{"id":"https://openalex.org/W4388729128","doi":"https://doi.org/10.1108/ics-04-2023-0047","title":"\u201c\u2026I have my dad, sister, brother, and mom\u2019s password\u201d: unveiling users\u2019 mental models of security and privacy-preserving tools","display_name":"\u201c\u2026I have my dad, sister, brother, and mom\u2019s password\u201d: unveiling users\u2019 mental models of security and privacy-preserving tools","publication_year":2023,"publication_date":"2023-11-16","ids":{"openalex":"https://openalex.org/W4388729128","doi":"https://doi.org/10.1108/ics-04-2023-0047"},"language":"en","primary_location":{"id":"doi:10.1108/ics-04-2023-0047","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-04-2023-0047","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://digitalcommons.usu.edu/computer_science_stures/29","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5072965575","display_name":"Prakriti Dumaru","orcid":"https://orcid.org/0000-0002-6326-5810"},"institutions":[{"id":"https://openalex.org/I121980950","display_name":"Utah State University","ror":"https://ror.org/00h6set76","country_code":"US","type":"education","lineage":["https://openalex.org/I121980950"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Prakriti Dumaru","raw_affiliation_strings":["Department of Computer Science, College of Science, Utah State University, Logan, Utah, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Science, Utah State University, Logan, Utah, USA","institution_ids":["https://openalex.org/I121980950"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5087875395","display_name":"Ankit Shrestha","orcid":"https://orcid.org/0000-0002-9012-6146"},"institutions":[{"id":"https://openalex.org/I121980950","display_name":"Utah State University","ror":"https://ror.org/00h6set76","country_code":"US","type":"education","lineage":["https://openalex.org/I121980950"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ankit Shrestha","raw_affiliation_strings":["Department of Computer Science, College of Science, Utah State University, Logan, Utah, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Science, Utah State University, Logan, Utah, USA","institution_ids":["https://openalex.org/I121980950"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011632297","display_name":"Rizu Paudel","orcid":"https://orcid.org/0000-0003-3840-9015"},"institutions":[{"id":"https://openalex.org/I121980950","display_name":"Utah State University","ror":"https://ror.org/00h6set76","country_code":"US","type":"education","lineage":["https://openalex.org/I121980950"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rizu Paudel","raw_affiliation_strings":["Department of Computer Science, College of Science, Utah State University, Logan, Utah, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Science, Utah State University, Logan, Utah, USA","institution_ids":["https://openalex.org/I121980950"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5057772402","display_name":"Cassity R. Haverkamp","orcid":"https://orcid.org/0000-0001-9178-9315"},"institutions":[{"id":"https://openalex.org/I121980950","display_name":"Utah State University","ror":"https://ror.org/00h6set76","country_code":"US","type":"education","lineage":["https://openalex.org/I121980950"]},{"id":"https://openalex.org/I2802678941","display_name":"Jones College","ror":"https://ror.org/05txzf778","country_code":"US","type":"education","lineage":["https://openalex.org/I2802678941"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Cassity Haverkamp","raw_affiliation_strings":["Emma Eccles Jones College of Education and Human Services, Utah State University, Logan, Utah, USA"],"affiliations":[{"raw_affiliation_string":"Emma Eccles Jones College of Education and Human Services, Utah State University, Logan, Utah, USA","institution_ids":["https://openalex.org/I2802678941","https://openalex.org/I121980950"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5050803170","display_name":"Maryellen Brunson McClain","orcid":"https://orcid.org/0000-0002-6855-6246"},"institutions":[{"id":"https://openalex.org/I4210119109","display_name":"Indiana University Bloomington","ror":"https://ror.org/02k40bc56","country_code":"US","type":"education","lineage":["https://openalex.org/I4210119109","https://openalex.org/I592451"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Maryellen Brunson McClain","raw_affiliation_strings":["School of Education, Indiana University Bloomington, Bloomington, Indiana, USA"],"affiliations":[{"raw_affiliation_string":"School