{"id":"https://openalex.org/W3032043542","doi":"https://doi.org/10.1145/3313831.3376570","title":"Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices","display_name":"Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices","publication_year":2020,"publication_date":"2020-04-21","ids":{"openalex":"https://openalex.org/W3032043542","doi":"https://doi.org/10.1145/3313831.3376570","mag":"3032043542"},"language":"en","primary_location":{"id":"doi:10.1145/3313831.3376570","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3313831.3376570","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037796481","display_name":"Yixin Zou","orcid":"https://orcid.org/0000-0002-9088-705X"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yixin Zou","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5052168623","display_name":"Kevin Roundy","orcid":"https://orcid.org/0000-0002-8285-1647"},"institutions":[{"id":"https://openalex.org/I1308906816","display_name":"NortonLifeLock (United States)","ror":"https://ror.org/0449t3a80","country_code":"US","type":"company","lineage":["https://openalex.org/I1308906816"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Kevin Roundy","raw_affiliation_strings":["NortonLifeLock Research Group, Culver City, CA, USA"],"affiliations":[{"raw_affiliation_string":"NortonLifeLock Research Group, Culver City, CA, USA","institution_ids":["https://openalex.org/I1308906816"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5023825669","display_name":"Acar Tamersoy","orcid":null},"institutions":[{"id":"https://openalex.org/I1308906816","display_name":"NortonLifeLock (United States)","ror":"https://ror.org/0449t3a80","country_code":"US","type":"company","lineage":["https://openalex.org/I1308906816"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Acar Tamersoy","raw_affiliation_strings":["NortonLifeLock Research Group, Culver City, CA, USA"],"affiliations":[{"raw_affiliation_string":"NortonLifeLock Research Group, Culver City, CA, USA","institution_ids":["https://openalex.org/I1308906816"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5060391899","display_name":"Saurabh Shintre","orcid":null},"institutions":[{"id":"https://openalex.org/I1308906816","display_name":"NortonLifeLock (United States)","ror":"https://ror.org/0449t3a80","country_code":"US","type":"company","lineage":["https://openalex.org/I1308906816"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Saurabh Shintre","raw_affiliation_strings":["NortonLifeLock Research Group, Mountain View, CA, USA"],"affiliations":[{"raw_affiliation_string":"NortonLifeLock Research Group, Mountain View, CA, USA","institution_ids":["https://openalex.org/I1308906816"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5070486143","display_name":"Johann Roturier","orcid":null},"institutions":[{"id":"https://openalex.org/I4210098805","display_name":"NortonLifeLock (Ireland)","ror":"https://ror.org/0114r0003","country_code":"IE","type":"company","lineage":["https://openalex.org/I1308906816","https://openalex.org/I4210098805"]}],"countries":["IE"],"is_corresponding":false,"raw_author_name":"Johann Roturier","raw_affiliation_strings":["NortonLifeLock Research Group, Dublin, Ireland"],"affiliations":[{"raw_affiliation_string":"NortonLifeLock Research Group, Dublin, Ireland","institution_ids":["https://openalex.org/I4210098805"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061205711","display_name":"Florian Schaub","orcid":"https://orcid.org/0000-0003-1039-7155"},"institutions":[{"id":"https://openalex.org/I27837315","display_name":"University of Michigan\u2013Ann Arbor","ror":"https://ror.org/00jmfr291","country_code":"US","type":"education","lineage":["https://openalex.org/I27837315"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Florian Schaub","raw_affiliation_strings":["University of Michigan, Ann Arbor, MI, USA"],"affiliations":[{"raw_affiliation_string":"University of Michigan, Ann Arbor, MI, USA","institution_ids":["https://openalex.org/I27837315"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5037796481"],"corresponding_institution_ids":["https://openalex.org/I27837315"],"apc_list":null,"apc_paid":null,"fwci":12.7472,"has_fulltext":false,"cited_by_count":68,"citation_normalized_percentile":{"value":0.98575161,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"15"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/abandonment","display_name":"Abandonment (legal)","score":0.910651683807373},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.7382462024688721},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.6875537633895874},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6597989201545715},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.5668106079101562},{"id":"https://openalex.org/keywords/best-practice","display_name":"Best practice","score":0.5377663969993591},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.42735517024993896},{"id":"https://openalex.org/keywords/security-awareness","display_name":"Security awareness","score":0.41931724548339844},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.37778860330581665},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.3719850778579712},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.36548012495040894},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.15859588980674744},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09444758296012878},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.08257728815078735}],"concepts":[{"id":"https://openalex.org/C2779816988","wikidata":"https://www.wikidata.org/wiki/Q305418","display_name":"Abandonment (legal)","level":2,"score":0.910651683807373},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.7382462024688721},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.6875537633895874},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6597989201545715},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.5668106079101562},{"id":"https://openalex.org/C184356942","wikidata":"https://www.wikidata.org/wiki/Q830382","display_name":"Best