{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T02:46:27Z","timestamp":1767926787972,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":61,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,10,5]],"date-time":"2009-10-05T00:00:00Z","timestamp":1254700800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,10,5]]},"DOI":"10.1145\/1621995.1622039","type":"proceedings-article","created":{"date-parts":[[2009,10,6]],"date-time":"2009-10-06T18:23:22Z","timestamp":1254853402000},"page":"221-226","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Enhancing research into usable privacy and security"],"prefix":"10.1145","author":[{"given":"Colin","family":"Birge","sequence":"first","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,10,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Microsoft Corporation","author":"Privacy","year":"2008","unstructured":"Privacy guidelines for developing software products and services , Microsoft Corporation , Redmond, WA, USA , 2008 . Privacy guidelines for developing software products and services, Microsoft Corporation, Redmond, WA, USA, 2008."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_3_1","volume-title":"Fundamentals of Computer Security Technology","author":"Amoroso E.G.","year":"1994","unstructured":"Amoroso , E.G. Fundamentals of Computer Security Technology . Prentice Hall , Englewood Cliffs, NJ , 1994 . Amoroso, E.G. Fundamentals of Computer Security Technology. Prentice Hall, Englewood Cliffs, NJ, 1994."},{"key":"e_1_3_2_1_4_1","volume-title":"Security Engineering: A guide to buidling dependable distributed systems","author":"Anderson R.","year":"2001","unstructured":"Anderson , R. Security Engineering: A guide to buidling dependable distributed systems . Wiley Computer Publishing , New York , 2001 . Anderson, R. Security Engineering: A guide to buidling dependable distributed systems. Wiley Computer Publishing, New York, 2001."},{"key":"e_1_3_2_1_5_1","volume-title":"Retrieved","author":"Avolio F.","year":"2008","unstructured":"Avolio , F. Internet security and usability: Who's winning?, 2001 , Retrieved January 11, 2008 from http:\/\/www.avolio.com\/columns\/sec-and-use.html. Avolio, F. Internet security and usability: Who's winning?, 2001, Retrieved January 11, 2008 from http:\/\/www.avolio.com\/columns\/sec-and-use.html."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2006.32"},{"key":"e_1_3_2_1_7_1","volume-title":"Morgan Kaufmann","author":"Beyer H.","year":"1998","unstructured":"Beyer , H. and Holtzblatt , K . Contextual Design: Defining customer-centered systems . Morgan Kaufmann , San Francisco, CA , 1998 . Beyer, H. and Holtzblatt, K. Contextual Design: Defining customer-centered systems. Morgan Kaufmann, San Francisco, CA, 1998."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280691"},{"key":"e_1_3_2_1_9_1","volume-title":"Trust and risk in Internet commerce","author":"Camp L.J.","year":"2000","unstructured":"Camp , L.J. Trust and risk in Internet commerce . MIT Press , Cambridge, MA , 2000 . Camp, L.J. Trust and risk in Internet commerce. MIT Press, Cambridge, MA, 2000."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409908.1409923"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/07350198809388842"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","DOI":"10.1002\/9780470517857","volume-title":"Complexity and Control: Confidence in a Convergent World","author":"Cofta P.","year":"2007","unstructured":"Cofta , P. Trust , Complexity and Control: Confidence in a Convergent World ., 2007 . Cofta, P. Trust, Complexity and Control: Confidence in a Convergent World., 2007."},{"key":"e_1_3_2_1_13_1","volume-title":"Security and Usability: Designing Secure Systems That People Can Use","author":"Cranor L.F.","year":"2005","unstructured":"Cranor , L.F. and Garfinkle , S . Preface . in Cranor, L.F. and Garfinkle, S. eds. Security and Usability: Designing Secure Systems That People Can Use , O'Reilly , Sebastopol, CA , 2005 , ix--xvii. Cranor, L.F. and Garfinkle, S. Preface. in Cranor, L.F. and Garfinkle, S. eds. Security and Usability: Designing Secure Systems That People Can Use, O'Reilly, Sebastopol, CA, 2005, ix--xvii."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456536.1456578"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.021"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci2103_2"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/844102.844116"},{"key":"e_1_3_2_1_18_1","first-page":"38","article-title":"Introducing usability testing, selecting and organizing tasks to test, and creating task scenarios. in A Practical Guide to Usability Testing, Second Edition, Intellect, Portland","volume":"21","author":"Dumas J.","year":"1999","unstructured":"Dumas , J. and Redish , J . Introducing usability testing, selecting and organizing tasks to test, and creating task scenarios. in A Practical Guide to Usability Testing, Second Edition, Intellect, Portland , OR , 1999 , 21 -- 38 , 159--182. Dumas, J. and Redish, J. Introducing usability testing, selecting and organizing tasks to test, and creating task scenarios. in A Practical Guide to Usability Testing, Second Edition, Intellect, Portland, OR, 1999, 21--38, 159--182.","journal-title":"OR"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357219"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240866.1241089"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518752"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1195716.1195719"},{"key":"e_1_3_2_1_23_1","volume-title":"Retrieved","author":"Friedberg J.","year":"2009","unstructured":"Friedberg , J. End to End Trust and the Trust User Experience, 2009 . Retrieved April 30, 2009 from http:\/\/blogs.technet.com\/privacyimperative\/archive\/2009\/04\/24\/end-to-end-trust-and-the-trust-user-experience.aspx. Friedberg, J. End to End Trust and the Trust User Experience, 2009. Retrieved April 30, 2009 from http:\/\/blogs.technet.com\/privacyimperative\/archive\/2009\/04\/24\/end-to-end-trust-and-the-trust-user-experience.aspx."