{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T10:36:15Z","timestamp":1769250975349,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,29]],"date-time":"2022-09-29T00:00:00Z","timestamp":1664409600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Human Centered Systems Security sponsored by the state of North Rhine-Westphalia"},{"name":"Deutsche Forschungsgemeinschaft (DFG, German Research Foundation)","award":["EXC 2092 CASA ? 390781972"],"award-info":[{"award-number":["EXC 2092 CASA ? 390781972"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,29]]},"DOI":"10.1145\/3549015.3554208","type":"proceedings-article","created":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T18:11:27Z","timestamp":1662660687000},"page":"172-188","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["\u201cIt\u2019s Just a Lot of Prerequisites\u201d: A User Perception and Usability Analysis of the German ID Card as a FIDO2 Authenticator"],"prefix":"10.1145","author":[{"given":"Markus","family":"Keil","sequence":"first","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"given":"Philipp","family":"Markert","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Germany"}]},{"given":"Markus","family":"D\u00fcrmuth","sequence":"additional","affiliation":[{"name":"Leibniz University Hannover, Germany"}]}],"member":"320","published-online":{"date-parts":[[2022,9,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77392-2_2"},{"key":"e_1_3_2_1_2_1","volume-title":"Security and Cryptography for Networks(SCN\u00a0\u201914)","author":"Bailey V.","unstructured":"Daniel\u00a0V. Bailey, Markus D\u00fcrmuth, and Christof Paar. 2014. Statistics on Password Re-use and Adaptive Strength for Financial Accounts. In Security and Cryptography for Networks(SCN\u00a0\u201914). Springer, Amalfi, Italy, 218\u2013235."},{"key":"e_1_3_2_1_3_1","volume-title":"Enthusiastic and Casual Signal Users\u2019 Understanding of Signal PINs. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201921)","author":"Bailey V.","year":"2021","unstructured":"Daniel\u00a0V. Bailey, Philipp Markert, and Adam\u00a0J. Aviv. 2021. \u201cI have no idea what they\u2019re trying to accomplish:\u201d Enthusiastic and Casual Signal Users\u2019 Understanding of Signal PINs. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201921). USENIX, Virtual Conference, 417\u2013436."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699390"},{"key":"e_1_3_2_1_7_1","volume-title":"The Password Thicket: Technical and Market Failures in Human Authentication on the Web. In Workshop on the Economics of Information Security(WEIS\u00a0\u201910)","author":"Bonneau Joseph","year":"2010","unstructured":"Joseph Bonneau and S\u00f6ren Preibusch. 2010. The Password Thicket: Technical and Market Failures in Human Authentication on the Web. In Workshop on the Economics of Information Security(WEIS\u00a0\u201910). ACM, Cambridge, Massachusetts, USA."},{"key":"e_1_3_2_1_8_1","volume-title":"The Password Thicket: Technical and Market Failures in Human Authentication on the Web. In Workshop on the Economics of Information Security(WEIS\u00a0\u201910)","author":"Bonneau Joseph","year":"2010","unstructured":"Joseph Bonneau and S\u00f6ren Preibusch. 2010. The Password Thicket: Technical and Market Failures in Human Authentication on the Web. In Workshop on the Economics of Information Security(WEIS\u00a0\u201910). ACM, Cambridge, Massachusetts, USA."},{"key":"e_1_3_2_1_9_1","volume-title":"SUS: A Quick and Dirty Usability Scale. In Usability Evaluation in Industry, Patrick\u00a0W","author":"Brooke John","year":"1996","unstructured":"John Brooke. 