequence":"first","affiliation":[]},{"given":"Shamal","family":"Faily","sequence":"additional","affiliation":[]},{"given":"John","family":"McAlaney","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Williams","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0","volume":"1999","author":"whitten","year":"1999","journal-title":"Usenix Security"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1358628.1358931"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/0010-0285(73)90033-9"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/844102.844117"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/304851.304859"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36159-6_24"},{"key":"ref34","first-page":"211","article-title":"The trade-off of design for routine and unexpected performance: Implications of situation awareness","author":"wickens","year":"2000","journal-title":"Situation Awareness Analysis and Measurement"},{"key":"ref10","first-page":"1","article-title":"Even experts deserve usable security: Design guidelines for security management systems","author":"chiasson","year":"2007","journal-title":"SOUPS Workshop on Usable IT Security Management (USM) Citeseer"},{"key":"ref11","article-title":"O'Reilly Media, Inc","author":"cranor","year":"2005","journal-title":"Security and Usability Designing Secure Systems that People Can Use"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1177\/154193120504900304","article-title":"Achieving cyber defense situational awareness: A cognitive task analysis of information assurance analysts","volume":"49","author":"d\u2019 amico","year":"2005","journal-title":"Proceedings of the Human Factors and Ergonomics Society Annual Meeting"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s007790170019"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1600176.1600182"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1518\/001872095779049543"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1809100.1809105"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/B0-08-043076-7\/01487-X"},{"journal-title":"The Ecological Approach to Visual Perception","year":"2011","author":"gibson","key":"ref18"},{"journal-title":"What is the Difference Between Information and Intelligence? \\textbar SecurityWeek Com","year":"2016","author":"goldfarb","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39345-7_16"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(83)90046-8"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/3468.844354"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2006.1656041"},{"key":"ref6","first-page":"123","article-title":"The essence of winning and losing","volume":"12","author":"boyd","year":"1996","journal-title":"Unpublished lecture notes"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1207\/s15327108ijap0101_4"},{"journal-title":"Psychological acceptability revisited In Security and Usability Designing Secure Systems that People Can Use","year":"2005","author":"bishop","key":"ref5"},{"journal-title":"Mental Models in Human-Computer Interaction Research Issues about What the User of Software Knows","year":"1987","author":"carroll","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508178"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"journal-title":"How Microsoft's tricky new Windows 10 pop-up deceives you into upgrading","year":"2016","author":"chacos","key":"ref9"},{"journal-title":"A Judgment under Uncertainty Heuristics and Biases","year":"1975","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.joep.2004.08.004"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.tree.2013.05.014"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ESPRE.2014.6890522"},{"journal-title":"Learning UML 2 0","year":"2006","author":"miles","key":"ref24"},{"journal-title":"Decision Making in Action Models and Methods","year":"1993","author":"klein","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/301153.301168"},{"journal-title":"Design of Everyday Things Revised and Expanded","year":"2013","author":"norman","key":"ref25"}],"event":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","start":{"date-parts":[[2017,5,10]]},"location":"Brighton, United Kingdom","end":{"date-parts":[[2017,5,12]]}},"container-title":["2017 11th International Conference on Research Challenges in Information Science (RCIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7951529\/7956506\/07956554.pdf?arnumber=7956554","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,26]],"date-time":"2019-09-26T23:48:44Z","timestamp":1569541724000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7956554\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/rcis.2017.7956554","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}