{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:51:09Z","timestamp":1776095469468,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T00:00:00Z","timestamp":1745539200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"VolkswagenStiftung Nieders\u00e4chsisches Vorab","award":["ZN3695,"],"award-info":[{"award-number":["ZN3695,"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,4,26]]},"DOI":"10.1145\/3706598.3713252","type":"proceedings-article","created":{"date-parts":[[2025,4,24]],"date-time":"2025-04-24T05:30:26Z","timestamp":1745472626000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Qualitative Study of Adoption Barriers and Challenges for Passwordless Authentication in German Public Administrations"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-3703-9748","authenticated-orcid":false,"given":"Jan-Ulrich","family":"Holtgrave","sequence":"first","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Hannover, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-2315-8989","authenticated-orcid":false,"given":"Sabrina","family":"Klivan","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Hannover, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7129-9642","authenticated-orcid":false,"given":"Karola","family":"Marky","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5644-3316","authenticated-orcid":false,"given":"Sascha","family":"Fahl","sequence":"additional","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Hannover, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,4,25]]},"reference":[{"key":"e_1_3_3_3_2_2","first-page":"1141","volume-title":"Proceedings of the Human Factors and Ergonomics Society Annual Meeting","volume":"62","author":"Acemyan Claudia\u00a0Ziegler","year":"2018","unstructured":"Claudia\u00a0Ziegler Acemyan, Philip Kortum, Jeffrey Xiong, and Dan\u00a0S Wallach. 2018. 2FA might be secure, but it\u2019s not usable: A summative usability assessment of Google\u2019s two-factor authentication (2FA) methods. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting , Vol.\u00a062. SAGE Publications Sage CA, Los Angeles, CA, 1141\u20131145."},{"key":"e_1_3_3_3_3_2","unstructured":"FIDO Alliance. 2022. Apple Google and Microsoft Commit to Expanded Support for FIDO Standard to Accelerate Availability of Passwordless Sign-Ins. https:\/\/fidoalliance.org\/apple-google-and-microsoft-commit-to-expanded-support-for-fido-standard-to-accelerate-availability-of-passwordless-sign-ins\/. Accessed: 2022-12-15."},{"key":"e_1_3_3_3_4_2","unstructured":"FIDO Alliance. 2023. FIDO Authentication. https:\/\/fidoalliance.org\/fido2\/. Accessed: 2022-09-04."},{"key":"e_1_3_3_3_5_2","doi-asserted-by":"crossref","unstructured":"Orna Baron-Epel Giora Kaplan Ruth Weinstein and Manfred\u00a0S Green. 2010. Extreme and acquiescence bias in a bi-ethnic population. European Journal of Public Health 20 5 (2010) 543\u2013548.","DOI":"10.1093\/eurpub\/ckq052"},{"key":"e_1_3_3_3_6_2","doi-asserted-by":"crossref","unstructured":"Shirley\u00a0Ann Becker. 2005. E-government usability for older adults. Commun. ACM 48 2 (2005) 102\u2013104.","DOI":"10.1145\/1042091.1042127"},{"key":"e_1_3_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46215.2023.10179454"},{"key":"e_1_3_3_3_8_2","first-page":"433","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Bouwman Xander","year":"2020","unstructured":"Xander Bouwman, Harm Griffioen, Jelle Egbers, Christian Doerr, Bram Klievink, and Michel van Eeten. 2020. A different Cup of TI? The Added Value of Commercial Threat Intelligence. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, Online, 433\u2013450. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/bouwman"},{"key":"e_1_3_3_3_9_2","volume-title":"Public management and governance","author":"Bovaird Tony","year":"2003","unstructured":"Tony Bovaird and Elke L\u00f6ffler. 