1996. SUS: A Quick and Dirty Usability Scale. In Usability Evaluation in Industry, Patrick\u00a0W. Jordan, Bruce Thomas, Bernard Weerdmeester, and Ian\u00a0Lyall McClelland (Eds.). CRC Press, London, United Kingdom, Chapter\u00a021, 189\u2013194."},{"key":"e_1_3_2_1_10_1","first-page":"2","article-title":"SUS: A Retrospective","volume":"8","author":"Brooke John","year":"2013","unstructured":"John Brooke. 2013. SUS: A Retrospective. Journal of Usability Studies 8, 2 (Feb. 2013), 29\u201340.","journal-title":"Journal of Usability Studies"},{"key":"e_1_3_2_1_11_1","volume-title":"eCommerce Fraud \u2013 Time to Act?Card Technology Today 21, 1 (Jan","author":"Brunswick Steve","year":"2009","unstructured":"Steve Brunswick. 2009. eCommerce Fraud \u2013 Time to Act?Card Technology Today 21, 1 (Jan. 2009), 12\u201313."},{"key":"e_1_3_2_1_12_1","volume-title":"Online Passwords: Keep It Complicated. https:\/\/www.theguardian.com\/technology\/2012\/oct\/05\/online-security-passwords-tricks-hacking, as of 2022\/08\/28 13:36:45.","author":"Burkeman Oliver","year":"2012","unstructured":"Oliver Burkeman. 2012. Online Passwords: Keep It Complicated. https:\/\/www.theguardian.com\/technology\/2012\/oct\/05\/online-security-passwords-tricks-hacking, as of 2022\/08\/28 13:36:45."},{"key":"e_1_3_2_1_13_1","unstructured":"Pedro Canahuati. 2019. Keeping Passwords Secure. https:\/\/newsroom.fb.com\/news\/2019\/03\/keeping-passwords-secure\/ as of 2022\/08\/28 13:36:45."},{"key":"e_1_3_2_1_14_1","volume-title":"When Privacy Meets Security: Leveraging Personal Information for Password Cracking. CoRR abs\/1304.6584 (April","author":"Castelluccia Claude","year":"2013","unstructured":"Claude Castelluccia, Abdelberi Chaabane, Markus D\u00fcrmuth, and Daniele Perito. 2013. When Privacy Meets Security: Leveraging Personal Information for Password Cracking. CoRR abs\/1304.6584 (April 2013), 1\u201316."},{"key":"e_1_3_2_1_15_1","volume-title":"Symposium on Usable Privacy and Security(SOUPS\u00a0\u201919)","author":"Ciolino St\u00e9phane","year":"2019","unstructured":"St\u00e9phane Ciolino, Simon Parkin, and Paul Dunphy. 2019. Of Two Minds about Two-Factor: Understanding Everyday FIDO U2F Usability through Device Comparison and Experience Sampling. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201919). USENIX, Santa Clara, California, USA, 339\u2013356."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174030"},{"key":"e_1_3_2_1_17_1","volume-title":"The Tangled Web of Password Reuse. In Symposium on Network and Distributed System Security(NDSS\u00a0\u201914)","author":"Das Anupam","year":"2014","unstructured":"Anupam Das, Joseph Bonneau, Matthew Caesar, Nikita Borisov, and XiaoFeng Wang. 2014. The Tangled Web of Password Reuse. In Symposium on Network and Distributed System Security(NDSS\u00a0\u201914). ISOC, San Diego, California, USA."},{"key":"e_1_3_2_1_18_1","volume-title":"Non-Inclusive Online Security: Older Adults\u2019 Experience with Two-Factor Authentication. In Hawaii International Conference on System Sciences(HICSS\u00a0\u201921)","author":"Das Sanchari","year":"2021","unstructured":"Sanchari Das, Andrew Kim, Ben Jelen, Lesa Huber, and L.\u00a0Jean Camp. 2021. Non-Inclusive Online Security: Older Adults\u2019 Experience with Two-Factor Authentication. In Hawaii International Conference on System Sciences(HICSS\u00a0\u201921). AIS, Kauai, Hawaii, USA, 6472\u20136481."},{"key":"e_1_3_2_1_19_1","volume-title":"Who Are You?! Adventures in Authentication Workshop(WAY\u00a0\u201919).","author":"Das Sanchari","unstructured":"Sanchari Das, Andrew Kim, Ben Jelen, Joshua Streiff, L.\u00a0Jean Camp, and Lesa Huber. 2019. Towards Implementing Inclusive Authentication Technologies for Older Adults. In Who Are You?! Adventures in Authentication Workshop(WAY\u00a0\u201919). Santa Clara, California, USA, 1\u20135."