{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:23:14Z","timestamp":1750220594563,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Bundesministerium f\u00fcr Bildung und Forschung","award":["ATHENE"],"award-info":[{"award-number":["ATHENE"]}]},{"name":"Hessisches Ministerium f\u00fcr Wissenschaft und Kunst","award":["ATHENE"],"award-info":[{"award-number":["ATHENE"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,9,28]]},"DOI":"10.1145\/3399715.3399970","type":"proceedings-article","created":{"date-parts":[[2020,10,2]],"date-time":"2020-10-02T23:52:27Z","timestamp":1601682747000},"page":"1-3","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Information Visualization Interface on Home Router Traffic Data for Laypersons"],"prefix":"10.1145","author":[{"given":"Marija","family":"Schufrin","sequence":"first","affiliation":[{"name":"Fraunhofer IGD"}]},{"given":"David","family":"Sessler","sequence":"additional","affiliation":[{"name":"Fraunhofer IGD"}]},{"given":"Steven Lamarr","family":"Reynolds","sequence":"additional","affiliation":[{"name":"Fraunhofer IGD"}]},{"given":"Salmah","family":"Ahmad","sequence":"additional","affiliation":[{"name":"Fraunhofer IGD"}]},{"given":"Tobias","family":"Mertz","sequence":"additional","affiliation":[{"name":"TU Darmstadt"}]},{"given":"J\u00f6rn","family":"Kohlhammer","sequence":"additional","affiliation":[{"name":"Fraunhofer IGD"}]}],"member":"320","published-online":{"date-parts":[[2020,10,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.4304\/jait.3.3.176-183"},{"key":"e_1_3_2_1_2_1","unstructured":"AVM. [n.d.]. Fritz!Box. online. https:\/\/avm.de\/produkte\/fritzbox\/ last accessed 03.02.2020.  AVM. [n.d.]. Fritz!Box. online. https:\/\/avm.de\/produkte\/fritzbox\/ last accessed 03.02.2020."},{"key":"e_1_3_2_1_3_1","volume-title":"Nurse","author":"Bada Maria","year":"2015","unstructured":"Maria Bada , Angela M. Sasse , and Jason R. C . Nurse . 2015 . Cyber Security Awareness Campaigns: Why do they fail to change behaviour? CoRR abs\/1901.02672 (2015). Maria Bada, Angela M. Sasse, and Jason R. C. Nurse. 2015. Cyber Security Awareness Campaigns: Why do they fail to change behaviour? CoRR abs\/1901.02672 (2015)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2450538"},{"key":"e_1_3_2_1_7_1","first-page":"420","article-title":"Personal visualization and personal visual analytics","volume":"21","author":"Huang Dandan","year":"2015","unstructured":"Dandan Huang , Melanie Tory , Bon Adriel Aseniero , Lyn Bartram , Scott Bateman , Sheelagh Carpendale , Anthony Tang , and Robert Woodbury . 2015 . Personal visualization and personal visual analytics . IEEE TVCG 21 , 3 (2015), 420 -- 433 . Dandan Huang, Melanie Tory, Bon Adriel Aseniero, Lyn Bartram, Scott Bateman, Sheelagh Carpendale, Anthony Tang, and Robert Woodbury. 2015. Personal visualization and personal visual analytics. IEEE TVCG 21, 3 (2015), 420--433.","journal-title":"IEEE TVCG"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.08.001"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSA.2016.7503278"},{"key":"e_1_3_2_1_10_1","unstructured":"Ying Li and Mikko T Siponen. 2011. A Call For Research On Home Users' Information Security Behaviour.. In PACIS. 112.  Ying Li and Mikko T Siponen. 2011. A Call For Research On Home Users' Information Security Behaviour.. In PACIS. 112."},{"key":"e_1_3_2_1_11_1","volume-title":"Fourteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Nthala Norbert","year":"2018","unstructured":"Norbert Nthala and Ivan Flechais . 2018 . Informal support networks: an investigation into home data security practices . In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018). 63--82. Norbert Nthala and Ivan Flechais. 2018. Informal support networks: an investigation into home data security practices. In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018). 63--82."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2011.144"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCG.2015.88"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the EuroVis Workshop on Visual Analytics. Eurographics Association, 55--59","author":"Ulmer Alex","year":"2018","unstructured":"Alex Ulmer , Marija Schufrin , Hendrik L\u00fccke-Tieke , Clindo Devassy Kannanayikkal , and J\u00f6rn Kohlhammer . 2018 . Towards visual cyber security analytics for the masses . In Proceedings of the EuroVis Workshop on Visual Analytics. Eurographics Association, 55--59 . Alex Ulmer, Marija Schufrin, Hendrik L\u00fccke-Tieke, Clindo Devassy Kannanayikkal, and J\u00f6rn Kohlhammer. 2018. Towards visual cyber security analytics for the masses. In Proceedings of the EuroVis Workshop on Visual Analytics. Eurographics Association, 55--59."},{"key":"e_1_3_2_1_15_1","unstructured":"Christopher Vogler. 2007. The Writer's journey. Michael Wiese Productions Studio City CA.  Christopher Vogler. 2007. The Writer's journey. Michael Wiese Productions Studio City CA."},{"key":"e_1_3_2_1_16_1","unstructured":"Wireshark. [n.d.]. online. https:\/\/www.wireshark.org\/ last accessed 03.02.2020.  Wireshark. [n.d.]. online. https:\/\/www.wireshark.org\/ last accessed 03.02.2020."}],"event":{"name":"AVI '20: International Conference on Advanced Visual Interfaces","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","ACM Association for Computing Machinery","SIGMM ACM Special Interest Group on Multimedia","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Salerno Italy","acronym":"AVI '20"},"container-title":["Proceedings of the International Conference on Advanced Visual Interfaces"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3399715.3399970","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3399715.3399970","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:49Z","timestamp":1750195909000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3399715.3399970"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,9,28]]},"references-count":14,"alternative-id":["10.1145\/3399715.3399970","10.1145\/3399715"],"URL":"https:\/\/doi.org\/10.1145\/3399715.3399970","relation":{},"subject":[],"published":{"date-parts":[[2020,9,28]]},"assertion":[{"value":"2020-10-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}