{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:48:33Z","timestamp":1755838113987,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,7,23]],"date-time":"2008-07-23T00:00:00Z","timestamp":1216771200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,7,23]]},"DOI":"10.1145\/1408664.1408680","type":"proceedings-article","created":{"date-parts":[[2008,9,4]],"date-time":"2008-09-04T21:44:44Z","timestamp":1220564684000},"page":"117-126","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Analyzing websites for user-visible security design flaws"],"prefix":"10.1145","author":[{"given":"Laura","family":"Falk","sequence":"first","affiliation":[{"name":"University of Michigan"}]},{"given":"Atul","family":"Prakash","sequence":"additional","affiliation":[{"name":"University of Michigan"}]},{"given":"Kevin","family":"Borders","sequence":"additional","affiliation":[{"name":"University of Michigan"}]}],"member":"320","published-online":{"date-parts":[[2008,7,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Banking study: list of financial institutions. http:\/\/www.eecs.umich.edu\/~laura\/webusability\/websites.html.  Banking study: list of financial institutions. http:\/\/www.eecs.umich.edu\/~laura\/webusability\/websites.html."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165734.1165735"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073004"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143131"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1361419.1361429"},{"key":"e_1_3_2_1_7_1","volume-title":"April","author":"Freed L.","year":"2007","unstructured":"L. Freed . State of customer satisfaction with online banking, forsee results\/forbes.com , April 2007 . L. Freed. State of customer satisfaction with online banking, forsee results\/forbes.com, April 2007."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 10th USENIX Security Symposium, Washington, D.C.","author":"Fu K.","year":"2001","unstructured":"K. Fu , E. Sit , K. Smith , and N. Feamster . Dos and don'ts of client authentication on the web . In Proceedings of the 10th USENIX Security Symposium, Washington, D.C. , August 2001 . An extended version is available as MIT-LCS-TR-818 (Best Student Paper Award). K. Fu, E. Sit, K. Smith, and N. Feamster. Dos and don'ts of client authentication on the web. In Proceedings of the 10th USENIX Security Symposium, Washington, D.C., August 2001. An extended version is available as MIT-LCS-TR-818 (Best Student Paper Award)."},{"key":"e_1_3_2_1_9_1","unstructured":"Banking on the www - banks of the usa. http:\/\/www.quazell.com\/bank\/bank_usa.html.  Banking on the www - banks of the usa. http:\/\/www.quazell.com\/bank\/bank_usa.html."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/775412.775422"},{"key":"e_1_3_2_1_11_1","unstructured":"Nessus Vulnerability Scanner. http:\/\/www.nessus.org.  Nessus Vulnerability Scanner. http:\/\/www.nessus.org."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586133"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1323128.1323132"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.35"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.35"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267167.1267171"},{"key":"e_1_3_2_1_17_1","unstructured":"WatchFire's AppScan Product.  WatchFire's AppScan Product."},{"key":"e_1_3_2_1_18_1","volume-title":"8th USENIX Security Symposium","author":"Whitten A.","year":"1999","unstructured":"A. Whitten and J. D. Tygar . Why Johnny can't encrypt: A usability evaluation of PGP 5.0 . In 8th USENIX Security Symposium , 1999 . A. Whitten and J. D. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In 8th USENIX Security Symposium, 1999."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124863"},{"key":"e_1_3_2_1_20_1","unstructured":"Why Use YURLs? 2003. http:\/\/www.waterken.com\/dev\/YURL\/Why\/.  Why Use YURLs? 2003. http:\/\/www.waterken.com\/dev\/YURL\/Why\/."}],"event":{"name":"SOUPS '08: The fourth Symposium on Usable Privacy and Security","acronym":"SOUPS '08","location":"Pittsburgh Pennsylvania USA"},"container-title":["Proceedings of the 4th symposium on Usable privacy and security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1408664.1408680","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1408664.1408680","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:57:44Z","timestamp":1750255064000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1408664.1408680"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7,23]]},"references-count":20,"alternative-id":["10.1145\/1408664.1408680","10.1145\/1408664"],"URL":"https:\/\/doi.org\/10.1145\/1408664.1408680","relation":{},"subject":[],"published":{"date-parts":[[2008,7,23]]},"assertion":[{"value":"2008-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}