{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T22:58:24Z","timestamp":1772837904944,"version":"3.50.1"},"reference-count":76,"publisher":"Emerald","issue":"4","license":[{"start":{"date-parts":[[2019,8,5]],"date-time":"2019-08-05T00:00:00Z","timestamp":1564963200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ITP"],"published-print":{"date-parts":[[2019,8,5]]},"abstract":"<jats:sec><jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title><jats:p>The purpose of this paper is to focus on a potential tradeoff between security and usability in people\u2019s use of online passwords \u2013 in general, complex passwords are secure and desirable but difficult to use (i.e. difficult to memorize) whereas simple passwords are easy to use, but are insecure and undesirable. Construal level theory (CLT) explains how high vs low construal level causes people to focus on \u201cdesirability\u201d vs \u201cfeasibility\u201d of an action, which in the research context can translate into the \u201csecurity\u201d vs \u201cusability\u201d of using passwords.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title><jats:p>The authors conducted a series of three laboratory experiments manipulating people\u2019s construal level and investigating its impact on password use.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Findings<\/jats:title><jats:p>The authors found that people who were induced to think at a high construal level created or showed intention to choose stronger passwords relative to people who were induced to think at a low construal level. Furthermore, this effect was also significantly different from the control group who did not receive any experimental treatment. In addition, the authors found that perspective taking targeted at the desirability of creating a strong password further strengthened the effect of a high construal level on intended password choice.<\/jats:p><\/jats:sec><jats:sec><jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title><jats:p>This research makes several contributions to existing literature on password security. First, this research offers CLT as a theoretical lens to explain an individual\u2019s thinking and behavior concerning online password use. Second, this research offers empirical evidence that a high construal level improves users\u2019 password use, a desirable feature for improved security. Third, this research contributes to the literature on how to apply nudging to influence human behavior toward more desirable, stronger, password use. Finally, our research identifies PT as a factor enhancing the positive effect of a high construal level on online users\u2019 password use.<\/jats:p><\/jats:sec>","DOI":"10.1108\/itp-01-2018-0001","type":"journal-article","created":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T11:42:10Z","timestamp":1559821330000},"page":"993-1020","source":"Crossref","is-referenced-by-count":18,"title":["Nudging with construal level theory to improve online password use and intended password choice"],"prefix":"10.1108","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9678-3377","authenticated-orcid":false,"given":"Jeffrey P.","family":"Kaleta","sequence":"first","affiliation":[]},{"given":"Jong Seok","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Sungjin","family":"Yoo","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"issue":"12","key":"key2019092315465896700_ref001","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/322796.322806","article-title":"Users are not the enemy","volume":"42","year":"1999","journal-title":"Communications of the ACM"},{"issue":"3","key":"key2019092315465896700_ref002","doi-asserted-by":"crossref","first-page":"613","DOI":"10.2307\/25750694","article-title":"Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2019092315465896700_ref003","first-page":"256","article-title":"An empirical study of user authentication: the perceptions versus practice of strong passwords","volume":"11","year":"2010","journal-title":"Issues in Information System"},{"key":"key2019092315465896700_ref004","unstructured":"Baird, J. (2016), \u201cTwo-factor authentication through SMS text message: not as secure as you think\u201d, Next Advisor, available at: www.nextadvisor.com\/blog\/2016\/10\/11\/two-step-verification-sms-text-message-secure\/ (accessed July 25, 2017)."},{"key":"key2019092315465896700_ref005","volume-title":"The Altruism Question: Toward a Social-Psychological Answer","year":"1991"},{"issue":"4","key":"key2019092315465896700_ref006","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1287\/orsc.6.4.350","article-title":"Perspective making and perspective taking in communities of knowing","volume":"6","year":"1995","journal-title":"Organization Science"},{"issue":"4","key":"key2019092315465896700_ref007","doi-asserted-by":"crossref","first-page":"837","DOI":"10.25300\/MISQ\/2015\/39.4.5","article-title":"What do users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors","volume":"39","year":"2015","journal-title":"MIS Quarterly (MISQ)"},{"key":"key2019092315465896700_ref008","unstructured":"Brandom, R. (2017), \u201cTwo-factor authentication is a mess\u201d, The Verge, available at: www.theverge.com\/2017\/7\/10\/15946642\/two-factor-authentication-online-security-mess (accessed July 25, 2017)."