{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T00:46:42Z","timestamp":1774831602996,"version":"3.50.1"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030990992","type":"print"},{"value":"9783030991005","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-030-99100-5_9","type":"book-chapter","created":{"date-parts":[[2022,3,30]],"date-time":"2022-03-30T14:05:04Z","timestamp":1648649104000},"page":"105-121","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Usable Privacy and\u00a0Security from\u00a0the\u00a0Perspective of\u00a0Cognitive Abilities"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2084-9119","authenticated-orcid":false,"given":"Joakim","family":"K\u00e4vrestad","sequence":"first","affiliation":[]},{"given":"Allex","family":"Hagberg","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Roos","sequence":"additional","affiliation":[]},{"given":"Jana","family":"Rambusch","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5962-9995","authenticated-orcid":false,"given":"Marcus","family":"Nohlberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,3,31]]},"reference":[{"key":"9_CR1","unstructured":"Andreasson, A., Blix, F.: \u201cSpecial commando move\"-when informal, formal and technical cybersecurity components fail. In: Proceedings of the 5th International Workshop on Socio-Technical Perspective in IS Development, pp. 26\u201333 (2019)"},{"key":"9_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.ijhcs.2015.07.002","volume":"84","author":"M Belk","year":"2015","unstructured":"Belk, M., Fidas, C., Germanakos, P., Samaras, G.: Do human cognitive differences in information processing affect preference and performance of captcha? Int. J. Hum. Comput. Stud. 84, 1\u201318 (2015)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Bhagavatula, R., Ur, B., Iacovino, K., Kywe, S.M., Cranor, L.F., Savvides, M.: Biometric authentication on iphone and android: usability, perceptions, and influences on adoption. In: USEC\u201915: Workshop on Usable Security, pp. 1\u201310 (2015)","DOI":"10.14722\/usec.2015.23003"},{"issue":"2","key":"9_CR4","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Qual. Res. Psychol. 3(2), 77\u2013101 (2006)","journal-title":"Qual. Res. Psychol."},{"key":"9_CR5","unstructured":"Canadian Centre for Cyber security: Cyber threat and cyber threat actors (2020). https:\/\/cyber.gc.ca\/en\/guidance\/cyber-threat-and-cyber-threat-actors"},{"issue":"1","key":"9_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.11648\/j.ajtas.20160501.11","volume":"5","author":"I Etikan","year":"2016","unstructured":"Etikan, I., Musa, S.A., Alkassim, R.S.: Comparison of convenience sampling and purposive sampling. Am. J. Theor. Appl. Stat. 5(1), 1\u20134 (2016)","journal-title":"Am. J. Theor. Appl. Stat."},{"key":"9_CR7","volume-title":"Cognitive Neuroscience. The Biology of the Mind","author":"MS Gazzaniga","year":"2006","unstructured":"Gazzaniga, M.S., Ivry, R.B., Mangun, G.: Cognitive Neuroscience. The Biology of the Mind. Norton, New York (2006)"},{"key":"9_CR8","doi-asserted-by":"crossref","unstructured":"Gerber, N., Zimmermann, V., Henhapl, B., Emer\u00f6z, S., Volkamer, M.: Finally Johnny can encrypt: but does this make him feel more secure? In: Proceedings of the 13th International Conference on Availability, Reliability and Security, pp. 1\u201310 (2018)","DOI":"10.1145\/3230833.3230859"},{"issue":"8","key":"9_CR9","first-page":"1","volume":"19","author":"A Gibbs","year":"1997","unstructured":"Gibbs, A.: Focus groups. Soc. Res. Update 19(8), 1\u20138 (1997)","journal-title":"Soc. Res. Update"},{"key":"9_CR10","unstructured":"Gro\u00df, T., Coopamootoo, K., Al-Jabri, A.: Effect of cognitive depletion on password choice. In: The $$\\{$$LASER$$\\}$$ Workshop: Learning from Authoritative Security Experiment Results ($$\\{$$LASER$$\\}$$ 2016), pp. 55\u201366 (2016)"},{"issue":"3","key":"9_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3384471","volume":"1","author":"R Gutzwiller","year":"2020","unstructured":"Gutzwiller, R., Dykstra, J., Payne, B.: Gaps and opportunities in situational awareness for cybersecurity. Digit. Threats: Res. Pract. 