{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T06:09:17Z","timestamp":1769753357481,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,7]],"date-time":"2022-06-07T00:00:00Z","timestamp":1654560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,7]]},"DOI":"10.1145\/3532105.3535013","type":"proceedings-article","created":{"date-parts":[[2022,6,8]],"date-time":"2022-06-08T14:29:57Z","timestamp":1654698597000},"page":"139-150","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["\"Why would Someone Hack Me out of Thousands of Students\": Video Presenter's Impact on Motivating Users to Adopt 2FA"],"prefix":"10.1145","author":[{"given":"Elham","family":"Al Qahtani","sequence":"first","affiliation":[{"name":"University of North Carolina at Charlotte, Charlotte, NC, USA"}]},{"given":"Lipsarani","family":"Sahoo","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte, Charlotte, NC, USA"}]},{"given":"Yousra","family":"Javed","sequence":"additional","affiliation":[{"name":"Illinois State University, Normal, IL, USA"}]},{"given":"Mohamed","family":"Shehab","sequence":"additional","affiliation":[{"name":"University of North Carolina at Charlotte, Charlotte, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,6,8]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/2630611.2630615"},{"key":"e_1_3_2_2_2_1","volume-title":"Impediments to adoption of two-factor authentication by home end-users","author":"Ackerman Preston","year":"2014","unstructured":"Preston Ackerman . 2014. Impediments to adoption of two-factor authentication by home end-users . SANS Institute InfoSec Reading Room ( 2014 ). Preston Ackerman. 2014. Impediments to adoption of two-factor authentication by home end-users. SANS Institute InfoSec Reading Room (2014)."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77392-2_24"},{"key":"e_1_3_2_2_4_1","volume-title":"Fourteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Qahtani Elham Al","year":"2018","unstructured":"Elham Al Qahtani , Mohamed Shehab , and Abrar Aljohani . 2018 . The effectiveness of fear appeals in increasing smartphone locking behavior among Saudi Arabians . In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018). 31--46. Elham Al Qahtani, Mohamed Shehab, and Abrar Aljohani. 2018. The effectiveness of fear appeals in increasing smartphone locking behavior among Saudi Arabians. In Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018). 31--46."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2017.1306765"},{"key":"e_1_3_2_2_6_1","volume-title":"Thirteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Albayram Yusuf","year":"2017","unstructured":"Yusuf Albayram , Mohammad Maifi Hasan Khan , Theodore Jensen , and Nhan Nguyen . 2017 . ?... better to use a lock screen than to worry about saving a few seconds of time\": Effect of Fear Appeal in the Context of Smartphone Locking Behavior . In Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017). 49--63. Yusuf Albayram, Mohammad Maifi Hasan Khan, Theodore Jensen, and Nhan Nguyen. 2017. ?... better to use a lock screen than to worry about saving a few seconds of time\": Effect of Fear Appeal in the Context of Smartphone Locking Behavior. In Thirteenth Symposium on Usable Privacy and Security ({SOUPS} 2017). 49--63."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2014.6986978"},{"key":"e_1_3_2_2_8_1","volume-title":"Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS quarterly 34, 3","author":"Anderson Catherine L","year":"2010","unstructured":"Catherine L Anderson and Ritu Agarwal . 2010. Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS quarterly 34, 3 ( 2010 ), 613--643. Catherine L Anderson and Ritu Agarwal. 2010. Practicing safe computing: a multimedia empirical examination of home computer user security behavioral intentions. MIS quarterly 34, 3 (2010), 613--643."},{"key":"e_1_3_2_2_9_1","volume-title":"Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672","author":"Bada Maria","year":"2019","unstructured":"Maria Bada , Angela M Sasse , and Jason RC Nurse . 2019. Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672 ( 2019 ). Maria Bada, Angela M Sasse, and Jason RC Nurse. 2019. Cyber security awareness campaigns: Why do they fail to change behaviour? arXiv preprint arXiv:1901.02672 (2019)."