{"id":"https://openalex.org/W2114525843","doi":"https://doi.org/10.1145/1600176.1600189","title":"Position","display_name":"Position","publication_year":2008,"publication_date":"2008-07-15","ids":{"openalex":"https://openalex.org/W2114525843","doi":"https://doi.org/10.1145/1600176.1600189","mag":"2114525843"},"language":"en","primary_location":{"id":"doi:10.1145/1600176.1600189","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1600176.1600189","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2007 Workshop on New Security Paradigms","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5016536356","display_name":"S. Vidyaraman","orcid":null},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"S. Vidyaraman","raw_affiliation_strings":["University at Buffalo, Buffalo"],"affiliations":[{"raw_affiliation_string":"University at Buffalo, Buffalo","institution_ids":["https://openalex.org/I63190737"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109040714","display_name":"M. Chandrasekaran","orcid":null},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"M. Chandrasekaran","raw_affiliation_strings":["University at Buffalo, Buffalo"],"affiliations":[{"raw_affiliation_string":"University at Buffalo, Buffalo","institution_ids":["https://openalex.org/I63190737"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031947971","display_name":"Shambhu Upadhyaya","orcid":"https://orcid.org/0000-0002-0596-1703"},"institutions":[{"id":"https://openalex.org/I63190737","display_name":"University at Buffalo, State University of New York","ror":"https://ror.org/01y64my43","country_code":"US","type":"education","lineage":["https://openalex.org/I63190737"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"S. Upadhyaya","raw_affiliation_strings":["University at Buffalo, Buffalo"],"affiliations":[{"raw_affiliation_string":"University at Buffalo, Buffalo","institution_ids":["https://openalex.org/I63190737"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5016536356"],"corresponding_institution_ids":["https://openalex.org/I63190737"],"apc_list":null,"apc_paid":null,"fwci":5.0759,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.95336667,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"75","last_page":"80"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/mantra","display_name":"Mantra","score":0.7888756990432739},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.7364744544029236},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7156499624252319},{"id":"https://openalex.org/keywords/nothing","display_name":"Nothing","score":0.7141532301902771},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6849258542060852},{"id":"https://openalex.org/keywords/unconscious-mind","display_name":"Unconscious mind","score":0.678869366645813},{"id":"https://openalex.org/keywords/position-paper","display_name":"Position paper","score":0.5498629808425903},{"id":"https://openalex.org/keywords/position","display_name":"Position (finance)","score":0.5071520805358887},{"id":"https://openalex.org/keywords/point","display_name":"Point (geometry)","score":0.45331621170043945},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.41314879059791565},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.38960573077201843},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.21384912729263306},{"id":"https://openalex.org/keywords/epistemology","display_name":"Epistemology","score":0.1578598916530609},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.09509822726249695}],"concepts":[{"id":"https://openalex.org/C2778171436","wikidata":"https://www.wikidata.org/wiki/Q131510","display_name":"Mantra","level":2,"score":0.7888756990432739},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.7364744544029236},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7156499624252319},{"id":"https://openalex.org/C136815107","wikidata":"https://www.wikidata.org/wiki/Q154242","display_name":"Nothing","level":2,"score":0.7141532301902771},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6849258542060852},{"id":"https://openalex.org/C115786838","wikidata":"https://www.wikidata.org/wiki/Q192105","display_name":"Unconscious mind","level":2,"score":0.678869366645813},{"id":"https://openalex.org/C78780964","wikidata":"https://www.wikidata.org/wiki/Q7233193","display_name":"Position paper","level":2,"score":0.5498629808425903},{"id":"https://openalex.org/C198082294","wikidata":"https://www.wikidata.org/wiki/Q3399648","display_name":"Position (finance)","level":2,"score":0.5071520805358887},{"id":"https://openalex.org/C28719098","wikidata":"https://www.wikidata.org/wiki/Q44946","display_name":"Point (geometry)","level":2,"score":0.45331621170043945},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.41314879059791565},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.38960573077201843},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.21384912729263306},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.1578598916530609},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.09509822726249695},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C27206212","wikidata":"https://www.wikidata.org/wiki/Q34178","display_name":"Theology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1600176.1600189","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1600176.1600189","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2007 Workshop on New Security Paradigms","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6899999976158142,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G4029451696","display_name":null,"funder_award_id":"200821J","funder_id":"https://openalex.org/F4320338294","funder_display_name":"Air Force Research Laboratory"}],"funders":[{"id":"https://openalex.org/F4320338294","display_name":"Air Force Research Laboratory","ror":"https://ror.org/02e2egq70"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W41409728","https://openalex.org/W2016310229","https://openalex.org/W2024301325","https://openalex.org/W2037202491","https://openalex.org/W2042059698","https://openalex.org/W2078635913","https://openalex.org/W2084044852","https://openalex.org/W2105922461","https://openalex.org/W2106457028","https://openalex.org/W2121077396","https://openalex.org/W2126090407","https://openalex.org/W2136773629","https://openalex.org/W2292825069"],"related_works":["https://openalex.org/W1605789739","https://openalex.org/W3210201299","https://openalex.org/W2890871679","https://openalex.org/W2808216538","https://openalex.org/W4388334207","https://openalex.org/W2216420239","https://openalex.org/W3011492772","https://openalex.org/W3189463824","https://openalex.org/W2319117687","https://openalex.org/W2499122376"],"abstract_inverted_index":{"The":[0],"Human":[1],"Factor":[2],"has":[3,19,93],"long":[4],"been":[5,20,94],"recognized":[6],"as":[7,50],"the":[8,36,42,56,65,68,85,91,139,148],"weakest":[9],"link":[10],"in":[11,26,96],"computer":[12],"systems":[13],"security,":[14],"yet,":[15],"nothing":[16],"technically":[17],"significant":[18],"done":[21],"to":[22,84,126,137,147],"address":[23],"this":[24,32,118],"problem":[25],"an":[27,51],"attack":[28],"agnostic":[29],"manner.":[30],"In":[31],"paper,":[33],"we":[34],"introduce":[35],"mantra":[37,149],"of":[38,64,108,142],"\"The":[39],"User":[40],"is":[41,123,135,153],"Enemy\"":[43],"for":[44,155],"security":[45,104,143],"designers":[46],"and":[47,67,70,80,101],"developers":[48],"alike":[49],"underlying":[52],"current":[53],"towards":[54,116,131],"addressing":[55,117,156],"weak":[57],"human":[58],"factor.":[59],"We":[60,87],"present":[61],"different":[62],"notions":[63],"user":[66,76,151],"system":[69],"argue":[71],"from":[72],"parallel":[73],"tracks":[74],"that":[75,103],"actions,":[77],"both":[78],"ignorant":[79],"non-compliant,":[81],"are":[82],"detrimental":[83],"organization.":[86],"further":[88],"show":[89],"how":[90],"paradigm":[92],"applied":[95],"a":[97,109,128],"rather":[98],"unconscious":[99],"manner":[100],"contend":[102],"mechanisms":[105],"borne":[106],"out":[107],"conscious":[110],"application":[111],"will":[112],"be":[113,127,138],"more":[114],"effective":[115],"systemic":[119],"problem.":[120],"Our":[121],"position":[122],"not":[124],"meant":[125,136],"cynical":[129],"attitude":[130],"users;":[132],"rather,":[133],"it":[134],"focal":[140],"point":[141],"design":[144],"attitude,":[145],"similar":[146],"\"All":[150],"input":[152],"evil\"":[154],"buffer":[157],"overflow":[158],"attacks.":[159]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2016-06-24T00:00:00"}
