{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T19:40:23Z","timestamp":1730317223054,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","funder":[{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","award":["W911NF-09-1-0273"],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004054","name":"King Abdulaziz University of Saudi Arabia","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004054","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,4,8]]},"DOI":"10.1145\/2600176.2600182","type":"proceedings-article","created":{"date-parts":[[2014,8,12]],"date-time":"2014-08-12T13:53:50Z","timestamp":1407851630000},"page":"1-12","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Less is more?"],"prefix":"10.1145","author":[{"given":"Ashwini","family":"Rao","sequence":"first","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Hanan","family":"Hibshi","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University and King Abdul-Aziz University"}]},{"given":"Travis","family":"Breaux","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Jean-Michel","family":"Lehker","sequence":"additional","affiliation":[{"name":"The University of Texas at San Antonio"}]},{"given":"Jianwei","family":"Niu","sequence":"additional","affiliation":[{"name":"The University of Texas at San Antonio"}]}],"member":"320","published-online":{"date-parts":[[2014,4,8]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Schema acquisition from a single example. J. of Experimental Psychology: Learning, Memory, and Cognition, 18(2):391","author":"Ahn W.-k.","year":"1992","unstructured":"W.-k. Ahn , W. F. Brewer , and R. J. Mooney . Schema acquisition from a single example. J. of Experimental Psychology: Learning, Memory, and Cognition, 18(2):391 , 1992 . W.-k. Ahn, W. F. Brewer, and R. J. Mooney. Schema acquisition from a single example. J. of Experimental Psychology: Learning, Memory, and Cognition, 18(2):391, 1992."},{"key":"e_1_3_2_1_2_1","volume-title":"Principles of statistics","author":"Bulmer M. G.","year":"1979","unstructured":"M. G. Bulmer . Principles of statistics . DoverPublications . com, 1979 . M. G. Bulmer. Principles of statistics. DoverPublications. com, 1979."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.85.1.163"},{"key":"e_1_3_2_1_4_1","volume-title":"The psychology of human computer interaction","author":"Card S. K.","year":"1983","unstructured":"S. K. Card , T. P. Moran , and A. Newell . The psychology of human computer interaction . Routledge , 1983 . S. K. Card, T. P. Moran, and A. Newell. The psychology of human computer interaction. Routledge, 1983."},{"key":"e_1_3_2_1_5_1","volume-title":"The psychology of human computer interaction","author":"Card S. K.","year":"1983","unstructured":"S. K. Card , T. P. Moran , and A. Newell . The psychology of human computer interaction . Routledge , 1983 . S. K. Card, T. P. Moran, and A. Newell. The psychology of human computer interaction. Routledge, 1983."},{"key":"e_1_3_2_1_6_1","volume-title":"Human-computer interaction: psychology as a science of design. Annu. review of psychology, 48(1):61--83","author":"Carroll J. M.","year":"1997","unstructured":"J. M. Carroll . Human-computer interaction: psychology as a science of design. Annu. review of psychology, 48(1):61--83 , 1997 . J. M. Carroll. Human-computer interaction: psychology as a science of design. Annu. review of psychology, 48(1):61--83, 1997."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog1302_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog0502_2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0026256"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073010"},{"key":"e_1_3_2_1_11_1","volume-title":"Basics of qualitative research: Techniques and procedures for developing grounded theory","author":"Corbin J.","year":"2007","unstructured":"J. Corbin and A. Strauss . Basics of qualitative research: Techniques and procedures for developing grounded theory . Sage , 2007 . J. Corbin and A. Strauss. Basics of qualitative research: Techniques and procedures for developing grounded theory. Sage, 2007."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/800045.801612"},{"key":"e_1_3_2_1_14_1","volume-title":"G* power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences. Behavior research methods, 39(2):175--191","author":"Faul F.","year":"2007","unstructured":"F. Faul , E. Erdfelder , A.-G. Lang , and A. Buchner . G* power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences. Behavior research methods, 39(2):175--191 , 2007 . F. Faul, E. Erdfelder, A.-G. Lang, and A. Buchner. G* power 3: A flexible statistical power analysis program for the social, behavioral, and biomedical sciences. Behavior research methods, 39(2):175--191, 2007."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog0702_3"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog1003_2"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1006\/jvlc.1996.0009"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/800049.801816"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.93.4.411"},{"key":"e_1_3_2_1_20_1","volume-title":"The pragmatics of analogical transfer. The psychology of learning and motivation, 19:59--87","author":"Holyoak K. J.","year":"1985","unstructured":"K. J. Holyoak . The pragmatics of analogical transfer. The psychology of learning and motivation, 19:59--87 , 1985 . K. J. Holyoak. The pragmatics of analogical transfer. The psychology of learning and motivation, 19:59--87, 1985."},{"key":"e_1_3_2_1_21_1","volume-title":"HCI Int.","author":"Kitajima M.","year":"2005","unstructured":"M. Kitajima , M. H. Blackmon , and P. G. Polson . Cognitive architecture for website design and usability evaluation: Comprehension and information scent in performing by exploration . In HCI Int. 2005 , volume 4 . L. Erlbaum Associates Mahwah , NJ , 2005. M. Kitajima, M. H. Blackmon, and P. G. Polson. Cognitive architecture for website design and usability evaluation: Comprehension and information scent in performing by exploration. In HCI Int. 2005, volume 4. L. Erlbaum Associates Mahwah, NJ, 2005."