{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:17Z","timestamp":1750221017041,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,9,23]],"date-time":"2019-09-23T00:00:00Z","timestamp":1569196800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ministero dell\u00f0Istruzione, dell\u00f0Universit\u00e0 e della Ricerca","award":["2017MX9T7H"],"award-info":[{"award-number":["2017MX9T7H"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,9,23]]},"DOI":"10.1145\/3351995.3352058","type":"proceedings-article","created":{"date-parts":[[2019,9,12]],"date-time":"2019-09-12T14:21:08Z","timestamp":1568298068000},"page":"1-3","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Human-centered cybersecurity"],"prefix":"10.1145","author":[{"given":"Carmelo","family":"Ardito","sequence":"first","affiliation":[{"name":"University of Bari Aldo Moro, Bari, Italy"}]},{"given":"Giuseppe","family":"Desolda","sequence":"additional","affiliation":[{"name":"University of Bari Aldo Moro, Bari, Italy"}]},{"given":"Francesco","family":"Di Nocera","sequence":"additional","affiliation":[{"name":"Sapienza University of Rome, Rome, Italy"}]},{"given":"Mohamed","family":"Khamis","sequence":"additional","affiliation":[{"name":"University of Glasgow, Glasgow, UK"}]},{"given":"Andrea","family":"Marrella","sequence":"additional","affiliation":[{"name":"Sapienza University of Rome, Rome, Italy"}]}],"member":"320","published-online":{"date-parts":[[2019,9,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the International Workshop on Human-Centered Cybersecurity (In conjunction with CHITALY 2019)","author":"Aneke Joseph","year":"2019","unstructured":"Joseph Aneke , Carmelo Ardito and Giuseppe Desolda . 2019 . Exploring Intelligent User Interfaces as Solution to Limit Phishing Attacks . In Proceedings of the International Workshop on Human-Centered Cybersecurity (In conjunction with CHITALY 2019) Joseph Aneke, Carmelo Ardito and Giuseppe Desolda. 2019. Exploring Intelligent User Interfaces as Solution to Limit Phishing Attacks. In Proceedings of the International Workshop on Human-Centered Cybersecurity (In conjunction with CHITALY 2019)"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the International Workshop on Human-Centered Cybersecurity (In conjunction with CHITALY 2019)","author":"Breve Bernardo","year":"2019","unstructured":"Bernardo Breve , Stefano Cirillo , Domenico Desiato , Vincenzo Deufemia and Giuseppe Polese . 2019 . VIPAT - A Visual Interactive Privacy Analytics Tool . In Proceedings of the International Workshop on Human-Centered Cybersecurity (In conjunction with CHITALY 2019) Bernardo Breve, Stefano Cirillo, Domenico Desiato, Vincenzo Deufemia and Giuseppe Polese. 2019. VIPAT - A Visual Interactive Privacy Analytics Tool. In Proceedings of the International Workshop on Human-Centered Cybersecurity (In conjunction with CHITALY 2019)"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the International Workshop on Human-Centered Cybersecurity (In conjunction with CHITALY 2019)","author":"Conti Mauro","year":"2019","unstructured":"Mauro Conti , Muhammad Hassan , Md Masoom Rabbani and Silvio Ranise . 2019 . RICe: Remote Attestation of Internet of Mobile Things in Information Centric Networking . In Proceedings of the International Workshop on Human-Centered Cybersecurity (In conjunction with CHITALY 2019) Mauro Conti, Muhammad Hassan, Md Masoom Rabbani and Silvio Ranise. 2019. RICe: Remote Attestation of Internet of Mobile Things in Information Centric Networking. In Proceedings of the International Workshop on Human-Centered Cybersecurity (In conjunction with CHITALY 2019)"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the International Workshop on Human-Centered Cybersecurity (In conjunction with CHITALY 2019)","author":"Ferro Lauren S.","year":"2019","unstructured":"Lauren S. Ferro , Andrea Marrella , Silvestro V. Veneruso , Massimo Mecella and Tiziana Catarci . 2019 . An interactive learning experience for cybersecurity related issues . In Proceedings of the International Workshop on Human-Centered Cybersecurity (In conjunction with CHITALY 2019) Lauren S. Ferro, Andrea Marrella, Silvestro V. Veneruso, Massimo Mecella and Tiziana Catarci. 2019. An interactive learning experience for cybersecurity related issues. In Proceedings of the International Workshop on Human-Centered Cybersecurity (In conjunction with CHITALY 2019)"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the International Workshop on Human-Centered Cybersecurity (In conjunction with CHITALY 2019)","author":"Ricciardi Orlando","year":"2019","unstructured":"Orlando Ricciardi , Piero Maggi , Fabio Ferlazzo and Francesco Di Nocera . 2019 . A token economy approach to cybersecurity . In Proceedings of the International Workshop on Human-Centered Cybersecurity (In conjunction with CHITALY 2019) Orlando Ricciardi, Piero Maggi, Fabio Ferlazzo and Francesco Di Nocera. 2019. A token economy approach to cybersecurity. In Proceedings of the International Workshop on Human-Centered Cybersecurity (In conjunction with CHITALY 2019)"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753383"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the International Workshop on Human-Centered Cybersecurity (In conjunction with CHITALY 2019)","author":"Stojkovski Borce","year":"2019","unstructured":"Borce Stojkovski and Gabriele Lenzini . 2019 . How Users Understand Privacy Indicators in a Secure Email App . In Proceedings of the International Workshop on Human-Centered Cybersecurity (In conjunction with CHITALY 2019) Borce Stojkovski and Gabriele Lenzini. 2019. How Users Understand Privacy Indicators in a Secure Email App. In Proceedings of the International Workshop on Human-Centered Cybersecurity (In conjunction with CHITALY 2019)"}],"event":{"name":"CHItaly19: Biannual Conference of the Italian SIGCHI Chapter","acronym":"CHItaly19","location":"Padova Italy"},"container-title":["Proceedings of the 13th Biannual Conference of the Italian SIGCHI Chapter: Designing the next interaction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3351995.3352058","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3351995.3352058","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:15Z","timestamp":1750206375000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3351995.3352058"}},"subtitle":["international workshop at CHITALY 2019"],"short-title":[],"issued":{"date-parts":[[2019,9,23]]},"references-count":7,"alternative-id":["10.1145\/3351995.3352058","10.1145\/3351995"],"URL":"https:\/\/doi.org\/10.1145\/3351995.3352058","relation":{},"subject":[],"published":{"date-parts":[[2019,9,23]]},"assertion":[{"value":"2019-09-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}