{"id":"https://openalex.org/W2295227116","doi":"https://doi.org/10.1109/hicss.2016.596","title":"Can Relaxing Security Policy Restrictiveness Improve User Behavior? A Field Study of Authentication Credential Usage","display_name":"Can Relaxing Security Policy Restrictiveness Improve User Behavior? A Field Study of Authentication Credential Usage","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W2295227116","doi":"https://doi.org/10.1109/hicss.2016.596","mag":"2295227116"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/hicss.2016.596","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110465685","display_name":"Jeffry Babb","orcid":null},"institutions":[{"id":"https://openalex.org/I188674872","display_name":"West Texas A&M University","ror":"https://ror.org/04gnp7x40","country_code":"US","type":"education","lineage":["https://openalex.org/I188674872"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jeffry Babb","raw_affiliation_strings":["West Texas A&M University"],"affiliations":[{"raw_affiliation_string":"West Texas A&M University","institution_ids":["https://openalex.org/I188674872"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020592704","display_name":"Mark Keith","orcid":"https://orcid.org/0000-0002-2588-8590"},"institutions":[{"id":"https://openalex.org/I100005738","display_name":"Brigham Young University","ror":"https://ror.org/047rhhm47","country_code":"US","type":"education","lineage":["https://openalex.org/I100005738"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mark Keith","raw_affiliation_strings":["Brigham Young University"],"affiliations":[{"raw_affiliation_string":"Brigham Young University","institution_ids":["https://openalex.org/I100005738"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075730165","display_name":"Paul John Steinbart","orcid":null},"institutions":[{"id":"https://openalex.org/I55732556","display_name":"Arizona State University","ror":"https://ror.org/03efmqc40","country_code":"US","type":"education","lineage":["https://openalex.org/I55732556"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Paul Steinbart","raw_affiliation_strings":["Arizona State University"],"affiliations":[{"raw_affiliation_string":"Arizona State University","institution_ids":["https://openalex.org/I55732556"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":0,"citation_normalized_percentile":{"value":0.0,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":0,"max":66},"biblio":{"volume":null,"issue":null,"first_page":"4803","last_page":"4812"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9979,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9972,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/restrictiveness","display_name":"Restrictiveness","score":0.845659},{"id":"https://openalex.org/keywords/proscription","display_name":"Proscription","score":0.5547171},{"id":"https://openalex.org/keywords/security-policy","display_name":"Security Policy","score":0.55206287},{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.5491266}],"concepts":[{"id":"https://openalex.org/C2776435913","wikidata":"https://www.wikidata.org/wiki/Q7316334","display_name":"Restrictiveness","level":2,"score":0.845659},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7259612},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6224999},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.58659613},{"id":"https://openalex.org/C2778756870","wikidata":"https://www.wikidata.org/wiki/Q723838","display_name":"Proscription","level":3,"score":0.5547171},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.55206287},{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.5491266},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.53829664},{"id":"https://openalex.org/C6353995","wikidata":"https://www.wikidata.org/wiki/Q17027910","display_name":"Human-computer interaction in information security","level":5,"score":0.51111275},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.46346536},{"id":"https://openalex.org/C9652623","wikidata":"https://www.wikidata.org/wiki/Q190109","display_name":"Field (mathematics)","level":2,"score":0.4499666},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.4250514},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.35935315},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.26344892},{"id":"https://openalex.org/C117110713","wikidata":"https://www.wikidata.org/wiki/Q3394676","display_name":"Network security policy","level":4,"score":0.19425884},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.09972027},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C94625758","wikidata":"https://www.wikidata.org/wiki/Q7163","display_name":"Politics","level":2,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C202444582","wikidata":"https://www.wikidata.org/wiki/Q837863","display_name":"Pure mathematics","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/hicss.2016.596","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, justice, and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.69}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":33,"referenced_works":["https://openalex.org/W114419354","https://openalex.org/W126108586","https://openalex.org/W1499005519","https://openalex.org/W1572182570","https://openalex.org/W1582484187","https://openalex.org/W1602619638","https://openalex.org/W1606108609","https://openalex.org/W1973983514","https://openalex.org/W1982158666","https://openalex.org/W2005191069","https://openalex.org/W2025448348","https://openalex.org/W2037202491","https://openalex.org/W2052940668","https://openalex.org/W2055147133","https://openalex.org/W2066345778","https://openalex.org/W2075494224","https://openalex.org/W2079145130","https://openalex.org/W2090618105","https://openalex.org/W2100783932","https://openalex.org/W2113266120","https://openalex.org/W2123097583","https://openalex.org/W2127244520","https://openalex.org/W2149929743","https://openalex.org/W2155843307","https://openalex.org/W2156447271","https://openalex.org/W2160858448","https://openalex.org/W2170554716","https://openalex.org/W2175335659","https://openalex.org/W2408546867","https://openalex.org/W2618814260","https://openalex.org/W2683619959","https://openalex.org/W3124525300","https://openalex.org/W4234586526"],"related_works":["https://openalex.org/W4289752601","https://openalex.org/W2950919038","https://openalex.org/W2551754115","https://openalex.org/W2321420494","https://openalex.org/W2292825069","https://openalex.org/W2064204951","https://openalex.org/W2029876067","https://openalex.org/W1780315910","https://openalex.org/W1607108700","https://openalex.org/W1580137006"],"abstract_inverted_index":{"Often,":[0],"security":[1,54],"policies":[2],"take":[3,113],"an":[4],"overly":[5],"proscriptive":[6],"approach":[7],"designed":[8],"to":[9,21,76,112,138],"shape":[10],"\"secure\"":[11],"behavior":[12,96],"in":[13,88,108,121],"the":[14,25,31,37,40,63,71,79,89],"specification":[15],"of":[16,27,52,67,91,125],"constraints,":[17],"controls,":[18],"and":[19],"impediments":[20],"free":[22],"action.":[23],"In":[24],"case":[26],"very":[28],"detailed":[29],"policies,":[30],"user":[32,64,72],"may":[33],"not":[34],"even":[35],"understand":[36],"logic":[38],"behind":[39],"behavior.":[41],"This":[42,119],"research":[43],"poses":[44],"a":[45,49,59,65,85],"simple":[46],"premise:":[47],"if":[48],"desired":[50,139],"state":[51],"system":[53],"can":[55],"be":[56,73],"achieved":[57],"with":[58,78,123],"policy":[60],"that":[61,130,136],"affords":[62],"range":[66],"behavioral":[68,117],"options,":[69],"would":[70],"more":[74],"likely":[75],"comply":[77],"policy?":[80],"We":[81],"present":[82],"findings":[83],"from":[84],"field":[86],"experiment":[87],"context":[90],"password":[92],"selection":[93],"where":[94],"secure":[95],"was":[97],"enhanced":[98],"by":[99,104],"relaxing":[100],"proscription":[101],"(and":[102],"prescription)":[103],"allowing":[105],"universal":[106],"cues":[107],"additional":[109],"feedback":[110],"tools":[111,132],"precedence":[114],"over":[115],"explicit":[116],"requirements.":[118],"is":[120],"keeping":[122],"aspects":[124],"Activity":[126],"Theory":[127],"which":[128],"proposes":[129],"familiar":[131],"influence":[133],"actor-structure":[134],"interactions":[135],"lead":[137],"outcomes.":[140]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2295227116","counts_by_year":[],"updated_date":"2024-12-07T00:03:24.807977","created_date":"2016-06-24"}