},{"issue":"1","key":"key2019092315465896700_ref009","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1177\/1745691610393980","article-title":"Amazon\u2019s mechanical turk a new source of inexpensive, yet high-quality, data?","volume":"6","year":"2011","journal-title":"Perspectives on Psychological Science"},{"issue":"7","key":"key2019092315465896700_ref010","doi-asserted-by":"crossref","first-page":"23","DOI":"10.5815\/ijcnis.2016.07.04","article-title":"Password security: an analysis of password strengths and vulnerabilities","volume":"8","year":"2016","journal-title":"International Journal of Computer Network & Information Security"},{"issue":"3","key":"key2019092315465896700_ref011","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1037\/h0034974","article-title":"Egocentrism and antisocial behavior: the assessment and training of social perspective-taking skills","volume":"9","year":"1973","journal-title":"Developmental Psychology"},{"key":"key2019092315465896700_ref012","doi-asserted-by":"crossref","unstructured":"Chiasson, S., Van Oorschot, P.C. and Biddle, R. (2007), \u201cGraphical password authentication using cued click points\u201d, in Biskup, J. and L\u00f3pez, J. (Eds), Computer Security\u2013ESORICS 2007, Springer, pp. 359-374.","DOI":"10.1007\/978-3-540-74835-9_24"},{"key":"key2019092315465896700_ref013","volume-title":"Quasi-Experimentation: Design & Analysis Issues for Field Settings","year":"1979"},{"key":"key2019092315465896700_ref014","first-page":"11","article-title":"On user choice in graphical password schemes","year":"2004"},{"issue":"4","key":"key2019092315465896700_ref015","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1037\/0022-3514.70.4.713","article-title":"Effect of perspective taking on the cognitive representation of persons: a merging of self and other","volume":"70","year":"1996","journal-title":"Journal of Personality and Social Psychology"},{"key":"key2019092315465896700_ref016","unstructured":"Deep, A. (2017), \u201cNetflix complying with RBI\u2019s two-factor authentication rules; testing Paytm?\u201d, MediaNama, available at: www.medianama.com\/2017\/07\/223-netflix-credit-cards-paytm\/ (accessed July 25, 2017)."},{"key":"key2019092315465896700_ref017","first-page":"1","article-title":"Password strength: an empirical analysis","year":"2010","journal-title":"IEEE Infocom"},{"issue":"3","key":"key2019092315465896700_ref018","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1002\/job.4030090308","article-title":"A note on the role of laboratory methodologies in applied behavioural research: don\u2019t throw out the baby with the bath water","volume":"9","year":"1988","journal-title":"Journal of Organizational Behavior"},{"key":"key2019092315465896700_ref019","first-page":"2379","article-title":"Does my password go up to eleven?: the impact of password meters on password selection","year":"2013"},{"issue":"6","key":"key2019092315465896700_ref020","doi-asserted-by":"crossref","first-page":"739","DOI":"10.1016\/j.jesp.2004.04.003","article-title":"The influence of abstract and concrete mindsets on anticipating and guiding others\u2019 self-regulatory efforts","volume":"40","year":"2004","journal-title":"Journal of Experimental Social Psychology"},{"issue":"3","key":"key2019092315465896700_ref021","doi-asserted-by":"crossref","first-page":"351","DOI":"10.1037\/0022-3514.90.3.351","article-title":"Construal levels and self-control","volume":"90","year":"2006","journal-title":"Journal of Personality and Social Psychology"},{"issue":"4","key":"key2019092315465896700_ref022","doi-asserted-by":"crossref","first-page":"708","DOI":"10.1037\/0022-3514.78.4.708","article-title":"Perspective-taking: decreasing stereotype expression, stereotype accessibility, and in- group favoritism","volume":"78","year":"2000","journal-title":"Journal of Personality and Social Psychology"},{"issue":"2","key":"key2019092315465896700_ref023","doi-asserted-by":"crossref","first-page":"404","DOI":"10.1037\/0022-3514.95.2.404","article-title":"Perspective-takers behave more stereotypically","volume":"95","year":"2008","journal-title":"Journal of Personality and Social Psychology"},{"key":"key2019092315465896700_ref024","first-page":"121","article-title":"Yagp: yet another graphical password strategy","year":"2008"},{"issue":"1","key":"key2019092315465896700_ref025","doi-asserted-by":"crossref","first-page":"73","DOI":"10.5465\/amj.2011.59215085","article-title":"The necessity of others is the mother of invention: intrinsic and prosocial motivations, perspective taking, and creativity","volume":"54","year":"2011","journal-title":"Academy of Management Journal"},{"issue":"3","key":"key2019092315465896700_ref026","doi-asserted-by":"crossref","first-page":"816","DOI":"10.1109\/JSYST.2014.2301517","article-title":"Robust