{"id":"https://openalex.org/W4396833206","doi":"https://doi.org/10.1145/3613904.3642823","title":"Understanding Users' Interaction with Login Notifications","display_name":"Understanding Users' Interaction with Login Notifications","publication_year":2024,"publication_date":"2024-05-11","ids":{"openalex":"https://openalex.org/W4396833206","doi":"https://doi.org/10.1145/3613904.3642823"},"language":"en","primary_location":{"id":"doi:10.1145/3613904.3642823","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3613904.3642823","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3613904.3642823","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the CHI Conference on Human Factors in Computing Systems","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3613904.3642823","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5065482265","display_name":"Philipp Markert","orcid":"https://orcid.org/0000-0002-9232-4496"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Philipp Markert","raw_affiliation_strings":["Ruhr University Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Ruhr University Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5046212991","display_name":"Leona Lassak","orcid":"https://orcid.org/0000-0001-8309-3211"},"institutions":[{"id":"https://openalex.org/I904495901","display_name":"Ruhr University Bochum","ror":"https://ror.org/04tsk2644","country_code":"DE","type":"education","lineage":["https://openalex.org/I904495901"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Leona Lassak","raw_affiliation_strings":["Ruhr University Bochum, Germany"],"affiliations":[{"raw_affiliation_string":"Ruhr University Bochum, Germany","institution_ids":["https://openalex.org/I904495901"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069307193","display_name":"Maximilian Golla","orcid":"https://orcid.org/0000-0003-2204-2132"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Maximilian Golla","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Germany","institution_ids":["https://openalex.org/I4210128801"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5110236021","display_name":"Markus D\u00fcrmuth","orcid":null},"institutions":[{"id":"https://openalex.org/I114112103","display_name":"Leibniz University Hannover","ror":"https://ror.org/0304hq317","country_code":"DE","type":"education","lineage":["https://openalex.org/I114112103"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Markus D\u00fcrmuth","raw_affiliation_strings":["Leibniz University Hannover, Germany"],"affiliations":[{"raw_affiliation_string":"Leibniz University Hannover, Germany","institution_ids":["https://openalex.org/I114112103"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5065482265"],"corresponding_institution_ids":["https://openalex.org/I904495901"],"apc_list":null,"apc_paid":null,"fwci":2.4107,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.90262902,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"17"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12607","display_name":"Personal Information Management and User Behavior","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.9877545833587646},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7822030186653137},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6221802234649658},{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.6001585721969604},{"id":"https://openalex.org/keywords/sign","display_name":"Sign (mathematics)","score":0.5563631057739258},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5264699459075928},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.48712706565856934},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4849105477333069},{"id":"https://openalex.org/keywords/service-provider","display_name":"Service provider","score":0.41282787919044495},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.08366990089416504}],"concepts":[{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.9877545833587646},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7822030186653137},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6221802234649658},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.6001585721969604},{"id":"https://openalex.org/C139676723","wikidata":"https://www.wikidata.org/wiki/Q1193832","display_name":"Sign (mathematics)","level":2,"score":0.5563631057739258},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5264699459075928},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.48712706565856934},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4849105477333069},{"id":"https://openalex.org/C116537","wikidata":"https://www.wikidata.org/wiki/Q2169973","display_name":"Service provider","level":3,"score":0.41282787919044495},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.08366990089416504},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3613904.3642823","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3613904.3642823","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3613904.3642823","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the CHI Conference on Human Factors in Computing Systems","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3613904.3642823","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3613904.3642823","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3613904.3642823","source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the CHI Conference on Human Factors in Computing Systems","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4396833206.pdf"},"referenced_works_count":22,"referenced_works":["https://openalex.org/W1800552373","https://openalex.org/W2045591401","https://openalex.org/W2065343501","https://openalex.org/W2108846476","https://openalex.org/W2139179587","https://openalex.org/W2165565225","https://openalex.org/W2611670505","https://openalex.org/W2624735790","https://openalex.org/W2786284130","https://openalex.org/W2793855649","https://openalex.org/W2891114826","https://openalex.org/W2914845368","https://openalex.org/W2931153881","https://openalex.org/W2942101457","https://openalex.org/W2987413972","https://openalex.org/W3000190958","https://openalex.org/W3030213528","https://openalex.org/W3106386337","https://openalex.org/W3189604486","https://openalex.org/W3204765815","https://openalex.org/W4288086187","https://openalex.org/W4387857430"],"related_works":["https://openalex.org/W4235220108","https://openalex.org/W4256170434","https://openalex.org/W4233948907","https://openalex.org/W4315650027","https://openalex.org/W4238894392","https://openalex.org/W2357607877","https://openalex.org/W2982321410","https://openalex.org/W4238771742","https://openalex.org/W4235839583","https://openalex.org/W3156990385"],"abstract_inverted_index":{"Login":[0],"notifications":[1,97],"intend":[2],"to":[3,43,49,65,90,96,126,141],"inform":[4],"users":[5,118],"about":[6],"sign-ins":[7],"and":[8,40,81,135,144],"help":[9],"them":[10,59],"protect":[11,66],"their":[12,67],"accounts":[13],"from":[14,25,69],"unauthorized":[15],"access.":[16,71],"Notifications":[17],"are":[18,47],"usually":[19],"sent":[20,98],"if":[21],"a":[22,73,100,107],"login":[23,55,84,101],"deviates":[24],"previous":[26],"ones,":[27],"potentially":[28],"indicating":[29],"malicious":[30,108,128],"activity.":[31],"They":[32],"contain":[33],"information":[34],"like":[35],"the":[36,54,132],"location,":[37],"date,":[38],"time,":[39],"device":[41],"used":[42],"sign":[44],"in.":[45],"Users":[46],"challenged":[48],"verify":[50],"whether":[51],"they":[52,62,102],"recognize":[53],"(because":[56],"it":[57],"was":[58],"or":[60,64,104],"someone":[61],"know)":[63],"account":[68],"unwanted":[70],"In":[72],"user":[74],"study,":[75],"we":[76],"explore":[77],"users\u2019":[78,92],"comprehension,":[79],"reactions,":[80],"expectations":[82],"of":[83],"notifications.":[85],"We":[86,115,130],"utilize":[87],"two":[88],"treatments":[89],"measure":[91],"behavior":[93],"in":[94],"response":[95],"for":[99,138,147],"initiated":[103],"based":[105],"on":[106,111],"actor":[109],"relying":[110],"statistical":[112],"sign-in":[113],"information.":[114],"find":[116],"that":[117],"identify":[119],"legitimate":[120],"logins":[121,146],"but":[122],"need":[123],"more":[124],"support":[125],"halt":[127],"sign-ins.":[129],"discuss":[131],"identified":[133],"problems":[134],"give":[136],"recommendations":[137],"service":[139],"providers":[140],"ensure":[142],"usable":[143],"secure":[145],"everyone.":[148]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2026-03-11T06:11:40.159057","created_date":"2025-10-10T00:00:00"}
