{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:49Z","timestamp":1750306309356,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,9,8]],"date-time":"2015-09-08T00:00:00Z","timestamp":1441670400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,9,8]]},"DOI":"10.1145\/2841113.2841125","type":"proceedings-article","created":{"date-parts":[[2015,12,10]],"date-time":"2015-12-10T19:49:49Z","timestamp":1449776989000},"page":"148-155","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Bridging the Trust Gap"],"prefix":"10.1145","author":[{"given":"Raquel","family":"Hill","sequence":"first","affiliation":[{"name":"Department of Computer Science, School of Informatics and Computing, Indiana University, Bloomington, IN 47405, +1 812-856-5807"}]},{"given":"Devan Ray","family":"Donaldson","sequence":"additional","affiliation":[{"name":"Department of Information and Library Science, School of Informatics and Computing, Indiana University, Bloomington, IN 47405 USA, +1 812-855-9723"}]}],"member":"320","published-online":{"date-parts":[[2015,9,8]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Abrams R. 2014. Target Puts Data Breach Costs at $148 Million and Forecasts Profit Drop. In The New York Times.  Abrams R. 2014. Target Puts Data Breach Costs at $148 Million and Forecasts Profit Drop. In The New York Times."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.01.003"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the Fifth National Colloquium for Information Systems Security Education (NCISSE'01)","author":"Allen J. H.","year":"2001","unstructured":"Allen , J. H. , 2001 . Cert system and network security practices . In Proceedings of the Fifth National Colloquium for Information Systems Security Education (NCISSE'01) , George Mason University, Fairfax, VA USA, 22--24. Allen, J. H., 2001. Cert system and network security practices. In Proceedings of the Fifth National Colloquium for Information Systems Security Education (NCISSE'01), George Mason University, Fairfax, VA USA, 22--24."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the USEC '14","author":"Balebako R.","year":"2014","unstructured":"Balebako , R. , Marsh , A. , Lin , J. , Hong , J. , and Cranor , L ., 2014. The Privacy and Security Behaviors of Smartphone App Developers . In Proceedings of the USEC '14 ( San Diego, CA , 2014 ), Internet Society. Balebako, R., Marsh, A., Lin, J., Hong, J., and Cranor, L., 2014. The Privacy and Security Behaviors of Smartphone App Developers. In Proceedings of the USEC '14 (San Diego, CA, 2014), Internet Society."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi4040971"},{"key":"e_1_3_2_1_6_1","unstructured":"Biba K. J. 1977. Integrity Considerations for Secure Computer Systems.  Biba K. J. 1977. Integrity Considerations for Secure Computer Systems."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280693"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581370"},{"volume-title":"Symposium on Requirements Engineering for Information Security.","author":"Butler S. A.","key":"e_1_3_2_1_9_1","unstructured":"Butler , S. A. and Fischbeck , P ., 2002. Multi-attribute risk assessment . In Symposium on Requirements Engineering for Information Security. Butler, S. A. and Fischbeck, P., 2002. Multi-attribute risk assessment. In Symposium on Requirements Engineering for Information Security."},{"volume-title":"Trust, reputation, and security: Theories and practice","author":"Camp L. J.","key":"e_1_3_2_1_10_1","unstructured":"Camp , L. J. , 2003. Designing for trust . In Trust, reputation, and security: Theories and practice Springer , Berlin Heidelberg , 15--29. Camp, L. J., 2003. Designing for trust. In Trust, reputation, and security: Theories and practice Springer, Berlin Heidelberg, 15--29."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Cattell R. B. 1966. The scree test for the number of factors. Multivariate behavioral research 1 (2) 245--276.  Cattell R. B. 1966. The scree test for the number of factors. Multivariate behavioral research 1 (2) 245--276.","DOI":"10.1207\/s15327906mbr0102_10"},{"key":"e_1_3_2_1_12_1","volume-title":"Calif.","author":"DeVellis R. F.","year":"2012","unstructured":"DeVellis , R. F. Scale development : theory and applications. SAGE, Thousand Oaks , Calif. , 2012 . DeVellis, R. F. Scale development : theory and applications. SAGE, Thousand Oaks, Calif., 2012."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23330"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220910944722"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2000.5340804"},{"key":"e_1_3_2_1_17_1","unstructured":"Trusted Computing Group 2015. Retrieved November 3 2015 from www.trustedcomputinggroup.org.  