},{"key":"e_1_3_2_1_20_1","volume-title":"SIGCHI Workshop on Designing Interactions for the Ageing Populations(CHI\u00a0EA\u00a0\u201920)","author":"Das Sanchari","year":"2020","unstructured":"Sanchari Das, Andrew Kim, Ben Jelen, Joshua Streiff, L.\u00a0Jean Camp, and Lesa Huber. 2020. Why Don\u2019t Older Adults Adopt Two-Factor Authentication?. In SIGCHI Workshop on Designing Interactions for the Ageing Populations(CHI\u00a0EA\u00a0\u201920). Honolulu, Hawaii, USA, 1\u20135."},{"key":"e_1_3_2_1_21_1","volume-title":"Workshop on Socio-Technical Aspects in Security and Trust(STAST\u00a0\u201917)","author":"Das Sanchari","year":"2017","unstructured":"Sanchari Das, Gianpaolo Russo, Andrew\u00a0C Dingman, Jayati Dev, Olivia Kenny, and L.\u00a0Jean Camp. 2017. A Qualitative Study on Usability and Acceptability of Yubico Security Key. In Workshop on Socio-Technical Aspects in Security and Trust(STAST\u00a0\u201917). ACM, Orlando, Florida, USA, 28\u201339."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23025"},{"key":"e_1_3_2_1_23_1","volume-title":"Password Strength: An Empirical Analysis. In Conference on Information Communications(INFOCOM\u00a0\u201910)","author":"Dell\u2019Amico Matteo","year":"2010","unstructured":"Matteo Dell\u2019Amico, Pietro Michiardi, and Yves Roudier. 2010. Password Strength: An Empirical Analysis. In Conference on Information Communications(INFOCOM\u00a0\u201910). IEEE, San Diego, California, USA, 983\u2013991."},{"key":"e_1_3_2_1_24_1","volume-title":"Contextual Inquiry of People with Visual Impairments in Authentication. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201915)","author":"Dosono Bryan","year":"2015","unstructured":"Bryan Dosono, Jordan Hayes, and Yang Wang. 2015. \u201cI\u2019m Stuck!\u201d: A Contextual Inquiry of People with Visual Impairments in Authentication. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201915). USENIX, Ottawa, Canada, 151\u2013168."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0965-2590(07)70017-8"},{"key":"e_1_3_2_1_26_1","first-page":"1","article-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation)","author":"The European Parliament and the Council of the European Union.","year":"2016","unstructured":"The European Parliament and the Council of the European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union, L 119\/1.","journal-title":"Official Journal of the European Union"},{"key":"e_1_3_2_1_27_1","unstructured":"Facebook Inc.2011. A New Suite of Safety Tools. https:\/\/www.facebook.com\/notes\/10160198855746729 as of 2022\/08\/28 13:36:45."},{"key":"e_1_3_2_1_28_1","volume-title":"Small Company. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201920)","author":"Farke M.","year":"2020","unstructured":"Florian\u00a0M. Farke, Lennart Lorenz, Theodor Schnitzler, Philipp Markert, and Markus D\u00fcrmuth. 2020. \u201cYou still use the password after all\u201d \u2013 Exploring FIDO2 Security Keys in a Small Company. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201920). USENIX, Virtual Conference, 19\u201335."},{"key":"e_1_3_2_1_29_1","unstructured":"Frank Felden Taavi Einaste Thilo Zelt Mario M\u00fcller Patrick Bauer Hendrik Lume Sabine Siegert and Hoffmann Till. 2020. Ten Years Electronic Identity: How Germany Can Establish a Successful eID Ecosystem. https:\/\/nortal.com\/de\/blog\/ten-years-electronic-identity-how-germany-can-establish-a-successful-eid-ecosystem\/ as of 2022\/08\/28 13:36:45."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_2_1_31_1","first-page":"6","article-title":"A Personal Resource for Technology Interaction: Development and Validation of the Affinity for Technology Interaction (ATI) Scale","volume":"35","author":"Franke Thomas","year":"2018","unstructured":"Thomas Franke, Christiane Attig, and Daniel Wessel. 