},{"key":"e_1_3_2_1_22_1","volume-title":"Research methods in human-computer interaction","author":"Lazar J.","year":"2010","unstructured":"J. Lazar , J. H. Feng , and H. Hochheiser . Research methods in human-computer interaction . Wiley . com, 2010 . J. Lazar, J. H. Feng, and H. Hochheiser. Research methods in human-computer interaction. Wiley. com, 2010."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/108844.108869"},{"key":"e_1_3_2_1_24_1","volume-title":"The specific character of abstract thought: Categorization, problem solving, and induction","author":"Medin D. L.","year":"1989","unstructured":"D. L. Medin and B. H. Ross . The specific character of abstract thought: Categorization, problem solving, and induction . 1989 . D. L. Medin and B. H. Ross. The specific character of abstract thought: Categorization, problem solving, and induction. 1989."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/259963.260531"},{"key":"e_1_3_2_1_26_1","first-page":"155","volume-title":"The role of expertise in solving arithmetic and algebra word problems by analogy. The nature and origins of Math.al skills","author":"Novick L. R.","year":"1992","unstructured":"L. R. Novick and J. Campbell . The role of expertise in solving arithmetic and algebra word problems by analogy. The nature and origins of Math.al skills , pages 155 -- 188 , 1992 . L. R. Novick and J. Campbell. The role of expertise in solving arithmetic and algebra word problems by analogy. The nature and origins of Math.al skills, pages 155--188, 1992."},{"key":"e_1_3_2_1_27_1","volume-title":"Cognitive load theory and instructional design: Recent developments. Educ.al psychologist, 38(1):1--4","author":"Paas F.","year":"2003","unstructured":"F. Paas , A. Renkl , and J. Sweller . Cognitive load theory and instructional design: Recent developments. Educ.al psychologist, 38(1):1--4 , 2003 . F. Paas, A. Renkl, and J. Sweller. Cognitive load theory and instructional design: Recent developments. Educ.al psychologist, 38(1):1--4, 2003."},{"key":"e_1_3_2_1_28_1","volume-title":"How to solve it: A new aspect of mathematical method","author":"Polya G.","year":"2004","unstructured":"G. Polya . How to solve it: A new aspect of mathematical method . Princeton University Press , 2004 . G. Polya. How to solve it: A new aspect of mathematical method. Princeton University Press, 2004."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335364"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078829"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/169059.169082"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.115.3.381"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog2101_1"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1037\/0021-9010.75.3.354"},{"key":"e_1_3_2_1_35_1","volume-title":"Experimental and quasi-experimental designs for generalized causal inference. Houghton","author":"Shadish W. R.","year":"2002","unstructured":"W. R. Shadish , T. D. Cook , and D. T. Campbell . Experimental and quasi-experimental designs for generalized causal inference. Houghton , Mifflin and Company , 2002 . W. R. Shadish, T. D. Cook, and D. T. Campbell. Experimental and quasi-experimental designs for generalized causal inference. Houghton, Mifflin and Company, 2002."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.2307\/2333709"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"e_1_3_2_1_38_1","volume-title":"Nonparametric statistics for the behavioral sciences","author":"Siegel S.","year":"1956","unstructured":"S. Siegel . Nonparametric statistics for the behavioral sciences . 1956 . S. Siegel. Nonparametric statistics for the behavioral sciences. 1956."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/259964.260041"},{"key":"e_1_3_2_1_40_1","volume-title":"Cognitive architecture and instructional design. Educ. psychology review, 10(3):251--296","author":"Sweller J.","year":"1998","unstructured":"J. Sweller , J. J. Van Merrienboer , and F. G. Paas . Cognitive architecture and instructional design. Educ. psychology review, 10(3):251--296 , 1998 . J. Sweller, J. J. Van Merrienboer, and F. G. Paas. Cognitive architecture and instructional design. Educ. psychology review, 10(3):251--296, 1998."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837125"},{"key":"e_1_3_2_1_42_1","volume-title":"Proc. of the 8th USENIX Security Symp.","volume":"99","author":"Whitten A.","year":"1999","unstructured":"A. Whitten and J. D. Tygar . Why johnny can't encrypt: A usability evaluation of pgp 5.0 . In Proc. of the 8th USENIX Security Symp. , volume 99 . McGraw-Hill , 1999 . A. Whitten and J. D. Tygar. Why johnny can't encrypt: A usability evaluation of pgp 5.0. In Proc. of the 8th USENIX Security Symp., volume 99. McGraw-Hill, 1999."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"}],"event":{"name":"HotSoS '14: Symposium and Bootcamp on the Science of Security","sponsor":["No. Carolina State Univeresity North Carolina State University"],"location":"Raleigh North Carolina USA","acronym":"HotSoS '14"},"container-title":["Proceedings of the 2014 Symposium and Bootcamp on the Science of Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2600176.2600182","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T18:32:16Z","timestamp":1673548336000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600176.2600182"}},"subtitle":["investigating the role of examples in security studies using analogical transfer"],"short-title":[],"issued":{"date-parts":[[2014,4,8]]},"references-count":43,"alternative-id":["10.1145\/2600176.2600182","10.1145\/2600176"],"URL":"https:\/\/doi.org\/10.1145\/2600176.2600182","relation":{},"subject":[],"published":{"date-parts":[[2014,4,8]]},"assertion":[{"value":"2014-04-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}