biometrics-based authentication scheme for multiserver environment","volume":"9","year":"2015","journal-title":"IEEE Systems Journal"},{"issue":"1","key":"key2019092315465896700_ref027","first-page":"31","article-title":"Don\u2019t believe strangers: online consumer reviews and the role of social psychological distance","volume":"55","year":"2017","journal-title":"Information & Management"},{"issue":"5","key":"key2019092315465896700_ref028","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1016\/0167-4048(95)97088-R","article-title":"Deficiencies of the traditional approach to information security and the requirements for a new methodology","volume":"14","year":"1995","journal-title":"Computers & Security"},{"issue":"2","key":"key2019092315465896700_ref029","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1016\/j.im.2014.07.003","article-title":"Choice decision of e-learning system: implications from construal level theory","volume":"52","year":"2015","journal-title":"Information & Management"},{"issue":"6","key":"key2019092315465896700_ref030","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1145\/1953122.1953142","article-title":"Does deterrence work in reducing information security policy abuse by employees?","volume":"54","year":"2011","journal-title":"Communications of the ACM"},{"issue":"4","key":"key2019092315465896700_ref031","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/975817.975820","article-title":"The domino effect of password reuse","volume":"47","year":"2004","journal-title":"Communications of the ACM"},{"issue":"1","key":"key2019092315465896700_ref032","doi-asserted-by":"crossref","first-page":"113","DOI":"10.25300\/MISQ\/2015\/39.1.06","article-title":"An enhanced fear appeal rhetorical framework: leveraging threats to the human asset through sanctioning rhetoric","volume":"39","year":"2015","journal-title":"MIS Quarterly"},{"issue":"4","key":"key2019092315465896700_ref033","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1037\/0021-9010.91.4.841","article-title":"\u2018All in a day\u2019s work\u2019: how follower individual differences and justice perceptions predict OCB role definitions and behavior","volume":"91","year":"2006","journal-title":"Journal of Applied Psychology"},{"issue":"1","key":"key2019092315465896700_ref034","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1037\/0022-3514.75.1.5","article-title":"The role of feasibility and desirability considerations in near and distant future decisions: a test of temporal construal theory","volume":"75","year":"1998","journal-title":"Journal of Personality and Social Psychology"},{"issue":"1","key":"key2019092315465896700_ref035","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1016\/j.jesp.2005.12.009","article-title":"The effect of level of construal on the temporal distance of activity enactment","volume":"43","year":"2007","journal-title":"Journal of Experimental Social Psychology"},{"issue":"4","key":"key2019092315465896700_ref036","doi-asserted-by":"crossref","first-page":"199","DOI":"10.2753\/MIS0742-1222240408","article-title":"Explaining and predicting the impact of branding alliances and web site quality on initial consumer trust of e-commerce web sites","volume":"24","year":"2008","journal-title":"Journal of Management Information Systems"},{"issue":"2","key":"key2019092315465896700_ref037","doi-asserted-by":"crossref","first-page":"293","DOI":"10.2307\/23044045","article-title":"Construct measurement and validation procedures in MIS and behavioral research: integrating new and existing techniques","volume":"35","year":"2011","journal-title":"MIS Quarterly"},{"key":"key2019092315465896700_ref038","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1080\/15536548.2014.924812","article-title":"Factors for measuring password-based authentication practices","volume":"10","year":"2014","journal-title":"Journal of Information Privacy and Security"},{"key":"key2019092315465896700_ref039","first-page":"173","article-title":"Measuring password guessability for an entire university","year":"2013"},{"key":"key2019092315465896700_ref040","volume-title":"The Importance of Using Strong Passwords","author":"Microsoft","year":"2006"},{"key":"key2019092315465896700_ref041","unstructured":"Morgan, S. (2016), \u201cTop 2016 cybersecurity reports out from AT&T, Cisco, Dell, Google, IBM, McAfee, Symantec and Verizon\u201d, Forbes, available at: www.forbes.com\/sites\/stevemorgan\/2016\/05\/09\/top-2016-cybersecurity-reports-out-from-att-cisco-dell-google-ibm-mcafee-symantec-and-verizon\/#7457b4193edb (accessed November 10, 2016)."