{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T23:10:44Z","timestamp":1673305844677},"reference-count":10,"publisher":"Association for Computing Machinery (ACM)","issue":"1","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["interactions"],"published-print":{"date-parts":[[2007,1]]},"DOI":"10.1145\/1189976.1189988","type":"journal-article","created":{"date-parts":[[2007,1,16]],"date-time":"2007-01-16T19:38:29Z","timestamp":1168976309000},"page":"12-14","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["If you can't beat 'em, join 'em"],"prefix":"10.1145","volume":"14","author":[{"given":"William","family":"Yurcik","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Ramona Su","family":"Thompson","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Michael B.","family":"Twidale","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]},{"given":"Esa M.","family":"Rantanen","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]}],"member":"320","published-online":{"date-parts":[[2007,1]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031607.1031672"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/765891.766152"},{"key":"e_1_2_1_3_1","volume-title":"Security Administration Tools and Practices","author":"Kandogan E.","year":"2005","unstructured":"Kandogan , E. & Haber , E.M. Security Administration Tools and Practices . chapter within Security and Usability: Designing Secure Systems People Can Use. ( 2005 ) edited by L .F. Cranor and S. Garfinkel, O'Reilly Press . Kandogan, E. & Haber, E.M. Security Administration Tools and Practices. chapter within Security and Usability: Designing Secure Systems People Can Use. (2005) edited by L .F. Cranor and S. Garfinkel, O'Reilly Press."},{"key":"e_1_2_1_4_1","volume-title":"Designing the User Interface: Strategies for Effective Human-Computer Interaction, 4\/E","author":"Shneiderman B.","year":"2005","unstructured":"Shneiderman , B. & Plaisant , C. ( 2005 ) Designing the User Interface: Strategies for Effective Human-Computer Interaction, 4\/E . Addison-Wesley . Shneiderman, B. & Plaisant, C. (2005) Designing the User Interface: Strategies for Effective Human-Computer Interaction, 4\/E. Addison-Wesley."},{"key":"e_1_2_1_5_1","volume-title":"The Visual Display of Quantitative Information 2\/E","author":"Tufte E.R.","year":"2001","unstructured":"Tufte , E.R. ( 2001 ). The Visual Display of Quantitative Information 2\/E . Graphics Press . Tufte, E.R. (2001). The Visual Display of Quantitative Information 2\/E. Graphics Press."},{"key":"e_1_2_1_6_1","volume-title":"Large Installation System Administration (LISA) Conference. (annual 1987-present). http:\/\/www.usenix.org\/events\/lisa06\/","author":"Usenix","unstructured":"Usenix Large Installation System Administration (LISA) Conference. (annual 1987-present). http:\/\/www.usenix.org\/events\/lisa06\/ Usenix Large Installation System Administration (LISA) Conference. (annual 1987-present). http:\/\/www.usenix.org\/events\/lisa06\/"},{"key":"e_1_2_1_7_1","unstructured":"VisFlowConnect-IP Download Homepage. security.ncsa.uiuc.edu\/distribution\/ VisFlowConnectDownLoad.html  VisFlowConnect-IP Download Homepage. security.ncsa.uiuc.edu\/distribution\/ VisFlowConnectDownLoad.html"},{"key":"e_1_2_1_8_1","unstructured":"VisTextFlow-IP Download Homepage. security.ncsa.uiuc.edu\/distribution\/ VisTextFlowDownLoad.html  VisTextFlow-IP Download Homepage. security.ncsa.uiuc.edu\/distribution\/ VisTextFlowDownLoad.html"},{"key":"e_1_2_1_9_1","volume-title":"Presentation: Visualizing Uncertainty in High Time-Stress. National Academy of Sciences Workshop \"Toward Improved Visualization of Uncertain Information\".","author":"Wickens C.","year":"2005","unstructured":"Wickens , C. ( March 4 , 2005 ). Presentation: Visualizing Uncertainty in High Time-Stress. National Academy of Sciences Workshop \"Toward Improved Visualization of Uncertain Information\". Wickens, C. (March 4, 2005). Presentation: Visualizing Uncertainty in High Time-Stress. National Academy of Sciences Workshop \"Toward Improved Visualization of Uncertain Information\"."},{"key":"e_1_2_1_10_1","volume-title":"Workshops on Visualization for Computer Security (VizSEC) (annual 2004-present). www.ncassr.org\/projects\/sift\/vizsec\/","author":"International","unstructured":"International Workshops on Visualization for Computer Security (VizSEC) (annual 2004-present). www.ncassr.org\/projects\/sift\/vizsec\/ International Workshops on Visualization for Computer Security (VizSEC) (annual 2004-present). www.ncassr.org\/projects\/sift\/vizsec\/"}],"container-title":["Interactions"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1189976.1189988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T19:36:36Z","timestamp":1672256196000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1189976.1189988"}},"subtitle":["combining text and visual interfaces for security-system administration"],"short-title":[],"issued":{"date-parts":[[2007,1]]},"references-count":10,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2007,1]]}},"alternative-id":["10.1145\/1189976.1189988"],"URL":"https:\/\/doi.org\/10.1145\/1189976.1189988","relation":{},"ISSN":["1072-5520","1558-3449"],"issn-type":[{"value":"1072-5520","type":"print"},{"value":"1558-3449","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,1]]},"assertion":[{"value":"2007-01-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}