{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:05:36Z","timestamp":1750309536817,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,6]],"date-time":"2024-11-06T00:00:00Z","timestamp":1730851200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,6]]},"DOI":"10.1145\/3711609.3711615","type":"proceedings-article","created":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T09:29:26Z","timestamp":1740562166000},"page":"36-45","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["User Experience and Information Security Implications of Digital Identity Wallets"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6734-3767","authenticated-orcid":false,"given":"Max","family":"Sauer","sequence":"first","affiliation":[{"name":"FZI Research Center for Information Technology, 76131 Karlsruhe, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8843-2649","authenticated-orcid":false,"given":"Christoph","family":"Becker","sequence":"additional","affiliation":[{"name":"FZI Research Center for Information Technology, 76131 Karlsruhe, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5304-8433","authenticated-orcid":false,"given":"Andreas","family":"Oberweis","sequence":"additional","affiliation":[{"name":"FZI Research Center for Information Technology, 76131 Karlsruhe, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4815-6149","authenticated-orcid":false,"given":"Simon","family":"Pfeifer","sequence":"additional","affiliation":[{"name":"FZI Research Center for Information Technology, 76131 Karlsruhe, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-4718-1202","authenticated-orcid":false,"given":"Akim","family":"Stark","sequence":"additional","affiliation":[{"name":"FZI Research Center for Information Technology, 76131 Karlsruhe, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6617-3674","authenticated-orcid":false,"given":"Jan","family":"S\u00fcrmeli","sequence":"additional","affiliation":[{"name":"FZI Research Center for Information Technology, 76131 Karlsruhe, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,2,26]]},"reference":[{"key":"e_1_3_3_2_2_2","unstructured":"DIN EN\u00a0ISO\/IEC 24760-1:2022. 2022. IT Security and Privacy - A framework for identity management - Part 1: Terminology and concepts (ISO\/IEC 24760-1)."},{"key":"e_1_3_3_2_3_2","unstructured":"DIN EN\u00a0ISO 9241-210:2020-03. 2020. DIN EN ISO 9241-210:2020-03 Ergonomics of human-system interaction - Part 210: Human-centred design for interactive systems (ISO 9241-210)."},{"key":"e_1_3_3_2_4_2","doi-asserted-by":"publisher","unstructured":"J\u00fcrgen Anke and Daniel Richter. 2023. Digitale Identit\u00e4ten: Status Quo und Perspektiven. HMD Praxis der Wirtschaftsinformatik 60 2 (2023) 261\u2013282. 10.1365\/s40702-023-00965-1","DOI":"10.1365\/s40702-023-00965-1"},{"key":"e_1_3_3_2_5_2","volume-title":"Proceedings of the UPA 2005 Conference","author":"Bojko Agnieszka","year":"2005","unstructured":"Agnieszka Bojko. 2005. Eye Tracking in User Experience Testing: How to Make the Most of It. In Proceedings of the UPA 2005 Conference."},{"key":"e_1_3_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.23919\/MIPRO.2019.8756655"},{"key":"e_1_3_3_2_7_2","unstructured":"John Brooke. 1995. SUS: A quick and dirty usability scale. Usability Evaluation In Industry (1995)."},{"key":"e_1_3_3_2_8_2","doi-asserted-by":"publisher","DOI":"10.1145\/3442167.3442173"},{"key":"e_1_3_3_2_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025599"},{"key":"e_1_3_3_2_10_2","unstructured":"Olaf Henninger Dirk Scheuermann and Thomas Kniess. 2010. On security evaluation of fingerprint recognition systems. (2010)."},{"key":"e_1_3_3_2_11_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-33306-5_19"},{"key":"e_1_3_3_2_12_2","first-page":"195","volume-title":"Proceedings of the 18th Symposium on Usable Privacy and Security (SOUPS \u201922)","author":"Korir Maina","year":"2022","unstructured":"Maina Korir, Simon Parkin, and Paul Dunphy. 2022. An Empirical Study of a Decentralized Identity Wallet: Usability, Security, and Perspectives on User Control. In Proceedings of the 18th Symposium on Usable Privacy and Security (SOUPS \u201922). 