{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T06:12:31Z","timestamp":1725603151696},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,10]]},"DOI":"10.1109\/ccst.2011.6095873","type":"proceedings-article","created":{"date-parts":[[2011,12,15]],"date-time":"2011-12-15T17:02:53Z","timestamp":1323968573000},"page":"1-7","source":"Crossref","is-referenced-by-count":2,"title":["Usability of authentication and access control: A case study in healthcare"],"prefix":"10.1109","author":[{"given":"A.","family":"Ferreira","sequence":"first","affiliation":[]},{"given":"R.","family":"Cruz-Correia","sequence":"additional","affiliation":[]},{"given":"L.","family":"Antunes","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2648.2001.01897.x"},{"journal-title":"Sociology at Surrey","year":"1997","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.22.1.129"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2010.77"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.4135\/9781849209700","author":"marvasti","year":"2004","journal-title":"Qualitative Research in Sociology An Introduction"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1065545.1065546"},{"journal-title":"Security and Usability Designing Secure Systems that People Can Use","year":"2005","author":"cranor","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143129"},{"key":"12","first-page":"169","article-title":"Why Johnny can't encrypt: A usability evaluation of PGP 5.0","author":"whitten","year":"1999","journal-title":"Proceedings of 8th USENIX Security Symposium"},{"key":"3","first-page":"47","article-title":"Improving the implementation of access control to electronic medical record","author":"ferreira","year":"2008","journal-title":"IEEE International Carnahan Conference on Security Technology"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2753.2009.01217.x"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/S0149-7189(99)00034-8"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1177\/016224399101600304"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3592.001.0001","author":"oudshoorn","year":"2003","journal-title":"How Users Matter The Coconstruction of Users and Technologies"},{"journal-title":"Comment Sortir de la Dichotomie Technique\/socie?te? Presentation des Diverses Sociologies de la Technique","year":"1994","author":"akrich","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1197\/jamia.M1094"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1377\/hlthaff.23.2.116"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1377\/hlthaff.23.2.116"},{"journal-title":"New Medical Technologies and Society Reordering Life","year":"2004","author":"brown","key":"8"}],"event":{"name":"2011 International Carnahan Conference on Security Technology (ICCST)","start":{"date-parts":[[2011,10,18]]},"location":"Barcelona, Spain","end":{"date-parts":[[2011,10,21]]}},"container-title":["2011 Carnahan Conference on Security Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6088023\/6095872\/06095873.pdf?arnumber=6095873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,20]],"date-time":"2019-06-20T20:34:42Z","timestamp":1561062882000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6095873\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/ccst.2011.6095873","relation":{},"subject":[],"published":{"date-parts":[[2011,10]]}}}