{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:48:05Z","timestamp":1776102485329,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,7,20]],"date-time":"2011-07-20T00:00:00Z","timestamp":1311120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,7,20]]},"DOI":"10.1145\/2078827.2078833","type":"proceedings-article","created":{"date-parts":[[2011,12,20]],"date-time":"2011-12-20T17:47:13Z","timestamp":1324403233000},"page":"1-20","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":60,"title":["What makes users refuse web single sign-on?"],"prefix":"10.1145","author":[{"given":"San-Tsai","family":"Sun","sequence":"first","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Eric","family":"Pospisil","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Ildar","family":"Muslukhov","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Nuray","family":"Dindar","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Kirstie","family":"Hawkey","sequence":"additional","affiliation":[{"name":"Dalhousie University, Halifax, NS, Canada"}]},{"given":"Konstantin","family":"Beznosov","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]}],"member":"320","published-online":{"date-parts":[[2011,7,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_2_1","unstructured":"AOL LLC. AOL Open Authentication API. http:\/\/dev.aol.com\/api\/openauth January 2008.  AOL LLC. AOL Open Authentication API. http:\/\/dev.aol.com\/api\/openauth January 2008."},{"key":"e_1_3_2_1_3_1","unstructured":"CBS News. Poll: Privacy rights under attack. http:\/\/www.cbsnews.com\/stories\/2005\/09\/30\/opinion\/polls\/main894733.shtml October 2005.  CBS News. Poll: Privacy rights under attack. http:\/\/www.cbsnews.com\/stories\/2005\/09\/30\/opinion\/polls\/main894733.shtml October 2005."},{"key":"e_1_3_2_1_4_1","first-page":"1","volume-title":"Proceedings of 15th USENIX UNIX Security Symposium","author":"Chiasson Sonia","year":"2006"},{"key":"e_1_3_2_1_5_1","unstructured":"CoreStreet Ltd. Spoofstick. http:\/\/www.spoofstick.com\/ 2005.  CoreStreet Ltd. Spoofstick. http:\/\/www.spoofstick.com\/ 2005."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.35.8.982"},{"key":"e_1_3_2_1_7_1","unstructured":"Jerry DeVault Brian Tretick and Kevin Ogorzelec. Privacy and independent verification: What consumers want. http:\/\/consumerprivacyguide.com\/privacy\/ccp\/verification1.pdf 2002.  Jerry DeVault Brian Tretick and Kevin Ogorzelec. Privacy and independent verification: What consumers want. http:\/\/consumerprivacyguide.com\/privacy\/ccp\/verification1.pdf 2002."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2008.49"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073009"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_11_1","unstructured":"Earthlink Inc. Earthlink toolbar: scambloker for Windows users. http:\/\/www.earthlink.net\/ 2008.  Earthlink Inc. Earthlink toolbar: scambloker for Windows users. http:\/\/www.earthlink.net\/ 2008."},{"key":"e_1_3_2_1_12_1","unstructured":"Facebook Inc. Facebook Platform. http:\/\/www.facebook.com\/platform 2010.  Facebook Inc. Facebook Platform. http:\/\/www.facebook.com\/platform 2010."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_2_1_14_1","unstructured":"Beverly Freeman. Yahoo! OpenID:One Key Many Doors. http:\/\/developer.yahoo.com\/openid\/openid-research-jul08.pdf July 2008.  Beverly Freeman. Yahoo! OpenID:One Key Many Doors. http:\/\/developer.yahoo.com\/openid\/openid-research-jul08.pdf July 2008."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143127"},{"key":"e_1_3_2_1_16_1","unstructured":"Google Inc. Authsub authentication for web applications. http:\/\/code.google.com\/apis\/accounts\/docs\/AuthSub.html December 2008.  Google Inc. Authsub authentication for web applications. http:\/\/code.google.com\/apis\/accounts\/docs\/AuthSub.html December 2008."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060815"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1391949.1391950"},{"key":"e_1_3_2_1_20_1","unstructured":"Internet2. Shibboleth System. http:\/\/shibboleth.internet2.edu\/ 2008.  Internet2. Shibboleth System. http:\/\/shibboleth.internet2.edu\/ 2008."},{"key":"e_1_3_2_1_21_1","volume-title":"Springer","author":"Jonassen David","year":"2008"},{"key":"e_1_3_2_1_22_1","unstructured":"Ben Laurie. OpenID: Phishing Heaven. http:\/\/www.links.org\/?p=187 January 2007.  Ben Laurie. OpenID: Phishing Heaven. http:\/\/www.links.org\/?p=187 January 2007."},{"key":"e_1_3_2_1_23_1","unstructured":"Liberty Alliance. Liberty Alliance Project. http:\/\/www.projectliberty.org\/ 2002.  Liberty Alliance. Liberty Alliance Project. http:\/\/www.projectliberty.org\/ 2002."},{"key":"e_1_3_2_1_24_1","unstructured":"John McCrea. Introducing two-click signup. http:\/\/blog.plaxo.com\/archives\/2009\/01\/introducing_two_1.html January 2009.  John McCrea. Introducing two-click signup. http:\/\/blog.plaxo.com\/archives\/2009\/01\/introducing_two_1.html January 2009."},{"key":"e_1_3_2_1_25_1","unstructured":"Chris Messina. OpenID Phishing Brainstorm. http:\/\/wiki.openid.net\/OpenID_JPhishing_Brainstorm 2009.  