{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:27Z","timestamp":1750220847939,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359800","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"718-731","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Will you trust this TLS certificate?"],"prefix":"10.1145","author":[{"given":"Martin","family":"Ukrop","sequence":"first","affiliation":[{"name":"Masaryk University, Czech Republic"}]},{"given":"Lydia","family":"Kraus","sequence":"additional","affiliation":[{"name":"Masaryk University, Czech Republic"}]},{"given":"Vashek","family":"Matyas","sequence":"additional","affiliation":[{"name":"Masaryk University, Czech Republic"}]},{"given":"Heider Ahmad Mutleq","family":"Wahsheh","sequence":"additional","affiliation":[{"name":"Ca' Foscari University of Venice, Venice, Italy"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2017.52"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2016.25"},{"volume-title":"Proceedings of the 13th USENIX Conference on Usable Privacy and Security (SOUPS). USENIX Association","year":"2017","author":"Acar Yasemin","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134007"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488395"},{"volume-title":"Proceedings of the 22nd USENIX Security Symposium. USENIX Association","year":"2013","author":"Akhawe Devdatta","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655012"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501610"},{"key":"e_1_3_2_1_10_1","unstructured":"CA\/Browser Forum 2018. Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates. Retrieved 2019-05-01 from https:\/\/cabforum.org\/baseline-requirements-documents\/  CA\/Browser Forum 2018. Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates. Retrieved 2019-05-01 from https:\/\/cabforum.org\/baseline-requirements-documents\/"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987443.2987454"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/sp.2013.41"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"D. Cooper S. Santesson S. Farrell S. Boeyen R. Housley and W. Polk. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280. RFC Editor.  D. Cooper S. Santesson S. Farrell S. Boeyen R. Housley and W. Polk. 2008. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280. RFC Editor.","DOI":"10.17487\/rfc5280"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243794"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813703"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702249"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590341"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702442"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382204"},{"key":"e_1_3_2_1_20_1","unstructured":"Google 2019. Transparency report: HTTPS encryption on the web. Retrieved 2019-05-01 from https:\/\/transparencyreport.google.com\/https  Google 2019. Transparency report: HTTPS encryption on the web. Retrieved 2019-05-01 from https:\/\/transparencyreport.google.com\/https"},{"volume-title":"Proceedings of the 10th International Symposium on Human Aspects of Information Security and Assurance (HAISA)","year":"2016","author":"Gorski Peter","key":"e_1_3_2_1_21_1"},{"volume-title":"Proceedings of the 14th USENIX Conference on Usable Privacy and Security (SOUPS). USENIX Association","year":"2018","author":"Gorski Peter Leo","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2068816.2068856"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"R. Housley W. Polk W. Ford and D. Solo. 2002. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280. RFC Editor.  R. Housley W. Polk W. Ford and D. Solo. 2002. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 3280. RFC Editor.","DOI":"10.17487\/rfc3280"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00060"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 26th USENIX Security Symposium","volume":"17","author":"Krombholz Katharina","year":"2017"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.2307\/2529310"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2017.23015"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134082"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134612"},{"key":"e_1_3_2_1_31_1","unstructured":"OpenSSL 2019. OpenSSL Wiki. Retrieved 2019-05-01 from https:\/\/wiki.openssl.org  OpenSSL 2019. OpenSSL Wiki. Retrieved 2019-05-01 from https:\/\/wiki.openssl.org"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174086"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ms.2009.116"},{"key":"e_1_3_2_1_34_1","unstructured":"Johnny Salda\u00f1a. 2015. The coding manual for qualitative researchers (3rd ed.). SAGE Publishing Thousand Oaks CA USA.  Johnny Salda\u00f1a. 2015. The coding manual for qualitative researchers (3rd ed.). SAGE Publishing Thousand Oaks CA USA."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Margarete Sandelowski. 2000. Whatever happened to qualitative description? Research in nursing & health 23 4 (2000) 334--340.  Margarete Sandelowski. 2000. Whatever happened to qualitative description? Research in nursing & health 23 4 (2000) 334--340.","DOI":"10.1002\/1098-240X(200008)23:4<334::AID-NUR9>3.0.CO;2-G"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/msp.2015.65"},{"key":"e_1_3_2_1_37_1","unstructured":"Stack Overflow 2018. Stack Overflow Developer survey. Retrieved 2019-05-01 from https:\/\/insights.stackoverflow.com\/survey\/2018\/  Stack Overflow 2018. Stack Overflow Developer survey. Retrieved 2019-05-01 from https:\/\/insights.stackoverflow.com\/survey\/2018\/"},{"volume-title":"Proceedings of the 18th USENIX Security Symposium. USENIX Association","year":"2009","author":"Sunshine Joshua","key":"e_1_3_2_1_38_1"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76953-0_3"}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","acronym":"ACSAC '19","location":"San Juan Puerto Rico USA"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359800","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359800","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:07Z","timestamp":1750202587000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359800"}},"subtitle":["perceptions of people working in IT"],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":38,"alternative-id":["10.1145\/3359789.3359800","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359800","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}