Changes
On August 4, 2023 at 8:46:17 AM UTC, admin:
-
Set author of Replication Package: "If You Can’t Get Them to the Lab: Evaluating a Virtual Study Environment with Security Information Workers" to Nicolas Huaman (previously Nicolas Huaman, Alexander Krause, Dominik Wermke, Jan H. Klemmer, Christian Stransky, Yasemin Acar, Sascha Fahl)
f | 1 | { | f | 1 | { |
n | 2 | "author": "Nicolas Huaman, Alexander Krause, Dominik Wermke, Jan H. | n | 2 | "author": "Nicolas Huaman", |
3 | Klemmer, Christian Stransky, Yasemin Acar, Sascha Fahl", | ||||
4 | "author_email": "nicolas.huaman@cispa.de", | 3 | "author_email": "nicolas.huaman@cispa.de", | ||
5 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | 4 | "creator_user_id": "17755db4-395a-4b3b-ac09-e8e3484ca700", | ||
6 | "doi": "10.25835/spxeaic7", | 5 | "doi": "10.25835/spxeaic7", | ||
7 | "doi_date_published": "2022-06-09", | 6 | "doi_date_published": "2022-06-09", | ||
8 | "doi_publisher": "LUIS", | 7 | "doi_publisher": "LUIS", | ||
9 | "doi_status": "true", | 8 | "doi_status": "true", | ||
10 | "domain": "https://data.uni-hannover.de", | 9 | "domain": "https://data.uni-hannover.de", | ||
n | n | 10 | "extra_authors": [ | ||
11 | { | ||||
12 | "extra_author": " Alexander Krause" | ||||
13 | }, | ||||
14 | { | ||||
15 | "extra_author": " Dominik Wermke" | ||||
16 | }, | ||||
17 | { | ||||
18 | "extra_author": " Jan H. Klemmer" | ||||
19 | }, | ||||
20 | { | ||||
21 | "extra_author": " Christian Stransky" | ||||
22 | }, | ||||
23 | { | ||||
24 | "extra_author": " Yasemin Acar" | ||||
25 | }, | ||||
26 | { | ||||
27 | "extra_author": " Sascha Fahl" | ||||
28 | } | ||||
29 | ], | ||||
11 | "groups": [], | 30 | "groups": [], | ||
12 | "have_copyright": "Yes", | 31 | "have_copyright": "Yes", | ||
13 | "id": "e0894e61-8e22-4832-aa92-555f007282bc", | 32 | "id": "e0894e61-8e22-4832-aa92-555f007282bc", | ||
14 | "isopen": false, | 33 | "isopen": false, | ||
15 | "license_id": "CC-BY-SA-3.0", | 34 | "license_id": "CC-BY-SA-3.0", | ||
16 | "license_title": "CC-BY-SA-3.0", | 35 | "license_title": "CC-BY-SA-3.0", | ||
17 | "maintainer": "Nicolas Huaman", | 36 | "maintainer": "Nicolas Huaman", | ||
18 | "maintainer_email": "nicolas.huaman@cispa.de", | 37 | "maintainer_email": "nicolas.huaman@cispa.de", | ||
19 | "metadata_created": "2023-01-12T13:13:58.657594", | 38 | "metadata_created": "2023-01-12T13:13:58.657594", | ||
n | 20 | "metadata_modified": "2023-01-12T13:13:58.657600", | n | 39 | "metadata_modified": "2023-08-04T08:46:17.135352", |
21 | "name": "luh-2022-soups-olab", | 40 | "name": "luh-2022-soups-olab", | ||
22 | "notes": "Replication Package for the Eighteenth Symposium on Usable | 41 | "notes": "Replication Package for the Eighteenth Symposium on Usable | ||
23 | Privacy and Security (SOUPS 2022) paper: \u201cIf You Can\u2019t Get | 42 | Privacy and Security (SOUPS 2022) paper: \u201cIf You Can\u2019t Get | ||
24 | Them to the Lab: Evaluating a Virtual Study Environment with Security | 43 | Them to the Lab: Evaluating a Virtual Study Environment with Security | ||
25 | Information Workers\u201d.\r\n\r\nTo make our study reproducible and | 44 | Information Workers\u201d.\r\n\r\nTo make our study reproducible and | ||
26 | allow for easy access for meta-research, we publish a replication | 45 | allow for easy access for meta-research, we publish a replication | ||
27 | package containing the following documents: \r\n(1) study protocols | 46 | package containing the following documents: \r\n(1) study protocols | ||
28 | for the cognitive walkthrough\r\n(2) the guided and the comparison | 47 | for the cognitive walkthrough\r\n(2) the guided and the comparison | ||
29 | study, including the study scenarios\r\n(3) the tasks | 48 | study, including the study scenarios\r\n(3) the tasks | ||
30 | descriptions\r\n(4) between-task surveys\r\n(5) end surveys\r\n", | 49 | descriptions\r\n(4) between-task surveys\r\n(5) end surveys\r\n", | ||
31 | "num_resources": 1, | 50 | "num_resources": 1, | ||