Chris Messina. OpenID Phishing Brainstorm. http:\/\/wiki.openid.net\/OpenID_JPhishing_Brainstorm 2009."},{"key":"e_1_3_2_1_26_1","unstructured":"Microsoft Inc. Beyond Windows CardSpace. http:\/\/blogs.msdn.com\/b\/card\/archive\/2011\/02\/15\/beyond-windows-cardspace.aspx 2011.  Microsoft Inc. Beyond Windows CardSpace. http:\/\/blogs.msdn.com\/b\/card\/archive\/2011\/02\/15\/beyond-windows-cardspace.aspx 2011."},{"key":"e_1_3_2_1_27_1","unstructured":"Mozila Labs. Weave Identity Account Manager. https:\/\/wiki.mozilla.org\/Labs\/Weave\/Identity\/Account_Manager 2009.  Mozila Labs. Weave Identity Account Manager. https:\/\/wiki.mozilla.org\/Labs\/Weave\/Identity\/Account_Manager 2009."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1201\/1086\/45241.14.2.20050501\/88289.3"},{"key":"e_1_3_2_1_29_1","unstructured":"Arun Nanda and Michael B. Jones. Identity Selector Interoperability Profile V1.5. http:\/\/informationcard.net\/specifications July 2008.  Arun Nanda and Michael B. Jones. Identity Selector Interoperability Profile V1.5. http:\/\/informationcard.net\/specifications July 2008."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1363-4127(04)00013-5"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1288216.1288221"},{"key":"e_1_3_2_1_32_1","unstructured":"David Recordon and Brad Fitzpatrick. OpenID authentication 2.0. http:\/\/openid.net\/specs\/openid-authentication-2_0.html December 2007.  David Recordon and Brad Fitzpatrick. OpenID authentication 2.0. http:\/\/openid.net\/specs\/openid-authentication-2_0.html December 2007."},{"key":"e_1_3_2_1_33_1","unstructured":"Eric Sachs. Usability Research on Federated Login. http:\/\/sites.google.com\/site\/oauthgoog\/UXFedLogin October 2008.  Eric Sachs. Usability Research on Federated Login. http:\/\/sites.google.com\/site\/oauthgoog\/UXFedLogin October 2008."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.35"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1900546.1900556"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2009.45"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866855.1866868"},{"key":"e_1_3_2_1_38_1","first-page":"399","volume-title":"Proceedings of 18th USENIX Security Symposium","author":"Sunshine Joshua","year":"2009"},{"key":"e_1_3_2_1_39_1","unstructured":"Sxipper Inc. Sxipper form manager Firefox extension. http:\/\/www.sxipper.com\/ 2009.  Sxipper Inc. Sxipper form manager Firefox extension. http:\/\/www.sxipper.com\/ 2009."},{"key":"e_1_3_2_1_40_1","unstructured":"The Information Card Foundation. Advance the use of Information Card. http:\/\/informationcard.net\/foundation 2009.  The Information Card Foundation. Advance the use of Information Card. http:\/\/informationcard.net\/foundation 2009."},{"key":"e_1_3_2_1_41_1","unstructured":"VeriSign Inc. VeriSign OpenID SeatBelt Plugin. https:\/\/pip.verisignlabs.com\/seatbelt.do 2009.  VeriSign Inc. VeriSign OpenID SeatBelt Plugin. https:\/\/pip.verisignlabs.com\/seatbelt.do 2009."},{"key":"e_1_3_2_1_42_1","unstructured":"Wikipedia. Password fatigue. http:\/\/en.wikipedia.org\/wiki\/Password_fatigue 2009.  Wikipedia. Password fatigue. http:\/\/en.wikipedia.org\/wiki\/Password_fatigue 2009."},{"key":"e_1_3_2_1_43_1","unstructured":"Luke Wroblewski. Web Form Design: Fill in the blanks chapter Gradual Engagement. Rosenfeld media 2008.  Luke Wroblewski. Web Form Design: Fill in the blanks chapter Gradual Engagement. Rosenfeld media 2008."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124863"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143133"},{"key":"e_1_3_2_1_46_1","unstructured":"Yahoo Inc. Browser-Based Authentication (BBAuth). http:\/\/developer.yahoo.com\/auth\/ December 2008.  Yahoo Inc. Browser-Based Authentication (BBAuth). http:\/\/developer.yahoo.com\/auth\/ December 2008."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143126"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the 14th Annual Network and Distibuted System Security Symposium (NDSS 2007)","author":"Zhang Yue","year":"2007"}],"event":{"name":"SOUPS '11: Symposium On Usable Privacy and Security","location":"Pittsburgh Pennsylvania","acronym":"SOUPS '11","sponsor":["Carnegie Mellon CyLab","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the Seventh Symposium on Usable Privacy and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2078827.2078833","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2078827.2078833","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:15Z","timestamp":1750241175000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2078827.2078833"}},"subtitle":["an empirical investigation of OpenID"],"short-title":[],"issued":{"date-parts":[[2011,7,20]]},"references-count":48,"alternative-id":["10.1145\/2078827.2078833","10.1145\/2078827"],"URL":"https:\/\/doi.org\/10.1145\/2078827.2078833","relation":{},"subject":[],"published":{"date-parts":[[2011,7,20]]},"assertion":[{"value":"2011-07-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}