2003. Public management and governance. Vol.\u00a03. Routledge, London."},{"key":"e_1_3_3_3_10_2","doi-asserted-by":"crossref","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3 2 (2006) 77\u2013101.","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_3_3_11_2","doi-asserted-by":"crossref","unstructured":"Bj\u00f6rn B\u00fcnzow. 2021. Wie organisiert man Innovation und Transformation im F\u00f6deralismus?\u2013Digitalisierungslabore und agile Methoden als neue Formen der Zusammenarbeit. Handbuch Onlinezugangsgesetz: Potenziale-Synergien-Herausforderungen 1 (2021) 383\u2013400.","DOI":"10.1007\/978-3-662-62395-4_16"},{"key":"e_1_3_3_3_12_2","doi-asserted-by":"crossref","unstructured":"Rune Bysted and Kristina\u00a0Risom Jespersen. 2014. Exploring managerial mechanisms that influence innovative work behaviour: Comparing private and public employees. Public Management Review 16 2 (2014) 217\u2013241.","DOI":"10.1080\/14719037.2013.806576"},{"key":"e_1_3_3_3_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/1182475.1182480"},{"key":"e_1_3_3_3_14_2","doi-asserted-by":"crossref","unstructured":"Victoria Clarke and Virginia Braun. 2017. Thematic analysis. The journal of positive psychology 12 3 (2017) 297\u2013298.","DOI":"10.1080\/17439760.2016.1262613"},{"key":"e_1_3_3_3_15_2","unstructured":"Department for Digital Culture Media & Sport. 2022. UK\u2019s Digital Strategy. https:\/\/www.gov.uk\/government\/publications\/uks-digital-strategy"},{"key":"e_1_3_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_24"},{"key":"e_1_3_3_3_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2011.64"},{"key":"e_1_3_3_3_18_2","doi-asserted-by":"crossref","unstructured":"Jonas\u00a0H Ellenberg. 1994. Selection bias in observational and experimental studies. Statistics in medicine 13 5-7 (1994) 557\u2013567.","DOI":"10.1002\/sim.4780130518"},{"key":"e_1_3_3_3_19_2","doi-asserted-by":"publisher","unstructured":"Mark Evans Ying He Leandros Maglaras Iryna Yevseyeva and Helge Janicke. 2019. Evaluating information security core human error causes (IS-CHEC) technique in public sector and comparison with the private sector. International Journal of Medical Informatics 127 (2019) 109\u2013119. 10.1016\/j.ijmedinf.2019.04.019","DOI":"10.1016\/j.ijmedinf.2019.04.019"},{"key":"e_1_3_3_3_20_2","first-page":"523","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022)","author":"Farke Florian\u00a0M.","year":"2022","unstructured":"Florian\u00a0M. Farke, Leona Lassak, Jannis Pinter, and Markus D\u00fcrmuth. 2022. Exploring User Authentication with Windows Hello in a Small Business Environment. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). USENIX Association, Boston, MA, 523\u2013540. https:\/\/www.usenix.org\/conference\/soups2022\/presentation\/farke"},{"key":"e_1_3_3_3_21_2","first-page":"19","volume-title":"Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020)","author":"Farke Florian\u00a0M.","year":"2020","unstructured":"Florian\u00a0M. Farke, Lennart Lorenz, Theodor Schnitzler, Philipp Markert, and Markus D\u00fcrmuth. 2020. \u201cYou still use the password after all\u201d \u2013 Exploring FIDO2 Security Keys in a Small Company. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). USENIX Association, Online, 19\u201335. https:\/\/www.usenix.org\/conference\/soups2020\/presentation\/farke"},{"key":"e_1_3_3_3_22_2","unstructured":"Federal Foreign Office of Germany. 2022. The Federal Government\u2019s new Digital Strategy. https:\/\/www.auswaertiges-amt.de\/en\/aussenpolitik\/digital-strategy\/2551972"},{"key":"e_1_3_3_3_23_2","doi-asserted-by":"crossref","unstructured":"Mary\u00a0K Feeney and Leisha DeHart-Davis. 2009. Bureaucracy and public employee behavior: A case of local government. Review of Public Personnel Administration 29 4 (2009) 311\u2013326.","DOI":"10.1177\/0734371X09333201"},{"key":"e_1_3_3_3_24_2","doi-asserted-by":"crossref","unstructured":"Daniela Fogli and Loredana\u00a0Parasiliti Provenza. 