{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,12]],"date-time":"2026-01-12T23:52:26Z","timestamp":1768261946837,"version":"3.49.0"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031780486","type":"print"},{"value":"9783031780493","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,28]],"date-time":"2024-11-28T00:00:00Z","timestamp":1732752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-78049-3_5","type":"book-chapter","created":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T04:27:27Z","timestamp":1732681647000},"page":"39-53","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["MEUSec \u2013 Method for\u00a0Enhancing User Experience and\u00a0Information Security"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6734-3767","authenticated-orcid":false,"given":"Max","family":"Sauer","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8843-2649","authenticated-orcid":false,"given":"Christoph","family":"Becker","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5304-8433","authenticated-orcid":false,"given":"Andreas","family":"Oberweis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4815-6149","authenticated-orcid":false,"given":"Simon","family":"Pfeifer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6617-3674","authenticated-orcid":false,"given":"Jan","family":"S\u00fcrmeli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,28]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","unstructured":"Distler, V., Lenzini, G., Lallemand, C., Koenig, V.: The Framework of security-enhancing friction: how UX can help users behave more securely. In: New Security Paradigms Workshop 2020 (NSPW 2020), pp. 45\u201358. ACM (2020). DOI: https:\/\/doi.org\/10.1145\/3442167.3442173","DOI":"10.1145\/3442167.3442173"},{"key":"5_CR2","doi-asserted-by":"publisher","unstructured":"Hintz, A.: Erfolgreiche Mitarbeiterf\u00fchrung durch soziale Kompetenz: Eine praxisbezogene Anleitung. Gabler Verlag, Wiesbaden (2013). https:\/\/doi.org\/10.1007\/978-3-8349-4545-7","DOI":"10.1007\/978-3-8349-4545-7"},{"key":"5_CR3","unstructured":"ISO: ISO\/IEC 27000:2018(en) Information technology - Security techniques - Information security management systems - Overview and vocabulary (2018)"},{"issue":"5","key":"5_CR4","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1016\/j.ijmedinf.2008.10.002","volume":"78","author":"MW Jaspers","year":"2009","unstructured":"Jaspers, M.W.: A comparison of usability methods for testing interactive health technologies: methodological aspects and empirical evidence. Int. J. Med. Inf. 78(5), 340\u2013353 (2009). https:\/\/doi.org\/10.1016\/j.ijmedinf.2008.10.002","journal-title":"Int. J. Med. Inf."},{"key":"5_CR5","series-title":"DuD-Fachbeitr\u00e4ge","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1007\/978-3-658-33306-5_19","volume-title":"Selbstbestimmung, Privatheit und Datenschutz","author":"A Khayretdinova","year":"2022","unstructured":"Khayretdinova, A., Kubach, M., Sellung, R., Ro\u00dfnagel, H.: Conducting a usability evaluation of decentralized identity management solutions. In: Friedewald, M., Kreutzer, M., Hansen, M. (eds.) Selbstbestimmung, Privatheit und Datenschutz. D, pp. 389\u2013406. Springer, Wiesbaden (2022). https:\/\/doi.org\/10.1007\/978-3-658-33306-5_19"},{"key":"5_CR6","unstructured":"Korir, M., Parkin, S., Dunphy, P.: An empirical study of a decentralized identity wallet: usability, security, and perspectives on user control. In: Proceedings of the 18th Symposium on Usable Privacy and Security (SOUPS 2022), pp. 195\u2013211 (2022)"},{"issue":"2","key":"5_CR7","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1365\/s40702-023-00952-6","volume":"60","author":"AM Krau\u00df","year":"2023","unstructured":"Krau\u00df, A.M., Sellung, R.A., Kostic, S.: Ist das die Wallet der Zukunft?: Ein Blick durch die Nutzendenbrille beim Einsatz von digitalen Identit\u00e4ten. HMD Praxis der Wirtschaftsinformatik 60(2), 344\u2013365 (2023). https:\/\/doi.org\/10.1365\/s40702-023-00952-6","journal-title":"HMD Praxis der Wirtschaftsinformatik"},{"key":"5_CR8","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1108\/K-09-2014-0192","volume":"45","author":"H Nechansky","year":"2016","unstructured":"Nechansky, H.: The interaction matrix: from individual goal-setting to the four modes of coexistence. Kybernetes 45, 87\u2013106 (2016). https:\/\/doi.org\/10.1108\/K-09-2014-0192","journal-title":"Kybernetes"},{"key":"5_CR9","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-052029-2.50007-3","volume-title":"Usability Engineering","author":"J Nielsen","year":"1993","unstructured":"Nielsen, J.: Usability Engineering. Academic Press, Boston (1993)"},{"key":"5_CR10","doi-asserted-by":"publisher","unstructured":"Nielsen, J.: Enhancing the explanatory power of usability heuristics. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Celebrating Interdependence (CHI 1994), pp. 152\u2013158. ACM Press, Boston (1994). https:\/\/doi.org\/10.1145\/191666.191729","DOI":"10.1145\/191666.191729"},{"key":"5_CR11","doi-asserted-by":"publisher","unstructured":"Nielsen, J., Molich, R.: Heuristic evaluation of user interfaces. