{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T20:36:02Z","timestamp":1759091762832,"version":"3.41.0"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030773915"},{"type":"electronic","value":"9783030773922"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-77392-2_20","type":"book-chapter","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T23:06:05Z","timestamp":1625267165000},"page":"310-325","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Understanding User\u2019s Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account"],"prefix":"10.1007","author":[{"given":"Huzeyfe","family":"Kocabas","sequence":"first","affiliation":[]},{"given":"Swapnil","family":"Nandy","sequence":"additional","affiliation":[]},{"given":"Tanjina","family":"Tamanna","sequence":"additional","affiliation":[]},{"given":"Mahdi Nasrullah","family":"Al-Ameen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"doi-asserted-by":"publisher","unstructured":"Ahmed, S.I., Guha, S., Rifat, M.R., Shezan, F.H., Dell, N.: Privacy in repair: an analysis of the privacy challenges surrounding broken digital artifacts in Bangladesh. In: Proceedings of the Eighth International Conference on Information and Communication Technologies and Development, ICTD 2016, pp. 11:1\u201311:10. ACM, New York (2016). https:\/\/doi.org\/10.1145\/2909609.2909661","key":"20_CR1","DOI":"10.1145\/2909609.2909661"},{"doi-asserted-by":"publisher","unstructured":"Ahmed, S.I., Haque, M.R., Chen, J., Dell, N.: Digital privacy challenges with shared mobile phone use in Bangladesh. In: Proceedings of the ACM Human-Computer Interaction 1(CSCW), 17:1\u201317:20, December 2017. https:\/\/doi.org\/10.1145\/3134652","key":"20_CR2","DOI":"10.1145\/3134652"},{"unstructured":"Al-Ameen, M.N., Fatema, K., Wright, M., Scielzo, S.: The impact of cues and user interaction on the memorability of system-assigned recognition-based graphical passwords. In: Eleventh Symposium on Usable Privacy and Security (SOUPS 2015), pp. 185\u2013196 (2015)","key":"20_CR3"},{"doi-asserted-by":"publisher","unstructured":"Al-Ameen, M.N., Tamanna, T., Nandy, S., Ahsan, M.A.M., Chandra, P., Ahmed, S.I.: We don\u2019t give a second thought before providing our information: Understanding users\u2019 perceptions of information collection by apps in urban Bangladesh. In: Proceedings of the 3rd ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS 2020), pp. 32\u201343. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3378393.3402244","key":"20_CR4","DOI":"10.1145\/3378393.3402244"},{"issue":"4","key":"20_CR5","first-page":"605","volume":"29","author":"MN Al-Ameen","year":"2017","unstructured":"Al-Ameen, M.N., Wright, M.: Exploring the potential of Geopass: a geographic location-password scheme. Interacting Computs. 29(4), 605\u2013627 (2017)","journal-title":"Interacting Computs."},{"key":"20_CR6","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.ijhcs.2015.05.005","volume":"82","author":"M Alsharnouby","year":"2015","unstructured":"Alsharnouby, M., Alaca, F., Chiasson, S.: Why phishing still works: user strategies for combating phishing attacks. Int. J. Hum.-Comput. Stud. 82, 69\u201382 (2015)","journal-title":"Int. J. Hum.-Comput. Stud."},{"key":"20_CR7","volume-title":"Understanding Your Users: A Practical Guide to User Research Methods","author":"K Baxter","year":"2015","unstructured":"Baxter, K., Courage, C., Caine, K.: Understanding Your Users: A Practical Guide to User Research Methods, 2nd edn. Morgan Kaufmann Publishers Inc., San Francisco (2015)","edition":"2"},{"issue":"4","key":"20_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2333112.2333114","volume":"44","author":"R Biddle","year":"2012","unstructured":"Biddle, R., Chiasson, S., Van Oorschot, P.C.: Graphical passwords: learning from the first twelve years. ACM Comput. Surv. (CSUR) 44(4), 1\u201341 (2012)","journal-title":"ACM Comput. Surv. (CSUR)"},{"unstructured":"Boyatzis, R.E.: Transforming Qualitative Information: Thematic Analysis and Code Development. Sage, Thousand Oaks (1998)","key":"20_CR9"},{"issue":"2","key":"20_CR10","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77\u2013101 (2006)","journal-title":"Qual. Res. Psychol."},{"unstructured":"Chen, J., Paik, M., McCabe, K.: Exploring internet security perceptions and practices in urban ghana. In: Proceedings of the Tenth USENIX Conference on Usable Privacy and Security, SOUPS 2014, pp. 129\u2013142. USENIX Association, USA (2014)","key":"20_CR11"},{"key":"20_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.deveng.2017.12.002","volume":"3","author":"C Cobb","year":"2018","unstructured":"Cobb, C., Sudar, S., Reiter, N., Anderson, R., Roesner, F., Kohno, T.: Computer security for data collection technologies. Dev. Eng. 3, 1\u201311 (2018)","journal-title":"Dev. Eng."