{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T10:32:53Z","timestamp":1774866773404,"version":"3.50.1"},"publisher-location":"Cham","reference-count":82,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030574031","type":"print"},{"value":"9783030574048","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-57404-8_19","type":"book-chapter","created":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T23:20:00Z","timestamp":1597965600000},"page":"247-258","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Exploring the Meaning of \u201cUsable Security\u201d"],"prefix":"10.1007","author":[{"given":"Markus","family":"Lennartsson","sequence":"first","affiliation":[]},{"given":"Joakim","family":"K\u00e4vrestad","sequence":"additional","affiliation":[]},{"given":"Marcus","family":"Nohlberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,21]]},"reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"* Abu-Salma, R., Sasse, M.A., Bonneau, J., Danilova, A., Naiakshina, A., Smith, M.: Obstacles to the adoption of secure communication tools. In: 2017 IEEE Symposium on Security and Privacy, pp. 137\u2013153 (2017)","DOI":"10.1109\/SP.2017.65"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"* Acar, Y., Fahl, S., Mazurek, M.L.: You are not your developer, either: a research agenda for usable security and privacy research beyond end users. In: 2016 IEEE SecDev, pp. 3\u20138 (2016)","DOI":"10.1109\/SecDev.2016.013"},{"key":"19_CR3","doi-asserted-by":"publisher","unstructured":"* Al Abdulwahid, A., Clarke, N., Stengel, I., Furnell, S, Reich, C.: Security, privacy and usability \u2013 a survey of users\u2019 perceptions and attitudes. In: Fischer-H\u00fcbner, Simone, Lambrinoudakis, Costas, Lopez, Javier (eds.) TrustBus 2015. LNCS, vol. 9264, pp. 153\u2013168. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-22906-5_12","DOI":"10.1007\/978-3-319-22906-5_12"},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"* Al-Sarayreh, K.T., Hasan, L.A., Almakadmeh, K.: A trade-off model of software requirements for balancing between security and usability issues. Int. Rev. Comput. Softw. 10(12), 1157\u20131168 (2015)","DOI":"10.15866\/irecos.v10i12.8094"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"* Alarifi, A., Alsaleh, M., Alomar, N.: A model for evaluating the security and usability of e-banking platforms. Computing 99(5), 519\u2013535 (2017)","DOI":"10.1007\/s00607-017-0546-9"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"* Almutairi, E., Al-Megren, S.: Usability and security analysis of the keepkey wallet. In: 2019 IEEE ICBC, pp. 149\u2013153 (2019)","DOI":"10.1109\/BLOC.2019.8751451"},{"key":"19_CR7","doi-asserted-by":"crossref","unstructured":"* Alshamsi, A., Williams, N., Andras, P.: The trade-off between usability and security in the context of egovernment: a mapping study. Proc. BCS-HCI 30, 1\u201313 (2016)","DOI":"10.14236\/ewic\/HCI2016.36"},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"* Alshanketi, F., Traore, I., Ahmed, A.A.: Improving performance and usability in mobile keystroke dynamic biometric authentication. In: 2016 IEEE SPW, pp. 66\u201373. IEEE (2016)","DOI":"10.1109\/SPW.2016.12"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"* Andriotis, P., Oikonomou, G.C., Mylonas, A., Tryfonas, T.: A study on usability and security features of the android pattern lock screen. Inf. Comput. Secur. 24(1), 53\u201372 (2016)","DOI":"10.1108\/ICS-01-2015-0001"},{"key":"19_CR10","unstructured":"* Atwater, E., Bocovich, C., Hengartner, U., Lank, E., Goldberg, I.: Leading Johnny to water: designing for usability and trust. In: SOUPS 2015 (2015)"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"* Bai, W., Kim, D., Namara, M., Qian, Y., Kelley, P.G., Mazurek, M.L.: Balancing security and usability in encrypted email. IEEE Internet Comput. 