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems Empowering People (CHI 1990), pp. 249\u2013256. ACM Press, Seattle (1990). https:\/\/doi.org\/10.1145\/97243.97281","DOI":"10.1145\/97243.97281"},{"key":"5_CR12","doi-asserted-by":"publisher","unstructured":"Podgorelec, B., Alber, L., Zefferer, T.: What is a (Digital) identity wallet? a systematic literature review. In: Proceedings of the 46th Annual Computers, Software, and Applications Conference (COMPSAC 2022), pp. 809\u2013818. IEEE (2022). https:\/\/doi.org\/10.1109\/COMPSAC54236.2022.00131","DOI":"10.1109\/COMPSAC54236.2022.00131"},{"key":"5_CR13","doi-asserted-by":"publisher","unstructured":"Realpe, P.C., Collazos, C.A., Hurtado, J., Granollers, A.: A set of heuristics for usable security and user authentication. In: Proceedings of the 17th International Conference on Human Computer Interaction, pp.\u00a01\u20138. ACM, Salamanca (2016). https:\/\/doi.org\/10.1145\/2998626.2998662","DOI":"10.1145\/2998626.2998662"},{"key":"5_CR14","unstructured":"Rusu, C., Roncagliolo, S., Rusu, V., Collazos, C.: A Methodology to establish usability heuristics. In: Proceedings of the 4th International Conference on Advances in Com-puter-Human Interactions (ACHI 2011) (2011)"},{"key":"5_CR15","unstructured":"Sartor, S., Sedlmeir, J., Rieger, A., Roth, T.: Love at first sight? a user experience study of self-sovereign identity Wallets. In: Proceedings of the 30th European Conference on Information Systems (ECIS 2022) (2022)"},{"key":"5_CR16","doi-asserted-by":"publisher","unstructured":"Satybaldy, A.: Usability evaluation of SSI digital wallets. In: Bieker, F., Meyer, J., Pape, S., Schiering, I., Weich, A. (eds.) Privacy and Identity Management, vol.\u00a0671, pp. 101\u2013117. Springer, Switzerland (2023). https:\/\/doi.org\/10.1007\/978-3-031-31971-6_9","DOI":"10.1007\/978-3-031-31971-6_9"},{"key":"5_CR17","doi-asserted-by":"publisher","unstructured":"Sauer, M., Alpers, S., Becker, C.: Comparison of methods for analyzing the correlation of user experience and information security. In: Proceedings of the 5th International Conference on Software Engineering and Development (ICSED 2023). ACM, New York (2024). https:\/\/doi.org\/10.1145\/3637792.3637794","DOI":"10.1145\/3637792.3637794"},{"key":"5_CR18","unstructured":"Sauer, M., Becker, C., Oberweis, A., Schork, S., S\u00fcrmeli, J.: User experience and information security heuristics for digital identity wallets. In: Proceedings of the 8th International Conference on Computer-Human Interaction Research and Applications (CHIRA 2024), Porto, Portugal (2024)"},{"key":"5_CR19","doi-asserted-by":"publisher","unstructured":"Sauer, M., Pfeifer, S.: MEUSec - Method for enhancing user experience and information security (2024). https:\/\/doi.org\/10.5281\/zenodo.10529247","DOI":"10.5281\/zenodo.10529247"},{"key":"5_CR20","doi-asserted-by":"publisher","unstructured":"Sauer, M., Pfeifer, S., S\u00fcrmeli, J., Siebert, E., Woytal, I.: User-friendly integration of identity wallets and mobility platforms: a user experience study conducted in the SDIKA project (2024). https:\/\/doi.org\/10.13140\/RG.2.2.12412.55682","DOI":"10.13140\/RG.2.2.12412.55682"},{"issue":"3","key":"5_CR21","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1207\/s15327590ijhc0903_2","volume":"9","author":"A Sears","year":"1997","unstructured":"Sears, A.: Heuristic walkthroughs: finding the problems without the noise. Int. J. Hum.-Comput. Interact. 9(3), 213\u2013234 (1997). https:\/\/doi.org\/10.1207\/s15327590ijhc0903_2","journal-title":"Int. J. Hum.-Comput. Interact."},{"key":"5_CR22","doi-asserted-by":"publisher","unstructured":"Sellung, R., Kubach, M.: Research on User experience for digital identitywallets: state-of-the-art and recommendations. In: Open Identity Summit 2023 (2023). https:\/\/doi.org\/10.18420\/OID2023_03","DOI":"10.18420\/OID2023_03"},{"key":"5_CR23","doi-asserted-by":"publisher","unstructured":"Weichbroth, P.: Usability of mobile applications: a systematic literature study. IEEE Access 8 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.2981892","DOI":"10.1109\/ACCESS.2020.2981892"},{"key":"5_CR24","unstructured":"Wharton, C., Rieman, J., Lewis, C., Polson, P.: The cognitive walkthrough method: a practitioner\u2019s guide. In: Usability Inspection Methods, pp. 105\u2013140. John Wiley & Sons, Inc., Hoboken (1994)"},{"key":"5_CR25","unstructured":"Whitten, A., Tygar, J.: Why Johnny can\u2019t encrypt: a usability evaluation of PGP 5.0. In: Proceedings of the 8th Conference on USENIX Security Symposium, Washington, D.C. (1999)"},{"key":"5_CR26","doi-asserted-by":"publisher","unstructured":"Y\u00e1\u00f1ez\u00a0G\u00f3mez, R., Cascado\u00a0Caballero, D., Sevillano, J.L.: Heuristic evaluation on mobile interfaces: a new checklist. Scientific World J., 1\u201319 (2014). https:\/\/doi.org\/10.1155\/2014\/434326","DOI":"10.1155\/2014\/434326"}],"container-title":["Lecture Notes in Computer Science","Advances in Mobile Computing and Multimedia Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-78049-3_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T05:03:18Z","timestamp":1732683798000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-78049-3_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,28]]},"ISBN":["9783031780486","9783031780493"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-78049-3_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,28]]},"assertion":[{"value":"28 November 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MoMM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advances in Mobile Computing and Multimedia Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bratislava","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovakia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"momm2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iiwas.org\/conferences\/momm2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}