{"id":"https://openalex.org/W4281774261","doi":"https://doi.org/10.1145/3532105.3535013","title":"\"Why would Someone Hack Me out of Thousands of Students\": Video Presenter's Impact on Motivating Users to Adopt 2FA","display_name":"\"Why would Someone Hack Me out of Thousands of Students\": Video Presenter's Impact on Motivating Users to Adopt 2FA","publication_year":2022,"publication_date":"2022-06-07","ids":{"openalex":"https://openalex.org/W4281774261","doi":"https://doi.org/10.1145/3532105.3535013"},"language":"en","primary_location":{"id":"doi:10.1145/3532105.3535013","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3532105.3535013","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5041676226","display_name":"Elham Al Qahtani","orcid":"https://orcid.org/0000-0002-5062-7579"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Elham Al Qahtani","raw_affiliation_strings":["University of North Carolina at Charlotte, Charlotte, NC, USA"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Charlotte, Charlotte, NC, USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024295709","display_name":"Lipsarani Sahoo","orcid":"https://orcid.org/0000-0001-8660-8516"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lipsarani Sahoo","raw_affiliation_strings":["University of North Carolina at Charlotte, Charlotte, NC, USA"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Charlotte, Charlotte, NC, USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5013067968","display_name":"Yousra Javed","orcid":"https://orcid.org/0000-0002-0293-9551"},"institutions":[{"id":"https://openalex.org/I47301684","display_name":"Illinois State University","ror":"https://ror.org/050kcr883","country_code":"US","type":"education","lineage":["https://openalex.org/I47301684"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Yousra Javed","raw_affiliation_strings":["Illinois State University, Normal, IL, USA"],"affiliations":[{"raw_affiliation_string":"Illinois State University, Normal, IL, USA","institution_ids":["https://openalex.org/I47301684"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013557688","display_name":"Mohamed Shehab","orcid":"https://orcid.org/0000-0002-4189-9118"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohamed Shehab","raw_affiliation_strings":["University of North Carolina at Charlotte, Charlotte, NC, USA"],"affiliations":[{"raw_affiliation_string":"University of North Carolina at Charlotte, Charlotte, NC, USA","institution_ids":["https://openalex.org/I102149020"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5041676226"],"corresponding_institution_ids":["https://openalex.org/I102149020"],"apc_list":null,"apc_paid":null,"fwci":1.5157,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.85872493,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"139","last_page":"150"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12262","display_name":"Hate Speech and Cyberbullying Detection","score":0.9769999980926514,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9768000245094299,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7377926111221313},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.5961897969245911},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.4444209039211273},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.333518922328949},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.3272503614425659},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.24230891466140747}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7377926111221313},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.5961897969245911},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.4444209039211273},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.333518922328949},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.3272503614425659},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.24230891466140747}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3532105.3535013","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3532105.3535013","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 27th ACM on Symposium on Access Control Models and Technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W1594423643","https://openalex.org/W1989210507","https://openalex.org/W2006809639","https://openalex.org/W2017547389","https://openalex.org/W2087094682","https://openalex.org/W2104100991","https://openalex.org/W2136136174","https://openalex.org/W2144981153","https://openalex.org/W2146416349","https://openalex.org/W2159759652","https://openalex.org/W2204311550","https://openalex.org/W2256695479","https://openalex.org/W2276747357","https://openalex.org/W2315824682","https://openalex.org/W2602895897","https://openalex.org/W2794591479","https://openalex.org/W2795673503","https://openalex.org/W2796098074","https://openalex.org/W2887941812","https://openalex.org/W2898579639","https://openalex.org/W2953042808","https://openalex.org/W2969468676","https://openalex.org/W2970454902","https://openalex.org/W3000195426","https://openalex.org/W3161750441","https://openalex.org/W3184872641","https://openalex.org/W4292811746"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W4389670110","https://openalex.org/W2187546663","https://openalex.org/W2429057255","https://openalex.org/W148745890","https://openalex.org/W2611942503","https://openalex.org/W4315621326","https://openalex.org/W2899790217","https://openalex.org/W1576092969","https://openalex.org/W2598865957"],"abstract_inverted_index":{"The":[0],"voluntary":[1,22],"adoption":[2,24],"rate":[3,25],"of":[4,48,82,102,135],"two-factor":[5],"authentication":[6],"(2FA)":[7],"remains":[8],"low.":[9],"This":[10],"paper":[11],"investigates":[12],"whether":[13],"video-based":[14],"risk":[15,194],"communication":[16,195],"messages":[17],"about":[18],"Duo":[19,54,69,105,138,154,166,175],"2FA":[20,23,55,70,106,139,155,167,176,185],"impacts":[21],"when":[26],"delivered":[27],"by":[28],"a":[29,33,200],"human":[30,109,201],"speaker":[31,88,92,110,119,202],"versus":[32],"cartoon":[34,118],"speaker.":[35],"We":[36,98],"conducted":[37],"an":[38],"online":[39,188],"two-phased":[40],"survey-based":[41],"study":[42],"with":[43,116],"435":[44],"university":[45,59,158,178],"students":[46],"comprised":[47],"those":[49,64],"who":[50,65,164],"have":[51,199],"not":[52],"enabled":[53,68,104,137,165],"(non-adopters)":[56],"on":[57,156,177,186],"their":[58,150,157],"account":[60,159],"as":[61,63,171],"well":[62],"had":[66],"previously":[67],"(adopters).":[71],"Participants":[72],"in":[73,140,160],"the":[74,83,108,117,129,141,145,161],"non-adopters":[75],"group":[76,147],"(139)":[77],"were":[78],"assigned":[79],"to":[80,114,152,183,207],"one":[81],"three":[84],"groups:":[85],"Threat-R":[86],"(human":[87],"video),":[89,93],"Threat-A":[90],"(cartoon":[91],"and":[94,131],"Control":[95,142],"(no":[96],"video).":[97],"found":[99],"that":[100,193,198],"31%":[101],"participants":[103,136,148,182],"through":[107,196],"video":[111,120],"message":[112],"compared":[113],"7%":[115],"message.":[121],"However,":[122],"there":[123],"was":[124],"no":[125],"significant":[126],"difference":[127],"between":[128],"treatment":[130,146],"control":[132],"groups":[133],"(17%":[134],"group).":[143],"Nevertheless,":[144],"showed":[149],"intention":[151],"activate":[153],"future.":[162],"Those":[163],"rated":[168],"Duo's":[169],"usability":[170],"good.":[172],"Moreover,":[173],"enabling":[174],"accounts":[179],"led":[180],"some":[181],"enable":[184],"other":[187],"accounts.":[189],"Our":[190],"findings":[191],"suggest":[192],"videos":[197],"could":[203],"increase":[204],"users'":[205],"willingness":[206],"adopt":[208],"security":[209],"features.":[210]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