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci2102_3"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1463160.1463176"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/506443.506577"},{"key":"e_1_3_2_1_27_1","volume-title":"Auerbach Publications","author":"Hansche S.","year":"2004","unstructured":"Hansche , S. , Berti , J. and Hare , C . Official ISC(2) guide to the CISSP Exam . Auerbach Publications , Boca Raton, FL , 2004 . Hansche, S., Berti, J. and Hare, C. Official ISC(2) guide to the CISSP Exam. Auerbach Publications, Boca Raton, FL, 2004."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1260984.1261239"},{"key":"e_1_3_2_1_29_1","volume-title":"Writing Secure Code","author":"Howard M.","year":"2003","unstructured":"Howard , M. and LeBlanc , D. Writing Secure Code , 2 nd Edition. Microsoft Press , Redmond, WA , 2003 . Howard, M. and LeBlanc, D. Writing Secure Code, 2nd Edition. Microsoft Press, Redmond, WA, 2003.","edition":"2"},{"issue":"4","key":"e_1_3_2_1_30_1","first-page":"488","article-title":"Rigor in usability testing","volume":"46","author":"Hughes M","unstructured":"Hughes , M . Rigor in usability testing . Technical Communication , 46 ( 4 ). 488 -- 494 . Hughes, M. Rigor in usability testing. Technical Communication, 46 (4). 488--494.","journal-title":"Technical Communication"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Humphreys T. Leung L. and Weakley A. Embedding expert users in the interaction design process: a case study. Design Studies 29. 603--622.  Humphreys T. Leung L. and Weakley A. Embedding expert users in the interaction design process: a case study. Design Studies 29. 603--622.","DOI":"10.1016\/j.destud.2008.07.006"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2008.25"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1519004"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-007-0163-2"},{"key":"e_1_3_2_1_35_1","volume-title":"The Ethos of Rhetoric","author":"Miller C.R.","year":"2004","unstructured":"Miller , C.R. Expertise and agency: Transformations of ethos in human-computer interaction . in Hyde, M.J. ed. The Ethos of Rhetoric , University of South Carolina Press , Columbia, SC , 2004 . Miller, C.R. Expertise and agency: Transformations of ethos in human-computer interaction. in Hyde, M.J. ed. The Ethos of Rhetoric, University of South Carolina Press, Columbia, SC, 2004."},{"key":"e_1_3_2_1_36_1","unstructured":"Mu\u00f1oz-Arteaga J. Gonz\u00e1lez R.M. Martin M.V. Vanderdonckt J. and \u00c1lvarez-Rodriguez F. A methodology for designing information security feedback based on user interface patterns. Advances in Engineering Software (in press).  Mu\u00f1oz-Arteaga J. Gonz\u00e1lez R.M. Martin M.V. Vanderdonckt J. and \u00c1lvarez-Rodriguez F. A methodology for designing information security feedback based on user interface patterns. Advances in Engineering Software (in press)."},{"key":"e_1_3_2_1_37_1","volume-title":"Will security enhance trust online, or supplant it? in Kramer","author":"Nissenbaum H.","year":"2004","unstructured":"Nissenbaum , H. Will security enhance trust online, or supplant it? in Kramer , R. and Cook, K. eds. Trust and Distrust Within Organizations: Emerging Perspectives , Enduring Questions, Russell Sage Publications , New York, 2004 , 155--188. Nissenbaum, H. Will security enhance trust online, or supplant it? in Kramer, R. and Cook, K. eds. Trust and Distrust Within Organizations: Emerging Perspectives, Enduring Questions, Russell Sage Publications, New York, 2004, 155--188."},{"key":"e_1_3_2_1_38_1","volume-title":"Security and Usability: Designing secure systems that people can use","author":"Nodder C.","year":"2005","unstructured":"Nodder , C. Users and trust: A Microsoft case study . in Cranor, L.F. and Garfinkle, S. eds. Security and Usability: Designing secure systems that people can use , O'Reilly , Sebastopol, CA , 2005 , 589--606. Nodder, C. Users and trust: A Microsoft case study. in Cranor, L.F. and Garfinkle, S. eds. Security and Usability: Designing secure systems that people can use, O'Reilly, Sebastopol, CA, 2005, 589--606."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518754"},{"key":"e_1_3_2_1_40_1","volume-title":"Security and Usability: Designing Secure Systems That People Can Use","author":"Patrick A.S.","year":"2005","unstructured":"Patrick , A.S. , Briggs , P. and Marsh , S . Designing Systems That People Will Trust . in Cranor, L.F. and Garfinkle, S. eds. Security and Usability: Designing Secure Systems That People Can Use , O'Reilly , Sebastopol, CA , 2005 , 75--100. Patrick, A.S., Briggs, P. and Marsh, S. Designing Systems That People Will Trust. in Cranor, L.F. and Garfinkle, S. eds. Security and Usability: Designing Secure Systems That People Can Use, O'Reilly, Sebastopol, CA, 2005, 75--100."