{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:36:58Z","timestamp":1750307818592,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,7,23]],"date-time":"2008-07-23T00:00:00Z","timestamp":1216771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,7,23]]},"DOI":"10.1145\/1408664.1408678","type":"proceedings-article","created":{"date-parts":[[2008,9,4]],"date-time":"2008-09-04T21:44:44Z","timestamp":1220564684000},"page":"95-104","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["A user study of off-the-record messaging"],"prefix":"10.1145","author":[{"given":"Ryan","family":"Stedman","sequence":"first","affiliation":[{"name":"University of Waterloo, Waterloo, Ontario, Canada"}]},{"given":"Kayo","family":"Yoshida","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, Ontario, Canada"}]},{"given":"Ian","family":"Goldberg","sequence":"additional","affiliation":[{"name":"University of Waterloo, Waterloo, Ontario, Canada"}]}],"member":"320","published-online":{"date-parts":[[2008,7,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314340"},{"key":"e_1_3_2_1_2_1","unstructured":"Apple Inc. Apple - Mac OS X Leopard - Features - iChat. http:\/\/www.apple.com\/macosx\/features\/ichat.html. Accessed February 2008.  Apple Inc. Apple - Mac OS X Leopard - Features - iChat. http:\/\/www.apple.com\/macosx\/features\/ichat.html. Accessed February 2008."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029179.1029200"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"e_1_3_2_1_5_1","unstructured":"S. Egan and others. Pidgin. http:\/\/www.pidgin.im\/. Accessed February 2008.  S. Egan and others. Pidgin. http:\/\/www.pidgin.im\/. Accessed February 2008."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/108844.108856"},{"key":"e_1_3_2_1_7_1","unstructured":"O. Goffart. mod_otr --- Man in the Middle module for Off-The-Record. http:\/\/ejabberd.jabber.ru\/mod_otr. Accessed February 2008.  O. Goffart. mod_otr --- Man in the Middle module for Off-The-Record. http:\/\/ejabberd.jabber.ru\/mod_otr. Accessed February 2008."},{"volume-title":"A. Acquisti, S. Gritzalis, C. Lambrinoudakis, and S. D. C. di Vimercati","year":"2007","author":"Goldberg I.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"I. Goldberg C. Alexander and N. Borisov. Off-the-Record Messaging: Authentication. OTR Help Page. http:\/\/www.cypherpunks.ca\/otr\/help\/authenticate.php?lang=en. Accessed February 2008.  I. Goldberg C. Alexander and N. Borisov. Off-the-Record Messaging: Authentication. OTR Help Page. http:\/\/www.cypherpunks.ca\/otr\/help\/authenticate.php?lang=en. Accessed February 2008."},{"key":"e_1_3_2_1_10_1","unstructured":"I. Goldberg C. Alexander and N. Borisov. Off-the-Record Messaging: Fingerprints. OTR Help Page. http:\/\/www.cypherpunks.ca\/otr\/help\/fingerprints.php?lang=en. Accessed February 2008.  I. Goldberg C. Alexander and N. Borisov. Off-the-Record Messaging: Fingerprints. OTR Help Page. http:\/\/www.cypherpunks.ca\/otr\/help\/fingerprints.php?lang=en. Accessed February 2008."},{"key":"e_1_3_2_1_11_1","unstructured":"I. Goldberg C. Alexander and N. Borisov. Off-the-Record Messaging: Privacy Levels. OTR Help Page. http:\/\/www.cypherpunks.ca\/otr\/help\/unverified.php?lang=en. Accessed February 2008.  I. Goldberg C. Alexander and N. Borisov. Off-the-Record Messaging: Privacy Levels. OTR Help Page. http:\/\/www.cypherpunks.ca\/otr\/help\/unverified.php?lang=en. Accessed February 2008."},{"key":"e_1_3_2_1_12_1","unstructured":"Interac Inc. Interac Email Money Transfer. http:\/\/www.interac.ca\/consumers\/productsandservices_ol_emt.php. Accessed February 2008.  Interac Inc. Interac Email Money Transfer. http:\/\/www.interac.ca\/consumers\/productsandservices_ol_emt.php. Accessed February 2008."},{"volume-title":"Santa Barbara","year":"2003","author":"Krawczyk H.","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","unstructured":"R. Kuhlmann. CLI-based Multi-Messenger. http:\/\/www.climm.org\/. Accessed February 2008.  R. Kuhlmann. CLI-based Multi-Messenger. http:\/\/www.climm.org\/. Accessed February 2008."},{"key":"e_1_3_2_1_15_1","unstructured":"K. Kurtz and S. Werndorfer. Trillian. http:\/\/www.ceruleanstudios.com\/. Accessed February 2008.  K. Kurtz and S. Werndorfer. Trillian. http:\/\/www.ceruleanstudios.com\/. Accessed February 2008."},{"volume-title":"Dept. of Computer Science","year":"1993","author":"Lewis C.","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","unstructured":"D. M.-V. Prett and others. Kopete Instant Messenger. http:\/\/kopete.kde.org\/. Accessed February 2008.  D. M.-V. Prett and others. Kopete Instant Messenger. http:\/\/kopete.kde.org\/. Accessed February 2008."},{"key":"e_1_3_2_1_18_1","unstructured":"P. Riikonen and others. Secure Internet Live Conferencing. http:\/\/silcnet.org\/. Accessed May 2008.  P. Riikonen and others. Secure Internet Live Conferencing. http:\/\/silcnet.org\/. Accessed May 2008."},{"key":"e_1_3_2_1_19_1","unstructured":"E. Schoenberg and others. Adium. http:\/\/www.adiumx.com\/. Accessed February 2008.  E. Schoenberg and others. Adium. http:\/\/www.adiumx.com\/. Accessed February 2008."},{"key":"e_1_3_2_1_20_1","unstructured":"B. Tompkins. Pidgin-Encryption. http:\/\/pidgin-encrypt.sourceforge.net\/. Accessed February 2008.  B. Tompkins. Pidgin-Encryption. http:\/\/pidgin-encrypt.sourceforge.net\/. Accessed February 2008."}],"event":{"name":"SOUPS '08: The fourth Symposium on Usable Privacy and Security","acronym":"SOUPS '08","location":"Pittsburgh Pennsylvania USA"},"container-title":["Proceedings of the 4th symposium on Usable privacy and security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1408664.1408678","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1408664.1408678","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:44Z","timestamp":1750255064000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1408664.1408678"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7,23]]},"references-count":20,"alternative-id":["10.1145\/1408664.1408678","10.1145\/1408664"],"URL":"https:\/\/doi.org\/10.1145\/1408664.1408678","relation":{},"subject":[],"published":{"date-parts":[[2008,7,23]]},"assertion":[{"value":"2008-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}