{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:15:54Z","timestamp":1764936954517,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T00:00:00Z","timestamp":1512345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,4]]},"DOI":"10.1145\/3134600.3134629","type":"proceedings-article","created":{"date-parts":[[2017,12,4]],"date-time":"2017-12-04T19:18:32Z","timestamp":1512415112000},"page":"212-224","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["I Like It, but I Hate It"],"prefix":"10.1145","author":[{"given":"Jake","family":"Weidman","sequence":"first","affiliation":[{"name":"The Pennsylvania State University, University Park, Pennsylvania"}]},{"given":"Jens","family":"Grossklags","sequence":"additional","affiliation":[{"name":"Technical University of Munich, Garching, Germany"}]}],"member":"320","published-online":{"date-parts":[[2017,12,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(09)70097-2"},{"key":"e_1_3_2_1_2_1","volume-title":"IT006 234","author":"Absalom Richard","year":"2012","unstructured":"Richard Absalom . 2012. International Data Privacy Legislation Review: A Guide for BYOD Policies. Ovum Consulting , IT006 234 ( 2012 ), 3--5. Richard Absalom. 2012. International Data Privacy Legislation Review: A Guide for BYOD Policies. Ovum Consulting, IT006 234 (2012), 3--5."},{"key":"e_1_3_2_1_3_1","first-page":"457","article-title":"Evaluating the performance of two-factor authentication solution in the banking sector","volume":"9","author":"Adeoye Olufemi","year":"2012","unstructured":"Olufemi Adeoye . 2012 . Evaluating the performance of two-factor authentication solution in the banking sector . IJCSI International Journal of Computer Science Issues 9 , 4 (2012), 457 -- 462 . Olufemi Adeoye. 2012. Evaluating the performance of two-factor authentication solution in the banking sector. IJCSI International Journal of Computer Science Issues 9, 4 (2012), 457--462.","journal-title":"IJCSI International Journal of Computer Science Issues"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/AICCSA.2009.5069395"},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the UBICOMP Workshop on Ubiquitous Display Environments.","author":"Ballagas Rafael","year":"2004","unstructured":"Rafael Ballagas , Michael Rohs , Jennifer Sheridan , and Jan Borchers . 2004 . BYOD: Bring your own device . In Proceedings of the UBICOMP Workshop on Ubiquitous Display Environments. Rafael Ballagas, Michael Rohs, Jennifer Sheridan, and Jan Borchers. 2004. BYOD: Bring your own device. In Proceedings of the UBICOMP Workshop on Ubiquitous Display Environments."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.84.2.191"},{"key":"e_1_3_2_1_7_1","volume-title":"BYOD: The New Workplace Trend.","author":"Bansal Manu","year":"2013","unstructured":"Manu Bansal . 2013 . BYOD: The New Workplace Trend. (2013). http:\/\/www.cisco.com\/c\/en_in\/about\/knowledge-network\/byod-new-workplace-trend.html Manu Bansal. 2013. BYOD: The New Workplace Trend. (2013). http:\/\/www.cisco.com\/c\/en_in\/about\/knowledge-network\/byod-new-workplace-trend.html"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/572260.572261"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(14)70090-X"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699390"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ejis.3000438"},{"key":"e_1_3_2_1_13_1","volume-title":"BYOD trend pressures corporate networks. eWeek 28, 14 (Sept","author":"Burt Jeffrey","year":"2011","unstructured":"Jeffrey Burt . 2011. BYOD trend pressures corporate networks. eWeek 28, 14 (Sept . 2011 ), 30--31. Jeffrey Burt. 2011. BYOD trend pressures corporate networks. eWeek 28, 14 (Sept. 2011), 30--31."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2003.10.004"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/358886.358895"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23025"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the International Conference on Mobile Computing, Applications, and Services (MobiCASE). 17--38","author":"Dodson Ben","year":"2010","unstructured":"Ben Dodson , Debangsu Sengupta , Dan Boneh , and Monica Lam . 2010 . Secure, consumer-friendly web authentication and payments with a phone . In Proceedings of the International Conference on Mobile Computing, Applications, and Services (MobiCASE). 