21(3), 30\u201338 (2017)","DOI":"10.1109\/MIC.2017.57"},{"key":"19_CR12","unstructured":"* Bai, W., Namara, M., Qian, Y., Kelley, P.G., Mazurek, M.L., Kim, D.: An inconvenient trust: user attitudes toward security and usability tradeoffs for key-directory encryption systems. In: SOUPS 2016, pp. 113\u2013130 (2016)"},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"* Belk, M., Pamboris, A., Fidas, C., Katsini, C., Avouris, N., Samaras, G.: Sweet-spotting security and usability for intelligent graphical authentication mechanisms. In: WIMS, vol. 17, pp. 252\u2013259 (2017)","DOI":"10.1145\/3106426.3106488"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"* Benenson, Z., Lenzini, G., Oliveira, D., Parkin, S., Uebelacker, S.: Maybe poor Johnny really cannot encrypt: the case for a complexity theory for usable security. In: NSPW 2015, pp. 85\u201399 (2015)","DOI":"10.1145\/2841113.2841120"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"* Bhagavatula, R., Ur, B., Iacovino, K., Kywe, S.M., Cranor, L.F., Savvides, M.: Biometric authentication on iphone and android: usability, perceptions, and influences on adoption. In: USEC. Citeseer (2015)","DOI":"10.14722\/usec.2015.23003"},{"key":"19_CR16","unstructured":"* Bindu, C.S.: Secure usable authentication using strong pass text passwords. In: IJCNIS (2015)"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"* Bo\u0161njak, L., Brumen, B.: Examining security and usability aspects of knowledge-based authentication methods. In: 2019 MIPRO, pp. 1181\u20131186 (2019)","DOI":"10.23919\/MIPRO.2019.8756655"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"* Caputo, D.D., Pfleeger, S.L., Sasse, M.A., Ammann, P., Offutt, J., Deng, L.: Barriers to usable security? Three organizational case studies. IEEE Secur. Priv. 14(5), 22\u201332 (2016)","DOI":"10.1109\/MSP.2016.95"},{"key":"19_CR19","doi-asserted-by":"publisher","unstructured":"* Carbone, R., Ranise, S., Sciarretta, G.: Design and security assessment of usable multi-factor authentication and single sign-on solutions for mobile applications. In: Kosta, E., Pierson, J., Slamanig, D., Fischer-H\u00fcbner, S., Krenn, S. (eds.) Privacy and Identity 2018. IAICT, vol. 547, pp. 51\u201366. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-16744-8_4","DOI":"10.1007\/978-3-030-16744-8_4"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"* Colnago, J., Devlin, S., Oates, M., Swoopes, C., Bauer, L., Cranor, L.F., Christin, N.: \u201cit\u2019s not actually that horrible\u201d: exploring adoption of two-factor authentication at a university. In: CHI 2018 (2018)","DOI":"10.1145\/3173574.3174030"},{"key":"19_CR21","doi-asserted-by":"publisher","unstructured":"* Das, S., Dingman, A., Camp, L.J.: Why Johnny doesn\u2019t use two factor a two-phase usability study of the FIDO U2F security key. In: Meiklejohn, Sarah, Sako, Kazue (eds.) FC 2018. LNCS, vol. 10957, pp. 160\u2013179. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-662-58387-6_9","DOI":"10.1007\/978-3-662-58387-6_9"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"* Das, S., Russo, G., Dingman, A.C., Dev, J., Kenny, O., Camp, L.J.: A qualitative study on usability and acceptability of yubico security key. In: STAST 2017, pp. 28\u201339. ACM (2018)","DOI":"10.1145\/3167996.3167997"},{"key":"19_CR23","unstructured":"* Das, S., Wang, B., Tingle, Z., Camp, L.J.: Evaluating user perception of multi-factor authentication: a systematic review. arXiv preprint arXiv:1908.05901 (2019)"},{"key":"19_CR24","doi-asserted-by":"publisher","unstructured":"* Ebert, A., Marouane, C., Rott, B., Werner, M.: KeyPocket - improving security and usability for provider independent login architectures with mobile devices. In: Thuraisingham, Bhavani, Wang, XiaoFeng, Yegneswaran, Vinod (eds.) SecureComm 2015. LNICST, vol. 164, pp. 41\u201357. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-28865-9_3","DOI":"10.1007\/978-3-319-28865-9_3"},{"key":"19_CR25","unstructured":"* Fagan, M., Khan, M.M.H.: Why do they do what they do?: A study of what motivates users to (not) follow computer security advice. In: SOUPS 2016, pp. 59\u201375 (2016)"},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"* Feth, D.: User-centric security: optimization of the security-usability trade-off. In: ESEC\/FSE 2015, pp. 1034\u20131037 (2015)","DOI":"10.1145\/2786805.2803195"},{"key":"19_CR27","doi-asserted-by":"publisher","unstructured":"* Tryfonas, T., (ed.): HAS 2017. LNCS, vol. 10292. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-58460-7","DOI":"10.1007\/978-3-319-58460-7"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"* Feth, D., Polst, S.: Heuristics and models for evaluating the usability of security measures. In: MUC 2019, pp. 275\u2013285 (2019)","DOI":"10.1145\/3340764.3340789"},{"key":"19_CR29","doi-asserted-by":"crossref","unstructured":"* Fukumitsu, M., Hasegawa, S., Iwazaki, J., Sakai, M., Takahashi, D.: A proposal of a password manager satisfying security and usability by using the secret sharing and a personal server. In: AINA 2016, pp. 661\u2013668 (2016)","DOI":"10.1109\/AINA.2016.45"},{"key":"19_CR30","doi-asserted-by":"crossref","unstructured":"* Glass, B., Jenkinson, G., Liu, Y., Sasse, M.A., Stajano, F.: The usability canary in the security coal mine: a cognitive framework for evaluation and design of usable authentication solutions. arXiv preprint arXiv:1607.03417 (2016)","DOI":"10.14722\/eurousec.2016.23007"},{"key":"19_CR31","unstructured":"* Gordieiev, O., Kharchenko, V.S., Vereshchak, K.: Usable security versus secure usability: an assessment of attributes interaction. In: ICTERI (2017)"},{"key":"19_CR32","unstructured":"* Goudalo, W., Kolski, C.: Towards advanced enterprise information systems engineering. In: ICEIS 2016, pp. 400\u2013411 (2016)"},{"key":"19_CR33","doi-asserted-by":"crossref","unstructured":"* Green, M., Smith, M.: Developers are not the enemy!: The need for usable security apis. IEEE Secur. Priv. 14(5), 40\u201346 (2016)","DOI":"10.1109\/MSP.2016.111"},{"key":"19_CR34","doi-asserted-by":"crossref","unstructured":"* Hasan, L.A., Al-Sarayreh, K.T.: An integrated measurement model for evaluating usability attributes. In: IPAC 2015. ACM (2015)","DOI":"10.1145\/2816839.2816861"},{"key":"19_CR35","doi-asserted-by":"crossref","unstructured":"* Hausawi, Y.M., Allen, W.H.: Usable-security evaluation. In: HAS 2015 (2015)","DOI":"10.1007\/978-3-319-20376-8_30"},{"key":"19_CR36","doi-asserted-by":"publisher","unstructured":"* \u0130\u015fler, D., K\u00fcp\u00e7\u00fc, A., Coskun, A.: User perceptions of security and usability of mobile-based single password authentication and two-factor authentication. In: P\u00e9rez-Sol\u00e0, Cristina, Navarro-Arribas, Guillermo, Biryukov, Alex, Garcia-Alfaro, Joaquin (eds.) DPM\/CBT -2019. LNCS, vol. 11737, pp. 99\u2013117. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-31500-9_7","DOI":"10.1007\/978-3-030-31500-9_7"},{"key":"19_CR37","unstructured":"* Karapanos, N., Marforio, C., Soriente, C., Capkun, S.: Sound-proof: Usable two-factor authentication based on ambient sound. In: USENIX 2015 (2015)"},{"key":"19_CR38","doi-asserted-by":"crossref","unstructured":"* Katsini, C., Belk, M., Fidas, C., Avouris, N., Samaras, G.: Security and usability in knowledge-based user authentication: a review. PCI 16, 1\u20136 (2016)","DOI":"10.1145\/3003733.3003764"},{"key":"19_CR39","unstructured":"* Khan, H., Hengartner, U., Vogel, D.: Usability and security perceptions of implicit authentication: convenient, secure, sometimes annoying. In: SOUPS 2015, pp. 225\u2013239 (2015)"},{"key":"19_CR40","doi-asserted-by":"crossref","unstructured":"* Khodadadi, T., Islam, A.K.M.M., Baharun, S., Komaki, S.: Evaluation of recognition-based graphical password schemes in terms of usability and security attributes. Int. J. Electr. Comput. Eng. 6(6), 2939\u20132948 (2016)","DOI":"10.11591\/ijece.v6i6.11227"},{"key":"19_CR41","unstructured":"* Krombholz, K., Mayer, W., Schmiedecker, M., Weippl, E.: \u201c i have no idea what i\u2019m doing\u201d-on the usability of deploying $$\\{$$HTTPS$$\\}$$. In: USENIX 2017, pp. 1339\u20131356 (2017)"},{"key":"19_CR42","doi-asserted-by":"crossref","unstructured":"* Lerner, A., Zeng, E., Roesner, F.: Confidante: usable encrypted email: a case study with lawyers and journalists. In: EuroS&P 2017, pp. 385\u2013400 (2017)","DOI":"10.1109\/EuroSP.2017.41"},{"key":"19_CR43","doi-asserted-by":"publisher","unstructured":"* Ling, Z., Borgeest, M., Sano, C., Lin, S., Fadl, M., Yu, W., Fu, X., Zhao, W.: A case study of usable security: usability testing of android privacy enhancing keyboard. In: Ma, L., Khreishah, A., Zhang, Y., Yan, M. (eds.) WASA 2017. LNCS, vol. 10251, pp. 716\u2013728. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-60033-8_61","DOI":"10.1007\/978-3-319-60033-8_61"},{"key":"19_CR44","doi-asserted-by":"crossref","unstructured":"* Mayron, L.M.: Biometric authentication on mobile devices. IEEE Secur. Priv. 13, 70\u201373 (2015)","DOI":"10.1109\/MSP.2015.67"},{"key":"19_CR45","unstructured":"* McGregor, S.E., Charters, P., Holliday, T., Roesner, F.: Investigating the computer security practices and needs of journalists. In: USENIX 2015, pp. 399\u2013414 (2015)"},{"key":"19_CR46","doi-asserted-by":"crossref","unstructured":"* Melicher, W., Kurilova, D., Segreti, S.M., Kalvani, P., Shay, R., Ur, B., Bauer, L., Christin, N., Cranor, L.F., Mazurek, M.L.: Usability and security of text passwords on mobile devices. In: CHI 2016, pp. 527\u2013539 (2016)","DOI":"10.1145\/2858036.2858384"},{"key":"19_CR47","doi-asserted-by":"publisher","unstructured":"* Meng, W., Liu, Z.: TMGMap: designing touch movement-based geographical password authentication on smartphones. In: Su, C., Kikuchi, H. (eds.) ISPEC 2018. LNCS, vol. 11125, pp. 373\u2013390. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99807-7_23","DOI":"10.1007\/978-3-319-99807-7_23"},{"key":"19_CR48","doi-asserted-by":"crossref","unstructured":"* Merdano\u011flum, N., Onay Durdu, P.: A systematic mapping study of usability vs security. In: CEIT 2018. pp. 1\u20136 (2018)","DOI":"10.1109\/CEIT.2018.8751841"},{"key":"19_CR49","doi-asserted-by":"crossref","unstructured":"* Napoli, D.: Developing accessible and usable security (accus) heuristics. In: Extended Abstracts of the CHI 2018, pp. 1\u20136 (2018)","DOI":"10.1145\/3170427.3180292"},{"key":"19_CR50","doi-asserted-by":"publisher","unstructured":"* Naqvi, B., Seffah, A.: Interdependencies, Conflicts and trade-offs between security and usability: why and how should we engineer them? In: Moallem, A. (ed.) HCII 2019. LNCS, vol. 11594, pp. 314\u2013324. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22351-9_21","DOI":"10.1007\/978-3-030-22351-9_21"},{"key":"19_CR51","doi-asserted-by":"crossref","unstructured":"* Nwokedi, U.O., Onyimbo, B.A., Rad, B.B.: Usability and security in user interface design: a systematic literature review. Int. J. Inf. Technol. Comput. Sci. 8, 72\u201380 (2016)","DOI":"10.5815\/ijitcs.2016.05.08"},{"key":"19_CR52","doi-asserted-by":"publisher","unstructured":"* Oluwafemi, A.J., Feng, J.H.: Usability and security: a case study of emergency communication system authentication. In: Stephanidis, C. (ed.) HCII 2019. CCIS, vol. 1032, pp. 205\u2013210. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-23522-2_26","DOI":"10.1007\/978-3-030-23522-2_26"},{"key":"19_CR53","doi-asserted-by":"crossref","unstructured":"* Patil, A.D., De Meer, H.: Usability of it-security in smart grids. In: e-Energy 2018, pp. 393\u2013395. ACM (2018)","DOI":"10.1145\/3208903.3212036"},{"key":"19_CR54","unstructured":"* Qin, L., Lapets, A., Jansen, F., Flockhart, P., Albab, K.D., Globus-Harris, I., Roberts, S., Varia, M.: From usability to secure computing and back again. In: SOUPS 2019 (2019)"},{"key":"19_CR55","doi-asserted-by":"crossref","unstructured":"* Realpe, P.C., Collazos, C.A., Hurtado, J., Granollers, A.: A