195\u2013211."},{"key":"e_1_3_3_2_13_2","doi-asserted-by":"publisher","DOI":"10.1109\/SERA.2011.18"},{"key":"e_1_3_3_2_14_2","doi-asserted-by":"publisher","unstructured":"Michael Nieles Kelley Dempsey and Victoria\u00a0Yan Pillitteri. 2017. NIST Special Publication 800-12: An introduction to information security. 10.6028\/NIST.SP.800-12r1","DOI":"10.6028\/NIST.SP.800-12r1"},{"key":"e_1_3_3_2_15_2","volume-title":"Usability engineering","author":"Nielsen Jakob","year":"2010","unstructured":"Jakob Nielsen. 2010. Usability engineering. Amsterdam Heidelberg."},{"key":"e_1_3_3_2_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/169059.169166"},{"key":"e_1_3_3_2_17_2","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC54236.2022.00131"},{"key":"e_1_3_3_2_18_2","volume-title":"Self-Sovereign Identity","author":"Preukschat Alex","year":"2021","unstructured":"Alex Preukschat and Drummond Reed. 2021. Self-Sovereign Identity. Manning Publications Co."},{"key":"e_1_3_3_2_19_2","volume-title":"Proceedings of the 15th Symposium on Usable Privacy and Security","author":"Reese Ken","year":"2019","unstructured":"Ken Reese, Smith Trevor, Jonathan Dutson, Jonathan Armknecht, Jacob Cameron, and Kent Seamons. 2019. A Usability Study of Five Two-Factor Authentication Methods. In Proceedings of the 15th Symposium on Usable Privacy and Security."},{"key":"e_1_3_3_2_20_2","volume-title":"Proceedings of the 14th Symposium on Usable Privacy and Security","author":"Ruoti Scott","year":"2018","unstructured":"Scott Ruoti, Jeff Andersen, Tyler Monson, Daniel Zappala, and Kent Seamons. 2018. A Comparative Usability Study of Key Management in Secure Email. In Proceedings of the 14th Symposium on Usable Privacy and Security."},{"key":"e_1_3_3_2_21_2","volume-title":"Proceedings of the 30th European Conference on Information Systems (ECIS \u201922)","author":"Sartor Sebastian","year":"2022","unstructured":"Sebastian Sartor, Johannes Sedlmeir, Alexander Rieger, and Tamara Roth. 2022. Love at First Sight? A User Experience Study of Self-Sovereign Identity Wallets. In Proceedings of the 30th European Conference on Information Systems (ECIS \u201922)."},{"key":"e_1_3_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-31971-6_9"},{"key":"e_1_3_3_2_23_2","doi-asserted-by":"crossref","unstructured":"Martin Schrepp Andreas Hinderks and J\u00f6rg Thomaschewski. 2017. Design and Evaluation of a Short Version of the User Experience Questionnaire (UEQ-S). International Journal of Interactive Multimedia and Artificial Intelligence 4 (2017).","DOI":"10.9781\/ijimai.2017.09.001"},{"key":"e_1_3_3_2_24_2","volume-title":"Open Identity Summit 2023","author":"Sellung Rachelle","year":"2023","unstructured":"Rachelle Sellung and Michael Kubach. 2023. Research on User Experience for Digital IdentityWallets: State-of-the-Art and Recommendations. In Open Identity Summit 2023."},{"key":"e_1_3_3_2_25_2","volume-title":"Proceedings of the 8th conference on USENIX Security Symposium","author":"Whitten A.","year":"1999","unstructured":"A. Whitten and J. Tygar. 1999. Why Johnny Can\u2019t Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of the 8th conference on USENIX Security Symposium. Washington, D.C."}],"event":{"name":"ICICM 2024: 2024 The 14th International Conference on Information Communication and Management","acronym":"ICICM 2024","location":"Paris France"},"container-title":["Proceedings of the 2024 14th International Conference on Information Communication and Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711609.3711615","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711609.3711615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:29Z","timestamp":1750295909000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711609.3711615"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,6]]},"references-count":24,"alternative-id":["10.1145\/3711609.3711615","10.1145\/3711609"],"URL":"https:\/\/doi.org\/10.1145\/3711609.3711615","relation":{},"subject":[],"published":{"date-parts":[[2024,11,6]]},"assertion":[{"value":"2025-02-26","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}