{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:43:00Z","timestamp":1730324580552,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,29]]},"DOI":"10.1145\/3491102.3502125","type":"proceedings-article","created":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T12:33:27Z","timestamp":1651149207000},"page":"1-13","source":"Crossref","is-referenced-by-count":2,"title":["\u201cI\u2019m Surprised So Much Is Connected\u201d"],"prefix":"10.1145","author":[{"given":"Sven","family":"Hammann","sequence":"first","affiliation":[{"name":"Department of Computer Science, ETH Zurich, Switzerland"}]},{"given":"Michael","family":"Crabb","sequence":"additional","affiliation":[{"name":"School of Science and Engineering, University of Dundee, United Kingdom"}]},{"given":"Sasa","family":"Radomirovic","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Heriot-Watt University, United Kingdom"}]},{"given":"Ralf","family":"Sasse","sequence":"additional","affiliation":[{"name":"Department of Computer Science, ETH Zurich, Switzerland"}]},{"given":"David","family":"Basin","sequence":"additional","affiliation":[{"name":"Department of Computer Science, ETH Zurich, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2022,4,29]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2021. Make your account more secure. https:\/\/support.google.com\/accounts\/answer\/46526. Accessed: 2021-09-06. 2021. Make your account more secure. https:\/\/support.google.com\/accounts\/answer\/46526. Accessed: 2021-09-06."},{"key":"e_1_3_2_2_2_1","unstructured":"2021. Supplementary material: Account graphs coded transcripts and front-end tool. https:doi.org\/10.1145\/3491102.3502125. 2021. Supplementary material: Account graphs coded transcripts and front-end tool. https:doi.org\/10.1145\/3491102.3502125."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"crossref","unstructured":"Yasemin Acar Christian Stransky Dominik Wermke Charles Weir Michelle\u00a0L. Mazurek and Sascha Fahl. 2017. Developers Need Support Too: A Survey of Security Advice for Software Developers. In 2017 IEEE Cybersecurity Development (SecDev). 22\u201326. https:\/\/doi.org\/10.1109\/SecDev.2017.17 Yasemin Acar Christian Stransky Dominik Wermke Charles Weir Michelle\u00a0L. Mazurek and Sascha Fahl. 2017. Developers Need Support Too: A Survey of Security Advice for Software Developers. In 2017 IEEE Cybersecurity Development (SecDev). 22\u201326. https:\/\/doi.org\/10.1109\/SecDev.2017.17","DOI":"10.1109\/SecDev.2017.17"},{"key":"e_1_3_2_2_4_1","volume-title":"Mohammad Maifi\u00a0Hasan Khan, and Michael Fagan","author":"Albayram Yusuf","year":"2017","unstructured":"Yusuf Albayram , Mohammad Maifi\u00a0Hasan Khan, and Michael Fagan . 2017 . A Study on Designing Video Tutorials for Promoting Security Features: A Case Study in the Context of Two-Factor Authentication (2FA). International Journal of Human\u2013Computer Interaction 33, 11(2017), 927\u2013942. https:\/\/doi.org\/10.1080\/10447318.2017.1306765 Yusuf Albayram, Mohammad Maifi\u00a0Hasan Khan, and Michael Fagan. 2017. A Study on Designing Video Tutorials for Promoting Security Features: A Case Study in the Context of Two-Factor Authentication (2FA). International Journal of Human\u2013Computer Interaction 33, 11(2017), 927\u2013942. https:\/\/doi.org\/10.1080\/10447318.2017.1306765"},{"key":"e_1_3_2_2_5_1","first-page":"79","article-title":"Can I Get Your Digits: Illegal Acquisition of Wireless Phone Numbers for Sim-Swap Attacks and Wireless Provider Liability","volume":"16","author":"Andrews Nathanael","year":"2018","unstructured":"Nathanael Andrews . 2018 . Can I Get Your Digits: Illegal Acquisition of Wireless Phone Numbers for Sim-Swap Attacks and Wireless Provider Liability . Nw. J. Tech. & Intell. Prop. 16 (2018), 79 . Nathanael Andrews. 2018. Can I Get Your Digits: Illegal Acquisition of Wireless Phone Numbers for Sim-Swap Attacks and Wireless Provider Liability. Nw. J. Tech. & Intell. Prop. 16 (2018), 79.","journal-title":"Nw. J. Tech. & Intell. Prop."},{"key":"e_1_3_2_2_6_1","volume-title":"Understanding User Tradeoffs for Search in Encrypted Communication. In 2018 IEEE European Symposium on Security and Privacy (EuroS P). 258\u2013272","author":"Bai Wei","year":"2018","unstructured":"Wei Bai , Ciara Lynton , Charalampos Papamanthou , and Michelle\u00a0 L. Mazurek . 