},{"doi-asserted-by":"publisher","unstructured":"Crabtree, A., Tolmie, P., Knight, W.: Repacking \u2018privacy\u2019 for a networked world. Comput. Supported Coop. Work 26(4\u20136), 453\u2013488 (2017). https:\/\/doi.org\/10.1007\/s10606-017-9276-y","key":"20_CR13","DOI":"10.1007\/s10606-017-9276-y"},{"doi-asserted-by":"publisher","unstructured":"Dodson, L.L., Sterling, S.R., Bennett, J.K.: Minding the gaps: Cultural, technical and gender-based barriers to mobile use in oral-language berber communities in morocco. In: Proceedings of the Sixth International Conference on Information and Communication Technologies and Development: Full Papers - Volume 1, ICTD 2013, pp. 79\u201388. Association for Computing Machinery, New York (2013). https:\/\/doi.org\/10.1145\/2516604.2516626","key":"20_CR14","DOI":"10.1145\/2516604.2516626"},{"doi-asserted-by":"crossref","unstructured":"Eldefrawy, M.H., Alghathbar, K., Khan, M.K.: OTP-based two-factor authentication using mobile phones. In: Proceedings of the 2011 Eighth International Conference on Information Technology: New Generations, ITNG 2011, pp. 327\u2013331. IEEE Computer Society, USA (2011). https:\/\/doi.org\/10.1109\/ITNG.2011.64","key":"20_CR15","DOI":"10.1109\/ITNG.2011.64"},{"doi-asserted-by":"publisher","unstructured":"Haque, S.M.T., et al.: Privacy vulnerabilities in public digital service centers in Dhaka, Bangladesh. In: Proceedings of the 2020 International Conference on Information and Communication Technologies and Development, ICTD 2020. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3392561.3394642","key":"20_CR16","DOI":"10.1145\/3392561.3394642"},{"doi-asserted-by":"crossref","unstructured":"Haque, S.T., Wright, M., Scielzo, S.: A study of user password strategy for multiple accounts. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy, CODASPY 2013, pp. 173\u2013176. Association for Computing Machinery, New York (2013). https:\/\/doi.org\/10.1145\/2435349.2435373","key":"20_CR17","DOI":"10.1145\/2435349.2435373"},{"unstructured":"Ion, I., Reeder, R., Consolvo, S.: \u201c...no one can hack my mind\": Comparing expert and non-expert security practices. In: Proceedings of the Eleventh USENIX Conference on Usable Privacy and Security, SOUPS 2015, pp. 327\u2013346. USENIX Association, USA (2015)","key":"20_CR18"},{"doi-asserted-by":"crossref","unstructured":"Just, M., Aspinall, D.: Personal choice and challenge questions: a security and usability assessment. In: Proceedings of the 5th Symposium on Usable Privacy and Security pp. 1\u201311 (2009)","key":"20_CR19","DOI":"10.1145\/1572532.1572543"},{"unstructured":"Karunakaran, S., Thomas, K., Bursztein, E., Comanescu, O.: Data breaches: user comprehension, expectations, and concerns with handling exposed data. In: Symposium on Usable Privacy and Security, pp. 217\u2013234 (2018)","key":"20_CR20"},{"key":"20_CR21","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/978-3-319-89656-4_29","volume-title":"Advances in Artificial Intelligence","author":"M King","year":"2018","unstructured":"King, M., Alhadidi, D., Cook, P.: Text-based detection of unauthorized users of social media accounts. In: Bagheri, E., Cheung, J.C.K. (eds.) Canadian AI 2018. LNCS (LNAI), vol. 10832, pp. 292\u2013297. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-89656-4_29"},{"doi-asserted-by":"crossref","unstructured":"Kothari, V., Koppel, R., Blythe, J., Smith, S.: Password logbooks and what their amazon reviews reveal about their users\u2019 motivations, beliefs, and behaviors. In: European Workshop on Usable Security (2017)","key":"20_CR22","DOI":"10.14722\/eurousec.2017.23018"},{"unstructured":"Lastdrager, E., Gallardo, I.C., Hartel, P., Junger, M.: How effective is anti-phishing training for children? In: Symposium on Usable Privacy and Security, pp. 229\u2013239 (2017)","key":"20_CR23"},{"doi-asserted-by":"crossref","unstructured":"Marques, D., Guerreiro, T., Carri\u00e7o, L., Beschastnikh, I., Beznosov, K.: Vulnerability & blame: making sense of unauthorized access to smartphones. In: Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 1\u201313 (2019)","key":"20_CR24","DOI":"10.1145\/3290605.3300819"},{"doi-asserted-by":"crossref","unstructured":"Mayer, P., Volkamer, M.: Addressing misconceptions about password security effectively. In: Workshop on Socio-Technical Aspects in Security and Trust, pp. 16\u201327 (2018)","key":"20_CR25","DOI":"10.1145\/3167996.3167998"},{"unstructured":"Miller, R.: That time i got locked out of my google account for a month, 22 December 2017. https:\/\/techcrunch.com\/2017\/12\/22\/that-time-i-got-locked-out-of-my-google-account-for-a-month\/","key":"20_CR26"},{"key":"20_CR27","first-page":"119","volume":"79","author":"H Nissenbaum","year":"2004","unstructured":"Nissenbaum, H.: Privacy as contextual integrity. Wash L. Rev. 79, 119 (2004)","journal-title":"Wash L. Rev."