},{"issue":"1","key":"key2019092315465896700_ref042","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1037\/0012-1649.12.1.85","article-title":"Conceptual perspective taking in 2-to 6-year-old children","volume":"12","year":"1976","journal-title":"Developmental Psychology"},{"issue":"6","key":"key2019092315465896700_ref043","doi-asserted-by":"crossref","first-page":"1085","DOI":"10.2307\/3069390","article-title":"Seeing another viewpoint: antecedents and outcomes of employee perspective taking","volume":"44","year":"2001","journal-title":"Academy of Management Journal"},{"key":"key2019092315465896700_ref044","volume-title":"The Psychology of the Child","year":"1969"},{"key":"key2019092315465896700_ref045","doi-asserted-by":"crossref","unstructured":"Poornachandran, P., Nithun, M., Pal, S., Ashok, A. and Ajayan, A. (2016), \u201cPassword reuse behavior: how massive online data breaches impacts personal data in web\u201d, in Saini, R.S. and Rawat, S.S. (Eds), Innovations in Computer Science and Engineering, Springer, pp. 199-210.","DOI":"10.1007\/978-981-10-0419-3_24"},{"issue":"2","key":"key2019092315465896700_ref046","doi-asserted-by":"crossref","first-page":"163","DOI":"10.3758\/BF03195438","article-title":"Improving computer security for authentication of users: influence of proactive password restrictions","volume":"34","year":"2002","journal-title":"Behavior Research Methods, Instruments, & Computers"},{"key":"key2019092315465896700_ref047","unstructured":"Profis, S. (2016), \u201cThe guide to password security (and why you should care) [online]\u201d, Cnet, available at: www.cnet.com\/how-to\/the-guide-to-password-security-and-why-you-should-care\/ (accessed November 10, 2016)."},{"issue":"3","key":"key2019092315465896700_ref048","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1023\/A:1011902718709","article-title":"Transforming the \u2018weakest link\u2019\u2013a human\/computer interaction approach to usable and effective security","volume":"19","year":"2001","journal-title":"BT Technology Journal"},{"issue":"3","key":"key2019092315465896700_ref049","doi-asserted-by":"crossref","first-page":"487","DOI":"10.2307\/25750688","article-title":"Neutralization: new insights into the problem of employee information systems security policy violations","volume":"34","year":"2010","journal-title":"MIS Quarterly"},{"issue":"6","key":"key2019092315465896700_ref050","doi-asserted-by":"crossref","first-page":"1573","DOI":"10.2307\/256844","article-title":"Determinants of risky decision-making behavior: a test of the mediating role of risk perceptions and propensity","volume":"38","year":"1995","journal-title":"Academy of Management Journal"},{"key":"key2019092315465896700_ref051","unstructured":"Smith, C. (2016), \u201cThe surprising facts about who shops online and on mobile\u201d, available at: www.businessinsider.com\/the-surprising-demographics-of-who-shops-online-and-on-mobile-2014-6 (accessed November 7, 2016)."},{"issue":"4","key":"key2019092315465896700_ref052","doi-asserted-by":"crossref","first-page":"989","DOI":"10.2307\/41409970","article-title":"Information privacy research: an interdisciplinary review","volume":"35","year":"2011","journal-title":"MIS Quarterly"},{"issue":"2","key":"key2019092315465896700_ref053","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1287\/isre.2016.0634","article-title":"Examining the continuance of secure behavior: a longitudinal field study of mobile device authentication","volume":"27","year":"2016","journal-title":"Information Systems Research"},{"issue":"2","key":"key2019092315465896700_ref054","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1016\/j.jesp.2010.11.001","article-title":"The effects of time perspective and level of construal on social distance","volume":"47","year":"2011","journal-title":"Journal of Experimental Social Psychology"},{"issue":"3","key":"key2019092315465896700_ref055","doi-asserted-by":"crossref","first-page":"255","DOI":"10.1287\/isre.1.3.255","article-title":"Effective IS security: an empirical study","volume":"1","year":"1990","journal-title":"Information Systems Research"},{"key":"key2019092315465896700_ref056","volume-title":"Nudge: Improving Decisions About Health, Wealth, and Happiness","year":"2008"},{"issue":"6","key":"key2019092315465896700_ref057","doi-asserted-by":"crossref","first-page":"876","DOI":"10.1037\/0022-3514.79.6.876","article-title":"Temporal construal and time-dependent changes in preference","volume":"79","year":"2000","journal-title":"Journal of Personality and Social Psychology"},{"issue":"3","key":"key2019092315465896700_ref058","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1037\/0033-295X.110.3.403","article-title":"Temporal construal","volume":"110","year":"2003","journal-title":"Psychological Review"},{"issue":"2","key":"key2019092315465896700_ref059","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1037\/a0018963","article-title":"Construal-level theory of psychological distance","volume":"117","year":"2010","journal-title":"Psychological Review"},{"key":"key2019092315465896700_ref060","doi-asserted-by":"crossref","unstructured":"Trope, Y.L. (2012), \u201cConstrual level theory\u201d, in Van Lange, P.A.M., Kruglanski, A.W. and Higgins, E.T. (Eds), Handbook of Theories of Social Psychology, SAGE Publications, Washington DC, pp. 118-134.","DOI":"10.4135\/9781446249215.n7"},{"key":"key2019092315465896700_ref061","doi-asserted-by":"crossref","first-page":"327","DOI":"10.1108\/09593841211254358","article-title":"Analyzing