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.51.6.1173"},{"key":"e_1_3_2_2_11_1","volume-title":"Gregory D Moody, and Peter Polak.","author":"Boss Scott R","year":"2015","unstructured":"Scott R Boss , Dennis F Galletta , Paul Benjamin Lowry , Gregory D Moody, and Peter Polak. 2015 . What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS quarterly 39, 4 (2015), 837--864. Scott R Boss, Dennis F Galletta, Paul Benjamin Lowry, Gregory D Moody, and Peter Polak. 2015. What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors. MIS quarterly 39, 4 (2015), 837--864."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174030"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_9"},{"key":"e_1_3_2_2_14_1","unstructured":"Sanchari Das Gianpaolo Russo Andrew Dingman Jayati Dev Olivia Kenny and L. Camp. 2017. A Qualitative Study on Usability and Acceptability of Yubico Security Key. (12 2017).  Sanchari Das Gianpaolo Russo Andrew Dingman Jayati Dev Olivia Kenny and L. Camp. 2017. A Qualitative Study on Usability and Acceptability of Yubico Security Key. (12 2017)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/acp.1346"},{"key":"e_1_3_2_2_16_1","volume-title":"Retrieved","year":"2021","unstructured":"Duo. 2021 . Multi-Factor Authentication from Duo . Retrieved June, 2021 from https:\/\/duo.com\/product\/multi-factor-authentication-mfa. Duo. 2021. Multi-Factor Authentication from Duo. Retrieved June, 2021 from https:\/\/duo.com\/product\/multi-factor-authentication-mfa."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00020"},{"key":"e_1_3_2_2_18_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS","author":"Faklaris Cori","year":"2019","unstructured":"Cori Faklaris , Laura A. Dabbish , and Jason I. Hong . 2019. A Self-Report Measure of End-User Security Attitudes (SA-6) . In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019 ). USENIX Association, Santa Clara, CA, 61--77. Cori Faklaris, Laura A. Dabbish, and Jason I. Hong. 2019. A Self-Report Measure of End-User Security Attitudes (SA-6). In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA, 61--77."},{"key":"e_1_3_2_2_19_1","volume-title":"Impact of users' security awareness on desktop security behavior: A protection motivation theory perspective. Information Systems Management 33, 1","author":"Hanus Bartlomiej","year":"2016","unstructured":"Bartlomiej Hanus and Yu \"Andy\" Wu . 2016. Impact of users' security awareness on desktop security behavior: A protection motivation theory perspective. Information Systems Management 33, 1 ( 2016 ), 2--16. Bartlomiej Hanus and Yu \"Andy\" Wu. 2016. Impact of users' security awareness on desktop security behavior: A protection motivation theory perspective. Information Systems Management 33, 1 (2016), 2--16."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556978"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.10.004"},{"key":"e_1_3_2_2_22_1","volume-title":"Data Privacy Management and Security Assurance","author":"Javed Yousra","unstructured":"Yousra Javed and Mohamed Shehab . 2016. Investigating the animation of application permission dialogs: a case study of Facebook . In Data Privacy Management and Security Assurance . Springer , 146--162. Yousra Javed and Mohamed Shehab. 2016. Investigating the animation of application permission dialogs: a case study of Facebook. In Data Privacy Management and Security Assurance. Springer, 146--162."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/02681102.2013.814040"},{"key":"e_1_3_2_2_24_1","volume-title":"Design of cyber security awareness game utilizing a social media framework. In 2011 Information Security for South Africa","author":"Labuschagne WA","unstructured":"WA Labuschagne , I Burke , Namosha Veerasamy , and MM Eloff . 2011. Design of cyber security awareness game utilizing a social media framework. In 2011 Information Security for South Africa . IEEE , 1--9. WA Labuschagne, I Burke, Namosha Veerasamy, and MM Eloff. 2011. Design of cyber security awareness game utilizing a social media framework. In 2011 Information Security for South Africa. IEEE, 1--9."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1108\/MRR-04-2013-0085"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/01443410500341080"},{"key":"e_1_3_2_2_27_1","volume-title":"Retrieved","year":"2021","unstructured":"Microsoft. 