Trusted Computing Group 2015. Retrieved November 3 2015 from www.trustedcomputinggroup.org."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1852666.1852739"},{"key":"e_1_3_2_1_19_1","unstructured":"Hiltzik M. 2015 March 6. Anthem is warning consumers about its huge data breach. Here's a translation. In Los Angeles Times.  Hiltzik M. 2015 March 6. Anthem is warning consumers about its huge data breach. Here's a translation. In Los Angeles Times."},{"key":"e_1_3_2_1_20_1","unstructured":"Howard M. and Leblanc D. E. 2002. Writing Secure Code. Microsoft Press.   Howard M. and Leblanc D. E. 2002. Writing Secure Code. Microsoft Press."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the Proceedings of the 2nd USENIX workshop on Hot topics in security","author":"Mccune J. M.","year":"2007","unstructured":"Mccune , J. M. , Perrig , A. , Seshadri , A. , and Doorn , L. V ., 2007. Turtles all the way down: research challenges in user-based attestation . In Proceedings of the Proceedings of the 2nd USENIX workshop on Hot topics in security ( Boston, MA , 2007 ), USENIX Association, 1361425, 1--5. Mccune, J. M., Perrig, A., Seshadri, A., and Doorn, L. V., 2007. Turtles all the way down: research challenges in user-based attestation. In Proceedings of the Proceedings of the 2nd USENIX workshop on Hot topics in security (Boston, MA, 2007), USENIX Association, 1361425, 1--5."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.60"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the IEEE Symposium on Requirements Engineering for Information Security (SREIS'05)","author":"Myagmar S.","year":"2005","unstructured":"Myagmar , S. , Lee , A. J. , and Yurcik , W ., 2005. Threat Modeling as a Basis for Security Requirements . In Proceedings of the IEEE Symposium on Requirements Engineering for Information Security (SREIS'05) (Paris, France , 2005 ). Myagmar, S., Lee, A. J., and Yurcik, W., 2005. Threat Modeling as a Basis for Security Requirements. In Proceedings of the IEEE Symposium on Requirements Engineering for Information Security (SREIS'05) (Paris, France, 2005)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1496671.1496680"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(00)00017-0"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866835.1866843"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1111\/0272-4332.205064"},{"volume-title":"Summated rating scale construction: an introduction","author":"Spector P. E.","key":"e_1_3_2_1_28_1","unstructured":"Spector , P. E. , 1992. Summated rating scale construction: an introduction . SAGE Publications, Newbury Park , Calif . Spector, P. E., 1992. Summated rating scale construction: an introduction. SAGE Publications, Newbury Park, Calif."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.84"},{"key":"e_1_3_2_1_30_1","volume-title":"Pearson Education","author":"Tabachnick B. G.","year":"2013","unstructured":"Tabachnick , B. G. and Fidell , L. S . Using multivariate statistics . Pearson Education , Boston , 2013 . Tabachnick, B. G. and Fidell, L. S. Using multivariate statistics. Pearson Education, Boston, 2013."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Whitten A. and Tygar J. D. 1998. Usability of Security: A Case Study. Carnegie Mellon University.  Whitten A. and Tygar J. D. 1998. Usability of Security: A Case Study. Carnegie Mellon University.","DOI":"10.1037\/e448702006-001"},{"key":"e_1_3_2_1_32_1","unstructured":"Yin S. 2012. More Malware Discovered with Stolen Certificates. In Security Watch.  Yin S. 2012. More Malware Discovered with Stolen Certificates. In Security Watch."}],"event":{"name":"NSPW '15: New Security Paradigms Workshop","sponsor":["ACSA Applied Computing Security Assoc"],"location":"Twente Netherlands","acronym":"NSPW '15"},"container-title":["Proceedings of the 2015 New Security Paradigms Workshop"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2841113.2841125","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2841113.2841125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:53:47Z","timestamp":1750222427000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2841113.2841125"}},"subtitle":["Integrating Models of Behavior and Perception"],"short-title":[],"issued":{"date-parts":[[2015,9,8]]},"references-count":31,"alternative-id":["10.1145\/2841113.2841125","10.1145\/2841113"],"URL":"https:\/\/doi.org\/10.1145\/2841113.2841125","relation":{},"subject":[],"published":{"date-parts":[[2015,9,8]]},"assertion":[{"value":"2015-09-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}