set of heuristics for usable security and user authentication. In: Interacci\u00f3n 2016, pp. 1\u20138. ACM (2016)","DOI":"10.1145\/2998626.2998662"},{"key":"19_CR56","unstructured":"* Reese, K., Smith, T., Dutson, J., Armknecht, J., Cameron, J., Seamons, K.: A usability study of five two-factor authentication methods. In: SOUPS 2019 (2019)"},{"key":"19_CR57","doi-asserted-by":"crossref","unstructured":"* Reynolds, J., Smith, T., Reese, K., Dickinson, L., Ruoti, S., Seamons, K.: A tale of two studies: the best and worst of yubikey usability. In: 2018 IEEE Symposium on Security and Privacy, pp. 872\u2013888 (2018)","DOI":"10.1109\/SP.2018.00067"},{"key":"19_CR58","doi-asserted-by":"crossref","unstructured":"* Ruoti, S., Andersen, J., Heidbrink, S., O\u2019Neill, M., Vaziripour, E., Wu, J., Zappala, D., Seamons, K.E.: \u201cwe\u2019re on the same page\u201d: a usability study of secure email using pairs of novice users. In: CHI 2016 (2016)","DOI":"10.1145\/2858036.2858400"},{"key":"19_CR59","doi-asserted-by":"crossref","unstructured":"* Ruoti, S., Andersen, J., Hendershot, T., Zappala, D., Seamons, K.E.: Private webmail 2.0: simple and easy-to-use secure email. In: UIST 2016 (2016)","DOI":"10.1145\/2984511.2984580"},{"key":"19_CR60","unstructured":"* Ruoti, S., Andersen, J., Monson, T., Zappala, D., Seamons, K.: A comparative usability study of key management in secure email. In: SOUPS 2018, pp. 375\u2013394 (2018)"},{"key":"19_CR61","doi-asserted-by":"crossref","unstructured":"* Ruoti, S., Roberts, B., Seamons, K.E.: Authentication melee: a usability analysis of seven web authentication systems. In: WWW 2015 (2015)","DOI":"10.1145\/2736277.2741683"},{"key":"19_CR62","doi-asserted-by":"crossref","unstructured":"* Ruoti, S., Seamons, K.E.: Johnny\u2019s journey toward usable secure email. IEEE Secur. Priv. 17(6), 72\u201376 (2019)","DOI":"10.1109\/MSEC.2019.2933683"},{"key":"19_CR63","doi-asserted-by":"crossref","unstructured":"* Sasse, A.: Scaring and bullying people into security won\u2019t work. IEEE Secur. Priv. 13(3), 80\u201383 (2015)","DOI":"10.1109\/MSP.2015.65"},{"key":"19_CR64","doi-asserted-by":"crossref","unstructured":"* Schwab, D., ALharbi, L., Nichols, O., Yang, L.: Picture passdoodle: usability study. In: IEEE Big Data Service 2018, pp. 293\u2013298 (2018)","DOI":"10.1109\/BigDataService.2018.00052"},{"key":"19_CR65","doi-asserted-by":"crossref","unstructured":"* Shay, R., et al.: A spoonful of sugar?: the impact of guidance and feedback on password-creation behavior. In: CHI 2015, pp. 2903\u20132912. ACM (2015)","DOI":"10.1145\/2702123.2702586"},{"key":"19_CR66","doi-asserted-by":"crossref","unstructured":"* Shirvanian, M., Saxena, N.: On the security and usability of crypto phones. In: ACSAC 2015, pp. 21\u201330 (2015)","DOI":"10.1145\/2818000.2818007"},{"key":"19_CR67","unstructured":"* Vaziripour, E., Wu, J., O\u2019Neill, M., Whitehead, J., Heidbrink, S., Seamons, K.E., Zappala, D.: Is that you, alice? A usability study of the authentication ceremony of secure messaging applications. In: SOUPS 2017 (2017)"},{"key":"19_CR68","doi-asserted-by":"crossref","unstructured":"* Wang, T., Ge, H., Chowdhury, O., Maji, H.K., Li, N.: On the security and usability of segment-based visual cryptographic authentication protocols. In: CCS 2016, pp. 603\u2013615 (2016)","DOI":"10.1145\/2976749.2978417"},{"key":"19_CR69","doi-asserted-by":"crossref","unstructured":"* Weber, S., Harbach, M., Smith, M.: Participatory design for security-related user interfaces. In: USEC 2015, p. 15 (2015)","DOI":"10.14722\/usec.2015.23011"},{"key":"19_CR70","doi-asserted-by":"crossref","unstructured":"* Wolf, F., Kuber, R., Aviv, A.J.: \u201cpretty close to a must-have\u201d balancing usability desire and security concern in biometric adoption. In: CHI 2019, pp. 1\u201312 (2019)","DOI":"10.1145\/3290605.3300381"},{"issue":"2","key":"19_CR71","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77\u2013101 (2006)","journal-title":"Qual. Res. Psychol."