2018. A Personal Resource for Technology Interaction: Development and Validation of the Affinity for Technology Interaction (ATI) Scale. International Journal of Human-Computer Interaction 35, 6 (March 2018), 456\u2013467.","journal-title":"International Journal of Human-Computer Interaction"},{"key":"e_1_3_2_1_32_1","volume-title":"Adventures in Authentication Workshop(WAY\u00a0\u201918)","author":"Golla Maximilian","year":"2018","unstructured":"Maximilian Golla, Theodor Schnitzler, and Markus D\u00fcrmuth. 2018. \u201cWill Any Password Do?\u201d Exploring Rate-Limiting on the Web. In Who Are You?! Adventures in Authentication Workshop(WAY\u00a0\u201918). USENIX, Baltimore, Maryland, USA."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2010.12.001"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2016.2568187"},{"key":"e_1_3_2_1_35_1","volume-title":"On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards. In Privacy Enhancing Technologies Symposium(PETS\u00a0\u201913)","author":"Harbach Marian","year":"2013","unstructured":"Marian Harbach, Sascha Fahl, Matthias Rieger, and Matthew Smith. 2013. On the Acceptance of Privacy-Preserving Authentication Technology: The Curious Case of National Identity Cards. In Privacy Enhancing Technologies Symposium(PETS\u00a0\u201913). Springer, Bloomington, Indiana, USA, 245\u2013264."},{"key":"e_1_3_2_1_36_1","unstructured":"Christian Kahlo. 2021. WebAuthn-eID for Firefox. https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/webauthn-eid-for-firefox\/ as of 2022\/08\/28 13:36:45."},{"key":"e_1_3_2_1_37_1","unstructured":"Christian Kahlo and Frank Aufmhoff. 2017. FIDELIO eService specification. https:\/\/gitlab.com\/adessoAG\/FIDELIO\/Documentation\/-\/raw\/master\/FIDELIO eService_V1_1.pdf as of 2022\/08\/28 13:36:45."},{"key":"e_1_3_2_1_38_1","unstructured":"Christian Kahlo and Markus Krebs. 2020. Description of the Business Process FIDELIO. https:\/\/gitlab.com\/adessoAG\/FIDELIO\/Documentation\/-\/raw\/master\/FIDELIO_Dienstbeschreibung_V1_3.pdf as of 2022\/08\/28 13:36:45."},{"key":"e_1_3_2_1_39_1","unstructured":"Markus Keil. 2021. Introduction eID and FIDO. https:\/\/youtu.be\/jFpprzm0kp0 as of 2022\/08\/28 13:36:45."},{"key":"e_1_3_2_1_40_1","unstructured":"Markus Keil. 2021. Setup Configuration. https:\/\/youtu.be\/Fefg5U8k8P0 as of 2022\/08\/28 13:36:45."},{"key":"e_1_3_2_1_41_1","unstructured":"Markus Keil. 2021. Setup of the nPA as a Second Factor for Google (Card Reader). https:\/\/youtu.be\/Z3KJyNZjb3w as of 2022\/08\/28 13:36:45."},{"key":"e_1_3_2_1_42_1","unstructured":"Markus Keil. 2021. Setup of the nPA as a Second Factor for Google (Smartphone). https:\/\/youtu.be\/Z-XkBIAl6Ro as of 2022\/08\/28 13:36:45."},{"key":"e_1_3_2_1_43_1","unstructured":"Guemmy Kim. 2022. Making You Safer With 2SV. https:\/\/blog.google\/technology\/safety-security\/reducing-account-hijacking\/ as of 2022\/08\/28 13:36:45."},{"key":"e_1_3_2_1_44_1","volume-title":"Analysing the Usability of Two-Factor Authentication in UK Online Banking. In Symposium on Network and Distributed System Security(NDSS\u00a0\u201915)","author":"Krol Kat","year":"2015","unstructured":"Kat Krol, Eleni Philippou, Emiliano De\u00a0Cristofaro, and M.\u00a0Angela Sasse. 2015. \u201cThey brought in the horrible key ring thing!\u201d Analysing the Usability of Two-Factor Authentication in UK Online Banking. In Symposium on Network and Distributed System Security(NDSS\u00a0\u201915). ISOC, San Diego, California, USA."