2021 . Microsoft Authenticator . Retrieved June, 2021 from https:\/\/www.microsoft.com\/en-us\/account\/authenticator. Microsoft. 2021. Microsoft Authenticator. Retrieved June, 2021 from https:\/\/www.microsoft.com\/en-us\/account\/authenticator."},{"key":"e_1_3_2_2_28_1","volume-title":"Combining motivational and volitional interventions to promote exercise participation: Protection motivation theory and implementation intentions. British journal of health psychology 7, 2","author":"Milne Sarah","year":"2002","unstructured":"Sarah Milne , Sheina Orbell , and Paschal Sheeran . 2002. Combining motivational and volitional interventions to promote exercise participation: Protection motivation theory and implementation intentions. British journal of health psychology 7, 2 ( 2002 ), 163--184. Sarah Milne, Sheina Orbell, and Paschal Sheeran. 2002. Combining motivational and volitional interventions to promote exercise participation: Protection motivation theory and implementation intentions. British journal of health psychology 7, 2 (2002), 163--184."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445078"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1108\/09685220710831107"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2751323.2751327"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.24"},{"key":"e_1_3_2_2_33_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS","author":"Reese Ken","year":"2019","unstructured":"Ken Reese , Trevor Smith , Jonathan Dutson , Jonathan Armknecht , Jacob Cameron , and Kent Seamons . 2019 . A Usability Study of Five Two-Factor Authentication Methods . In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA. Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons. 2019. A Usability Study of Five Two-Factor Authentication Methods. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA."},{"key":"e_1_3_2_2_34_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security ({SOUPS}","author":"Reese Ken","year":"2019","unstructured":"Ken Reese , Trevor Smith , Jonathan Dutson , Jonathan Armknecht , Jacob Cameron , and Kent Seamons . 2019 . A usability study of five two-factor authentication methods . In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019). 357--370. Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons. 2019. A usability study of five two-factor authentication methods. In Fifteenth Symposium on Usable Privacy and Security ({SOUPS} 2019). 357--370."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00067"},{"key":"e_1_3_2_2_36_1","volume-title":"A protection motivation theory of fear appeals and attitude change1. The journal of psychology 91, 1","author":"Rogers Ronald W","year":"1975","unstructured":"Ronald W Rogers . 1975. A protection motivation theory of fear appeals and attitude change1. The journal of psychology 91, 1 ( 1975 ), 93--114. Ronald W Rogers. 1975. A protection motivation theory of fear appeals and attitude change1. The journal of psychology 91, 1 (1975), 93--114."},{"key":"e_1_3_2_2_37_1","volume-title":"Intention-behavior relations: a conceptual and empirical review. European review of social psychology 12, 1","author":"Sheeran Paschal","year":"2002","unstructured":"Paschal Sheeran . 2002. Intention-behavior relations: a conceptual and empirical review. European review of social psychology 12, 1 ( 2002 ), 1--36. Paschal Sheeran. 2002. Intention-behavior relations: a conceptual and empirical review. European review of social psychology 12, 1 (2002), 1--36."},{"key":"e_1_3_2_2_38_1","volume-title":"The intention--behavior gap. Social and personality psychology compass 10, 9","author":"Sheeran Paschal","year":"2016","unstructured":"Paschal Sheeran and Thomas L Webb . 2016. The intention--behavior gap. Social and personality psychology compass 10, 9 ( 2016 ), 503--518. Paschal Sheeran and Thomas L Webb. 2016. The intention--behavior gap. Social and personality psychology compass 10, 9 (2016), 503--518."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611190701743724"},{"key":"e_1_3_2_2_41_1","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS","author":"Story Peter","year":"2020","unstructured":"Peter Story , Daniel Smullen , Alessandro Acquisti , Lorrie Faith Cranor , Norman Sadeh , and Florian Schaub . 