{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:40:15Z","timestamp":1750308015506,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,3,30]],"date-time":"2007-03-30T00:00:00Z","timestamp":1175212800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,3,30]]},"DOI":"10.1145\/1234772.1234786","type":"proceedings-article","created":{"date-parts":[[2007,11,16]],"date-time":"2007-11-16T15:58:50Z","timestamp":1195228730000},"page":"10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Looking for trouble"],"prefix":"10.1145","author":[{"given":"Joshua B.","family":"Gross","sequence":"first","affiliation":[{"name":"The Pennsylvania State University"}]},{"given":"Mary Beth","family":"Rosson","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University"}]}],"member":"320","published-online":{"date-parts":[[2007,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"U.S.D.o. ed.","author":"Women","year":"2005","unstructured":"Women in the Labor Force : A Databook. Labor , U.S.D.o. ed. , 2005 . Women in the Labor Force: A Databook. Labor, U.S.D.o. ed., 2005."},{"key":"e_1_3_2_1_2_1","unstructured":"Worm targets Macs via Bluetooth Cnn.com 2006. Worm targets Macs via Bluetooth Cnn.com 2006."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.22"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.022"},{"key":"e_1_3_2_1_5_1","volume-title":"Hard: An Economic Perspective. in Seventeenth Computer Security Applications Conference","author":"Anderson R.","year":"2001","unstructured":"Anderson , R. , Why Information Security is Hard: An Economic Perspective. in Seventeenth Computer Security Applications Conference , 2001 , 358--365. Anderson, R., Why Information Security is Hard: An Economic Perspective. in Seventeenth Computer Security Applications Conference, 2001, 358--365."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1987.1663532"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/4398.001.0001","volume-title":"Making Use: Scenario-Based Design of Human-Computer Interaction","author":"Carroll J. M.","year":"2000","unstructured":"Carroll , J. M. Making Use: Scenario-Based Design of Human-Computer Interaction . The MIT Press , Cambridge, MA , 2000 . Carroll, J. M. Making Use: Scenario-Based Design of Human-Computer Interaction. The MIT Press, Cambridge, MA, 2000."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.020"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.021"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073009"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0308-5"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143127"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of Human Factors in Telecommunications","author":"Holmstrom U.","year":"1999","unstructured":"Holmstrom , U. , User-centered design of secure systems . in Proceedings of Human Factors in Telecommunications , ( Copenhagen, Denmark) , 1999 . Holmstrom, U., User-centered design of secure systems. in Proceedings of Human Factors in Telecommunications, (Copenhagen, Denmark), 1999."},{"key":"e_1_3_2_1_15_1","volume-title":"Democracy and Learning. Education Now","author":"Jeffs T.","year":"1996","unstructured":"Jeffs , T. and Smith , M. K . Informal Education: Conversation , Democracy and Learning. Education Now , 1996 . Jeffs, T. and Smith, M. K. Informal Education: Conversation, Democracy and Learning. Education Now, 1996."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.019"},{"key":"e_1_3_2_1_17_1","volume-title":"Human Factors","author":"Karat C.-M.","year":"1989","unstructured":"Karat , C.-M. , Iterative Usability Testing of a Security Application . in Human Factors , 1989 . Karat, C.-M., Iterative Usability Testing of a Security Application. in Human Factors, 1989."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.011"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00048-7"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642662"},{"key":"e_1_3_2_1_21_1","volume-title":"Organizations","author":"March J. G.","year":"1958","unstructured":"March , J. G. and Simon , H. A . Organizations , 1958 . March, J. G. and Simon, H. A. Organizations, 1958."},{"key":"e_1_3_2_1_22_1","volume-title":"SAGE Publications Ltd","author":"Mason J.","year":"1996","unstructured":"Mason , J. Qualitative Researching . SAGE Publications Ltd , London, UK , 1996 . Mason, J. Qualitative Researching. SAGE Publications Ltd, London, UK, 1996."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.009"},{"key":"e_1_3_2_1_24_1","volume-title":"The Art of Deception","author":"Mitnick K. D.","year":"2003","unstructured":"Mitnick , K. D. The Art of Deception . John Wiley & Sons , New York , 2003 . Mitnick, K. D. The Art of Deception. John Wiley & Sons, New York, 2003."},{"key":"e_1_3_2_1_25_1","volume-title":"Human Factors","author":"Mosteller W. S.","year":"1989","unstructured":"Mosteller , W. S. and Ballas , J ., Usability Analysis of Messages from a Security System . in Human Factors , 1989 . Mosteller, W. S. and Ballas, J., Usability Analysis of Messages from a Security System. in Human Factors, 1989."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.11.4.404.14600"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.015"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011902718709"},{"key":"e_1_3_2_1_29_1","unstructured":"Schneier B. Secrets and Lies. John Wiley & Sons NY 2000. Schneier B. Secrets and Lies . John Wiley & Sons NY 2000."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.2.1.40"},{"key":"e_1_3_2_1_31_1","volume-title":"Multiliteracies for a Digital Age","author":"Selber S. A.","year":"2004","unstructured":"Selber , S. A. Multiliteracies for a Digital Age . Southern Illinois University Press , 2004 . Selber, S. A. Multiliteracies for a Digital Age. Southern Illinois University Press, 2004."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24663-3_2"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220010371394"},{"key":"e_1_3_2_1_34_1","volume-title":"Penn State","author":"Thomas D. A.","year":"2005","unstructured":"Thomas , D. A. Security Threats and FBI Counterintrusion Efforts , Penn State , 2005 . Thomas, D. A. Security Threats and FBI Counterintrusion Efforts, Penn State, 2005."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2004.44"},{"issue":"4","key":"e_1_3_2_1_36_1","first-page":"287","article-title":"Towards a Theory of Informal and Incidental Learning","volume":"11","author":"Watkins K. E.","year":"2001","unstructured":"Watkins , K. E. and Marsick , V. J . Towards a Theory of Informal and Incidental Learning in Organizations. International Journal of Lifelong Education , 11 ( 4 ), 2001 , 287 -- 300 . Watkins, K. E. and Marsick, V. J. Towards a Theory of Informal and Incidental Learning in Organizations. International Journal of Lifelong Education, 11 (4), 2001, 287--300.","journal-title":"Organizations. International Journal of Lifelong Education"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"}],"event":{"name":"CHiMiT07: Computer Human Interaction for the Management of Information Technology","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Cambridge Massachusetts","acronym":"CHiMiT07"},"container-title":["Proceedings of the 2007 symposium on Computer human interaction for the management of information technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1234772.1234786","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1234772.1234786","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:39Z","timestamp":1750259199000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1234772.1234786"}},"subtitle":["understanding end-user security management"],"short-title":[],"issued":{"date-parts":[[2007,3,30]]},"references-count":37,"alternative-id":["10.1145\/1234772.1234786","10.1145\/1234772"],"URL":"https:\/\/doi.org\/10.1145\/1234772.1234786","relation":{},"subject":[],"published":{"date-parts":[[2007,3,30]]},"assertion":[{"value":"2007-03-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}