{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T05:03:08Z","timestamp":1766466188706,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,15]],"date-time":"2014-09-15T00:00:00Z","timestamp":1410739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000269","name":"Economic and Social Research Council","doi-asserted-by":"publisher","award":["EP\/G00255X\/1"],"award-info":[{"award-number":["EP\/G00255X\/1"]}],"id":[{"id":"10.13039\/501100000269","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"publisher","award":["EP\/G066019\/1"],"award-info":[{"award-number":["EP\/G066019\/1"]}],"id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000690","name":"Research Councils UK","doi-asserted-by":"publisher","award":["EP\/H042997\/1"],"award-info":[{"award-number":["EP\/H042997\/1"]}],"id":[{"id":"10.13039\/501100000690","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,15]]},"DOI":"10.1145\/2683467.2683475","type":"proceedings-article","created":{"date-parts":[[2015,1,5]],"date-time":"2015-01-05T13:32:15Z","timestamp":1420464735000},"page":"83-94","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":30,"title":["Understanding the Experience-Centeredness of Privacy and Security Technologies"],"prefix":"10.1145","author":[{"given":"Paul","family":"Dunphy","sequence":"first","affiliation":[{"name":"Newcastle University, Newcastle, United Kingdom"}]},{"given":"John","family":"Vines","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle, United Kingdom"}]},{"given":"Lizzie","family":"Coles-Kemp","sequence":"additional","affiliation":[{"name":"Newcastle University, London, United Kingdom"}]},{"given":"Rachel","family":"Clarke","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle, United Kingdom"}]},{"given":"Vasilis","family":"Vlachokyriakos","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle, United Kingdom"}]},{"given":"Peter","family":"Wright","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle, United Kingdom"}]},{"given":"John","family":"McCarthy","sequence":"additional","affiliation":[{"name":"University College Cork, Cork, Ireland"}]},{"given":"Patrick","family":"Olivier","sequence":"additional","affiliation":[{"name":"Newcastle University, Newcastle, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2014,9,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481348"},{"key":"e_1_3_2_1_3_1","volume-title":"Security and Usability: Designing Secure Systems That People Can Use. O'Reilly","author":"Cranor L.","year":"2005","unstructured":"Cranor , L. and Garfinkel , S ., eds . Security and Usability: Designing Secure Systems That People Can Use. O'Reilly , 2005 . Cranor, L. and Garfinkel, S., eds. Security and Usability: Designing Secure Systems That People Can Use. O'Reilly, 2005."},{"key":"e_1_3_2_1_4_1","volume-title":"Psychological Science","author":"Cumming G.","year":"2013","unstructured":"Cumming , G. The New Statistics: Why and How . Psychological Science , ( 2013 ). Cumming, G. The New Statistics: Why and How. Psychological Science, (2013)."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography -","volume":"6","author":"Davis D.","year":"1996","unstructured":"Davis , D. Compliance defects in public-key cryptography . Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6 , USENIX Association ( 1996 ), 17. Davis, D. Compliance defects in public-key cryptography. Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6, USENIX Association (1996), 17."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0279-6"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327051hci2103_2"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0308-5"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837114"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Dunphy P. Monk A. Vines J. Blythe M. and Olivier P. Designing for Spontaneous and Secure Delegation in Digital Payments. Interacting with Computers 10.1093\/iw (2013).  Dunphy P. Monk A. Vines J. Blythe M. and Olivier P. Designing for Spontaneous and Secure Delegation in Digital Payments. Interacting with Computers 10.1093\/iw (2013).","DOI":"10.1093\/iwc\/iwt038"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280710"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJESDF.2007.013589"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408666"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/291224.291235"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993060.1993065"},{"key":"e_1_3_2_1_16_1","volume-title":"A Research Agenda Acknowledging the Persistence of Passwords","author":"Herley C.","year":"2011","unstructured":"Herley , C. and Oorschot , P. Van . A Research Agenda Acknowledging the Persistence of Passwords . IEEE Security and Privacy 99, PrePrints ( 2011 ). Herley, C. and Oorschot, P. Van. A Research Agenda Acknowledging the Persistence of Passwords. IEEE Security and Privacy 99, PrePrints (2011)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642616"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979324"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2073276.2073278"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1463160.1463191"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979283"},{"key":"e_1_3_2_1_22_1","volume-title":"Technology as Experience","author":"McCarthy J.","year":"2007","unstructured":"McCarthy , J. and Wright , P . Technology as Experience . The MIT Press , 2007 . McCarthy, J. and Wright, P. Technology as Experience. The MIT Press, 2007."