17--38 . Ben Dodson, Debangsu Sengupta, Dan Boneh, and Monica Lam. 2010. Secure, consumer-friendly web authentication and payments with a phone. In Proceedings of the International Conference on Mobile Computing, Applications, and Services (MobiCASE). 17--38."},{"key":"e_1_3_2_1_18_1","unstructured":"Exchange Online. 2016. Managing devices for Outlook for iOS and Android in Exchange Online. (2016). https:\/\/technet.microsoft.com\/en-us\/library\/mt465743(v=exchg.150).aspx  Exchange Online. 2016. Managing devices for Outlook for iOS and Android in Exchange Online. (2016). https:\/\/technet.microsoft.com\/en-us\/library\/mt465743(v=exchg.150).aspx"},{"key":"e_1_3_2_1_19_1","volume-title":"FIL-103-2005.","author":"Federal Financial Institutions Examination Council","year":"2005","unstructured":"Federal Financial Institutions Examination Council . 2005. Authentication in an internet banking environment. Financial Institution Letter , FIL-103-2005. Washington, DC : Federal Deposit Insurance Corp. (FDIC) (Oct . 2005 ). Federal Financial Institutions Examination Council. 2005. Authentication in an internet banking environment. Financial Institution Letter, FIL-103-2005. Washington, DC: Federal Deposit Insurance Corp. (FDIC) (Oct. 2005)."},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 20th Americas Conference on Information Systems (AMCIS).","author":"Giddens Laurie","year":"2014","unstructured":"Laurie Giddens and John Tripp . 2014 . It's my tool, I know how to use it: A theory of the impact of BYOD on device competence and job satisfaction . In Proceedings of the 20th Americas Conference on Information Systems (AMCIS). Laurie Giddens and John Tripp. 2014. It's my tool, I know how to use it: A theory of the impact of BYOD on device competence and job satisfaction. In Proceedings of the 20th Americas Conference on Information Systems (AMCIS)."},{"key":"e_1_3_2_1_21_1","volume-title":"Campus announces data breach. Berkeley News (April","author":"Gilmore Janet","year":"2015","unstructured":"Janet Gilmore . 2015. Campus announces data breach. Berkeley News (April 2015 ). Janet Gilmore. 2015. Campus announces data breach. Berkeley News (April 2015)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.12.001"},{"volume-title":"Work redesign","author":"Hackman Richard","key":"e_1_3_2_1_23_1","unstructured":"Richard Hackman and Greg Oldham . 1980. Work redesign . Addison-Wesley . Richard Hackman and Greg Oldham. 1980. Work redesign. Addison-Wesley."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0018556"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/15391523.2011.10782576"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2856490"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the International Conference for Internet Technology And Secured Transactions (ICITST). 259--264","author":"Just Mike","year":"2012","unstructured":"Mike Just and David Aspinall . 2012 . On the security and usability of dual credential authentication in UK online banking . In Proceedings of the International Conference for Internet Technology And Secured Transactions (ICITST). 259--264 . Mike Just and David Aspinall. 2012. On the security and usability of dual credential authentication in UK online banking. In Proceedings of the International Conference for Internet Technology And Secured Transactions (ICITST). 259--264."},{"key":"e_1_3_2_1_28_1","volume-title":"Students hit by University of Greenwich data breach. BBC News (Feb","author":"Kelion Leo","year":"2016","unstructured":"Leo Kelion . 2016. Students hit by University of Greenwich data breach. BBC News (Feb . 2016 ). Leo Kelion. 2016. Students hit by University of Greenwich data breach. BBC News (Feb. 2016)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(11)70038-1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2009.04.014"},{"key":"e_1_3_2_1_31_1","volume-title":"The Diamondback (Feb","author":"King Michael R.","year":"2014","unstructured":"Michael R. King . 2014. 309,079 UMD social security numbers compromised. The Diamondback (Feb . 2014 ). Michael R. King. 2014. 309,079 UMD social security numbers compromised. The Diamondback (Feb. 2014)."},{"key":"e_1_3_2_1_32_1","volume-title":"Kerberos and two-factor authentication. OSF-DCE Request For Comments: 59.0","author":"Kotanchik Jim","year":"1994","unstructured":"Jim Kotanchik . 1994. Kerberos and two-factor authentication. OSF-DCE Request For Comments: 59.0 ( 1994 ). Jim Kotanchik. 