},{"issue":"194","key":"19_CR72","first-page":"4","volume":"189","author":"J Brooke","year":"1996","unstructured":"Brooke, J.: Sus-a quick and dirty usability scale. Usability Eval. Ind. 189(194), 4\u20137 (1996)","journal-title":"Usability Eval. Ind."},{"key":"19_CR73","doi-asserted-by":"crossref","unstructured":"Das, S., Dingman, A., Camp, L.J.: Why Johnny doesn\u2019t use two factor a two-phase usability study of the FIDO U2F security key. In: FC 2018 (2018)","DOI":"10.1007\/978-3-662-58387-6_9"},{"key":"19_CR74","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2018.01.016","volume":"75","author":"S Furnell","year":"2018","unstructured":"Furnell, S., Esmael, R., Yang, W., Li, N.: Enhancing security behaviour by supporting the user. Comput. Secur. 75, 1\u20139 (2018)","journal-title":"Comput. Secur."},{"key":"19_CR75","unstructured":"He, W., Golla, M., Padhi, R., Ofek, J., D\u00fcrmuth, M., Fernandes, E., Ur, B.: Rethinking access control and authentication for the home internet of things (IoT). In: USENIX 2018, pp. 255\u2013272 (2018)"},{"key":"19_CR76","unstructured":"Jesson, J., Matheson, L., Lacey, F.M.: Doing Your Literature Review: Traditional and Systematic Techniques. Sage, London (2011)"},{"key":"19_CR77","unstructured":"Khan, H., Hengartner, U., Vogel, D.: Usability and security perceptions of implicit authentication: convenient, secure, sometimes annoying. In: SOUPS 2015, pp. 225\u2013239 (2015)"},{"key":"19_CR78","unstructured":"Kitchenham, B.: Procedures for performing systematic reviews. Keele, UK, Keele University 33, 1\u201326 (2004)"},{"issue":"10","key":"19_CR79","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/TC.2017.2703808","volume":"66","author":"S Marchal","year":"2017","unstructured":"Marchal, S., Armano, G., Gr\u00f6ndahl, T., Saari, K., Singh, N., Asokan, N.: Off-the-hook: an efficient and usable client-side phishing prevention application. IEEE Trans. Comput. 66(10), 1717\u20131733 (2017)","journal-title":"IEEE Trans. Comput."},{"key":"19_CR80","doi-asserted-by":"crossref","unstructured":"Meline, T.: Selecting studies for systematic review: Inclusion and exclusion criteria. Contemporary issues in communication science and disorders 33(21\u201327) (2006)","DOI":"10.1044\/cicsd_33_S_21"},{"key":"19_CR81","unstructured":"Whitten, A., Tygar, J.D.: Why Johnny can\u2019t encrypt: a usability evaluation of PGP 5.0. In: USENIX 1999, vol. 348, pp. 169\u2013184 (1999)"},{"key":"19_CR82","doi-asserted-by":"crossref","unstructured":"Wohlin, C.: Guidelines for snowballing in systematic literature studies and a replication in software engineering. In: EASE 2014. Citeseer (2014)","DOI":"10.1145\/2601248.2601268"}],"container-title":["IFIP Advances in Information and Communication Technology","Human Aspects of Information Security and Assurance"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57404-8_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,22]],"date-time":"2024-08-22T12:41:50Z","timestamp":1724330510000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-57404-8_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030574031","9783030574048"],"references-count":82,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57404-8_19","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"21 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAISA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Human Aspects of Information Security and Assurance","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mytilene, Lesbos","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"haisa2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.haisa.org\/?page=home","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"63% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.79","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The symposium was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}