{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T03:30:21Z","timestamp":1771471821968,"version":"3.50.1"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"11","license":[{"start":{"date-parts":[[2024,10,25]],"date-time":"2024-10-25T00:00:00Z","timestamp":1729814400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"funder":[{"name":"Digitalization Initiative of the Zurich Higher Education Institutions"},{"name":"Swiss National Science Foundation"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Commun. ACM"],"published-print":{"date-parts":[[2024,11]]},"abstract":"<jats:p>Focusing on \"enabling approaches\" that treat humans as partners can add another layer of protection to our cybersecurity defenses.<\/jats:p>","DOI":"10.1145\/3665665","type":"journal-article","created":{"date-parts":[[2024,10,24]],"date-time":"2024-10-24T17:49:51Z","timestamp":1729792191000},"page":"72-81","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Human-Centered Cybersecurity Revisited: From Enemies to Partners"],"prefix":"10.1145","volume":"67","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6873-8146","authenticated-orcid":false,"given":"Verena","family":"Zimmermann","sequence":"first","affiliation":[{"name":"ETH Zurich, GESS, Zurich, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9483-617X","authenticated-orcid":false,"given":"Lorin","family":"Sch\u00f6ni","sequence":"additional","affiliation":[{"name":"ETH Zurich, GESS, Zurich, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6125-9169","authenticated-orcid":false,"given":"Thierry","family":"Schaltegger","sequence":"additional","affiliation":[{"name":"ZHAW Zurcher Hochschule fur Angewandte Wissenschaften, Winterthur, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2350-970X","authenticated-orcid":false,"given":"Benjamin","family":"Ambuehl","sequence":"additional","affiliation":[{"name":"ZHAW Zurcher Hochschule fur Angewandte Wissenschaften, Winterthur, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9192-6778","authenticated-orcid":false,"given":"Melanie","family":"Knieps","sequence":"additional","affiliation":[{"name":"University of Zurich, Zurich, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9683-4792","authenticated-orcid":false,"given":"Nico","family":"Ebert","sequence":"additional","affiliation":[{"name":"ZHAW Zurcher Hochschule fur Angewandte Wissenschaften, Winterthur, Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2024,10,25]]},"reference":[{"key":"e_1_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_1_3_2","first-page":"75","volume-title":"Interactions between Short-Term and Long-Term Memory in the Verbal Domain","author":"Allen R.J.","year":"2008","unstructured":"Allen, R.J. and Baddeley, A.D. Working memory and sentence recall. In Interactions between Short-Term and Long-Term Memory in the Verbal Domain. Psychology Press, (2008), 75\u201397."},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1515\/icom-2019-0019"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jenvp.2022.101818"},{"key":"e_1_3_1_6_2","volume-title":"Surviving Security: How to Integrate People, Process, and Technology","author":"Andress A.","year":"2003","unstructured":"Andress, A. Surviving Security: How to Integrate People, Process, and Technology. CRC press, Boca Raton, FL, USA, (2003)."},{"key":"e_1_3_1_7_2","unstructured":"Bada M. Sasse A.M. and Nurse J.R. Cyber security awareness campaigns: Why do they fail to change behaviour? Arxiv Preprint Arxiv:1901.02672 (2019)."},{"key":"e_1_3_1_8_2","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2008.12"},{"key":"e_1_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/1226736.1226761"},{"key":"e_1_3_1_10_2","doi-asserted-by":"publisher","DOI":"10.1089\/cyber.2020.0631"},{"key":"e_1_3_1_11_2","first-page":"97","volume-title":"Simple Heuristics That Make Us Smart","author":"Czerlinski J.","year":"1999","unstructured":"Czerlinski, J., Gigerenzer, G., and Goldstein, D.G. How good are simple heuristics? In Simple Heuristics That Make Us Smart. Oxford University Press, Oxford, UK, (1999), 97\u2013118."