{"id":"https://openalex.org/W4220881701","doi":"https://doi.org/10.1108/ics-07-2021-0105","title":"User perceptions and use of authentication methods: insights from youth in Mexico and Bosnia and Herzegovina","display_name":"User perceptions and use of authentication methods: insights from youth in Mexico and Bosnia and Herzegovina","publication_year":2022,"publication_date":"2022-03-16","ids":{"openalex":"https://openalex.org/W4220881701","doi":"https://doi.org/10.1108/ics-07-2021-0105"},"language":"en","primary_location":{"id":"doi:10.1108/ics-07-2021-0105","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-07-2021-0105","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"http://dro.dur.ac.uk/35444/","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5023547132","display_name":"Sun\u010dica Had\u017eidedi\u0107","orcid":"https://orcid.org/0000-0001-9026-8737"},"institutions":[{"id":"https://openalex.org/I137551348","display_name":"Sarajevo School of Science and Technology","ror":"https://ror.org/00xx8vr92","country_code":"BA","type":"education","lineage":["https://openalex.org/I137551348"]},{"id":"https://openalex.org/I190082696","display_name":"Durham University","ror":"https://ror.org/01v29qb04","country_code":"GB","type":"education","lineage":["https://openalex.org/I190082696"]}],"countries":["BA","GB"],"is_corresponding":true,"raw_author_name":"Suncica Hadzidedic","raw_affiliation_strings":["Department of Computer Science, Durham University, Durham, UK and Department of Computer Science, University Sarajevo School of Science and Technology, Sarajevo, Bosnia and Herzegovina"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Durham University, Durham, UK and Department of Computer Science, University Sarajevo School of Science and Technology, Sarajevo, Bosnia and Herzegovina","institution_ids":["https://openalex.org/I137551348","https://openalex.org/I190082696"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5053326359","display_name":"Silvia B. Fajardo-Flores","orcid":"https://orcid.org/0000-0002-4332-4377"},"institutions":[{"id":"https://openalex.org/I916541031","display_name":"Universidad de Colima","ror":"https://ror.org/04znxe670","country_code":"MX","type":"education","lineage":["https://openalex.org/I916541031"]}],"countries":["MX"],"is_corresponding":false,"raw_author_name":"Silvia Fajardo-Flores","raw_affiliation_strings":["Faculty of Telematics, Universidad de Colima, Colima, Mexico"],"affiliations":[{"raw_affiliation_string":"Faculty of Telematics, Universidad de Colima, Colima, Mexico","institution_ids":["https://openalex.org/I916541031"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5074087925","display_name":"Belma Rami\u0107-Brki\u0107","orcid":"https://orcid.org/0000-0002-8205-0137"},"institutions":[{"id":"https://openalex.org/I137551348","display_name":"Sarajevo School of Science and Technology","ror":"https://ror.org/00xx8vr92","country_code":"BA","type":"education","lineage":["https://openalex.org/I137551348"]}],"countries":["BA"],"is_corresponding":false,"raw_author_name":"Belma Ramic-Brkic","raw_affiliation_strings":["Department of Computer Science, University Sarajevo School of Science and Technology, Sarajevo, Bosnia and Herzegovina"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University Sarajevo School of Science and Technology, Sarajevo, Bosnia and Herzegovina","institution_ids":["https://openalex.org/I137551348"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5023547132"],"corresponding_institution_ids":["https://openalex.org/I137551348","https://openalex.org/I190082696"],"apc_list":null,"apc_paid":null,"fwci":1.5157,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.85507746,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"30","issue":"4","first_page":"615","last_page":"632"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9848999977111816,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10803","display_name":"Innovative Human-Technology Interaction","score":0.9786999821662903,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.7875115871429443},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.7412458062171936},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.7072214484214783},{"id":"https://openalex.org/keywords/sophistication","display_name":"Sophistication","score":0.6289466023445129},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6008861064910889},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.5217983722686768},{"id":"https://openalex.org/keywords/population","display_name":"Population","score":0.5098921060562134},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.5003745555877686},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.45509833097457886},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.4533315598964691},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.45203980803489685},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.43465837836265564},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.36903345584869385},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.23905780911445618},{"id":"https://openalex.org/keywords/qualitative-research","display_name":"Qualitative research","score":0.2371658980846405},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.1953761875629425},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1462269425392151},{"id":"https://openalex.org/keywords/medicine","display_name":"Medicine","score":0.08922377228736877},{"id":"https://openalex.org/keywords/sociology","display_name":"Sociology","score":0.08631017804145813}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.7875115871429443},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.7412458062171936},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.7072214484214783},{"id":"https://openalex.org/C168725872","wikidata":"https://www.wikidata.org/wiki/Q991663","display_name":"Sophistication","level":2,"score":0.6289466023445129},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6008861064910889},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.5217983722686768},{"id":"https://openalex.org/C2908647359","wikidata":"https://www.wikidata.org/wiki/Q2625603","display_name":"Population","level":2,"score":0.5098921060562134},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.5003745555877686},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.45509833097457886},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.4533315598964691},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.45203980803489685},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.43465837836265564},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.36903345584869385},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.23905780911445618},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.2371658980846405},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.1953761875629425},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1462269425392151},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.08922377228736877},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.08631017804145813},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0},{"id":"https://openalex.org/C99454951","wikidata":"https://www.wikidata.org/wiki/Q932068","display_name":"Environmental