},{"key":"20_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/978-3-540-40956-4_8","volume-title":"Privacy Enhancing Technologies","author":"AS Patrick","year":"2003","unstructured":"Patrick, A.S., Kenny, S.: From privacy legislation to interface design: implementing information privacy in human-computer interactions. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 107\u2013124. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-40956-4_8"},{"doi-asserted-by":"crossref","unstructured":"Redmiles, E.M.: \u201cShould i worry?\u201d a cross-cultural examination of account security incident response. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 920\u2013934. IEEE (2019)","key":"20_CR29","DOI":"10.1109\/SP.2019.00059"},{"unstructured":"Ruoti, S., Monson, T., Wu, J., Zappala, D., Seamons, K.: Weighing context and trade-offs: how suburban adults selected their online security posture. In: Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), pp. 211\u2013228 (2017)","key":"20_CR30"},{"unstructured":"Sambasivan, N., et al.: \u201cPrivacy is not for me, it\u2019s for those rich women\u201d: performative privacy practices on mobile phones by women in south Asia. In: Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), pp. 127\u2013142. USENIX Association, Baltimore, August 2018. https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/sambasivan","key":"20_CR31"},{"doi-asserted-by":"publisher","unstructured":"Sambasivan, N., Rangaswamy, N., Cutrell, E., Nardi, B.: Ubicomp4d: Infrastructure and interaction for international development-the case of urban Indian slums. In: Proceedings of the 11th International Conference on Ubiquitous Computing, UbiComp 2009, pp. 155\u2013164. Association for Computing Machinery, New York (2009). https:\/\/doi.org\/10.1145\/1620545.1620570","key":"20_CR32","DOI":"10.1145\/1620545.1620570"},{"doi-asserted-by":"publisher","unstructured":"Seng, S., Kocabas, H., Al-Ameen, M.N., Wright, M.: Poster: Understanding user\u2019s decision to interact with potential phishing posts on facebook using a vignette study. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, CCS 2019, pp. 2617\u20132619. Association for Computing Machinery, New York (2019). https:\/\/doi.org\/10.1145\/3319535.3363270","key":"20_CR33","DOI":"10.1145\/3319535.3363270"},{"issue":"3","key":"20_CR34","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3183341","volume":"21","author":"E Stobert","year":"2018","unstructured":"Stobert, E., Biddle, R.: The password life cycle. ACM Trans. Privacy Secur. 21(3), 1\u201332 (2018)","journal-title":"ACM Trans. Privacy Secur."},{"key":"20_CR35","first-page":"63","volume":"3","author":"O Sukwong","year":"2010","unstructured":"Sukwong, O., Kim, H., Hoe, J.: Commercial antivirus software effectiveness: an empirical study. Computer 3, 63\u201370 (2010)","journal-title":"Computer"},{"doi-asserted-by":"publisher","unstructured":"Sultana, S., et al.: Understanding the sensibility of social media use and privacy with Bangladeshi facebook group users. In: Proceedings of the 3rd ACM SIGCAS Conference on Computing and Sustainable Societies (COMPASS 2020), pp. 317\u2013318. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3378393.3402235","key":"20_CR36","DOI":"10.1145\/3378393.3402235"},{"doi-asserted-by":"publisher","unstructured":"Vashistha, A., Anderson, R., Mare, S.: Examining security and privacy research in developing regions. In: Proceedings of the 1st ACM SIGCAS Conference on Computing and Sustainable Societies, COMPASS 2018 (COMPASS 2018). Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3209811.3209818","key":"20_CR37","DOI":"10.1145\/3209811.3209818"},{"unstructured":"Weiner, A.J., Ne\u2019man, R.: Fallback identity authentication techniques, 3 October 2017, US Patent 9,781,105","key":"20_CR38"},{"unstructured":"Williams, C.: 620 million accounts stolen from 16 hacked websites now for sale on dark web, seller boasts, 11 February 2019. https:\/\/www.theregister.co.uk\/2019\/02\/11\/620_million_hacked_accounts_dark_web\/","key":"20_CR39"},{"doi-asserted-by":"crossref","unstructured":"Zhang-Kennedy, L., Chiasson, S., van Oorschot, P.: Revisiting password rules: facilitating human management of passwords. In: 2016 APWG Symposium on Electronic Crime Research (eCrime) pp. 81\u201390. IEEE, Toronto (2016)","key":"20_CR40","DOI":"10.1109\/ECRIME.2016.7487945"},{"unstructured":"Zou, Y., Mhaidli, A.H., McCall, A., Schaub, F.: \u201cI\u2019ve got nothing to lose\u201d: consumers\u2019 risk perceptions and protective actions after the equifax data breach. In: Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018), pp. 197\u2013216 (2018)","key":"20_CR41"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-77392-2_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:12:21Z","timestamp":1751494341000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-77392-2_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030773915","9783030773922"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-77392-2_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}