{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:36:19Z","timestamp":1750307779039,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,29]],"date-time":"2007-10-29T00:00:00Z","timestamp":1193616000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,29]]},"DOI":"10.1145\/1314333.1314352","type":"proceedings-article","created":{"date-parts":[[2007,11,15]],"date-time":"2007-11-15T14:30:20Z","timestamp":1195137020000},"page":"91-98","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Towards understanding user perceptions of authentication technologies"],"prefix":"10.1145","author":[{"given":"Laurie A.","family":"Jones","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA"}]},{"given":"Annie I.","family":"Ant\u00f3n","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC"}]},{"given":"Julia B.","family":"Earp","sequence":"additional","affiliation":[{"name":"North Carolina State University, Raleigh, NC"}]}],"member":"320","published-online":{"date-parts":[[2007,10,29]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"29","volume-title":"Strategies for Developing Policies and Requirements for Secure E-Commerce Systems. Recent Advances in E-Commerce Security and Privacy, ed. by A. K. Ghosh","author":"Ant\u00f3n A. I.","year":"2001","unstructured":"Ant\u00f3n , A. I. and J. Earp . Strategies for Developing Policies and Requirements for Secure E-Commerce Systems. Recent Advances in E-Commerce Security and Privacy, ed. by A. K. Ghosh , Kluwer Academic Publishers , pp. 29 -- 46 , 2001 . Ant\u00f3n, A. I. and J. Earp. Strategies for Developing Policies and Requirements for Secure E-Commerce Systems. Recent Advances in E-Commerce Security and Privacy, ed. by A. K. Ghosh, Kluwer Academic Publishers, pp. 29--46, 2001."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1178053"},{"key":"e_1_3_2_1_3_1","first-page":"13","author":"Citizenship","year":"2003","unstructured":"Citizenship and Immigration Canada . Tracking Public Perceptions of Biometrics , 2003 . Accessed April 13 , 2007 at http:\/\/www.cic.gc.ca\/english\/press\/03\/poll-biometrics-e.pdf. Citizenship and Immigration Canada. Tracking Public Perceptions of Biometrics, 2003. Accessed April 13, 2007 at http:\/\/www.cic.gc.ca\/english\/press\/03\/poll-biometrics-e.pdf.","journal-title":"Tracking Public Perceptions of Biometrics"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(95)00005-S"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2005.844927"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(07)70006-4"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(00)06027-2"},{"key":"e_1_3_2_1_8_1","volume-title":"User perceptions related to identification through biometrics within electronic business. Master's thesis","author":"Giesing I.","year":"2003","unstructured":"Giesing , I. User perceptions related to identification through biometrics within electronic business. Master's thesis , University of Pretoria , 2003 . Giesing, I. User perceptions related to identification through biometrics within electronic business. Master's thesis, University of Pretoria, 2003."},{"key":"e_1_3_2_1_9_1","volume-title":"Establishing Public Confidence in the Viability of Fingerprint Biometric Technology. Master's thesis","author":"Green N. A.","year":"2005","unstructured":"Green , N. A. Establishing Public Confidence in the Viability of Fingerprint Biometric Technology. Master's thesis , Brigham Young University , 2005 . Green, N. A. Establishing Public Confidence in the Viability of Fingerprint Biometric Technology. Master's thesis, Brigham Young University, 2005."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.4018\/joeuc.2006070101"},{"key":"e_1_3_2_1_11_1","volume-title":"Privacy and Identity Management Survey: Summary of Results and Findings","author":"Magnuson G.","year":"2005","unstructured":"Magnuson , G. and P. Reid . Privacy and Identity Management Survey: Summary of Results and Findings . 2005 , accessed February 12, 2007 at http:\/\/www.eds.com\/services\/whitepapers\/downloads\/privacy_survey.pdf. Magnuson, G. and P. Reid. Privacy and Identity Management Survey: Summary of Results and Findings. 2005, accessed February 12, 2007 at http:\/\/www.eds.com\/services\/whitepapers\/downloads\/privacy_survey.pdf."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.28945\/775"},{"key":"e_1_3_2_1_13_1","volume-title":"Psychometric Theory","author":"Nunnally J.","year":"1978","unstructured":"Nunnally , J. Psychometric Theory . New York : McGraw Hill , 1978 . Nunnally, J. Psychometric Theory. New York: McGraw Hill, 1978."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.819611"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MTAS.2006.1700020"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1193209"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1228175.1228231"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.v56:3"},{"key":"e_1_3_2_1_19_1","first-page":"5","article-title":"RFID and consumers","author":"Vethman A. J","year":"2005","unstructured":"Vethman , A. J . RFID and consumers . Capgemini , March 1, 2005 , accessed March 5 , 2007 at http:\/\/www.capgemini.com\/news\/2005\/Capgemini_European_RFID_report.pdf. Vethman, A. J. RFID and consumers. Capgemini, March 1, 2005, accessed March 5, 2007 at http:\/\/www.capgemini.com\/news\/2005\/Capgemini_European_RFID_report.pdf.","journal-title":"Capgemini"},{"key":"e_1_3_2_1_20_1","volume-title":"Army Biometric Applications","author":"Woodward J. D.","year":"2001","unstructured":"Woodward , J. D. , K. W. Webb , E. M. Newton , M. Bradley and D. Rubenson . Army Biometric Applications . RAND Corporation , 2001 . Woodward, J. D., K. W. Webb, E. M. Newton, M. Bradley and D. Rubenson. Army Biometric Applications. RAND Corporation, 2001."}],"event":{"name":"CCS07: 14th ACM Conference on Computer and Communications Security 2007","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria Virginia USA","acronym":"CCS07"},"container-title":["Proceedings of the 2007 ACM workshop on Privacy in electronic society"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314333.1314352","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1314333.1314352","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:04Z","timestamp":1750254964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1314333.1314352"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,10,29]]},"references-count":20,"alternative-id":["10.1145\/1314333.1314352","10.1145\/1314333"],"URL":"https:\/\/doi.org\/10.1145\/1314333.1314352","relation":{},"subject":[],"published":{"date-parts":[[2007,10,29]]},"assertion":[{"value":"2007-10-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}