},{"key":"e_1_3_2_1_23_1","volume-title":"The Art of Deception","author":"Mitnick K.","year":"2003","unstructured":"Mitnick , K. The Art of Deception . John Wiley & Sons , 2003 . Mitnick, K. The Art of Deception. John Wiley & Sons, 2003."},{"key":"e_1_3_2_1_24_1","volume-title":"The Invisible Computer","author":"Norman D.","year":"1999","unstructured":"Norman , D. The Invisible Computer . MIT Press , 1999 . Norman, D. The Invisible Computer. MIT Press, 1999."},{"key":"e_1_3_2_1_25_1","volume-title":"Emotional Design: Why We Love (or Hate) Everyday Things","author":"Norman D.","year":"2005","unstructured":"Norman , D. Emotional Design: Why We Love (or Hate) Everyday Things . Basic Books , 2005 . Norman, D. Emotional Design: Why We Love (or Hate) Everyday Things. Basic Books, 2005."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0043424"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557156"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335364"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1671011.1671046"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01405730"},{"key":"e_1_3_2_1_31_1","first-page":"9","volume":"63","author":"Saltzer J.","year":"1975","unstructured":"Saltzer , J. and Schroeder , M. The Protection of Information in Computer Systems. IEEE 63 , 9 ( 1975 ), 1278--1308. Saltzer, J. and Schroeder, M. The Protection of Information in Computer Systems. IEEE 63, 9 (1975), 1278--1308.","journal-title":"The Protection of Information in Computer Systems. IEEE"},{"key":"e_1_3_2_1_32_1","unstructured":"Schechter S. The User IS the Enemy and (S)he Keeps Reaching for that Bright Shiny Power Button! Workshop on Home Usable Privacy and Security (HUPS) (2013).  Schechter S. The User IS the Enemy and (S)he Keeps Reaching for that Bright Shiny Power Button! Workshop on Home Usable Privacy and Security (HUPS) (2013)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240759"},{"key":"e_1_3_2_1_35_1","volume-title":"Action Research","author":"Stringer E.T.","year":"2014","unstructured":"Stringer , E.T. Action Research . Sage , 2014 . Stringer, E.T. Action Research. Sage, 2014."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208569"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208567"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145229"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.04.024"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_3_2_1_41_1","volume-title":"Proceedings of the 8th conference on USENIX Security Symposium -","volume":"8","author":"Whitten A.","year":"1999","unstructured":"Whitten , A. and Tygar , J.D . Why Johnny can't encrypt: a usability evaluation of PGP 5.0 . Proceedings of the 8th conference on USENIX Security Symposium - Volume 8 , USENIX Association ( 1999 ), 14. Whitten, A. and Tygar, J.D. Why Johnny can't encrypt: a usability evaluation of PGP 5.0. Proceedings of the 8th conference on USENIX Security Symposium - Volume 8, USENIX Association (1999), 14."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357156"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-02192-3","volume-title":"Experience-Centered Design: Designers, Users, and Communities in Dialogue","author":"Wright P.","year":"2010","unstructured":"Wright , P. and McCarthy , J. Experience-Centered Design: Designers, Users, and Communities in Dialogue . Morgan and Claypool Publishers , 2010 . Wright, P. and McCarthy, J. Experience-Centered Design: Designers, Users, and Communities in Dialogue. Morgan and Claypool Publishers, 2010."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508194"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493231"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/304851.304859"}],"event":{"name":"NSPW '14: New Security Paradigms Workshop","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Victoria British Columbia Canada","acronym":"NSPW '14"},"container-title":["Proceedings of the 2014 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2683467.2683475","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2683467.2683475","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:59Z","timestamp":1750227179000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2683467.2683475"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,15]]},"references-count":46,"alternative-id":["10.1145\/2683467.2683475","10.1145\/2683467"],"URL":"https:\/\/doi.org\/10.1145\/2683467.2683475","relation":{},"subject":[],"published":{"date-parts":[[2014,9,15]]},"assertion":[{"value":"2014-09-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}