of Education, Indiana University Bloomington, Bloomington, Indiana, USA","institution_ids":["https://openalex.org/I4210119109"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041581450","display_name":"Mahdi Nasrullah Al-Ameen","orcid":"https://orcid.org/0000-0002-5764-2253"},"institutions":[{"id":"https://openalex.org/I121980950","display_name":"Utah State University","ror":"https://ror.org/00h6set76","country_code":"US","type":"education","lineage":["https://openalex.org/I121980950"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mahdi Nasrullah Al-Ameen","raw_affiliation_strings":["Department of Computer Science, College of Science, Utah State University, Logan, Utah, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, College of Science, Utah State University, Logan, Utah, USA","institution_ids":["https://openalex.org/I121980950"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5072965575"],"corresponding_institution_ids":["https://openalex.org/I121980950"],"apc_list":null,"apc_paid":null,"fwci":10.3781,"has_fulltext":false,"cited_by_count":18,"citation_normalized_percentile":{"value":0.98099203,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"32","issue":"3","first_page":"282","last_page":"303"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9842000007629395,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12335","display_name":"Sexuality, Behavior, and Technology","score":0.9786999821662903,"subfield":{"id":"https://openalex.org/subfields/3203","display_name":"Clinical Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6171850562095642},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5784286260604858},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5443810820579529},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5401974320411682},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.5145675539970398},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.4457976520061493},{"id":"https://openalex.org/keywords/human-computer-interaction-in-information-security","display_name":"Human-computer interaction in information security","score":0.43961435556411743},{"id":"https://openalex.org/keywords/conceptual-model","display_name":"Conceptual model","score":0.4102022051811218},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3309573531150818},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.2820358872413635},{"id":"https://openalex.org/keywords/qualitative-research","display_name":"Qualitative research","score":0.24923664331436157},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.23285964131355286},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.12449026107788086},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.08311587572097778}],"concepts":[{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6171850562095642},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5784286260604858},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5443810820579529},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5401974320411682},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.5145675539970398},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.4457976520061493},{"id":"https://openalex.org/C6353995","wikidata":"https://www.wikidata.org/wiki/Q17027910","display_name":"Human-computer interaction in information security","level":5,"score":0.43961435556411743},{"id":"https://openalex.org/C13606891","wikidata":"https://www.wikidata.org/wiki/Q2623243","display_name":"Conceptual model","level":2,"score":0.4102022051811218},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3309573531150818},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.2820358872413635},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.24923664331436157},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.23285964131355286},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.12449026107788086},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.08311587572097778},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1108/ics-04-2023-0047","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-04-2023-0047","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:digitalcommons.usu.edu:computer_science_stures-1049","is_oa":true,"landing_page_url":"https://digitalcommons.usu.edu/computer_science_stures/29","pdf_url":null,"source":{"id":"https://openalex.org/S4377196327","display_name":"Digital Commons - USU (Utah State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I121980950","host_organization_name":"Utah