32 | "num_tags": 9, | 51 | "num_tags": 9, | ||
33 | "organization": { | 52 | "organization": { | ||
34 | "approval_status": "approved", | 53 | "approval_status": "approved", | ||
35 | "created": "2021-10-14T10:15:52.219448", | 54 | "created": "2021-10-14T10:15:52.219448", | ||
n | 36 | "description": "https://www.pi.uni-hannover.de/de/sec/", | n | 55 | "description": "https://www.itsec.uni-hannover.de/de/eis/", |
37 | "id": "8c4542e3-c4b6-48be-ac32-e16b44c79b1c", | 56 | "id": "8c4542e3-c4b6-48be-ac32-e16b44c79b1c", | ||
38 | "image_url": "", | 57 | "image_url": "", | ||
39 | "is_organization": true, | 58 | "is_organization": true, | ||
n | 40 | "name": "fachgebiet-it-sicherheit", | n | 59 | "name": "fachgebiet-empirical-information-security", |
41 | "state": "active", | 60 | "state": "active", | ||
n | 42 | "title": "Fachgebiet IT-Sicherheit", | n | 61 | "title": "Fachgebiet Empirical Information Security", |
43 | "type": "organization" | 62 | "type": "organization" | ||
44 | }, | 63 | }, | ||
45 | "owner_org": "8c4542e3-c4b6-48be-ac32-e16b44c79b1c", | 64 | "owner_org": "8c4542e3-c4b6-48be-ac32-e16b44c79b1c", | ||
46 | "private": false, | 65 | "private": false, | ||
47 | "relationships_as_object": [], | 66 | "relationships_as_object": [], | ||
48 | "relationships_as_subject": [], | 67 | "relationships_as_subject": [], | ||
49 | "repository_name": "Leibniz University Hannover", | 68 | "repository_name": "Leibniz University Hannover", | ||
50 | "resources": [ | 69 | "resources": [ | ||
51 | { | 70 | { | ||
52 | "cache_last_updated": null, | 71 | "cache_last_updated": null, | ||
53 | "cache_url": null, | 72 | "cache_url": null, | ||
54 | "created": "2022-06-09T07:48:32.611844", | 73 | "created": "2022-06-09T07:48:32.611844", | ||
55 | "description": "", | 74 | "description": "", | ||
56 | "format": "ZIP", | 75 | "format": "ZIP", | ||
57 | "hash": "", | 76 | "hash": "", | ||
58 | "id": "7c1ac578-6ad2-40b9-9d46-d85cf7705b80", | 77 | "id": "7c1ac578-6ad2-40b9-9d46-d85cf7705b80", | ||
59 | "last_modified": "2022-06-09T09:34:00.524388", | 78 | "last_modified": "2022-06-09T09:34:00.524388", | ||
n | 60 | "metadata_modified": "2023-01-12T13:13:58.644126", | n | 79 | "metadata_modified": "2023-08-04T08:46:17.138661", |
61 | "mimetype": "application/zip", | 80 | "mimetype": "application/zip", | ||
62 | "mimetype_inner": null, | 81 | "mimetype_inner": null, | ||
63 | "name": "replication-package.zip", | 82 | "name": "replication-package.zip", | ||
64 | "package_id": "e0894e61-8e22-4832-aa92-555f007282bc", | 83 | "package_id": "e0894e61-8e22-4832-aa92-555f007282bc", | ||
65 | "position": 0, | 84 | "position": 0, | ||
66 | "resource_type": null, | 85 | "resource_type": null, | ||
67 | "size": 368850, | 86 | "size": 368850, | ||
68 | "state": "active", | 87 | "state": "active", | ||
69 | "url": | 88 | "url": | ||
70 | c1ac578-6ad2-40b9-9d46-d85cf7705b80/download/replication-package.zip", | 89 | c1ac578-6ad2-40b9-9d46-d85cf7705b80/download/replication-package.zip", | ||
71 | "url_type": "" | 90 | "url_type": "" | ||
72 | } | 91 | } | ||
73 | ], | 92 | ], | ||
t | t | 93 | "services_used_list": "", | ||
74 | "source_metadata_created": "2022-06-09T07:39:12.964116", | 94 | "source_metadata_created": "2022-06-09T07:39:12.964116", | ||
75 | "source_metadata_modified": "2022-06-10T09:45:32.358572", | 95 | "source_metadata_modified": "2022-06-10T09:45:32.358572", | ||
76 | "state": "active", | 96 | "state": "active", | ||
77 | "tags": [ | 97 | "tags": [ | ||
78 | { | 98 | { | ||
79 | "display_name": "computer security", | 99 | "display_name": "computer security", | ||
80 | "id": "74bf79c0-e7f7-462c-847d-9ab81102791a", | 100 | "id": "74bf79c0-e7f7-462c-847d-9ab81102791a", | ||
81 | "name": "computer security", | 101 | "name": "computer security", | ||
82 | "state": "active", | 102 | "state": "active", | ||
83 | "vocabulary_id": null | 103 | "vocabulary_id": null | ||
84 | }, | 104 | }, | ||
85 | { | 105 | { | ||
86 | "display_name": "development", | 106 | "display_name": "development", | ||
