{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T22:40:07Z","timestamp":1751755207651,"version":"3.41.0"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030808648"},{"type":"electronic","value":"9783030808655"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-80865-5_9","type":"book-chapter","created":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T10:08:41Z","timestamp":1625566121000},"page":"126-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["What Parts of Usable Security Are Most Important to Users?"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2084-9119","authenticated-orcid":false,"given":"Joakim","family":"K\u00e4vrestad","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0984-7542","authenticated-orcid":false,"given":"Steven","family":"Furnell","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5962-9995","authenticated-orcid":false,"given":"Marcus","family":"Nohlberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,7]]},"reference":[{"key":"9_CR1","unstructured":"Huskaj, G., Wilson, R.L.: An anticipatory ethical analysis of offensive cyberspace operations. In: Cruz, T., Simoes, P. (eds.) In: Proceedings of the 15th International Conference on Cyber Warfare and Security. Academic Conferences and Publishing International Ltd. (2020)"},{"issue":"3","key":"9_CR2","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/j.cose.2004.01.012","volume":"23","author":"C Vroom","year":"2004","unstructured":"Vroom, C., Von Solms, R.: Towards information security behavioural compliance. Comput. Secur. 23(3), 191\u2013198 (2004)","journal-title":"Comput. Secur."},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Al Sabbagh, B., Kowalski, S.: ST(CS)2 - featuring socio-technical cyber security warning systems. In: Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp. 312\u2013316 (2012)","DOI":"10.1109\/CyberSec.2012.6246110"},{"key":"9_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-642-41924-9_23","volume-title":"Conceptual Modeling","author":"E Paja","year":"2013","unstructured":"Paja, E., Dalpiaz, F., Giorgini, P.: Managing security requirements conflicts in socio-technical systems. In: Ng, W., Storey, V.C., Trujillo, J.C. (eds.) ER 2013. LNCS, vol. 8217, pp. 270\u2013283. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41924-9_23"},{"key":"9_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2018.01.016","volume":"75","author":"S Furnell","year":"2018","unstructured":"Furnell, S., Esmael, R., Yang, W., Li, N.: Enhancing security behaviour by supporting the user. Comput. Secur. 75, 1\u20139 (2018)","journal-title":"Comput. Secur."},{"key":"9_CR6","unstructured":"Cybint: 15 alarming cyber security facts and stats (2020). https:\/\/www.cybintsolutions.com\/cyber-security-facts-stats\/"},{"key":"9_CR7","unstructured":"EC-Council (2019). https:\/\/blog.eccouncil.org\/the-top-types-of-cybersecurity-attacks-of-2019-till-date\/"},{"key":"9_CR8","unstructured":"Soare, B.: Vectors of attack (2020). https:\/\/heimdalsecurity.com\/blog\/vectors-of-attack\/"},{"key":"9_CR9","unstructured":"Whitten, A., Tygar, J.D.: Why Johnny can\u2019t encrypt: a usability evaluation of PGP 5.0. In: USENIX Security Symposium, vol. 348, pp. 169\u2013184 (1999)"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Aljahdali, H.M., Poet, R.: The affect of familiarity on the Usability of Recognition-based graphical Password Cross cultural Study Between Saudi Arabia and the United Kingdom. In: IEEE International Conference on Trust Security and Privacy in Computing and Communications, pp. 1528\u20131534","DOI":"10.1109\/TrustCom.2013.187"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Alsaiari, H., Papadaki, M., Dowland, P., Furnell, S.: Graphical one-time password (GOTPass): a usability evaluation. Inf. Secur. J. 25(1\u20133), 94\u2013108 (2015)","DOI":"10.1080\/19393555.2016.1179374"},{"key":"9_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-662-58387-6_9","volume-title":"Financial Cryptography and Data Security","author":"S Das","year":"2018","unstructured":"Das, S., Dingman, A., Camp, L.J.: Why Johnny doesn\u2019t use two factor a two-phase usability study of the FIDO U2F security key. In: Meiklejohn, S., Sako, K. (eds.) FC 2018. LNCS, vol. 10957, pp. 160\u2013179. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-662-58387-6_9"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th international conference on World Wide Web, pp. 657\u2013666. ACM (2021)","DOI":"10.1145\/1242572.1242661"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Benenson, Z., Lenzini, G., Oliveira, D., Parkin, S., Uebelacker, S.: Maybe poor Johnny really cannot encrypt: the case for a complexity theory for usable security. In: NSPW 2015, pp. 85\u201399 (2015)","DOI":"10.1145\/2841113.2841120"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Lerner, A., Zeng, E., Roesner, F.: Confidante: usable encrypted email: a case study with lawyers and journalists. In: 2017 IEEE European Symposium on Security and Privacy (EuroS&P), pp. 385\u2013400 (2017)","DOI":"10.1109\/EuroSP.2017.41"},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.cosrev.2019.03.002","volume":"33","author":"S Chaudhary","year":"2019","unstructured":"Chaudhary, S., Schafeitel-T\u00e4htinen, T., Helenius, M., Berki, E.: Usability, security and trust in password managers: a quest for user-centric properties and features. Comput. Sci. Rev. 33, 69\u201390 (2019)","journal-title":"Comput. Sci. Rev."},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Haga, W.J., Zviran, M.: Question-and-answer passwords - an empirical-evaluation. Inf. Syst. 16(3), 335\u2013343 (1991)","DOI":"10.1016\/0306-4379(91)90005-T"},{"issue":"1","key":"9_CR18","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/00223980.1975.9915803","volume":"91","author":"RW Rogers","year":"1975","unstructured":"Rogers, R.W.: A protection motivation theory of fear appeals and attitude change1. J. Psychol. 91(1), 93\u2013114 (1975)","journal-title":"J. Psychol."},{"key":"9_CR19","series-title":"SSSP Springer Series in Social Psychology","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-642-69746-3_2","volume-title":"Action Control","author":"I Ajzen","year":"1985","unstructured":"Ajzen, I.: From intentions to actions: a theory of planned behavior. In: Kuhl, J., Beckmann, J. (eds.) Action Control. SSSSP, pp. 11\u201339. Springer, Heidelberg (1985). https:\/\/doi.org\/10.1007\/978-3-642-69746-3_2"},{"key":"9_CR20","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13, 319\u2013340 (1989)","journal-title":"MIS Q."},{"key":"9_CR21","unstructured":"Davis, F.D.: A technology acceptance model for empirically testing new end-user information systems: theory and results. Ph.D. thesis, Massachusetts Institute of Technology (1985)"},{"issue":"10","key":"9_CR22","doi-asserted-by":"publisher","first-page":"1717","DOI":"10.1109\/TC.2017.2703808","volume":"66","author":"S Marchal","year":"2017","unstructured":"Marchal, S., Armano, G., Gr\u00f6ndahl, T., Saari, K., Singh, N., Asokan, N.: Off-the-hook: an efficient and usable client-side phishing prevention application. IEEE Trans. Comput. 66(10), 1717\u20131733 (2017)","journal-title":"IEEE Trans. Comput."},{"key":"9_CR23","unstructured":"He, W., et al.: Rethinking access control and authentication for the home internet of things (IoT). In: 27th USENIX Security Symposium (USENIX Security 2018), pp. 255\u2013272 (2018)"},{"issue":"194","key":"9_CR24","first-page":"4","volume":"189","author":"J Brooke","year":"1996","unstructured":"Brooke, J.: SUS-a quick and dirty usability scale. Usability Eval. Ind. 189(194), 4\u20137 (1996)","journal-title":"Usability Eval. Ind."},{"key":"9_CR25","unstructured":"Khan, H., Hengartner, U., Vogel, D.: Usability and security perceptions of implicit authentication: convenient, secure, sometimes annoying. In: Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), pp. 225\u2013239 (2015)"},{"key":"9_CR26","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-030-57404-8_19","volume-title":"Human Aspects of Information Security and Assurance","author":"M Lennartsson","year":"2020","unstructured":"Lennartsson, M., K\u00e4vrestad, J., Nohlberg, M.: Exploring the meaning of \u201cusable security\u2019\u2019. In: Clarke, N., Furnell, S. (eds.) HAISA 2021. IAICT, vol. 593, pp. 247\u2013258. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-57404-8_19"},{"key":"9_CR27","unstructured":"Rivers, D.: Sampling for web surveys. In: Joint Statistical Meetings, p. 4 (2007)"},{"key":"9_CR28","unstructured":"Culotta, A.: Reducing sampling bias in social media data for county health inference. In: Joint Statistical Meetings Proceedings, pp. 1\u201312. Citeseer (2014)"},{"key":"9_CR29","doi-asserted-by":"publisher","DOI":"10.4135\/9781412985451","volume-title":"Practical Sampling","author":"GT Henry","year":"1990","unstructured":"Henry, G.T.: Practical Sampling, vol. 21. Sage, Newbury Park (1990)"},{"key":"9_CR30","unstructured":"Scheaffer, R.L., Mendenhall, W., III., Ott, R.L., Gerow, K.G.: Elementary survey sampling. Cengage Learning (2011)"},{"key":"9_CR31","unstructured":"Inglehart, R., Welzel, C.: The WVS cultural map of the world. World Values Survey (2010)"},{"key":"9_CR32","unstructured":"Wheelan, C.: Naked Statistics: Stripping the Dread from the Data. WW Norton & Company, New York (2013)"},{"key":"9_CR33","volume-title":"Survey Research Methods","author":"FJ Fowler Jr","year":"2013","unstructured":"Fowler, F.J., Jr.: Survey Research Methods. Sage Publications, Thousand Oaks (2013)"},{"key":"9_CR34","doi-asserted-by":"crossref","unstructured":"Lincoln, Y.S., Guba, E.G.: Naturalistic inquiry (1985)","DOI":"10.1016\/0147-1767(85)90062-8"},{"issue":"4","key":"9_CR35","doi-asserted-by":"crossref","first-page":"351","DOI":"10.69554\/KMOS3545","volume":"1","author":"A Joinson","year":"2018","unstructured":"Joinson, A., van Steen, T.: Human aspects of cyber security: behaviour or culture change? Cyber Secur. Peer Rev. J. 1(4), 351\u2013360 (2018)","journal-title":"Cyber Secur. Peer Rev. J."},{"key":"9_CR36","unstructured":"Bansal, G., Hodorff, K., Marshall, K.: Moral beliefs and organizational information security policy compliance: the role of gender. In: Proceedings of the Eleventh Midwest United States Association for Information Systems, pp. 1\u20136 (2016)"},{"key":"9_CR37","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1016\/j.chb.2016.12.040","volume":"69","author":"M Anwar","year":"2017","unstructured":"Anwar, M., He, W., Ash, I., Yuan, X., Li, L., Xu, L.: Gender difference and employees\u2019 cybersecurity behaviors. Comput. Hum. Behav. 69, 437\u2013443 (2017)","journal-title":"Comput. Hum. Behav."},{"key":"9_CR38","unstructured":"McGill, T., Thompson, N.: Gender differences in information security perceptions and behaviour. In: 29th Australasian Conference on Information Systems (2018)"},{"key":"9_CR39","doi-asserted-by":"crossref","unstructured":"Fatokun, F., Hamid, S., Norman, A., Fatokun, J.: The impact of age, gender, and educational level on the cybersecurity behaviors of tertiary institution students: an empirical investigation on Malaysian universities. J. Phys. Conf. Ser. 1339, 012098 (2019). IOP Publishing","DOI":"10.1088\/1742-6596\/1339\/1\/012098"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Security Education for Cyber Resilience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-80865-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T22:23:23Z","timestamp":1751754203000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-80865-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030808648","9783030808655"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-80865-5_9","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"7 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WISE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP World Conference on Information Security Education","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wise-ifip2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ifiptc11.org\/wg118-events\/wise14","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"42% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2 workshop papers and a special chapter showcasing the history of WISE are also included.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}