State University","host_organization_lineage":["https://openalex.org/I121980950"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computer Science Student Research","raw_type":"text"}],"best_oa_location":{"id":"pmh:oai:digitalcommons.usu.edu:computer_science_stures-1049","is_oa":true,"landing_page_url":"https://digitalcommons.usu.edu/computer_science_stures/29","pdf_url":null,"source":{"id":"https://openalex.org/S4377196327","display_name":"Digital Commons - USU (Utah State University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I121980950","host_organization_name":"Utah State University","host_organization_lineage":["https://openalex.org/I121980950"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Computer Science Student Research","raw_type":"text"},"sustainable_development_goals":[{"score":0.6600000262260437,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1423289060","https://openalex.org/W1463518955","https://openalex.org/W1979290264","https://openalex.org/W2041656211","https://openalex.org/W2098482696","https://openalex.org/W2411354024","https://openalex.org/W2417203279","https://openalex.org/W2497179706","https://openalex.org/W2739711672","https://openalex.org/W2740209367","https://openalex.org/W2888940660","https://openalex.org/W2888990453","https://openalex.org/W2889199884","https://openalex.org/W2889246521","https://openalex.org/W2889247751","https://openalex.org/W2900767416","https://openalex.org/W2969632906","https://openalex.org/W2977601907","https://openalex.org/W2999421257","https://openalex.org/W3048560297","https://openalex.org/W3082800652","https://openalex.org/W3105087512","https://openalex.org/W3131313671","https://openalex.org/W3131740479","https://openalex.org/W3157409099","https://openalex.org/W3183563307","https://openalex.org/W3183740021","https://openalex.org/W4285204502"],"related_works":["https://openalex.org/W2025043113","https://openalex.org/W1967528062","https://openalex.org/W2024488177","https://openalex.org/W2063961455","https://openalex.org/W1537544362","https://openalex.org/W96636389","https://openalex.org/W2766905531","https://openalex.org/W2162931884","https://openalex.org/W2793054839","https://openalex.org/W1974991139"],"abstract_inverted_index":{"Purpose":[0],"The":[1,78],"purpose":[2],"of":[3,43,52,95,102,135,164,191],"this":[4,30,129,156],"study":[5,83,130,157],"is":[6,65],"to":[7,37,57,67,90,147,176],"understand":[8,73],"user":[9],"perceptions":[10,101],"and":[11,17,41,105,113,138,173,180],"misconceptions":[12,94,142,179],"regarding":[13,97],"security":[14,40,75,98,119,144,165,192],"tools.":[15,76,193],"Security":[16],"privacy-preserving":[18],"tools":[19,54,145,166],"(for":[20],"brevity,":[21],"the":[22,39,46,74,88,92,106,136,141,154,161,188],"authors":[23,79],"term":[24],"them":[25,182],"as":[26],"\u201csecurity":[27],"tools\u201d":[28],"in":[29,45,87,124],"paper,":[31],"unless":[32],"otherwise":[33],"specified)":[34],"are":[35,61,121],"designed":[36],"protect":[38],"privacy":[42],"people":[44,96],"digital":[47],"environment.":[48],"However,":[49],"inappropriate":[50],"use":[51,190],"these":[53],"can":[55],"lead":[56],"unexpected":[58],"consequences":[59],"that":[60,167],"preventable.":[62],"Hence,":[63],"it":[64],"significant":[66],"examine":[68],"why":[69],"users":[70],"do":[71],"not":[72],"Design/methodology/approach":[77],"conducted":[80],"a":[81],"qualitative":[82],"with":[84,183],"40":[85],"participants":[86],"USA":[89],"investigate":[91],"prevalent":[93],"tools,":[99],"their":[100,110],"data":[103,114],"access":[104],"corresponding":[107],"impact":[108],"on":[109,153],"usage":[111,127],"behavior":[112],"protection":[115],"strategies.":[116],"Findings":[117],"While":[118],"vulnerabilities":[120],"often":[122],"rooted":[123],"people\u2019s":[125],"internet":[126,137],"behavior,":[128],"examined":[131],"user\u2019s":[132],"mental":[133,149],"models":[134,186],"unpacked":[139],"how":[140],"about":[143],"relate":[146],"those":[148],"models.":[150],"Originality/value":[151],"Based":[152],"findings,":[155],"offers":[158],"recommendations":[159],"highlighting":[160],"design":[162],"aspects":[163],"need":[168],"careful":[169],"attention":[170],"from":[171],"researchers":[172],"industry":[174],"practitioners,":[175],"alleviate":[177],"users\u2019":[178],"provide":[181],"accurate":[184],"conceptual":[185],"toward":[187],"desired":[189]},"counts_by_year":[{"year":2025,"cited_by_count":9},{"year":2024,"cited_by_count":9}],"updated_date":"2026-04-02T15:55:50.835912","created_date":"2025-10-10T00:00:00"}