2020 . From Intent to Action: Nudging Users Towards Secure Mobile Payments . In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). 379--415. Peter Story, Daniel Smullen, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, and Florian Schaub. 2020. From Intent to Action: Nudging Users Towards Secure Mobile Payments. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). 379--415."},{"key":"e_1_3_2_2_42_1","volume-title":"Seventeenth Symposium on Usable Privacy and Security (SOUPS","author":"Stransky Christian","year":"2021","unstructured":"Christian Stransky , Dominik Wermke , Johanna Schrader , Nicolas Huaman , Yasemin Acar , Anna Lena Fehlhaber , Miranda Wei , Blase Ur , and Sascha Fahl . 2021 . On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security . In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). 437--454. Christian Stransky, Dominik Wermke, Johanna Schrader, Nicolas Huaman, Yasemin Acar, Anna Lena Fehlhaber, Miranda Wei, Blase Ur, and Sascha Fahl. 2021. On the Limited Impact of Visualizing Encryption: Perceptions of E2E Messaging Security. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). 437--454."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174066"},{"key":"e_1_3_2_2_44_1","volume-title":"Does changing behavioral intentions engender behavior change? A meta-analysis of the experimental evidence. Psychological bulletin 132, 2","author":"Webb Thomas L","year":"2006","unstructured":"Thomas L Webb and Paschal Sheeran . 2006. Does changing behavioral intentions engender behavior change? A meta-analysis of the experimental evidence. Psychological bulletin 132, 2 ( 2006 ), 249. Thomas L Webb and Paschal Sheeran. 2006. Does changing behavioral intentions engender behavior change? A meta-analysis of the experimental evidence. Psychological bulletin 132, 2 (2006), 249."},{"key":"e_1_3_2_2_46_1","volume-title":"Handbook of communication and emotion","author":"Witte Kim","unstructured":"Kim Witte . 1996. Fear as motivator, fear as inhibitor: Using the extended parallel process model to explain fear appeal successes and failures . In Handbook of communication and emotion . Elsevier , 423--450. Kim Witte. 1996. Fear as motivator, fear as inhibitor: Using the extended parallel process model to explain fear appeal successes and failures. In Handbook of communication and emotion. Elsevier, 423--450."},{"key":"e_1_3_2_2_47_1","volume-title":"A meta-analysis of fear appeals: Implications for effective public health campaigns. Health education & behavior 27, 5","author":"Witte Kim","year":"2000","unstructured":"Kim Witte and Mike Allen . 2000. A meta-analysis of fear appeals: Implications for effective public health campaigns. Health education & behavior 27, 5 ( 2000 ), 591--615. Kim Witte and Mike Allen. 2000. A meta-analysis of fear appeals: Implications for effective public health campaigns. Health education & behavior 27, 5 (2000), 591--615."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2018.5095"},{"key":"e_1_3_2_2_49_1","volume-title":"Azah Anir Norman, and Norjihan Abdul Ghani","author":"Ali Zani Azma Alina","year":"2018","unstructured":"Azma Alina Ali Zani , Azah Anir Norman, and Norjihan Abdul Ghani . 2018 . A Review of Security Awareness Approach: Ensuring Communal Learning . (2018). Azma Alina Ali Zani, Azah Anir Norman, and Norjihan Abdul Ghani. 2018. A Review of Security Awareness Approach: Ensuring Communal Learning. (2018)."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07127-5_27"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2016.1136177"}],"event":{"name":"SACMAT '22: The 27th ACM Symposium on Access Control Models and Technologies","location":"New York NY USA","acronym":"SACMAT '22","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532105.3535013","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3532105.3535013","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:09:14Z","timestamp":1750183754000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3532105.3535013"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,7]]},"references-count":50,"alternative-id":["10.1145\/3532105.3535013","10.1145\/3532105"],"URL":"https:\/\/doi.org\/10.1145\/3532105.3535013","relation":{},"subject":[],"published":{"date-parts":[[2022,6,7]]},"assertion":[{"value":"2022-06-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}