87 | "id": "293b4641-9e2e-44df-b7b1-46de625283f6", | 107 | "id": "293b4641-9e2e-44df-b7b1-46de625283f6", | ||
88 | "name": "development", | 108 | "name": "development", | ||
89 | "state": "active", | 109 | "state": "active", | ||
90 | "vocabulary_id": null | 110 | "vocabulary_id": null | ||
91 | }, | 111 | }, | ||
92 | { | 112 | { | ||
93 | "display_name": "replication", | 113 | "display_name": "replication", | ||
94 | "id": "b6c901e0-e880-4b6b-9dda-debd83956aed", | 114 | "id": "b6c901e0-e880-4b6b-9dda-debd83956aed", | ||
95 | "name": "replication", | 115 | "name": "replication", | ||
96 | "state": "active", | 116 | "state": "active", | ||
97 | "vocabulary_id": null | 117 | "vocabulary_id": null | ||
98 | }, | 118 | }, | ||
99 | { | 119 | { | ||
100 | "display_name": "security", | 120 | "display_name": "security", | ||
101 | "id": "c3018e45-a63d-4de4-a11a-5edbc0aee325", | 121 | "id": "c3018e45-a63d-4de4-a11a-5edbc0aee325", | ||
102 | "name": "security", | 122 | "name": "security", | ||
103 | "state": "active", | 123 | "state": "active", | ||
104 | "vocabulary_id": null | 124 | "vocabulary_id": null | ||
105 | }, | 125 | }, | ||
106 | { | 126 | { | ||
107 | "display_name": "software", | 127 | "display_name": "software", | ||
108 | "id": "5b605df0-3d03-4ce9-a7ff-74df14c502ee", | 128 | "id": "5b605df0-3d03-4ce9-a7ff-74df14c502ee", | ||
109 | "name": "software", | 129 | "name": "software", | ||
110 | "state": "active", | 130 | "state": "active", | ||
111 | "vocabulary_id": null | 131 | "vocabulary_id": null | ||
112 | }, | 132 | }, | ||
113 | { | 133 | { | ||
114 | "display_name": "study", | 134 | "display_name": "study", | ||
115 | "id": "2198f306-217b-4749-b191-f2db98ec6ec8", | 135 | "id": "2198f306-217b-4749-b191-f2db98ec6ec8", | ||
116 | "name": "study", | 136 | "name": "study", | ||
117 | "state": "active", | 137 | "state": "active", | ||
118 | "vocabulary_id": null | 138 | "vocabulary_id": null | ||
119 | }, | 139 | }, | ||
120 | { | 140 | { | ||
121 | "display_name": "study material", | 141 | "display_name": "study material", | ||
122 | "id": "83c4ffd4-ee16-4757-a2dc-54f24f2b7302", | 142 | "id": "83c4ffd4-ee16-4757-a2dc-54f24f2b7302", | ||
123 | "name": "study material", | 143 | "name": "study material", | ||
124 | "state": "active", | 144 | "state": "active", | ||
125 | "vocabulary_id": null | 145 | "vocabulary_id": null | ||
126 | }, | 146 | }, | ||
127 | { | 147 | { | ||
128 | "display_name": "usable security", | 148 | "display_name": "usable security", | ||
129 | "id": "bd3be3a5-b11b-487e-a381-6538b40a455c", | 149 | "id": "bd3be3a5-b11b-487e-a381-6538b40a455c", | ||
130 | "name": "usable security", | 150 | "name": "usable security", | ||
131 | "state": "active", | 151 | "state": "active", | ||
132 | "vocabulary_id": null | 152 | "vocabulary_id": null | ||
133 | }, | 153 | }, | ||
134 | { | 154 | { | ||
135 | "display_name": "walkthroughs", | 155 | "display_name": "walkthroughs", | ||
136 | "id": "4ab80037-ecc6-462b-abc1-ad238a1917c0", | 156 | "id": "4ab80037-ecc6-462b-abc1-ad238a1917c0", | ||
137 | "name": "walkthroughs", | 157 | "name": "walkthroughs", | ||
138 | "state": "active", | 158 | "state": "active", | ||
139 | "vocabulary_id": null | 159 | "vocabulary_id": null | ||
140 | } | 160 | } | ||
141 | ], | 161 | ], | ||
142 | "terms_of_usage": "Yes", | 162 | "terms_of_usage": "Yes", | ||
143 | "title": "Replication Package: \"If You Can\u2019t Get Them to the | 163 | "title": "Replication Package: \"If You Can\u2019t Get Them to the | ||
144 | Lab: Evaluating a Virtual Study Environment with Security Information | 164 | Lab: Evaluating a Virtual Study Environment with Security Information | ||
145 | Workers\"", | 165 | Workers\"", | ||
146 | "type": "vdataset", | 166 | "type": "vdataset", | ||
147 | "url": "https://data.uni-hannover.de/dataset/2022-soups-olab", | 167 | "url": "https://data.uni-hannover.de/dataset/2022-soups-olab", | ||
148 | "version": "" | 168 | "version": "" | ||
149 | } | 169 | } |