1(3), 1\u20136 (2020)","journal-title":"Digit. Threats: Res. Pract."},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Habib, H., et al.: \u201cIt\u2019s a scavenger hunt\u201d: usability of websites\u2019 opt-out and data deletion choices. In: Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, pp. 1\u201312 (2020)","DOI":"10.1145\/3313831.3376511"},{"issue":"11","key":"9_CR13","doi-asserted-by":"publisher","first-page":"3469","DOI":"10.1007\/s10803-016-2886-2","volume":"46","author":"FG Happ\u00e9","year":"2016","unstructured":"Happ\u00e9, F.G., Mansour, H., Barrett, P., Brown, T., Abbott, P., Charlton, R.A.: Demographic and cognitive profile of individuals seeking a diagnosis of autism spectrum disorder in adulthood. J. Autism Dev. Disord. 46(11), 3469\u20133480 (2016). https:\/\/doi.org\/10.1007\/s10803-016-2886-2","journal-title":"J. Autism Dev. Disord."},{"key":"9_CR14","unstructured":"Henriquez, M.: The top 12 data breaches of 2019 (2019). https:\/\/www.securitymagazine.com\/articles\/91366-the-top-12-data-breaches-of-2019"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Horcher, A.M., Tejay, G.P.: Building a better password: the role of cognitive load in information security training. In: 2009 IEEE International Conference on Intelligence and Security Informatics, pp. 113\u2013118. IEEE (2009)","DOI":"10.1109\/ISI.2009.5137281"},{"key":"9_CR16","unstructured":"ISO 27000:2018(EN). Standard, International Organization for Standardization, Geneva, CH (2018)"},{"issue":"1","key":"9_CR17","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s10209-020-00714-x","volume":"20","author":"S Johansson","year":"2021","unstructured":"Johansson, S., Gulliksen, J., Gustavsson, C.: Disability digital divide: the use of the internet, smartphones, computers and tablets among people with disabilities in Sweden. Univ. Access Inf. Soc. 20(1), 105\u2013120 (2021). https:\/\/doi.org\/10.1007\/s10209-020-00714-x","journal-title":"Univ. Access Inf. Soc."},{"key":"9_CR18","volume-title":"The Creative Self: Effect of Beliefs, Self-Efficacy, Mindset, and Identity","author":"M Karwowski","year":"2017","unstructured":"Karwowski, M., Kaufman, J.C.: The Creative Self: Effect of Beliefs, Self-Efficacy, Mindset, and Identity. Academic Press, Cambridge (2017)"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"K\u00e4vrestad, J., Eriksson, F., Nohlberg, M.: Understanding passwords-a taxonomy of password creation strategies. Inf. Comput. Secur. (2019)","DOI":"10.1108\/ICS-06-2018-0077"},{"key":"9_CR20","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-030-57404-8_6","volume-title":"Human Aspects of Information Security and Assurance","author":"J K\u00e4vrestad","year":"2020","unstructured":"K\u00e4vrestad, J., Nohlberg, M.: ContextBased microtraining: a framework for information security training. In: Clarke, N., Furnell, S. (eds.) HAISA 2020. IAICT, vol. 593, pp. 71\u201381. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-57404-8_6"},{"key":"9_CR21","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-030-57404-8_19","volume-title":"Human Aspects of Information Security and Assurance","author":"M Lennartsson","year":"2020","unstructured":"Lennartsson, M., K\u00e4vrestad, J., Nohlberg, M.: Exploring the meaning of \u201cusable security\u2019\u2019. In: Clarke, N., Furnell, S. (eds.) HAISA 2020. IAICT, vol. 593, pp. 247\u2013258. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-57404-8_19"},{"key":"9_CR22","doi-asserted-by":"publisher","DOI":"10.1016\/0147-1767(85)90062-8","volume-title":"Naturalistic Inquiry","author":"YS Lincoln","year":"1985","unstructured":"Lincoln, Y.S., Guba, E.G.: Naturalistic Inquiry. Sage, Thousand Oaks (1985)"},{"key":"9_CR23","unstructured":"Lundin, L., Mellgren, Z.: Psykiska funktionshinder: st\u00f6d och hj\u00e4lp vid kognitiva funktionsneds\u00e4ttningar. Studentlitteratur (2012)"},{"key":"9_CR24","unstructured":"McLean, R.: A hacker gained access to 100 million capital one credit card applications and accounts (2019). https:\/\/edition.cnn.com\/2019\/07\/29\/business\/capital-one-data-breach\/index.html"},{"issue":"6","key":"9_CR25","doi-asserted-by":"publisher","first-page":"1017","DOI":"10.1016\/S0191-8869(99)00251-2","volume":"29","author":"K Oberauer","year":"2000","unstructured":"Oberauer, K., S\u00fc\u00df, H.M., Schulze, R., Wilhelm, O., Wittmann, W.W.: Working memory capacity\u2013facets of a cognitive ability construct. Pers. Individ. Differ. 29(6), 1017\u20131045 (2000)","journal-title":"Pers. Individ. Differ."},{"key":"9_CR26","unstructured":"OECD: Hows Life in the Digital Age? (2019). https:\/\/www.oecd-ilibrary.org\/content\/publication\/9789264311800-en"},{"issue":"4","key":"9_CR27","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1080\/09687590120059540","volume":"16","author":"MF Olney","year":"2001","unstructured":"Olney, M.F., Kim, A.: Beyond adjustment: integration of cognitive disability into identity. Disab. Soc. 16(4), 563\u2013583 (2001)","journal-title":"Disab. Soc."},{"issue":"2","key":"9_CR28","first-page":"312","volume":"47","author":"L Palmer","year":"2013","unstructured":"Palmer, L.: The relationship between stress, fatigue, and cognitive functioning. Coll. Stud. J. 47(2), 312\u2013325 (2013)","journal-title":"Coll. Stud. J."},{"key":"9_CR29","volume-title":"Security in Computing","author":"CP Pfleeger","year":"2015","unstructured":"Pfleeger, C.P., Pfleeger, S.L., Margulies, J.: Security in Computing, 5th edn. Prentice Hall, Upper Saddle River (2015)","edition":"5"},{"issue":"2","key":"9_CR30","doi-asserted-by":"publisher","first-page":"20","DOI":"10.3390\/bs9020020","volume":"9","author":"A Rabiee","year":"2019","unstructured":"Rabiee, A., et al.: The cognitive profile of people with high-functioning autism spectrum disorders. Behav. Sci. 9(2), 20 (2019)","journal-title":"Behav. Sci."},{"issue":"2","key":"9_CR31","doi-asserted-by":"publisher","first-page":"209","DOI":"10.2478\/popets-2019-0027","volume":"2019","author":"KM Ramokapane","year":"2019","unstructured":"Ramokapane, K.M., Mazeli, A.C., Rashid, A.: Skip, skip, skip, accept!!!: a study on the usability of smartphone manufacturer provided default features and user privacy. Proc. Priv. Enhancing Technol. 2019(2), 209\u2013227 (2019)","journal-title":"Proc. Priv. Enhancing Technol."},{"issue":"7","key":"9_CR32","doi-asserted-by":"publisher","first-page":"1147","DOI":"10.1093\/jamia\/ocaa078","volume":"27","author":"A Ramsetty","year":"2020","unstructured":"Ramsetty, A., Adams, C.: Impact of the digital divide in the age of COVID-19. J. Am. Med. Inform. Assoc. 27(7), 1147\u20131148 (2020)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"9_CR33","doi-asserted-by":"crossref","unstructured":"Reeves, A., Delfabbro, P., Calic, D.: Encouraging employee engagement with cybersecurity: how to tackle cyber fatigue. SAGE Open 11(1) (2021)","DOI":"10.1177\/21582440211000049"},{"key":"9_CR34","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1016\/j.chb.2015.12.037","volume":"57","author":"NS Safa","year":"2016","unstructured":"Safa, N.S., Von Solms, R.: An information security knowledge sharing model in organizations. Comput. Hum. Behav. 