{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T13:32:02Z","timestamp":1745933522293,"version":"3.37.3"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2015,7,1]],"date-time":"2015-07-01T00:00:00Z","timestamp":1435708800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/G059063","EP\/K504002","EP\/L019272"],"award-info":[{"award-number":["EP\/G059063","EP\/K504002","EP\/L019272"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2015,7,1]]},"DOI":"10.1109\/tse.2014.2383396","type":"journal-article","created":{"date-parts":[[2014,12,19]],"date-time":"2014-12-19T03:23:29Z","timestamp":1418959409000},"page":"711-729","source":"Crossref","is-referenced-by-count":17,"title":["Safer User Interfaces: A Case Study in Improving Number Entry"],"prefix":"10.1109","volume":"41","author":[{"given":"Harold","family":"Thimbleby","sequence":"first","affiliation":[]}],"member":"263","reference":[{"journal-title":"Press On","year":"2007","author":"thimbleby","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69554-7_5"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1080\/01449298308914472"},{"journal-title":"Z Notation A Reference Manual","year":"1988","author":"spivey","key":"ref32"},{"key":"ref31","first-page":"1","article-title":"Logic and epistemology in safety cases","author":"rushby","year":"0","journal-title":"Proc 32nd Int Conf Comput Safety Rel Security"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(86)80070-0"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.2000.0442"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1006\/ijhc.1999.0341"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/38.6.418"},{"journal-title":"User Interface Design","year":"1990","author":"thimbleby","key":"ref34"},{"journal-title":"Design for Patient Safety A Guide to the Design of Electronic Infusion Devices","year":"0","author":"halls","key":"ref10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1141"},{"journal-title":"Formal Methods in Human-Computer Interaction","year":"1990","author":"harrison","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci0701_1"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/363235.363259"},{"year":"0","key":"ref14"},{"year":"0","key":"ref15"},{"year":"0","key":"ref16"},{"year":"0","key":"ref17"},{"journal-title":"Human and Machine Thinking","year":"1993","author":"johnson-laird","key":"ref18"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1145\/382294.382710","article-title":"A reply to the criticisms of the Knight & Leveson experiment","volume":"15","author":"knight","year":"1990","journal-title":"SIGSOFT Softw Eng Notes"},{"journal-title":"Conjectures and Refutations The Growth of Scientific Knowledge","year":"2002","author":"popper","key":"ref28"},{"key":"ref4","first-page":"29","article-title":"Safer &#x2018;5-key&#x2019; number entry user interfaces using differential formal analysis","volume":"26","author":"cauchi","year":"0","journal-title":"Proc BCS Conf Human-Comput Interaction"},{"journal-title":"Proc ACM SIGCHI Symp Eng Interactive Comput Syst","year":"0","author":"patern\u00f2","key":"ref27"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"1429","DOI":"10.1098\/rsif.2010.0112","article-title":"Reducing number entry errors: Solving a widespread, serious problem","volume":"7","author":"cairns","year":"2010","journal-title":"J Roy Soc Interface"},{"journal-title":"A Discipline of Programming","year":"1976","author":"dijkstra","key":"ref6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139062367"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1960.tb04447.x"},{"year":"0","key":"ref8"},{"year":"0","author":"fu","key":"ref7"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1145\/376929.376941","article-title":"Usability analysis with Markov models","volume":"8","author":"cairns","year":"2001","journal-title":"ACM Trans Comput -Human Interaction"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/800045.801613"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1037\/a0034397"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-92698-6_31"},{"journal-title":"The Trouble With Computers","year":"1995","author":"landauer","key":"ref20"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1028014.1028091"},{"year":"0","key":"ref22"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(81)80023-5"},{"key":"ref21","first-page":"1","article-title":"The benefits of formalising interactive number entry case studies with drug infusion pumps","author":"masci","year":"2013","journal-title":"Innovations in Systems and Software Engineering"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICHI.2013.91"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2163.358092"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466190"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/358722.358735"},{"year":"0","author":"thimbleby","key":"ref44"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.135"},{"key":"ref43","first-page":"1\/16","article-title":"Dependable keyed data entry for interactive systems","volume":"45","author":"thimbleby","year":"2011","journal-title":"Electronic Commun EASST"},{"key":"ref25","first-page":"178","article-title":"Number entry interfaces and their effects on errors and number perception","author":"oladimeji","year":"0","journal-title":"Proc IFIP Conf Human-Comput Interaction"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/7156214\/06991548.pdf?arnumber=6991548","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:53:16Z","timestamp":1641988396000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6991548\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,1]]},"references-count":47,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tse.2014.2383396","relation":{},"ISSN":["0098-5589","1939-3520"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"}],"subject":[],"published":{"date-parts":[[2015,7,1]]}}}