2012. A meta-design approach to the development of e-government services. Journal of Visual Languages & Computing 23 2 (2012) 47\u201362.","DOI":"10.1016\/j.jvlc.2011.11.003"},{"key":"e_1_3_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/1028014.1028047"},{"key":"e_1_3_3_3_26_2","unstructured":"Lorenzo Franceschi-Bicchiera. 2023. CISA says US government agency was hacked thanks to \u2018end of life\u2019 software. https:\/\/techcrunch.com\/2023\/12\/06\/cisa-says-us-government-agency-was-hacked-thanks-to-end-of-life-software\/"},{"key":"e_1_3_3_3_27_2","unstructured":"Lorenzo Franceschi-Bicchiera. 2023. Cyber attack on British Library raises concerns over lack of UK resilience. https:\/\/www.ft.com\/content\/642ee014-4768-4c65-b1ee-0d4f39a8a63d"},{"key":"e_1_3_3_3_28_2","first-page":"17","volume-title":"Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)","author":"Gerlitz Eva","year":"2021","unstructured":"Eva Gerlitz, Maximilian H\u00e4ring, and Matthew Smith. 2021. Please do not use !?_ or your License Plate Number: Analyzing Password Policies in German Companies. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). USENIX Association, Online, 17\u201336. https:\/\/www.usenix.org\/conference\/soups2021\/presentation\/gerlitz"},{"key":"e_1_3_3_3_29_2","unstructured":"Government of Canada. 2022. Canada\u2019s Digital Ambition. https:\/\/www.canada.ca\/en\/government\/system\/digital-government\/government-canada-digital-operations-strategic-plans\/canada-digital-ambition.html"},{"key":"e_1_3_3_3_30_2","doi-asserted-by":"crossref","unstructured":"Paul\u00a0A Grassi Michael\u00a0E Garcia and James\u00a0L Fenton. 2017. Digital identity guidelines. NIST special publication 800 (2017) 63\u20133.","DOI":"10.6028\/NIST.SP.800-63-3"},{"key":"e_1_3_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-5914-6_5"},{"key":"e_1_3_3_3_32_2","doi-asserted-by":"publisher","unstructured":"Eszter Hargittai and Yuli\u00a0Patrick Hsieh. 2012. Succinct Survey Measures of Web-Use Skills. Social Science Computer Review 30 1 (2012) 95\u2013107. 10.1177\/0894439310397146 arXiv:10.1177\/0894439310397146","DOI":"10.1177\/0894439310397146"},{"key":"e_1_3_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.5220\/0007188303730377"},{"key":"e_1_3_3_3_34_2","doi-asserted-by":"publisher","unstructured":"Michael Jones. 2020. CBOR Object Signing and Encryption (COSE) and JSON Object Signing and Encryption (JOSE) Registrations for Web Authentication (WebAuthn) Algorithms. RFC 8812. 10.17487\/RFC8812","DOI":"10.17487\/RFC8812"},{"key":"e_1_3_3_3_35_2","doi-asserted-by":"crossref","unstructured":"Mark Keith Benjamin Shao and Paul\u00a0John Steinbart. 2007. The Usability of Passphrases for Authentication: An Empirical Field Study. International journal of human-computer studies 65 1 (2007) 17\u201328.","DOI":"10.1016\/j.ijhcs.2006.08.005"},{"key":"e_1_3_3_3_36_2","doi-asserted-by":"crossref","unstructured":"Agata Kruzikova Lenka Knapova David Smahel Lenka Dedkova and Vashek Matyas. 2022. Usable and secure? User perception of four authentication methods for mobile banking. Computers & Security 115 (2022) 102603.","DOI":"10.1016\/j.cose.2022.102603"},{"key":"e_1_3_3_3_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623063"},{"key":"e_1_3_3_3_38_2","doi-asserted-by":"crossref","unstructured":"Ozan Kuru and Josh Pasek. 2016. Improving social media measurement in surveys: Avoiding acquiescence bias in Facebook research. Computers in Human Behavior 57 (2016) 82\u201392.","DOI":"10.1016\/j.chb.2015.12.008"},{"key":"e_1_3_3_3_39_2","first-page":"91","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Lassak Leona","year":"2021","unstructured":"Leona Lassak, Annika Hildebrandt, Maximilian Golla, and Blase Ur. 2021. \" It\u2019s Stored, Hopefully, on an Encrypted Server\u201d: Mitigating Users\u2019 Misconceptions About FIDO2 Biometric WebAuthn. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, Copenhagen, Denmark, 91\u2013108. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/lassak"},{"key":"e_1_3_3_3_40_2","first-page":"7231","volume-title":"33rd USENIX Security Symposium (USENIX Security 24)","author":"Lassak Leona","year":"2024","unstructured":"Leona Lassak, Elleen Pan, Blase Ur, and Maximilian Golla. 2024. Why Aren\u2019t We Using Passkeys? Obstacles Companies Face Deploying FIDO2 Passwordless Authentication. In 33rd USENIX Security Symposium (USENIX Security 24). USENIX Association, Philadelphia, PA, 7231\u20137248. https:\/\/www.usenix.org\/conference\/usenixsecurity24\/presentation\/lassak"},{"key":"e_1_3_3_3_41_2","first-page":"220","volume-title":"Tagungsband UP09Tagungsband UP09","author":"Laugwitz Bettina","year":"2009","unstructured":"Bettina Laugwitz, Ulf Schubert, Waltraud Ilmberger, Nina Tamm, Theo Held, and Martin Schrepp. 2009. Subjektive Benutzerzufriedenheit quantitativ erfassen: Erfahrungen mit dem User Experience Questionnaire UEQ, In Tagungsband UP09. Tagungsband UP09 9, 220\u2013225."},{"key":"e_1_3_3_3_42_2","first-page":"268","volume-title":"IEEE Symposium on Security and Privacy","author":"Lyastani Sanam\u00a0Ghorbani","year":"2020","unstructured":"Sanam\u00a0Ghorbani Lyastani, Michael Schilling, Michaela Neumayr, Michael Backes, and Sven Bugiel. 2020. Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication.. In IEEE Symposium on Security and Privacy. IEEE, Online, 268\u2013285."},{"key":"e_1_3_3_3_43_2","unstructured":"Sean Lyngaas. 2023. Exclusive: US government agencies hit in global cyberattack. https:\/\/edition.cnn.com\/2023\/06\/15\/politics\/us-government-hit-cybeattack\/index.html"},{"key":"e_1_3_3_3_44_2","doi-asserted-by":"publisher","unstructured":"Karola Marky Kirill Ragozin George Chernyshov Andrii Matviienko Martin Schmitz Max M\u00fchlh\u00e4user Chloe Eghtebas and Kai Kunze. 2022. \u201cNah it\u2019s just annoying!\u201d A Deep Dive into User Perceptions of Two-Factor Authentication. ACM Trans. Comput.-Hum. Interact. 29 5 Article 43 (10 2022) 32\u00a0pages. 10.1145\/3503514","DOI":"10.1145\/3503514"},{"key":"e_1_3_3_3_45_2","unstructured":"Peter Maxwill Martin Vornweg and Yasemin Yuecksel. 2022. Landkreis Anhalt-Bitterfeld you are fucked. https:\/\/www.spiegel.de\/panorama\/cybercrime-wie-hacker-den-landkreis-anhalt-bitterfeld-lahmlegten-podcast-a-9572cbea-2404-4a5d-9db4-0718d1c6d9d4"},{"key":"e_1_3_3_3_46_2","unstructured":"Patrick McDaniel and Farinaz Koushanfar. 2023. Secure and Trustworthy Computing 2.0 Vision Statement. arxiv:https:\/\/arXiv.org\/abs\/2308.00623\u00a0[cs.CR]"},{"key":"e_1_3_3_3_47_2","first-page":"375","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"McDonald Allison","year":"2021","unstructured":"Allison McDonald, Catherine Barwulor, Michelle\u00a0L. Mazurek, Florian Schaub, and Elissa\u00a0M. Redmiles. 2021. \"It\u2019s stressful having all these phones\": Investigating Sex Workers\u2019 Safety Goals, Risks, and Practices Online. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, Online, 375\u2013392. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/mcdonald"},{"key":"e_1_3_3_3_48_2","doi-asserted-by":"crossref","unstructured":"Nora McDonald Sarita Schoenebeck and Andrea Forte. 2019. Reliability and Inter-Rater Reliability in Qualitative Research: Norms and Guidelines for CSCW and HCI Practice. ACM on Human-Computer Interaction 3 CSCW Article 72 (2019) 23\u00a0pages.","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_3_49_2","doi-asserted-by":"publisher","unstructured":"Craig Metz. 1997. OTP Extended Responses. RFC 2243. 