{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:18:09Z","timestamp":1763468289561,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,7,16]],"date-time":"2015-07-16T00:00:00Z","timestamp":1437004800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,7,16]]},"DOI":"10.1145\/2775441.2775456","type":"proceedings-article","created":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T13:41:11Z","timestamp":1441114871000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Target data breach"],"prefix":"10.1145","author":[{"given":"Fer","family":"O'Neil","sequence":"first","affiliation":[{"name":"Texas Tech University\/ESET LLC, San Diego, California"}]}],"member":"320","published-online":{"date-parts":[[2015,7,16]]},"reference":[{"volume-title":"Usability Testing and Research. Allyn & Bacon","author":"Barnum C. M.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.2190\/3YBY-TYNY-EQG8-N9FC"},{"key":"e_1_3_2_1_3_1","unstructured":"Dumas J. S. and Redish J. 1999. A practical guide to usability testing. Intellect Books.   Dumas J. S. and Redish J. 1999. A practical guide to usability testing. Intellect Books."},{"key":"e_1_3_2_1_4_1","unstructured":"Elgin B. 2014. Three New Details From Target's Credit Card Breach. BusinessWeek: technology.  Elgin B. 2014. Three New Details From Target's Credit Card Breach. BusinessWeek: technology."},{"edition":"2","volume-title":"The Elements of User Experience: User-Centered Design for the Web and Beyond","author":"Garrett J. J.","key":"e_1_3_2_1_5_1"},{"volume-title":"Combining Rhetorical Theory with Usability Theory to Evaluate Quality of Writing in Web-Based Texts. Usability of Complex Information Systems","author":"Hailey D.","key":"e_1_3_2_1_6_1"},{"volume-title":"User-centered technology: A rhetorical theory for computers and other mundane artifacts","author":"Johnson R. R.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPC.2007.908730"},{"volume-title":"Document Design: A Guide for Technical Communicators. Bedford\/St. Martin's.","year":"2007","author":"Kimball M. A.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"Kostelnick C. and Hassett M. 2003. Shaping information: The rhetoric of visual conventions. SIU Press.  Kostelnick C. and Hassett M. 2003. Shaping information: The rhetoric of visual conventions. SIU Press."},{"key":"e_1_3_2_1_11_1","unstructured":"a message from CEO Gregg Steinhafel about Target's payment card issues: https:\/\/corporate.target.com\/discover\/article\/Important-Notice-Unauthorized-access-to-payment-ca. Accessed: 2014-03-10.  a message from CEO Gregg Steinhafel about Target's payment card issues: https:\/\/corporate.target.com\/discover\/article\/Important-Notice-Unauthorized-access-to-payment-ca. Accessed: 2014-03-10."},{"key":"e_1_3_2_1_12_1","unstructured":"Norman D. A. 2002. The Design of Everyday Things. Basic books.   Norman D. A. 2002. The Design of Everyday Things. Basic books."},{"key":"e_1_3_2_1_13_1","first-page":"2","article-title":"What Is Information Design","volume":"47","author":"Redish J. C.","year":"2000","journal-title":"Technical Communication: Journal of the Society for Technical Communication."},{"volume-title":"Dynamics in Document Design: Creating Text for Readers","author":"Schriver K. A.","key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","DOI":"10.2307\/358576"},{"key":"e_1_3_2_1_15_1","unstructured":"Sources: Target Investigating Data Breach --- Krebs on Security: http:\/\/krebsonsecurity.com\/2013\/12\/sources-target-investigating-data-breach\/. Accessed: 2014-05-01.  Sources: Target Investigating Data Breach --- Krebs on Security: http:\/\/krebsonsecurity.com\/2013\/12\/sources-target-investigating-data-breach\/. Accessed: 2014-05-01."},{"key":"e_1_3_2_1_16_1","unstructured":"Target Confirms Unauthorized Access to Payment Card Data in U.S. Stores | Target Corporate: http:\/\/pressroom.target.com\/news\/target-confirms-unauthorized-access-to-payment-card-data-in-u-s-stores. Accessed: 2014-03-10.  Target Confirms Unauthorized Access to Payment Card Data in U.S. Stores | Target Corporate: http:\/\/pressroom.target.com\/news\/target-confirms-unauthorized-access-to-payment-card-data-in-u-s-stores. Accessed: 2014-03-10."},{"key":"e_1_3_2_1_17_1","unstructured":"Team V. R. 2013. Data breach investigations report. Verizon.  Team V. R. 2013. Data breach investigations report. Verizon."}],"event":{"name":"SIGDOC '15: The 33rd ACM International Conference on the Design of Communication","sponsor":["Arizona State University Arizona State University","North Dakota State University North Dakota State University","University of Limerick University of Limerick","Chongqing Acad. Sci. Technol. Chongqing Academy of Science and Technology","Microsoft Research Microsoft Research","XA Experience Architecture Program, Michigan State University","Iowa State University Iowa State University","SIGDOC ACM Special Interest Group for Design of Communications","University of Central Florida University of Central Florida"],"location":"Limerick Ireland","acronym":"SIGDOC '15"},"container-title":["Proceedings of the 33rd Annual International Conference on the Design of Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2775441.2775456","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2775441.2775456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:28Z","timestamp":1750223248000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2775441.2775456"}},"subtitle":["applying user-centered design principles to data breach notifications"],"short-title":[],"issued":{"date-parts":[[2015,7,16]]},"references-count":17,"alternative-id":["10.1145\/2775441.2775456","10.1145\/2775441"],"URL":"https:\/\/doi.org\/10.1145\/2775441.2775456","relation":{},"subject":[],"published":{"date-parts":[[2015,7,16]]},"assertion":[{"value":"2015-07-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}