trajectories of information security awareness","volume":"25","year":"2012","journal-title":"Information Technology & People"},{"issue":"1","key":"key2019092315465896700_ref062","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1037\/0033-2909.91.1.143","article-title":"Perspective-taking and altruism","volume":"91","year":"1982","journal-title":"Psychological Bulletin"},{"key":"key2019092315465896700_ref063","first-page":"65","article-title":"How does your password measure up? The effect of strength meters on password creation","year":"2012"},{"key":"key2019092315465896700_ref064","volume-title":"A Theory of Action Identification","year":"1985"},{"issue":"1","key":"key2019092315465896700_ref065","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1037\/0033-295X.94.1.3","article-title":"What do people think they\u2019re doing? Action identification and human behavior","volume":"94","year":"1987","journal-title":"Psychological Review"},{"issue":"2","key":"key2019092315465896700_ref066","first-page":"73","article-title":"Examining trust in information technology artifacts: the effects of system quality and culture","volume":"39","year":"2008","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"key2019092315465896700_ref067","first-page":"263","article-title":"Using accountability to reduce access policy violations in information systems","volume":"24","year":"2013","journal-title":"Journal of Management Information Systems"},{"issue":"4","key":"key2019092315465896700_ref068","first-page":"345","article-title":"Increasing accountability through user-interface design artifacts: a new approach to addressing the problem of access-policy violations","volume":"29","year":"2015","journal-title":"MIS Quarterly"},{"issue":"1","key":"key2019092315465896700_ref069","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1006\/obhd.2000.2896","article-title":"A longitudinal field investigation of gender differences in individual technology adoption decision-making processes","volume":"83","year":"2000","journal-title":"Organizational Behavior and Human Decision Processes"},{"issue":"8","key":"key2019092315465896700_ref070","doi-asserted-by":"crossref","first-page":"1038","DOI":"10.1016\/j.im.2017.02.008","article-title":"Role of local presence in online impulse buying","volume":"54","year":"2017","journal-title":"Information & Management"},{"issue":"1\/2","key":"key2019092315465896700_ref071","first-page":"102","article-title":"PassPoints: design and longitudinal evaluation of a graphical password system","volume":"63","year":"2005","journal-title":"International Journal of Human-Computer Studies"},{"key":"key2019092315465896700_ref072","unstructured":"Wired (2017), \u201cSecurity news this week: oh good, hackers beat two-factor authentication to rob bank accounts\u201d, available at: www.wired.com\/2017\/05\/security-news-week-hackers-beat-two-factor-authentication-rob-bank-accounts\/ (accessed July 25, 2017)."},{"issue":"5","key":"key2019092315465896700_ref073","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1109\/MSP.2004.81","article-title":"Password memorability and security: empirical results","volume":"2","year":"2004","journal-title":"IEEE Security & Privacy"},{"issue":"4","key":"key2019092315465896700_ref074","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1108\/ITP-12-2012-0147","article-title":"Understanding computer security behavioral intention in the workplace: an empirical study of Korean firms","volume":"26","year":"2013","journal-title":"Information Technology & People"},{"issue":"2","key":"key2019092315465896700_ref075","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1057\/ejis.2009.9","article-title":"Improving multiple-password recall: an empirical study","volume":"18","year":"2009","journal-title":"European Journal of Information Systems"},{"issue":"4","key":"key2019092315465896700_ref076","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1080\/07421222.1999.11518226","article-title":"Password security: an empirical study","volume":"15","year":"1999","journal-title":"Journal of Management Information Systems"}],"container-title":["Information Technology &amp; People"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-01-2018-0001\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ITP-01-2018-0001\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,24]],"date-time":"2025-07-24T21:54:02Z","timestamp":1753394042000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/itp\/article\/32\/4\/993-1020\/181966"}},"subtitle":["A security-usability tradeoff perspective"],"short-title":[],"issued":{"date-parts":[[2019,8,5]]},"references-count":76,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,8,5]]}},"alternative-id":["10.1108\/ITP-01-2018-0001"],"URL":"https:\/\/doi.org\/10.1108\/itp-01-2018-0001","relation":{},"ISSN":["0959-3845"],"issn-type":[{"value":"0959-3845","type":"print"}],"subject":[],"published":{"date-parts":[[2019,8,5]]}}}