10.17487\/RFC2243","DOI":"10.17487\/RFC2243"},{"key":"e_1_3_3_3_50_2","doi-asserted-by":"crossref","unstructured":"Thomas Meuche. 2022. Dilemmata und Wege zur Digitalisierung der \u00f6ffentlichen Verwaltung. Gruppe. Interaktion. Organisation. Zeitschrift f\u00fcr Angewandte Organisationspsychologie (GIO) 53 1 (2022) 99\u2013108.","DOI":"10.1007\/s11612-021-00612-7"},{"key":"e_1_3_3_3_51_2","volume-title":"Totp: Time-based one-time password algorithm","author":"M\u2019Raihi David","year":"2011","unstructured":"David M\u2019Raihi, Salah Machani, Mingliang Pei, and Johan Rydell. 2011. Totp: Time-based one-time password algorithm. Technical Report. Internet Engineering Task Force (IETF)."},{"key":"e_1_3_3_3_52_2","doi-asserted-by":"publisher","unstructured":"David M\u2019Raihi Johan Rydell Mingliang Pei and Salah Machani. 2011. TOTP: Time-Based One-Time Password Algorithm. RFC 6238. 10.17487\/RFC6238","DOI":"10.17487\/RFC6238"},{"key":"e_1_3_3_3_53_2","unstructured":"Next:Public Beratungsagentur. 2021. Verwaltung in Krisenzeiten 2. https:\/\/nextpublic.de\/verwaltung-in-krisenzeiten-2\/. Accessed: 2024-11-29."},{"key":"e_1_3_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-13760-1_16"},{"key":"e_1_3_3_3_55_2","unstructured":"Government of Canada. 2023. BGRS and SIRVA Canada systems privacy breach affecting current and former federal employees. https:\/\/www.canada.ca\/en\/government\/system\/digital-government\/online-security-privacy\/bgrs-sirva-canada-systems-privacy-breach-affecting-current-former-federal-employees.html. Accessed: 2024-01-15."},{"key":"e_1_3_3_3_56_2","first-page":"57","volume-title":"Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)","author":"Owens Kentrell","year":"2021","unstructured":"Kentrell Owens, Olabode Anise, Amanda Krauss, and Blase Ur. 2021. User Perceptions of the Usability and Security of Smartphones as FIDO2 Roaming Authenticators. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021). USENIX Association, Online, 57\u201376. https:\/\/www.usenix.org\/conference\/soups2021\/presentation\/owens"},{"key":"e_1_3_3_3_57_2","doi-asserted-by":"crossref","unstructured":"Surjit Paul and Saini Das. 2020. Accessibility and usability analysis of Indian eGovernment websites. Universal Access in the Information Society 19 4 (2020) 949\u2013957.","DOI":"10.1007\/s10209-019-00704-8"},{"key":"e_1_3_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/2751323.2751327"},{"key":"e_1_3_3_3_59_2","unstructured":"Manuela Preoteasa. 2023. The Federal Government\u2019s new Digital Strategy. https:\/\/www.euractiv.com\/section\/digital\/news\/romanias-new-government-vows-to-speed-up-digital-transformation\/"},{"key":"e_1_3_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435395"},{"key":"e_1_3_3_3_61_2","first-page":"357","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019)","author":"Reese Ken","year":"2019","unstructured":"Ken Reese, Trevor Smith, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons. 2019. A Usability Study of Five Two-Factor Authentication Methods. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA, 357\u2013370. https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/reese"},{"key":"e_1_3_3_3_62_2","doi-asserted-by":"publisher","DOI":"10.5555\/AAI28107604"},{"key":"e_1_3_3_3_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00067"},{"key":"e_1_3_3_3_64_2","unstructured":"Michael Richards. 2023. No Time to Waste: Government IT Modernization Must Take Off Now. https:\/\/www.uschamber.com\/technology\/no-time-to-waste-government-it-modernization-must-take-off-now"},{"key":"e_1_3_3_3_65_2","unstructured":"Shannon Riley. 2006. Password security: What users know and what they actually do. Usability News 8 1 (2006) 2833\u20132836."},{"key":"e_1_3_3_3_66_2","doi-asserted-by":"crossref","unstructured":"Benjamin Saunders Julius Sim Tom Kingstone Shula Baker Jackie Waterfield Bernadette Bartlam Heather Burroughs and Clare Jinks. 