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.destud.2007.02.004"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240866.1240967"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143138"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454247.1454266"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1975.9939"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409040.1409043"},{"key":"e_1_3_2_1_47_1","volume-title":"Foundations for teaching technical communication","author":"Sanders S.P.","year":"1997","unstructured":"Sanders , S.P. Technical communication and ethics . in Staples, K. and Ornatowski, C. eds. Foundations for teaching technical communication , Ablex , Greenwich, CT , 1997 . Sanders, S.P. Technical communication and ethics. in Staples, K. and Ornatowski, C. eds. Foundations for teaching technical communication, Ablex, Greenwich, CT, 1997."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2008.29"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355124"},{"key":"e_1_3_2_1_50_1","volume-title":"Threat Modeling","author":"Swiderski F.","year":"2004","unstructured":"Swiderski , F. and Snyder , W . Threat Modeling . Microsoft Press , Redmond, WA , 2004 . Swiderski, F. and Snyder, W. Threat Modeling. Microsoft Press, Redmond, WA, 2004."},{"issue":"4","key":"e_1_3_2_1_51_1","first-page":"1","article-title":"Elements of trust: the cultural dimension of internet diffusion revisited","volume":"6","author":"Volken T","unstructured":"Volken , T . Elements of trust: the cultural dimension of internet diffusion revisited . Electronic Journal of Sociology , 6 ( 4 ). 1 -- 20 . Volken, T. Elements of trust: the cultural dimension of internet diffusion revisited. Electronic Journal of Sociology, 6 (4). 1--20.","journal-title":"Electronic Journal of Sociology"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.27"},{"key":"e_1_3_2_1_53_1","volume-title":"Graphics Interface","author":"Whalen T.","year":"2005","unstructured":"Whalen , T. and Inkpen , K.M. , Gathering Evidence: Use of Visual Security Cues in Web Browsers . in Graphics Interface 2005 , (Victoria, British Columbia , Canada, 2005), Canadian Human-Computer Communications Society , 137--144. Whalen, T. and Inkpen, K.M., Gathering Evidence: Use of Visual Security Cues in Web Browsers. in Graphics Interface 2005, (Victoria, British Columbia, Canada, 2005), Canadian Human-Computer Communications Society, 137--144."},{"key":"e_1_3_2_1_54_1","volume-title":"USENIX 1999","author":"Whitten A.","year":"1999","unstructured":"Whitten , A. and Tygar , J.D ., Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 . in USENIX 1999 , (Washington D.C., 1999 ), USENIX Press, 169--184. Whitten, A. and Tygar, J.D., Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. in USENIX 1999, (Washington D.C., 1999), USENIX Press, 169--184."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124863"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408671"},{"key":"e_1_3_2_1_57_1","volume-title":"Security and Usability: Designing Secure Systems That People Can Use","author":"Yee K.-P.","year":"2005","unstructured":"Yee , K.-P. Guidelines and Strategies for Secure Interaction Design . in Cranor, L.F. and Garfinkle, S. eds. Security and Usability: Designing Secure Systems That People Can Use , O'Reilly , Sebastopol, CA , 2005 , 247--274. Yee, K.-P. Guidelines and Strategies for Secure Interaction Design. in Cranor, L.F. and Garfinkle, S. eds. Security and Usability: Designing Secure Systems That People Can Use, O'Reilly, Sebastopol, CA, 2005, 247--274."},{"key":"e_1_3_2_1_58_1","volume-title":"Pattern Language of Programming '97","author":"Yoder J.","year":"1997","unstructured":"Yoder , J. and Barcalow , J ., Architectural patterns for enabling application security . in Pattern Language of Programming '97 , (Monticello, IL, USA, 1997 ). Yoder, J. and Barcalow, J., Architectural patterns for enabling application security. in Pattern Language of Programming '97, (Monticello, IL, USA, 1997)."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1456536.1456585"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSAC.2005.60"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/304851.304859"}],"event":{"name":"SIGDOC '09: The 27th ACM International Conference on Design of Communication","location":"Bloomington Indiana USA","acronym":"SIGDOC '09","sponsor":["ACM Association for Computing Machinery","SIGDOC ACM Special Interest Group for Design of Communications"]},"container-title":["Proceedings of the 27th ACM international conference on Design of communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1621995.1622039","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1621995.1622039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:58:03Z","timestamp":1750255083000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1621995.1622039"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,5]]},"references-count":61,"alternative-id":["10.1145\/1621995.1622039","10.1145\/1621995"],"URL":"https:\/\/doi.org\/10.1145\/1621995.1622039","relation":{},"subject":[],"published":{"date-parts":[[2009,10,5]]},"assertion":[{"value":"2009-10-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}