1994. Kerberos and two-factor authentication. OSF-DCE Request For Comments: 59.0 (1994)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2015.23001"},{"key":"e_1_3_2_1_34_1","volume-title":"IU wraps up data breach response effort. Indiana Public Media (July","author":"Kuhn Casey","year":"2014","unstructured":"Casey Kuhn . 2014. IU wraps up data breach response effort. Indiana Public Media (July 2014 ). Casey Kuhn. 2014. IU wraps up data breach response effort. Indiana Public Media (July 2014)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1940941.1940971"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 1st International Conference on Convergence and its Application (ICCA). 172--175","author":"Lee Keunwang","year":"2013","unstructured":"Keunwang Lee and Haeseok Oh . 2013 . Research on access control method by user authority using two-factor authentication . In Proceedings of the 1st International Conference on Convergence and its Application (ICCA). 172--175 . Keunwang Lee and Haeseok Oh. 2013. Research on access control method by user authority using two-factor authentication. In Proceedings of the 1st International Conference on Convergence and its Application (ICCA). 172--175."},{"key":"e_1_3_2_1_37_1","volume-title":"Data breach at Butler University exposes personal data of nearly 200,000. (June","author":"Longnecker Emily","year":"2014","unstructured":"Emily Longnecker . 2014. Data breach at Butler University exposes personal data of nearly 200,000. (June 2014 ). Emily Longnecker. 2014. Data breach at Butler University exposes personal data of nearly 200,000. (June 2014)."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(12)70031-3"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2011.6123150"},{"key":"e_1_3_2_1_40_1","unstructured":"Michigan State University. 2016. Information on data security incident. (2016).  Michigan State University. 2016. Information on data security incident. (2016)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.136"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2012.93"},{"key":"e_1_3_2_1_43_1","unstructured":"Steven Miller Clifford Neuman Jeffrey Schiller and Jermoe Saltzer. 1987. Kerberos authentication and authorization system. In Project Athena Technical Plan.  Steven Miller Clifford Neuman Jeffrey Schiller and Jermoe Saltzer. 1987. Kerberos authentication and authorization system. In Project Athena Technical Plan."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1287\/isre.2.3.192"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(12)70111-3"},{"key":"e_1_3_2_1_46_1","volume-title":"Federal Information Processing Standards Publication 197. (Nov.","author":"National Institute of Standards and Technology. 2001.","year":"2001","unstructured":"National Institute of Standards and Technology. 2001. Announcing the Advanced Encryption Standard (AES) , Federal Information Processing Standards Publication 197. (Nov. 2001 ). National Institute of Standards and Technology. 2001. Announcing the Advanced Encryption Standard (AES), Federal Information Processing Standards Publication 197. (Nov. 2001)."},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the 19th Americas Conference on Information Systems (AMCIS).","author":"Ortbach Kevin","year":"2013","unstructured":"Kevin Ortbach , Martin Bode , and Bj\u00f6rn Niehaves . 2013 . What influences technological individualization? -- An analysis of antecedents to IT consumerization behavior . In Proceedings of the 19th Americas Conference on Information Systems (AMCIS). Kevin Ortbach, Martin Bode, and Bj\u00f6rn Niehaves. 2013. What influences technological individualization? -- An analysis of antecedents to IT consumerization behavior. In Proceedings of the 19th Americas Conference on Information Systems (AMCIS)."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2751323.2751327"},{"volume-title":"Penn State says College of Engineering hit by two data breaches. (May","year":"2015","key":"e_1_3_2_1_49_1","unstructured":"Reuters. 2015. Penn State says College of Engineering hit by two data breaches. (May 2015 ). Reuters. 2015. Penn State says College of Engineering hit by two data breaches. (May 2015)."},{"volume-title":"Diffusion of innovations","author":"Rogers Everett","key":"e_1_3_2_1_50_1","unstructured":"Everett Rogers . 2010. Diffusion of innovations . Simon and Schuster . Everett Rogers. 2010. Diffusion of innovations. Simon and Schuster."},{"key":"e_1_3_2_1_51_1","volume-title":"Add Butler University to breach list. (June","author":"Roman Jeffrey","year":"2014","unstructured":"Jeffrey Roman . 