{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T12:08:13Z","timestamp":1773144493417,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662643303","type":"print"},{"value":"9783662643310","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-662-64331-0_21","type":"book-chapter","created":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T19:16:12Z","timestamp":1634930172000},"page":"406-413","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Short Paper: Organizational Security: Implementing a Risk-Reduction-Based Incentivization Model for MFA Adoption"],"prefix":"10.1007","author":[{"given":"Sanchari","family":"Das","sequence":"first","affiliation":[]},{"given":"Andrew","family":"Kim","sequence":"additional","affiliation":[]},{"given":"L. Jean","family":"Camp","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,23]]},"reference":[{"issue":"11","key":"21_CR1","doi-asserted-by":"publisher","first-page":"927","DOI":"10.1080\/10447318.2017.1306765","volume":"33","author":"Y Albayram","year":"2017","unstructured":"Albayram, Y., Khan, M.M.H., Fagan, M.: A study on designing video tutorials for promoting security features: a case study in the context of two-factor authentication (2fa). Int. J. Human Comput. Interact 33(11), 927\u2013942 (2017). https:\/\/doi.org\/10.1080\/10447318.2017.1306765","journal-title":"Int. J. Human Comput. Interact"},{"key":"21_CR2","doi-asserted-by":"publisher","unstructured":"Braz, C., Robert, J.M.: Security and usability: the case of the user authentication methods. In: Proceedings of the 18th Conference on L\u2019Interaction Homme-Machine. pp. 199\u2013203. IHM \u201906, ACM, New York, NY, USA (2006). https:\/\/doi.org\/10.1145\/1132736.1132768, http:\/\/doi.acm.org.proxyiub.uits.iu.edu\/10.1145\/1132736.1132768","DOI":"10.1145\/1132736.1132768"},{"key":"21_CR3","doi-asserted-by":"publisher","unstructured":"Das, S., Dingman, A., Camp, L.J.: Why johnny doesn\u2019t use two factor a two-phase usability study of the FIDO U2F security key. In: Meiklejohn, S., Sako, K. (eds.) FC 2018. LNCS, vol. 10957, pp. 160\u2013179. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-662-58387-6_9","DOI":"10.1007\/978-3-662-58387-6_9"},{"key":"21_CR4","unstructured":"Das, S., Wang, B., Tingle, Z., Camp, L.J.: Evaluating user perception of multi-factor authentication: a systematic review. In: Proceedings of the 13th International Symposium on Human Aspects of Information Security and Assurance (HAISA 2019). HAISA (2019)"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Furnell, S.M., Bryant, P., Phippen, A.D.: Assessing the security perceptions of personal internet users. Comput. Secur. 26(5), 410\u2013417 (2007)","DOI":"10.1016\/j.cose.2007.03.001"},{"key":"21_CR6","doi-asserted-by":"publisher","unstructured":"Garg, V., Camp, L.J., Connelly, K., Lorenzen-Huber, L.: Risk communication design: video vs. text. In: Fischer-H\u00fcbner, S., Wright, M. (eds.) PETS 2012. LNCS, vol. 7384, pp. 279\u2013298. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31680-7_15","DOI":"10.1007\/978-3-642-31680-7_15"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Harbach, M., Fahl, S., Smith, M.: Who\u2019s afraid of which bad wolf? a survey of it security risk awareness. In: 2014 IEEE 27th Computer Security Foundations Symposium. pp. 97\u2013110. IEEE (2014)","DOI":"10.1109\/CSF.2014.15"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Harbach, M., Hettig, M., Weber, S., Smith, M.: Using personal examples to improve risk communication for security and privacy decisions. In: Proceedings of the 32nd Annual ACM Conference on Human Factors in Computing Systems. pp. 2647\u20132656. ACM (2014)","DOI":"10.1145\/2556288.2556978"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Krol, K., Philippou, E., De Cristofaro, E., Sasse, M.A.: They brought in the horrible key ring thing! analysing the usability of two-factor authentication in uk online banking. arXiv preprint arXiv:1501.04434 (2015)","DOI":"10.14722\/usec.2015.23001"},{"key":"21_CR10","doi-asserted-by":"publisher","unstructured":"Lang, J., Czeskis, A., Balfanz, D., Schilder, M., Srinivas, S.: Security keys: practical cryptographic second factors for the modern web. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 422\u2013440. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54970-4_25","DOI":"10.1007\/978-3-662-54970-4_25"},{"key":"21_CR11","doi-asserted-by":"publisher","unstructured":"Petsas, T., Tsirantonakis, G., Athanasopoulos, E., Ioannidis, S.: Two-factor authentication: is the world ready? quantifying 2fa adoption. In: Proceedings of the 8th European Workshop on System Security, p. 4. ACM (April 2015). https:\/\/doi.org\/10.1145\/2751323.2751327","DOI":"10.1145\/2751323.2751327"},{"key":"21_CR12","doi-asserted-by":"publisher","unstructured":"Reynolds, J., Smith, T., Reese, K., Dickinson, L., Ruoti, S., Seamons, K.: A tale of two studies: the best and worst of yubikey usability. In: 2018 IEEE Symposium on Security and Privacy (SP). pp. 872\u2013888. IEEE (2018). DOI: https:\/\/doi.org\/10.1109\/SP.2018.00067","DOI":"10.1109\/SP.2018.00067"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Sedera, D., Dey, S.: User expertise in contemporary information systems: conceptualization, measurement and application. Inf. Manage 50(8), 621\u2013637 (2013)","DOI":"10.1016\/j.im.2013.07.004"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Viega, J., Kohno, T., Potter, B.: Trust and mistrust in secure applications. Commun. ACM 44(2), 31\u201336 (2001)","DOI":"10.1145\/359205.359223"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Weinstein, N.D.: Unrealistic optimism about future life events. J. Pers. Soc. Psychol. 39(5), 806 (1980)","DOI":"10.1037\/0022-3514.39.5.806"},{"key":"21_CR16","doi-asserted-by":"publisher","unstructured":"Weir, C.S., Douglas, G., Richardson, T., Jack, M.: Usable security: user preferences for authentication methods in ebanking and the effects of experience. Interact. Comput. 22(3), 153\u2013164 (2010). https:\/\/doi.org\/10.1016\/j.intcom.2009.10.001","DOI":"10.1016\/j.intcom.2009.10.001"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-64331-0_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T20:08:26Z","timestamp":1634933306000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-64331-0_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783662643303","9783662643310"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-64331-0_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"23 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc21.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}