},{"key":"e_1_3_2_1_45_1","volume-title":"Virtual Conference, 59\u201370","author":"Kunke Johannes","year":"2021","unstructured":"Johannes Kunke, Stephan Wiefling, Markus Ullmann, and Luigi\u00a0Lo Iacono. 2021. Evaluation of Account Recovery Strategies with FIDO2-based Passwordless Authentication. In Open Identity Summit(OID\u00a0\u201921). Gesellschaft f\u00fcr Informatik e.V., Virtual Conference, 59\u201370."},{"key":"e_1_3_2_1_46_1","volume-title":"Information as a Double-Edged Sword: The Role of Computer Experience and Information on Applicant Reactions Towards Novel Technologies for Personnel Selection. Computers in Human Behavior 81 (April","author":"Langer Markus","year":"2018","unstructured":"Markus Langer, Cornelius\u00a0J. K\u00f6nig, and Andromachi Fitili. 2018. Information as a Double-Edged Sword: The Role of Computer Experience and Information on Applicant Reactions Towards Novel Technologies for Personnel Selection. Computers in Human Behavior 81 (April 2018), 19\u201330."},{"key":"e_1_3_2_1_47_1","volume-title":"Biometric WebAuthn. In USENIX Security Symposium(SSYM\u00a0\u201921)","author":"Lassak Leona","year":"2021","unstructured":"Leona Lassak, Annika Hildebrandt, Maximilian Golla, and Blase Ur. 2021. \u201cIt\u2019s Stored, Hopefully, on an Encrypted Server\u201d: Mitigating Users\u2019 Misconceptions About FIDO2 Biometric WebAuthn. In USENIX Security Symposium(SSYM\u00a0\u201921). USENIX, Virtual Conference, 91\u2013108."},{"key":"e_1_3_2_1_48_1","volume-title":"IEEE Symposium on Security and Privacy(SP\u00a0\u201920)","author":"Lyastani Sanam\u00a0Ghorbani","year":"2020","unstructured":"Sanam\u00a0Ghorbani Lyastani, Michael Schilling, Michaela Neumayr, Michael Backes, and Sven Bugiel. 2020. Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication. In IEEE Symposium on Security and Privacy(SP\u00a0\u201920). IEEE, Virtual Conference, 268\u2013285."},{"key":"e_1_3_2_1_49_1","unstructured":"AbdelKarim Mardini and Guemmy Kim. 2021. Making Sign-in Safer and More Convenient. https:\/\/blog.google\/technology\/safety-security\/making-sign-safer-and-more-convenient\/ as of 2022\/08\/28 13:36:45."},{"key":"e_1_3_2_1_50_1","volume-title":"Usability and Security of Text Passwords on Mobile Devices. In ACM Conference on Human Factors in Computing Systems(CHI\u00a0\u201916)","author":"Melicher William","year":"2016","unstructured":"William Melicher, Darya Kurilova, Sean\u00a0M. Segreti, Pranshu Kalvani, Richard Shay, Blase Ur, Lujo Bauer, Nicolas Christin, Lorrie\u00a0Faith Cranor, and Michelle\u00a0L. Mazurek. 2016. Usability and Security of Text Passwords on Mobile Devices. In ACM Conference on Human Factors in Computing Systems(CHI\u00a0\u201916). ACM, San Jose, California, USA, 527\u2013539."},{"key":"e_1_3_2_1_51_1","unstructured":"Microsoft Inc.2020. Sign in to Your Accounts Using the Microsoft Authenticator App. https:\/\/docs.microsoft.com\/en-us\/azure\/active-directory\/user-help\/user-help-auth-app-sign-in as of 2022\/08\/28 13:36:45."},{"key":"e_1_3_2_1_52_1","unstructured":"Federal\u00a0Ministry of\u00a0the Interior and Community. 2019. Digital Identification With the German Online ID Card - Information for Companies and Authorities. https:\/\/www.personalausweisportal.de\/SharedDocs\/downloads\/Webs\/PA\/EN\/anwenderhandbuch.pdf as of 2022\/08\/28 13:36:45."},{"key":"e_1_3_2_1_53_1","first-page":"12","article-title":"The German eID as an Authentication Token on Android Devices","volume":"14","author":"Otterbein Florian","year":"2016","unstructured":"Florian Otterbein, Tim Ohlendorf, and Marian Margraf. 