practice","level":2,"score":0.5377663969993591},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.42735517024993896},{"id":"https://openalex.org/C2778652015","wikidata":"https://www.wikidata.org/wiki/Q7445019","display_name":"Security awareness","level":3,"score":0.41931724548339844},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.37778860330581665},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.3719850778579712},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.36548012495040894},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.15859588980674744},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09444758296012878},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.08257728815078735},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3313831.3376570","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3313831.3376570","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4000000059604645,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":86,"referenced_works":["https://openalex.org/W22488834","https://openalex.org/W54475548","https://openalex.org/W153756376","https://openalex.org/W1423289060","https://openalex.org/W1463518955","https://openalex.org/W1485200701","https://openalex.org/W1507209377","https://openalex.org/W1944720853","https://openalex.org/W1971916001","https://openalex.org/W1975066611","https://openalex.org/W1986518351","https://openalex.org/W1990857471","https://openalex.org/W2001607616","https://openalex.org/W2004222284","https://openalex.org/W2018696390","https://openalex.org/W2040356698","https://openalex.org/W2042720915","https://openalex.org/W2045591401","https://openalex.org/W2067724039","https://openalex.org/W2075080680","https://openalex.org/W2079938082","https://openalex.org/W2080453063","https://openalex.org/W2081430061","https://openalex.org/W2084885239","https://openalex.org/W2097719378","https://openalex.org/W2099387734","https://openalex.org/W2099647042","https://openalex.org/W2099697766","https://openalex.org/W2109120348","https://openalex.org/W2115373648","https://openalex.org/W2126360800","https://openalex.org/W2129100925","https://openalex.org/W2133824719","https://openalex.org/W2143953012","https://openalex.org/W2150957322","https://openalex.org/W2154453017","https://openalex.org/W2162532690","https://openalex.org/W2169371034","https://openalex.org/W2204311550","https://openalex.org/W2213160927","https://openalex.org/W2256695479","https://openalex.org/W2292160273","https://openalex.org/W2350778671","https://openalex.org/W2403232321","https://openalex.org/W2406789678","https://openalex.org/W2413416220","https://openalex.org/W2417203279","https://openalex.org/W2462559584","https://openalex.org/W2467010435","https://openalex.org/W2471998880","https://openalex.org/W2537669654","https://openalex.org/W2545457694","https://openalex.org/W2557778508","https://openalex.org/W2585292421","https://openalex.org/W2586858771","https://openalex.org/W2601198590","https://openalex.org/W2621100923","https://openalex.org/W2624735790","https://openalex.org/W2722360008","https://openalex.org/W2739711672","https://openalex.org/W2740209367","https://openalex.org/W2752476146","https://openalex.org/W2753752286","https://openalex.org/W2765667105","https://openalex.org/W2779206865","https://openalex.org/W2783948250","https://openalex.org/W2795673503","https://openalex.org/W2795776492","https://openalex.org/W2796098074","https://openalex.org/W2888849592","https://openalex.org/W2889246521","https://openalex.org/W2889558110","https://openalex.org/W2901260264","https://openalex.org/W2941057822","https://openalex.org/W2942101457","https://openalex.org/W2953410748","https://openalex.org/W2968107524","https://openalex.org/W2968354513","https://openalex.org/W2968455169","https://openalex.org/W2970454902","https://openalex.org/W2977601907","https://openalex.org/W2999421257","https://openalex.org/W3000645669","https://openalex.org/W3097991090","https://openalex.org/W3121431905","https://openalex.org/W4288086187"],"related_works":["https://openalex.org/W185442532","https://openalex.org/W1577996341","https://openalex.org/W2966027630","https://openalex.org/W2086515904","https://openalex.org/W4313261984","https://openalex.org/W3214742805","https://openalex.org/W4304943319","https://openalex.org/W2166222264","https://openalex.org/W2544387082","https://openalex.org/W2968709340"],"abstract_inverted_index":{"Users":[0],"struggle":[1],"to":[2,4],"adhere":[3],"expert-recommended":[5],"security":[6],"and":[7,27,38,53,59,78,113,118],"privacy":[8,52],"practices.":[9,44,57],"While":[10],"prior":[11,79],"work":[12],"has":[13],"studied":[14],"initial":[15],"adoption":[16,37],"of":[17,40,87],"such":[18],"practices,":[19],"little":[20],"is":[21],"known":[22],"about":[23],"the":[24,36],"subsequent":[25],"implementation":[26],"abandonment.":[28],"We":[29,108],"conducted":[30],"an":[31],"online":[32],"survey":[33],"(n=902)":[34],"examining":[35],"abandonment":[39],"30":[41],"commonly":[42],"recommended":[43],"Security":[45],"practices":[46,62,68,90],"were":[47,63,91,95],"more":[48,64],"widely":[49,65],"adopted":[50,66],"than":[51,67],"identity":[54,114],"theft":[55,115],"protection":[56,116],"Manual":[58],"fully":[60],"automatic":[61],"requiring":[69],"recurring":[70],"user":[71,125],"interaction.":[72],"Participants'":[73],"gender,":[74],"education,":[75],"technical":[76],"background,":[77],"negative":[80],"experience":[81],"are":[82],"correlated":[83],"with":[84,105,124],"their":[85],"levels":[86],"adoption.":[88],"Furthermore,":[89],"abandoned":[92],"when":[93,101],"they":[94],"perceived":[96],"as":[97],"low-value,":[98],"inconvenient,":[99],"or":[100],"users":[102],"overrode":[103],"them":[104],"subjective":[106],"judgment.":[107],"discuss":[109],"how":[110],"security,":[111],"privacy,":[112],"recommendations":[117],"tools":[119],"can":[120],"be":[121],"better":[122],"aligned":[123],"needs.":[126]},"counts_by_year":[{"year":2026,"cited_by_count":3},{"year":2025,"cited_by_count":15},{"year":2024,"cited_by_count":16},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":11},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":3}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2025-10-10T00:00:00"}
