{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T20:44:27Z","timestamp":1760647467292,"version":"3.41.0"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030773915"},{"type":"electronic","value":"9783030773922"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-77392-2_24","type":"book-chapter","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T23:06:05Z","timestamp":1625267165000},"page":"369-390","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["The Effectiveness of Video Messaging Campaigns to Use 2FA"],"prefix":"10.1007","author":[{"given":"Elham","family":"Al Qahtani","sequence":"first","affiliation":[]},{"given":"Lipsarani","family":"Sahoo","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Shehab","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"key":"24_CR1","unstructured":"Miami University: Two-factor authentication is a must for all employees (2015). http:\/\/www.shorturl.at\/qB479. Accessed 26 Dec 2019"},{"key":"24_CR2","unstructured":"Carnegie Mellon University: Two-factor authentication (2fa) (2016). http:\/\/www.shorturl.at\/AE149. Accessed 26 Dec 2019"},{"key":"24_CR3","unstructured":"Duo (2019). https:\/\/duo.com\/. Accessed 26 Dec 2019"},{"key":"24_CR4","unstructured":"Fort Hays State University: duo security (2019). http:\/\/www.shorturl.at\/CJQ02. Accessed 26 Dec 2019"},{"key":"24_CR5","unstructured":"Students, faculty reflect on duo security six months after introduction (2019). http:\/\/www.shorturl.at\/opyA8. Accessed 26 Dec 2019"},{"key":"24_CR6","unstructured":"UNC Charlotte: Duo two factor authentication (2019). http:\/\/www.shorturl.at\/eFP13. Accessed 26 Dec 2019"},{"issue":"3","key":"24_CR7","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1080\/0144929X.2012.708787","volume":"33","author":"J Abawajy","year":"2014","unstructured":"Abawajy, J.: User preference of cyber security awareness delivery methods. Behav. Inf. Technol. 33(3), 237\u2013248 (2014)","journal-title":"Behav. Inf. Technol."},{"key":"24_CR8","unstructured":"Ackerman, P.: Impediments to adoption of two-factor authentication by home end-users. SANS Institute InfoSec Reading Room (2014)"},{"key":"24_CR9","doi-asserted-by":"crossref","unstructured":"Al Qahtani, E., Javed, Y., Lipford, H., Shehab, M.: Do women in conservative societies (not) follow smartphone security advice? A case study of Saudi Arabia and Pakistan (2020)","DOI":"10.1109\/EuroSPW51379.2020.00028"},{"key":"24_CR10","unstructured":"Al Qahtani, E., Shehab, M., Aljohani, A.: The effectiveness of fear appeals in increasing smartphone locking behavior among Saudi Arabians. In: Fourteenth Symposium on Usable Privacy and Security ($$\\{$$SOUPS$$\\}$$ 2018), pp. 31\u201346 (2018)"},{"issue":"11","key":"24_CR11","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1080\/10447318.2017.1306765","volume":"33","author":"Y Albayram","year":"2017","unstructured":"Albayram, Y., Khan, M.M.H., Fagan, M.: A study on designing video tutorials for promoting security features: a case study in the context of two-factor authentication (2fa). Int. J. Hum.-Comput. Interact. 33(11), 927\u2013942 (2017)","journal-title":"Int. J. Hum.-Comput. Interact."},{"key":"24_CR12","unstructured":"Albayram, Y., Khan, M.M.H., Jensen, T., Nguyen, N.: \u201c... better to use a lock screen than to worry about saving a few seconds of time\u201d: effect of fear appeal in the context of smartphone locking behavior. In: Thirteenth Symposium on Usable Privacy and Security ($$\\{$$SOUPS$$\\}$$ 2017), pp. 49\u201363 (2017)"},{"key":"24_CR13","doi-asserted-by":"publisher","unstructured":"Althobaiti, M., Mayhew, P.: Security and usability of authenticating process of online banking: user experience study, vol. 2014, pp. 1\u20136, October 2014. https:\/\/doi.org\/10.1109\/CCST.2014.6986978","DOI":"10.1109\/CCST.2014.6986978"},{"key":"24_CR14","unstructured":"Bada, M., Sasse, A.M., Nurse, J.R.: Cyber security awareness campaigns: why do they fail to change behaviour? arXiv preprint arXiv:1901.02672 (2019)"},{"issue":"1","key":"24_CR15","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1111\/j.1467-839X.2004.00137.x","volume":"7","author":"BS Cheng","year":"2004","unstructured":"Cheng, B.S., Chou, L.F., Wu, T.Y., Huang, M.P., Farh, J.L.: Paternalistic leadership and subordinate responses: establishing a leadership model in Chinese organizations. Asian J. Soc. Psychol. 7(1), 89\u2013117 (2004)","journal-title":"Asian J. Soc. Psychol."},{"key":"24_CR16","first-page":"209","volume":"20","author":"B Cheng","year":"2003","unstructured":"Cheng, B., Chou, L., Huang, M., Farh, L.J., Peng, S.: A triad model of paternalistic leadership: evidence from business organizations in Mainland China. Indigenous Psychol. Res. Chin. Soc. 20, 209 (2003)","journal-title":"Indigenous Psychol. Res. Chin. Soc."},{"key":"24_CR17","doi-asserted-by":"publisher","unstructured":"Colnago, J., et al.: \u201cIt\u2019s not actually that horrible\u201d: exploring adoption of two-factor authentication at a university. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. CHI 2018. Association for Computing Machinery, New York (2018). https:\/\/doi.org\/10.1145\/3173574.3174030","DOI":"10.1145\/3173574.3174030"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Das, S., Russo, G., Dingman, A., Dev, J., Kenny, O., Camp, L.: A qualitative study on usability and acceptability of Yubico security key, December 2017","DOI":"10.1145\/3167996.3167997"},{"key":"24_CR19","unstructured":"Davis, J.: List of websites and whether or not they support 2fa. twofactorauth.org (2018). https:\/\/twofactorauth.org\/. Accessed May 2019"},{"key":"24_CR20","doi-asserted-by":"crossref","unstructured":"Dutson, J., Allen, D., Eggett, D., Seamons, K.: Don\u2019t punish all of us: measuring user attitudes about two-factor authentication. In: 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 119\u2013128. IEEE (2019)","DOI":"10.1109\/EuroSPW.2019.00020"},{"key":"24_CR21","unstructured":"Fagan, M., Khan, M.M.H.: Why do they do what they do?: a study of what motivates users to (not) follow computer security advice. In: Twelfth Symposium on Usable Privacy and Security ($$\\{$$SOUPS$$\\}$$ 2016), pp. 59\u201375 (2016)"},{"key":"24_CR22","doi-asserted-by":"crossref","unstructured":"Harbach, M., Hettig, M., Weber, S., Smith, M.: Using personal examples to improve risk communication for security & privacy decisions. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2647\u20132656. ACM (2014)","DOI":"10.1145\/2556288.2556978"},{"key":"24_CR23","doi-asserted-by":"crossref","unstructured":"Herley, C.: So long, and no thanks for the externalities: the rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop, pp. 133\u2013144. ACM (2009)","DOI":"10.1145\/1719030.1719050"},{"key":"24_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"906","DOI":"10.1007\/978-3-540-73111-5_100","volume-title":"Human-Computer Interaction. HCI Applications and Services","author":"D-L Huang","year":"2007","unstructured":"Huang, D.-L., Rau, P.-L.P., Salvendy, G.: A survey of factors influencing people\u2019s perception of information security. In: Jacko, J.A. (ed.) HCI 2007. LNCS, vol. 4553, pp. 906\u2013915. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73111-5_100"},{"key":"24_CR25","unstructured":"Kitten, T.: Linkedin: Hashed passwords breached. inforisktoday.com, June 2012. https:\/\/tinyurl.com\/y2oqkxyx. Accessed May 2019"},{"key":"24_CR26","unstructured":"McCandless, D.: World\u2019s biggest data breaches & hacks. informationisbeautiful.net, April 2019. https:\/\/tinyurl.com\/ycho2xx4. Accessed May 2019"},{"issue":"5","key":"24_CR27","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1108\/09685220710831107","volume":"15","author":"MR Pattinson","year":"2007","unstructured":"Pattinson, M.R., Anderson, G.: How well are information risks being communicated to your computer end-users? Inf. Manag. Comput. Secur. 15(5), 362\u2013371 (2007)","journal-title":"Inf. Manag. Comput. Secur."},{"key":"24_CR28","doi-asserted-by":"crossref","unstructured":"Petsas, T., Tsirantonakis, G., Athanasopoulos, E., Ioannidis, S.: Two-factor authentication: is the world ready?: quantifying 2fa adoption. In: Proceedings of the Eighth European Workshop on System Security, p. 4. ACM (2015)","DOI":"10.1145\/2751323.2751327"},{"key":"24_CR29","unstructured":"Redmiles, E.M., Liu, E., Mazurek, M.L.: You want me to do what? A design study of two-factor authentication messages. In: SOUPS (2017)"},{"key":"24_CR30","unstructured":"Reese, K., Smith, T., Dutson, J., Armknecht, J., Cameron, J., Seamons, K.: A usability study of five two-factor authentication methods. In: Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, August 2019. https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/reese"},{"key":"24_CR31","doi-asserted-by":"crossref","unstructured":"Reynolds, J., Smith, T., Reese, K., Dickinson, L., Ruoti, S., Seamons, K.: A tale of two studies: the best and worst of Yubikey usability. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 872\u2013888. IEEE (2018)","DOI":"10.1109\/SP.2018.00067"},{"key":"24_CR32","unstructured":"Salvendy, G.: Human factors and Ergonomics. Lawrence Erlbaum Associates (1999)"},{"key":"24_CR33","unstructured":"Ur, B., et al.: \u201cI added \u2018!\u2019 at the end to make it secure\u201d: observing password creation in the lab. In: Eleventh Symposium On Usable Privacy and Security ($$\\{$$SOUPS$$\\}$$ 2015), pp. 123\u2013140 (2015)"},{"key":"24_CR34","doi-asserted-by":"publisher","first-page":"357","DOI":"10.3389\/fpsyg.2018.00357","volume":"9","author":"H Wang","year":"2018","unstructured":"Wang, H., Guan, B.: The positive effect of authoritarian leadership on employee performance: the moderating role of power distance. Front. Psychol. 9, 357 (2018)","journal-title":"Front. Psychol."},{"issue":"3","key":"24_CR35","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1016\/j.intcom.2009.10.001","volume":"22","author":"CS Weir","year":"2010","unstructured":"Weir, C.S., Douglas, G., Richardson, T., Jack, M.: Usable security: user preferences for authentication methods in ebanking and the effects of experience. Interact. Comput. 22(3), 153\u2013164 (2010)","journal-title":"Interact. Comput."}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-77392-2_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:36:14Z","timestamp":1751495774000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-77392-2_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030773915","9783030773922"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-77392-2_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}