2016. The German eID as an Authentication Token on Android Devices. International Journal of Computer Science and Information Security 14, 12 (Dec. 2016), 198\u2013205.","journal-title":"International Journal of Computer Science and Information Security"},{"key":"e_1_3_2_1_54_1","volume-title":"Symposium on Usable Privacy and Security(SOUPS\u00a0\u201921)","author":"Owens Kentrell","year":"2021","unstructured":"Kentrell Owens, Olabode Anise, Amanda Krauss, and Blase Ur. 2021. User Perceptions of the Usability and Security of Smartphones as FIDO2 Roaming Authenticators. In Symposium on Usable Privacy and Security(SOUPS\u00a0\u201921). USENIX, Virtual Conference, 57\u201376."},{"key":"e_1_3_2_1_55_1","volume-title":"Virtual Conference, 1\u20135.","author":"Owens Kentrell","year":"2020","unstructured":"Kentrell Owens, Blase Ur, and Olabode Anise. 2020. A Framework for Evaluating the Usability and Security of Smartphones as FIDO2 Roaming Authenticators. In Who Are You?! Adventures in Authentication Workshop(WAY\u00a0\u201920). Virtual Conference, 1\u20135."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.148"},{"key":"e_1_3_2_1_57_1","volume-title":"Why Older Adults (Don\u2019t) Use Password Managers. In USENIX Security Symposium(SSYM\u00a0\u201921)","author":"Ray Hirak","year":"2021","unstructured":"Hirak Ray, Flynn Wolf, Ravi Kuber, and Adam\u00a0J. Aviv. 2021. Why Older Adults (Don\u2019t) Use Password Managers. In USENIX Security Symposium(SSYM\u00a0\u201921). USENIX, Virtual Conference, 73\u201390."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00067"},{"key":"e_1_3_2_1_59_1","volume-title":"Southern Association for Information Systems Conference(SAIS\u00a0\u201909)","author":"Strouble Dennis","year":"2009","unstructured":"Dennis Strouble, Gregory\u00a0M. Shechtman, and Alan\u00a0S. Alsop. 2009. Productivity and Usability Effects of Using a Two-Factor Security System. In Southern Association for Information Systems Conference(SAIS\u00a0\u201909). AIS, Charleston, South Carolina, USA, 196\u2013201."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-27523-5_13"},{"key":"e_1_3_2_1_61_1","volume-title":"Social Engineering Downgrade Attacks Against FIDO Protocols. In USENIX Security Symposium(SSYM\u00a0\u201921)","author":"Ulqinaku Enis","year":"2021","unstructured":"Enis Ulqinaku, Hala Assal, AbdelRahman Abdou, Sonia Chiasson, and Srdjan Capkun. 2021. Is Real-Time Phishing Eliminated With FIDO? Social Engineering Downgrade Attacks Against FIDO Protocols. In USENIX Security Symposium(SSYM\u00a0\u201921). USENIX, Virtual Conference, 3811\u20133828."},{"key":"e_1_3_2_1_62_1","unstructured":"U.S. Department of Homeland Security. 2012. The Menlo Report: Ethical Principles Guiding Information and Communication Technology Research. https:\/\/www.caida.org\/publications\/papers\/2012\/menlo_report_actual_formatted\/ as of 2022\/08\/28 13:36:45."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0968-090X(96)00025-3"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.09.008"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2009.10.001"}],"event":{"name":"EuroUSEC 2022: 2022 European Symposium on Usable Security","location":"Karlsruhe Germany","acronym":"EuroUSEC 2022"},"container-title":["Proceedings of the 2022 European Symposium on Usable Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3549015.3554208","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3549015.3554208","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:22:14Z","timestamp":1755800534000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3549015.3554208"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,29]]},"references-count":65,"alternative-id":["10.1145\/3549015.3554208","10.1145\/3549015"],"URL":"https:\/\/doi.org\/10.1145\/3549015.3554208","relation":{},"subject":[],"published":{"date-parts":[[2022,9,29]]},"assertion":[{"value":"2022-09-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}