},{"key":"e_1_3_1_12_2","doi-asserted-by":"publisher","DOI":"10.1080\/0960085X.2021.1927866"},{"key":"e_1_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1201\/9781315590813"},{"key":"e_1_3_1_14_2","unstructured":"Dekker S. Why do things go right? (Sep. 28 2018); http:\/\/www.safetydifferently.com\/why-do-things-go-right\/"},{"key":"e_1_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.4324\/9781351059794"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103435"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1177\/0018720816681350"},{"key":"e_1_3_1_18_2","doi-asserted-by":"crossref","unstructured":"ICCC FBI. Internet crime report 2021 (2021).","DOI":"10.1016\/S1361-3723(21)00038-5"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.1995.tb00308.x"},{"key":"e_1_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833756"},{"key":"e_1_3_1_21_2","first-page":"13","volume-title":"SOUPS@ USENIX Security Symp","author":"Habib H.","year":"2018","unstructured":"Habib, H. et al. User Behaviors and Attitudes Under Password Expiration Policies. In SOUPS@ USENIX Security Symp. USENIX, Berkeley, CA, USA, (2018), 13\u201330."},{"key":"e_1_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.02.020"},{"key":"e_1_3_1_23_2","volume-title":"Resilience Engineering: Concepts and Precepts","author":"Hollnagel E.","year":"2006","unstructured":"Hollnagel, E., Woods, D., and Leveson, N. Resilience Engineering: Concepts and Precepts. Ashgate Publishing, Ltd., Farnham, UK, (2006)."},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753384"},{"key":"e_1_3_1_25_2","unstructured":"Jeang\u00e8ne Vilmer J. The \u201cMacron Leaks\u201d Operation: A Post- Mortem (2019); https:\/\/www.atlanticcouncil.org\/wpcontent\/uploads\/2019\/06\/The_Macron_Leaks_Operation-A_Post-Mortem.pdf"},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23007"},{"key":"e_1_3_1_27_2","unstructured":"Kittle B. A practical guide to conducting a barrier analysis. New York: Helen Keller Intern. (2013)."},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1038\/s41598-023-40858-3"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1515\/abitech-2022-0005"},{"key":"e_1_3_1_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833766"},{"key":"e_1_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1731"},{"key":"e_1_3_1_32_2","doi-asserted-by":"publisher","DOI":"10.1177\/1059601104273066"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-7535(97)00052-0"},{"key":"e_1_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2023.568"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2011.07.002"},{"key":"e_1_3_1_36_2","volume-title":"Near Miss Reporting as a Safety Tool","author":"Van der Schaaf T.W.","year":"2013","unstructured":"Van der Schaaf, T.W., Lucas, D.A., and Richard Hale, A. Near Miss Reporting as a Safety Tool. Butterworth-Heinemann, Oxford, UK, (2013)."},{"key":"e_1_3_1_37_2","volume-title":"Behind Human Error: Cognitive Systems, Computers and Hindsight. Technical Report","author":"Woods D.D.","unstructured":"Woods, D.D., Johannesen, L.J., Cook, R.I., and Sarter, N.B. Behind Human Error: Cognitive Systems, Computers and Hindsight. Technical Report. Dayton Univ Research Inst (Urdi) OH."},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-78462-1_13"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2019.05.005"},{"key":"e_1_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1145\/3429888"},{"key":"e_1_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1038\/d41586-018-05707-8"}],"container-title":["Communications of the ACM"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3665665","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3665665","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:06:05Z","timestamp":1750291565000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3665665"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,25]]},"references-count":40,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2024,11]]}},"alternative-id":["10.1145\/3665665"],"URL":"https:\/\/doi.org\/10.1145\/3665665","relation":{},"ISSN":["0001-0782","1557-7317"],"issn-type":[{"value":"0001-0782","type":"print"},{"value":"1557-7317","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,25]]},"assertion":[{"value":"2024-10-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}