{"id":"https://openalex.org/W2055873213","doi":"https://doi.org/10.1145/2078827.2078831","title":"On the challenges in usable security lab studies","display_name":"On the challenges in usable security lab studies","publication_year":2011,"publication_date":"2011-07-20","ids":{"openalex":"https://openalex.org/W2055873213","doi":"https://doi.org/10.1145/2078827.2078831","mag":"2055873213"},"language":"en","primary_location":{"id":"doi:10.1145/2078827.2078831","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2078827.2078831","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Seventh Symposium on Usable Privacy and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5019564426","display_name":"Andreas Sotirakopoulos","orcid":null},"institutions":[{"id":"https://openalex.org/I141945490","display_name":"University of British Columbia","ror":"https://ror.org/03rmrcq20","country_code":"CA","type":"education","lineage":["https://openalex.org/I141945490"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Andreas Sotirakopoulos","raw_affiliation_strings":["University of British Columbia, Vancouver, BC, Canada"],"affiliations":[{"raw_affiliation_string":"University of British Columbia, Vancouver, BC, Canada","institution_ids":["https://openalex.org/I141945490"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091571857","display_name":"Kirstie Hawkey","orcid":null},"institutions":[{"id":"https://openalex.org/I129902397","display_name":"Dalhousie University","ror":"https://ror.org/01e6qks80","country_code":"CA","type":"education","lineage":["https://openalex.org/I129902397"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Kirstie Hawkey","raw_affiliation_strings":["Dalhousie University, Halifax, NS, Canada"],"affiliations":[{"raw_affiliation_string":"Dalhousie University, Halifax, NS, Canada","institution_ids":["https://openalex.org/I129902397"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5035380853","display_name":"Konstantin Beznosov","orcid":"https://orcid.org/0000-0002-1327-7477"},"institutions":[{"id":"https://openalex.org/I141945490","display_name":"University of British Columbia","ror":"https://ror.org/03rmrcq20","country_code":"CA","type":"education","lineage":["https://openalex.org/I141945490"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Konstantin Beznosov","raw_affiliation_strings":["University of British Columbia, Vancouver, BC, Canada"],"affiliations":[{"raw_affiliation_string":"University of British Columbia, Vancouver, BC, Canada","institution_ids":["https://openalex.org/I141945490"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5019564426"],"corresponding_institution_ids":["https://openalex.org/I141945490"],"apc_list":null,"apc_paid":null,"fwci":17.7121,"has_fulltext":false,"cited_by_count":86,"citation_normalized_percentile":{"value":0.98908772,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.908319890499115},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7300365567207336},{"id":"https://openalex.org/keywords/sample","display_name":"Sample (material)","score":0.5756096839904785},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.49457380175590515},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.36205172538757324},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.3481270670890808}],"concepts":[{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.908319890499115},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7300365567207336},{"id":"https://openalex.org/C198531522","wikidata":"https://www.wikidata.org/wiki/Q485146","display_name":"Sample (material)","level":2,"score":0.5756096839904785},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.49457380175590515},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.36205172538757324},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.3481270670890808},{"id":"https://openalex.org/C43617362","wikidata":"https://www.wikidata.org/wiki/Q170050","display_name":"Chromatography","level":1,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2078827.2078831","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2078827.2078831","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Seventh Symposium on Usable Privacy and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320334593","display_name":"Natural Sciences and Engineering Research Council of Canada","ror":"https://ror.org/01h531d29"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W572688520","https://openalex.org/W1522768299","https://openalex.org/W1550000763","https://openalex.org/W1574235309","https://openalex.org/W1688446120","https://openalex.org/W2008274335","https://openalex.org/W2009900466","https://openalex.org/W2022302485","https://openalex.org/W2024301325","https://openalex.org/W2026843999","https://openalex.org/W2038808651","https://openalex.org/W2081840305","https://openalex.org/W2089358714","https://openalex.org/W2099889974","https://openalex.org/W2102357195","https://openalex.org/W2131906261","https://openalex.org/W2160119656","https://openalex.org/W2160343382","https://openalex.org/W2335888457","https://openalex.org/W2906794128","https://openalex.org/W2914982603"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2982321410","https://openalex.org/W2392004567","https://openalex.org/W2046296964","https://openalex.org/W2940029036","https://openalex.org/W4388292429","https://openalex.org/W2756595502","https://openalex.org/W2010789764","https://openalex.org/W2187233292","https://openalex.org/W2002936267"],"abstract_inverted_index":{"We":[0,17,144],"replicated":[1],"and":[2,43,67,89,101],"extended":[3],"a":[4,45,56,125],"2008":[5],"study":[6,53,109,126,151],"conducted":[7],"at":[8],"CMU":[9],"that":[10,29,153],"investigated":[11],"the":[12,19,26,64,86,90,103,107,118,131,138,158],"effectiveness":[13],"of":[14,25,28,41,120,133],"SSL":[15],"warnings.":[16],"adjusted":[18],"experimental":[20],"design":[21,110],"to":[22,36,85,106,148],"mitigate":[23],"some":[24],"limitations":[27],"prior":[30],"study;":[31],"adjustments":[32],"include":[33],"allowing":[34],"participants":[35,61,81],"use":[37],"their":[38,68],"web":[39,142],"browser":[40],"choice":[42],"recruiting":[44],"more":[46],"representative":[47],"user":[48],"sample.":[49],"However,":[50],"during":[51,63,73],"our":[52,60,99],"we":[54,97,116],"observed":[55],"strong":[57],"disparity":[58,84],"between":[59],"actions":[62,72],"laboratory":[65,87,150],"tasks":[66,75],"self-reported":[69],"\"would":[70],"be\"":[71],"similar":[74],"in":[76,124,141],"everyday":[77],"computer":[78],"practices.":[79],"Our":[80],"attributed":[82],"this":[83,95],"environment":[88],"security":[91,160],"it":[92],"offered.":[93],"In":[94],"paper":[96],"discuss":[98,117],"results":[100],"how":[102],"introduced":[104],"changes":[105,140],"initial":[108],"may":[111,172],"have":[112],"affected":[113],"them.":[114],"Also,":[115],"challenges":[119,132],"observing":[121],"natural":[122],"behavior":[123],"environment,":[127],"as":[128,130],"well":[129],"replicating":[134],"previous":[135],"studies":[136],"given":[137],"rapid":[139],"technology.":[143],"also":[145],"propose":[146],"alternatives":[147],"traditional":[149],"methodologies":[152],"can":[154],"be":[155],"considered":[156],"by":[157],"usable":[159],"research":[161,165],"community":[162],"when":[163],"investigating":[164],"questions":[166],"involving":[167],"sensitive":[168],"data":[169],"where":[170],"trust":[171],"influence":[173],"behavior.":[174]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":7},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":11},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":10},{"year":2013,"cited_by_count":8},{"year":2012,"cited_by_count":5}],"updated_date":"2026-03-25T14:56:36.534964","created_date":"2025-10-10T00:00:00"}