2018. Saturation in qualitative research: exploring its conceptualization and operationalization. Quality & quantity 52 (2018) 1893\u20131907.","DOI":"10.1007\/s11135-017-0574-8"},{"key":"#cr-split#-e_1_3_3_3_67_2.1","doi-asserted-by":"crossref","unstructured":"Martin Schrepp Andreas Hinderks and J\u00f6rg Thomaschewski. 2017. Design and evaluation of a short version of the user experience questionnaire (UEQ-S). International Journal of Interactive Multimedia and Artificial Intelligence 4","DOI":"10.9781\/ijimai.2017.09.001"},{"key":"#cr-split#-e_1_3_3_3_67_2.2","doi-asserted-by":"crossref","unstructured":"(6) 103-108. 6 4 (2017) 103-108.","DOI":"10.1215\/26885220-108.1-4.103"},{"key":"e_1_3_3_3_68_2","doi-asserted-by":"crossref","unstructured":"Martin Schrepp Jo\u00f6rg Thomaschewski and Andreas Hinderks. 2017. Construction of a benchmark for the user experience questionnaire (UEQ). International Journal of Interactive Multimedia and Artificial Intelligence 4 4 (2017) 40\u201344.","DOI":"10.9781\/ijimai.2017.445"},{"key":"e_1_3_3_3_69_2","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557377"},{"key":"e_1_3_3_3_70_2","doi-asserted-by":"crossref","unstructured":"Trui Steen and Carina Schott. 2019. Public sector employees in a challenging work environment. Public Administration 97 1 (2019) 3\u201310.","DOI":"10.1111\/padm.12572"},{"key":"e_1_3_3_3_71_2","doi-asserted-by":"publisher","unstructured":"Edyta\u00a0Karolina Szczepaniuk Hubert Szczepaniuk Tomasz Rokicki and Bogdan Klepacki. 2020. Information security assessment in public administration. Computers & Security 90 (2020) 101709. 10.1016\/j.cose.2019.101709","DOI":"10.1016\/j.cose.2019.101709"},{"key":"e_1_3_3_3_72_2","doi-asserted-by":"crossref","unstructured":"Viktor Taneski Marjan Heri\u010dko and Bo\u0161tjan Brumen. 2019. Systematic overview of password security problems. Acta Polytechnica Hungarica 16 3 (2019) 143\u2013165.","DOI":"10.12700\/APH.16.3.2019.3.8"},{"key":"e_1_3_3_3_73_2","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134067"},{"key":"e_1_3_3_3_74_2","unstructured":"Thea\u00a0F Van\u00a0de Mortel. 2008. Faking it: social desirability response bias in self-report research. Australian Journal of Advanced Nursing The 25 4 (2008) 40\u201348."},{"key":"e_1_3_3_3_75_2","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23103"},{"key":"e_1_3_3_3_76_2","doi-asserted-by":"crossref","unstructured":"Silas\u00a0Formunyuy Verkijika and Lizette De\u00a0Wet. 2018. A usability assessment of e-government websites in Sub-Saharan Africa. International Journal of Information Management 39 (2018) 20\u201329.","DOI":"10.1016\/j.ijinfomgt.2017.11.003"},{"key":"e_1_3_3_3_77_2","unstructured":"Karen Werner. 2020. Uni Gie\u00dfen: So teuer war der Hackerangriff wirklich. https:\/\/www.giessener-allgemeine.de\/giessen\/uni-giessen-hackerangriff-kosten-ilias-90015054.html"},{"key":"e_1_3_3_3_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580993"}],"event":{"name":"CHI 2025: CHI Conference on Human Factors in Computing Systems","location":"Yokohama Japan","acronym":"CHI '25","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2025 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713252","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3706598.3713252","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T05:43:51Z","timestamp":1751607831000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3706598.3713252"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,25]]},"references-count":78,"alternative-id":["10.1145\/3706598.3713252","10.1145\/3706598"],"URL":"https:\/\/doi.org\/10.1145\/3706598.3713252","relation":{},"subject":[],"published":{"date-parts":[[2025,4,25]]},"assertion":[{"value":"2025-04-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}