2018 . Understanding User Tradeoffs for Search in Encrypted Communication. In 2018 IEEE European Symposium on Security and Privacy (EuroS P). 258\u2013272 . https:\/\/doi.org\/10.1109\/EuroSP.2018.00026 Wei Bai, Ciara Lynton, Charalampos Papamanthou, and Michelle\u00a0L. Mazurek. 2018. Understanding User Tradeoffs for Search in Encrypted Communication. In 2018 IEEE European Symposium on Security and Privacy (EuroS P). 258\u2013272. https:\/\/doi.org\/10.1109\/EuroSP.2018.00026"},{"key":"e_1_3_2_2_7_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS","author":"Busse Karoline","year":"2019","unstructured":"Karoline Busse , Julia Sch\u00e4fer , and Matthew Smith . 2019 . Replication: no one can hack my mind revisiting a study on expert and non-expert security practices and advice . In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). Karoline Busse, Julia Sch\u00e4fer, and Matthew Smith. 2019. Replication: no one can hack my mind revisiting a study on expert and non-expert security practices and advice. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019)."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2018.08.002"},{"key":"e_1_3_2_2_9_1","volume-title":"Multi-Device World. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems","author":"Cecchinato E.","year":"2016","unstructured":"Marta\u00a0 E. Cecchinato , Abigail Sellen , Milad Shokouhi , and Gavin Smyth . 2016 . Finding Email in a Multi-Account , Multi-Device World. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems ( San Jose, California, USA) (CHI \u201916). Association for Computing Machinery, New York, NY, USA, 1200\u20131210. https:\/\/doi.org\/10.1145\/2858036.2858473 Marta\u00a0E. Cecchinato, Abigail Sellen, Milad Shokouhi, and Gavin Smyth. 2016. Finding Email in a Multi-Account, Multi-Device World. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (San Jose, California, USA) (CHI \u201916). Association for Computing Machinery, New York, NY, USA, 1200\u20131210. https:\/\/doi.org\/10.1145\/2858036.2858473"},{"key":"e_1_3_2_2_10_1","first-page":"2","article-title":"Benefits to qualitative data quality with multiple coders: Two case studies in multi-coder data analysis","volume":"34","author":"Church P","year":"2019","unstructured":"Sarah\u00a0 P Church , Michael Dunn , and Linda\u00a0 S Prokopy . 2019 . Benefits to qualitative data quality with multiple coders: Two case studies in multi-coder data analysis . Journal of Rural Social Sciences 34 , 1 (2019), 2 . Sarah\u00a0P Church, Michael Dunn, and Linda\u00a0S Prokopy. 2019. Benefits to qualitative data quality with multiple coders: Two case studies in multi-coder data analysis. Journal of Rural Social Sciences 34, 1 (2019), 2.","journal-title":"Journal of Rural Social Sciences"},{"volume-title":"Account Management Strategies. In 11th International Workshop in Socio-Technical Aspects in Security and Trust. 11th International Workshop on Socio-Technical Aspects in Security.","author":"Crabb Michael","key":"e_1_3_2_2_11_1","unstructured":"Michael Crabb , Melvin Abraham , and Sa\u0161a Radomirovi\u0107 . 2021. \u201c I\u2019m Doing the Best I Can.\u201d: Understanding Technology Literate Older Adults \u2019 Account Management Strategies. In 11th International Workshop in Socio-Technical Aspects in Security and Trust. 11th International Workshop on Socio-Technical Aspects in Security. Michael Crabb, Melvin Abraham, and Sa\u0161a Radomirovi\u0107. 2021. \u201cI\u2019m Doing the Best I Can.\u201d: Understanding Technology Literate Older Adults\u2019 Account Management Strategies. In 11th International Workshop in Socio-Technical Aspects in Security and Trust. 11th International Workshop on Socio-Technical Aspects in Security."},{"key":"e_1_3_2_2_12_1","unstructured":"Anupam Das Joseph Bonneau Matthew Caesar Nikita Borisov and XiaoFeng Wang. 2014. The tangled web of password reuse.. In NDSS Vol.\u00a014. 23\u201326. Anupam Das Joseph Bonneau Matthew Caesar Nikita Borisov and XiaoFeng Wang. 2014. The tangled web of password reuse.. In NDSS Vol.\u00a014. 23\u201326."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-58387-6_9"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23025"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-017-0093-6"},{"key":"e_1_3_2_2_16_1","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS","author":"Fagan Michael","year":"2016","unstructured":"Michael Fagan and Mohammad Maifi\u00a0Hasan Khan . 