2014. Add Butler University to breach list. (June 2014 ). Jeffrey Roman. 2014. Add Butler University to breach list. (June 2014)."},{"key":"e_1_3_2_1_52_1","first-page":"936","article-title":"Managing and Enforcing Policies on Mobile Devices. (Aug. 2008)","volume":"12","author":"Roman Manuel","year":"2008","unstructured":"Manuel Roman , Gregory Buzzard , Shahid Shoaib , Eugene Krivopaltsev , and Michael Diener . 2008 . Managing and Enforcing Policies on Mobile Devices. (Aug. 2008) . US Patent App. 12\/188 , 936 . Manuel Roman, Gregory Buzzard, Shahid Shoaib, Eugene Krivopaltsev, and Michael Diener. 2008. Managing and Enforcing Policies on Mobile Devices. (Aug. 2008). US Patent App. 12\/188,936.","journal-title":"US Patent App."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.19030\/rbis.v17i2.7846"},{"key":"e_1_3_2_1_54_1","volume-title":"Guide to enterprise password management (draft): Recommendations of the National Institute of Standards and Technology","author":"Scarfone Karen","year":"2009","unstructured":"Karen Scarfone and Murugiah Souppaya . 2009. Guide to enterprise password management (draft): Recommendations of the National Institute of Standards and Technology . Gaithersburg, MD : US Dept. of Commerce, Technology Administration, National Institute of Standards and Technology ( 2009 ). Karen Scarfone and Murugiah Souppaya. 2009. Guide to enterprise password management (draft): Recommendations of the National Institute of Standards and Technology. Gaithersburg, MD: US Dept. of Commerce, Technology Administration, National Institute of Standards and Technology (2009)."},{"key":"e_1_3_2_1_55_1","unstructured":"Vasco Data Security. 2010. DIGIPASS GO 6. (2010).  Vasco Data Security. 2010. DIGIPASS GO 6. (2010)."},{"key":"e_1_3_2_1_56_1","volume-title":"North Dakota university system says server hacked. Bismarck Tribune (March","author":"Smith Nick","year":"2014","unstructured":"Nick Smith . 2014. North Dakota university system says server hacked. Bismarck Tribune (March 2014 ). Nick Smith. 2014. North Dakota university system says server hacked. Bismarck Tribune (March 2014)."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.acalib.2005.10.011"},{"key":"e_1_3_2_1_58_1","volume-title":"A playground for hackers'. (July","author":"Straumsheim Carl","year":"2015","unstructured":"Carl Straumsheim . 2015. ' A playground for hackers'. (July 2015 ). Carl Straumsheim. 2015. 'A playground for hackers'. (July 2015)."},{"key":"e_1_3_2_1_59_1","volume-title":"Proceedings of the Southern Association for Information Systems Conference (SAIS)","author":"Strouble Dennis","year":"2009","unstructured":"Dennis Strouble , Gregory Schechtman , and Alan Alsop . 2009 . Productivity and usability effects of using a two-factor security system . Proceedings of the Southern Association for Information Systems Conference (SAIS) (2009), 196--201. Dennis Strouble, Gregory Schechtman, and Alan Alsop. 2009. Productivity and usability effects of using a two-factor security system. Proceedings of the Southern Association for Information Systems Conference (SAIS) (2009), 196--201."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.013"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.24908\/ss.v8i4.4183"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1353-4858(12)70013-2"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2009.5336918"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.09.008"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2009.10.001"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1989.4279067"}],"event":{"name":"ACSAC 2017: 2017 Annual Computer Security Applications Conference","acronym":"ACSAC 2017","location":"Orlando FL USA"},"container-title":["Proceedings of the 33rd Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134629","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3134600.3134629","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:11Z","timestamp":1750217411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3134600.3134629"}},"subtitle":["Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication"],"short-title":[],"issued":{"date-parts":[[2017,12,4]]},"references-count":66,"alternative-id":["10.1145\/3134600.3134629","10.1145\/3134600"],"URL":"https:\/\/doi.org\/10.1145\/3134600.3134629","relation":{},"subject":[],"published":{"date-parts":[[2017,12,4]]},"assertion":[{"value":"2017-12-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}