57, 442\u2013451 (2016)","journal-title":"Comput. Hum. Behav."},{"key":"9_CR35","doi-asserted-by":"publisher","first-page":"477","DOI":"10.2307\/40041279","volume":"154","author":"DJ Solove","year":"2005","unstructured":"Solove, D.J.: A taxonomy of privacy. U. Pa. L. Rev. 154, 477 (2005)","journal-title":"U. Pa. L. Rev."},{"issue":"3","key":"9_CR36","first-page":"524","volume":"65","author":"T Stern","year":"2014","unstructured":"Stern, T., Kumar, N.: Improving privacy settings control in online social networks with a wheel interface. J. Am. Soc. Inf. Sci. 65(3), 524\u2013538 (2014)","journal-title":"J. Am. Soc. Inf. Sci."},{"key":"9_CR37","unstructured":"United Nations: Sustainable development (2021). https:\/\/sdgs.un.org\/"},{"key":"9_CR38","doi-asserted-by":"crossref","unstructured":"Verhagen, S.J., et al.: Measuring within-day cognitive performance using the experience sampling method: a pilot study in a healthy population. PloS One 14(12) (2019)","DOI":"10.1371\/journal.pone.0226409"},{"issue":"8","key":"9_CR39","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1177\/0093650215627483","volume":"45","author":"A Vishwanath","year":"2018","unstructured":"Vishwanath, A., Harrison, B., Ng, Y.J.: Suspicion, cognition, and automaticity model of phishing susceptibility. Commun. Res. 45(8), 1146\u20131166 (2018)","journal-title":"Commun. Res."},{"key":"9_CR40","unstructured":"W3C: Web content accessibility guidelines (wcag) 2.1 (2018). https:\/\/www.w3.org\/TR\/WCAG21"},{"key":"9_CR41","unstructured":"Whitten, A., Tygar, J.D.: Why Johnny can\u2019t encrypt: a usability evaluation of PGP 5.0. In: USENIX Security Symposium, vol. 348, pp. 169\u2013184 (1999)"},{"key":"9_CR42","unstructured":"World Health Organization: International statistical classification of diseases and related health problems 10th revision (icd-10) (2019)"},{"key":"9_CR43","doi-asserted-by":"crossref","unstructured":"Yan, J., El Ahmad, A.S.: Usability of CAPTCHAs or usability issues in CAPTCHA design. In: Proceedings of the 4th Symposium on Usable Privacy and Security, pp. 44\u201352 (2008)","DOI":"10.1145\/1408664.1408671"},{"issue":"6","key":"9_CR44","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1007\/s10207-019-00429-y","volume":"18","author":"M Y\u0131ld\u0131r\u0131m","year":"2019","unstructured":"Y\u0131ld\u0131r\u0131m, M., Mackie, I.: Encouraging users to improve password security and memorability. Int. J. Inf. Secur. 18(6), 741\u2013759 (2019). https:\/\/doi.org\/10.1007\/s10207-019-00429-y","journal-title":"Int. J. Inf. Secur."},{"issue":"4","key":"9_CR45","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1016\/j.paid.2004.06.005","volume":"38","author":"S Young","year":"2005","unstructured":"Young, S.: Coping strategies used by adults with ADHD. Pers. Individ. Differ. 38(4), 809\u2013816 (2005)","journal-title":"Pers. Individ. Differ."}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management. Between Data Protection and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-99100-5_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T00:02:21Z","timestamp":1774828941000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-99100-5_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783030990992","9783030991005"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-99100-5_9","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"31 March 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Privacy and Identity","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Summer School on Privacy and Identity Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"privacy-identity2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifip-summerschool2021.uni.lu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}