{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T22:28:13Z","timestamp":1743028093891,"version":"3.40.3"},"publisher-location":"Cham","reference-count":8,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031619656"},{"type":"electronic","value":"9783031619663"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-61966-3_15","type":"book-chapter","created":{"date-parts":[[2024,6,1]],"date-time":"2024-06-01T01:03:59Z","timestamp":1717203839000},"page":"129-135","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Investigating the\u00a0Accessibility and\u00a0Usability of\u00a0Multi-factor Authentication for\u00a0Young People"],"prefix":"10.1007","author":[{"given":"Lukas","family":"Smith","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0407-7019","authenticated-orcid":false,"given":"Suzanne","family":"Prior","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0634-5248","authenticated-orcid":false,"given":"Jacques","family":"Ophoff","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,6,1]]},"reference":[{"key":"15_CR1","doi-asserted-by":"publisher","unstructured":"AL-Badi, F.A.: Child-friendly authentication (CFA) (2022). https:\/\/doi.org\/10.54938\/ijemdcsai.2022.01.1.70","DOI":"10.54938\/ijemdcsai.2022.01.1.70"},{"key":"15_CR2","doi-asserted-by":"publisher","unstructured":"Andrew, S., Watson, S., Oh, T., Tigwell, G.W.: A review of literature on accessibility and authentication techniques. In: Proceedings of the 22nd International ACM SIGACCESS Conference on Computers and Accessibility, ASSETS 2020. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3373625.3418005","DOI":"10.1145\/3373625.3418005"},{"key":"15_CR3","unstructured":"Childers, D.: State of the auth 2021: Experiences and perceptions of multi-factor authentication. Duo Labs. Accessed 9 Jan 2023"},{"key":"15_CR4","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-030-78092-0_13","volume-title":"HCII 2021","author":"S Furnell","year":"2021","unstructured":"Furnell, S., Helkala, K., Woods, N.: Disadvantaged by disability: examining the accessibility of cyber security. In: Antona, M., Stephanidis, C. (eds.) HCII 2021. LNCS, vol. 12768, pp. 197\u2013212. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-78092-0_13"},{"key":"15_CR5","doi-asserted-by":"publisher","unstructured":"Ophoff, J., Johnson, G., Renaud, K.: Cognitive function vs. accessible authentication: insights from dyslexia research. In: Proceedings of the 18th International Web for All Conference, W4A 2021. Association for Computing Machinery, New York (2021). https:\/\/doi.org\/10.1145\/3430263.3452427","DOI":"10.1145\/3430263.3452427"},{"key":"15_CR6","unstructured":"Orcutt, A.M.: State of Internet Scams 2021\u2014socialcatfish.com. https:\/\/socialcatfish.com\/scamfish\/state-of-internet-scams-2021\/. Accessed 24 Jan 2024"},{"key":"15_CR7","unstructured":"RobloxWiki: Scam (2024). https:\/\/roblox.fandom.com\/wiki\/Scam. Accessed 24 Jan 2024"},{"key":"15_CR8","doi-asserted-by":"publisher","unstructured":"Smahel, D., et al.: Eu kids online 2020: survey results from 19 countries (2020). https:\/\/doi.org\/10.21953\/lse.47fdeqj01ofo","DOI":"10.21953\/lse.47fdeqj01ofo"}],"container-title":["Communications in Computer and Information Science","HCI International 2024 Posters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-61966-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,22]],"date-time":"2024-12-22T04:17:23Z","timestamp":1734841043000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-61966-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031619656","9783031619663"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-61966-3_15","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"1 June 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Washington DC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}