health","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1108/ics-07-2021-0105","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-07-2021-0105","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:dro.dur.ac.uk.OAI2:35444","is_oa":true,"landing_page_url":"http://dro.dur.ac.uk/35444/","pdf_url":null,"source":{"id":"https://openalex.org/S4377196258","display_name":"Durham Research Online (Durham University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I190082696","host_organization_name":"Durham University","host_organization_lineage":["https://openalex.org/I190082696"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Information and Computer Security, 2022, Vol.30(4), pp.615-632 [Peer Reviewed Journal]","raw_type":"Article"},{"id":"pmh:oai:durham-repository.worktribe.com:1216408","is_oa":true,"landing_page_url":"https://durham-repository.worktribe.com/output/1216408","pdf_url":null,"source":{"id":"https://openalex.org/S4306400188","display_name":"Durham Research Online (Durham University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I190082696","host_organization_name":"Durham University","host_organization_lineage":["https://openalex.org/I190082696"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"","raw_type":"Journal Article"}],"best_oa_location":{"id":"pmh:oai:dro.dur.ac.uk.OAI2:35444","is_oa":true,"landing_page_url":"http://dro.dur.ac.uk/35444/","pdf_url":null,"source":{"id":"https://openalex.org/S4377196258","display_name":"Durham Research Online (Durham University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I190082696","host_organization_name":"Durham University","host_organization_lineage":["https://openalex.org/I190082696"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by-nc","license_id":"https://openalex.org/licenses/cc-by-nc","version":"acceptedVersion","is_accepted":true,"is_published":false,"raw_source_name":"Information and Computer Security, 2022, Vol.30(4), pp.615-632 [Peer Reviewed Journal]","raw_type":"Article"},"sustainable_development_goals":[{"score":0.6100000143051147,"id":"https://metadata.un.org/sdg/4","display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":35,"referenced_works":["https://openalex.org/W1605453369","https://openalex.org/W1969183719","https://openalex.org/W2012314775","https://openalex.org/W2029522813","https://openalex.org/W2030112111","https://openalex.org/W2067189069","https://openalex.org/W2104773223","https://openalex.org/W2114037292","https://openalex.org/W2126453598","https://openalex.org/W2154254089","https://openalex.org/W2171920515","https://openalex.org/W2257985229","https://openalex.org/W2417993288","https://openalex.org/W2588762288","https://openalex.org/W2612478359","https://openalex.org/W2756930187","https://openalex.org/W2809946788","https://openalex.org/W2896753901","https://openalex.org/W2901260264","https://openalex.org/W2911945468","https://openalex.org/W2945624884","https://openalex.org/W2967441405","https://openalex.org/W2968548076","https://openalex.org/W2969748787","https://openalex.org/W2972475147","https://openalex.org/W2975048949","https://openalex.org/W3004890695","https://openalex.org/W3004936685","https://openalex.org/W3005890490","https://openalex.org/W3016054095","https://openalex.org/W3022534249","https://openalex.org/W3033179496","https://openalex.org/W3129887395","https://openalex.org/W3160942992","https://openalex.org/W3197608432"],"related_works":["https://openalex.org/W4241263575","https://openalex.org/W2317823609","https://openalex.org/W3130462184","https://openalex.org/W2902287117","https://openalex.org/W2401463593","https://openalex.org/W4318256508","https://openalex.org/W2349808627","https://openalex.org/W2391671934","https://openalex.org/W1983660090","https://openalex.org/W2123843216"],"abstract_inverted_index":{"Purpose":[0],"This":[1,150],"paper":[2,37],"aims":[3],"to":[4,100],"address":[5],"the":[6,33,39,89,112,136,155],"user":[7],"perspective":[8],"about":[9],"usability,":[10],"security":[11,142],"and":[12,19,23,63,65,83,120,139],"use":[13],"of":[14,69,129,141],"five":[15],"authentication":[16,76,131,158],"schemes":[17],"(text":[18],"graphical":[20],"passwords,":[21,107],"biometrics":[22],"hardware":[24],"tokens)":[25],"from":[26,162],"a":[27],"population":[28],"not":[29,168],"covered":[30],"previously":[31],"in":[32,43,55,61],"literature.":[34],"Additionally,":[35],"this":[36],"explores":[38],"criteria":[40,103],"users":[41],"apply":[42,101],"creating":[44,105],"their":[45,147],"text":[46,86,106],"passwords.":[47],"Design/methodology/approach":[48],"An":[49],"online":[50],"survey":[51],"study":[52,151],"was":[53,77],"performed":[54],"spring":[56],"2019":[57],"with":[58,111],"university":[59],"students":[60],"Mexico":[62],"Bosnia":[64],"Herzegovina.":[66],"A":[67],"total":[68],"197":[70],"responses":[71],"were":[72,88],"collected.":[73],"Findings":[74],"Fingerprint-based":[75],"most":[78],"frequently":[79],"perceived":[80],"as":[81,144,146],"usable":[82],"secure.":[84],"However,":[85],"passwords":[87],"predominantly":[90],"used":[91,157],"method":[92],"for":[93,104,171],"unlocking":[94],"computer":[95],"devices.":[96],"The":[97],"participants":[98],"preferred":[99],"personal":[102],"which,":[108],"interestingly,":[109],"coincided":[110],"general":[113],"password":[114],"guidelines,":[115],"e.g.":[116],"length,":[117],"combining":[118],"letters":[119],"special":[121],"characters.":[122],"Originality/value":[123],"Research":[124],"on":[125],"young":[126],"adults\u2019":[127],"perceptions":[128],"different":[130],"methods":[132,159],"is":[133],"driven":[134],"by":[135],"increasing":[137],"frequency":[138],"sophistication":[140],"breaches,":[143],"well":[145],"significant":[148],"consequences.":[149],"provided":[152],"insight":[153],"into":[154],"commonly":[156],"among":[160],"youth":[161],"two":[163],"geographic":[164],"locations,":[165],"which":[166],"have":[167],"been":[169],"accounted":[170],"previously.":[172]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2022-04-03T00:00:00"}