2016 . Why do they do what they do?: A study of what motivates users to (not) follow computer security advice . In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). 59\u201375. Michael Fagan and Mohammad Maifi\u00a0Hasan Khan. 2016. Why do they do what they do?: A study of what motivates users to (not) follow computer security advice. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). 59\u201375."},{"volume-title":"The SAGE handbook of qualitative data analysis","author":"Flick Uwe","key":"e_1_3_2_2_17_1","unstructured":"Uwe Flick . 2013. The SAGE handbook of qualitative data analysis . Sage . Uwe Flick. 2013. The SAGE handbook of qualitative data analysis. Sage."},{"key":"e_1_3_2_2_18_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Flor\u00eancio Dinei","year":"2014","unstructured":"Dinei Flor\u00eancio , Cormac Herley , and Paul\u00a0 C Van\u00a0Oorschot . 2014 . Password portfolios and the finite-effort user: Sustainably managing large numbers of accounts . In 23rd USENIX Security Symposium (USENIX Security 14) . 575\u2013590. Dinei Flor\u00eancio, Cormac Herley, and Paul\u00a0C Van\u00a0Oorschot. 2014. Password portfolios and the finite-effort user: Sustainably managing large numbers of accounts. In 23rd USENIX Security Symposium (USENIX Security 14). 575\u2013590."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143127"},{"volume-title":"MLA handbook for writers of research papers","author":"Gibaldi Joseph","key":"e_1_3_2_2_20_1","unstructured":"Joseph Gibaldi , Walter\u00a0 S Achtert , and Modern Language\u00a0Association of America. 2003. MLA handbook for writers of research papers . Modern Language Association of America New York . Joseph Gibaldi, Walter\u00a0S Achtert, and Modern Language\u00a0Association of America. 2003. MLA handbook for writers of research papers. Modern Language Association of America New York."},{"volume-title":"Analyzing qualitative data. Vol.\u00a06","author":"Gibbs R","key":"e_1_3_2_2_21_1","unstructured":"Graham\u00a0 R Gibbs . 2018. Analyzing qualitative data. Vol.\u00a06 . Sage . Graham\u00a0R Gibbs. 2018. Analyzing qualitative data. Vol.\u00a06. Sage."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354193"},{"key":"e_1_3_2_2_23_1","volume-title":"10th Symposium On Usable Privacy and Security ({SOUPS}","author":"Harbach Marian","year":"2014","unstructured":"Marian Harbach , Emanuel Von\u00a0Zezschwitz , Andreas Fichtner , Alexander De\u00a0Luca , and Matthew Smith . 2014 . It\u2019s a hard lock life: A field study of smartphone (un) locking behavior and risk perception . In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 213\u2013230. Marian Harbach, Emanuel Von\u00a0Zezschwitz, Andreas Fichtner, Alexander De\u00a0Luca, and Matthew Smith. 2014. It\u2019s a hard lock life: A field study of smartphone (un) locking behavior and risk perception. In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 213\u2013230."},{"key":"e_1_3_2_2_24_1","volume-title":"Comparing Expert and Non-Expert Security Practices. In Eleventh Symposium On Usable Privacy and Security (SOUPS","author":"Ion Iulia","year":"2015","unstructured":"Iulia Ion , Rob Reeder , and Sunny Consolvo . 2015 . \u201d... no one can hack my mind \u201d: Comparing Expert and Non-Expert Security Practices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). 327\u2013346. Iulia Ion, Rob Reeder, and Sunny Consolvo. 2015. \u201d... no one can hack my mind\u201d: Comparing Expert and Non-Expert Security Practices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). 327\u2013346."},{"key":"e_1_3_2_2_25_1","unstructured":"Kevin Lee Ben Kaiser Jonathan Mayer and Arvind Narayanan. 2020. An Empirical Study of Wireless Carrier Authentication for SIM Swaps. Kevin Lee Ben Kaiser Jonathan Mayer and Arvind Narayanan. 2020. An Empirical Study of Wireless Carrier Authentication for SIM Swaps."},{"key":"e_1_3_2_2_26_1","volume-title":"Studying the Impact of Managers on Password Strength and Reuse. In 27th USENIX Security Symposium.","author":"Lyastani Sanam\u00a0Ghorbani","year":"2018","unstructured":"Sanam\u00a0Ghorbani Lyastani , Michael Schilling , Sascha Fahl , Michael Backes , and Sven Bugiel . 2018 . Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse. In 27th USENIX Security Symposium. Sanam\u00a0Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Michael Backes, and Sven Bugiel. 2018. Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse. In 27th USENIX Security Symposium."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133973"},{"key":"e_1_3_2_2_30_1","volume-title":"Fifteenth Symposium On Usable Privacy and Security (SOUPS","author":"Pearman Sarah","year":"2019","unstructured":"Sarah Pearman , Shikun\u00a0Aerin Zhang , Lujo Bauer , Nicolas Christin , and Lorrie\u00a0Faith Cranor . 2019 . Why people (don\u2019t) use password managers effectively . In Fifteenth Symposium On Usable Privacy and Security (SOUPS 2019). 319\u2013338. Sarah Pearman, Shikun\u00a0Aerin Zhang, Lujo Bauer, Nicolas Christin, and Lorrie\u00a0Faith Cranor. 2019. Why people (don\u2019t) use password managers effectively. In Fifteenth Symposium On Usable Privacy and Security (SOUPS 2019). 319\u2013338."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978307"},{"key":"e_1_3_2_2_32_1","volume-title":"Thirteenth Symposium On Usable Privacy and Security (SOUPS","author":"Redmiles M","year":"2017","unstructured":"Elissa\u00a0 M Redmiles , Everest Liu , and Michelle\u00a0 L Mazurek . 2017 . You Want Me To Do What? A Design Study of Two-Factor Authentication Messages .. In Thirteenth Symposium On Usable Privacy and Security (SOUPS 2017). Elissa\u00a0M Redmiles, Everest Liu, and Michelle\u00a0L Mazurek. 2017. You Want Me To Do What? A Design Study of Two-Factor Authentication Messages.. In Thirteenth Symposium On Usable Privacy and Security (SOUPS 2017)."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.24"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219166.3219185"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3681050"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3681050"},{"key":"e_1_3_2_2_37_1","volume-title":"10th Symposium On Usable Privacy and Security (SOUPS","author":"Stobert Elizabeth","year":"2014","unstructured":"Elizabeth Stobert and Robert Biddle . 2014 . The password life cycle: user behaviour in managing passwords . In 10th Symposium On Usable Privacy and Security (SOUPS 2014). 243\u2013255. Elizabeth Stobert and Robert Biddle. 2014. The password life cycle: user behaviour in managing passwords. In 10th Symposium On Usable Privacy and Security (SOUPS 2014). 243\u2013255."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.4103\/2321-0656.140875"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIPRO.2014.6859779"},{"key":"e_1_3_2_2_40_1","unstructured":"David Thomas. 2003. An inductive approach for qualitative analysis. (2003). David Thomas. 2003. An inductive approach for qualitative analysis. (2003)."},{"volume-title":"Qualitative research methods: Collecting evidence, crafting analysis, communicating impact","author":"Tracy J","key":"e_1_3_2_2_41_1","unstructured":"Sarah\u00a0 J Tracy . 2019. Qualitative research methods: Collecting evidence, crafting analysis, communicating impact . John Wiley & Sons , Oxford, UK . Sarah\u00a0J Tracy. 2019. Qualitative research methods: Collecting evidence, crafting analysis, communicating impact. John Wiley & Sons, Oxford, UK."},{"key":"e_1_3_2_2_42_1","volume-title":"Equifax Data Breach. In Fourteenth Symposium on Usable Privacy and Security.","author":"Zou Yixin","year":"2018","unstructured":"Yixin Zou , Abraham\u00a0 H Mhaidli , Austin McCall , and Florian Schaub . 2018 . \u201d I\u2019ve Got Nothing to Lose\u201d: Consumers\u2019 Risk Perceptions and Protective Actions after the Equifax Data Breach. In Fourteenth Symposium on Usable Privacy and Security. Yixin Zou, Abraham\u00a0H Mhaidli, Austin McCall, and Florian Schaub. 2018. \u201d I\u2019ve Got Nothing to Lose\u201d: Consumers\u2019 Risk Perceptions and Protective Actions after the Equifax Data Breach. In Fourteenth Symposium on Usable Privacy and Security."}],"event":{"name":"CHI '22: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"New Orleans LA USA","acronym":"CHI '22"},"container-title":["CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491102.3502125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,2]],"date-time":"2022-05-02T16:44:33Z","timestamp":1651509873000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491102.3502125"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,29]]},"references-count":41,"alternative-id":["10.1145\/3491102.3502125","10.1145\/3491102"],"URL":"https:\/\/doi.org\/10.1145\/3491102.3502125","relation":{},"subject":[],"published":{"date-parts":[[2022,4,29]]}}}