{"id":"https://openalex.org/W7131673044","doi":"https://doi.org/10.3389/fcomp.2026.1764808","title":"Annoyed by cybersecurity? Human-centric perspectives on cybersecurity","display_name":"Annoyed by cybersecurity? Human-centric perspectives on cybersecurity","publication_year":2026,"publication_date":"2026-02-26","ids":{"openalex":"https://openalex.org/W7131673044","doi":"https://doi.org/10.3389/fcomp.2026.1764808"},"language":"en","primary_location":{"id":"doi:10.3389/fcomp.2026.1764808","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2026.1764808","pdf_url":"https://public-pages-files-2025.frontiersin.org/journals/computer-science/articles/10.3389/fcomp.2026.1764808/pdf","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://public-pages-files-2025.frontiersin.org/journals/computer-science/articles/10.3389/fcomp.2026.1764808/pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5042793059","display_name":"Ravdeep Kour","orcid":"https://orcid.org/0000-0003-0734-0959"},"institutions":[{"id":"https://openalex.org/I190632392","display_name":"Lule\u00e5 University of Technology","ror":"https://ror.org/016st3p78","country_code":"SE","type":"education","lineage":["https://openalex.org/I190632392"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Ravdeep Kour","raw_affiliation_strings":["Division of Operation and Maintenance Engineering, Lulea University of Technology"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Division of Operation and Maintenance Engineering, Lulea University of Technology","institution_ids":["https://openalex.org/I190632392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5121749921","display_name":"Ramin Karim","orcid":null},"institutions":[{"id":"https://openalex.org/I190632392","display_name":"Lule\u00e5 University of Technology","ror":"https://ror.org/016st3p78","country_code":"SE","type":"education","lineage":["https://openalex.org/I190632392"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Ramin Karim","raw_affiliation_strings":["Division of Operation and Maintenance Engineering, Lulea University of Technology"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Division of Operation and Maintenance Engineering, Lulea University of Technology","institution_ids":["https://openalex.org/I190632392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5126937741","display_name":"Annika W\u00e4genbauer","orcid":null},"institutions":[{"id":"https://openalex.org/I4210143258","display_name":"SBS CyberSecurity (United States)","ror":"https://ror.org/0572r3k48","country_code":"US","type":"company","lineage":["https://openalex.org/I4210143258"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Annika W\u00e4genbauer","raw_affiliation_strings":["Cybersecurity Redefined"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Cybersecurity Redefined","institution_ids":["https://openalex.org/I4210143258"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5042793059"],"corresponding_institution_ids":["https://openalex.org/I190632392"],"apc_list":{"value":1150,"currency":"USD","value_usd":1150},"apc_paid":{"value":1150,"currency":"USD","value_usd":1150},"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.27804683,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"8","issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.7077000141143799,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.7077000141143799,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.04410000145435333,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.025599999353289604,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5823000073432922},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5073999762535095},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.44940000772476196},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.4205000102519989},{"id":"https://openalex.org/keywords/phase","display_name":"Phase (matter)","score":0.4147000014781952},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.3059999942779541}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7505999803543091},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5823000073432922},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5196999907493591},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5073999762535095},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.44940000772476196},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.4205000102519989},{"id":"https://openalex.org/C44280652","wikidata":"https://www.wikidata.org/wiki/Q104837","display_name":"Phase (matter)","level":2,"score":0.4147000014781952},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.36329999566078186},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.3059999942779541},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.29809999465942383},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.2840000092983246},{"id":"https://openalex.org/C24845683","wikidata":"https://www.wikidata.org/wiki/Q178651","display_name":"Interview","level":2,"score":0.27480000257492065},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.27230000495910645},{"id":"https://openalex.org/C14185376","wikidata":"https://www.wikidata.org/wiki/Q30232","display_name":"Agile software development","level":2,"score":0.2687999904155731},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.26179999113082886}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3389/fcomp.2026.1764808","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2026.1764808","pdf_url":"https://public-pages-files-2025.frontiersin.org/journals/computer-science/articles/10.3389/fcomp.2026.1764808/pdf","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},{"id":"pmh:oai:DiVA.org:ltu-116598","is_oa":true,"landing_page_url":"http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-116598","pdf_url":null,"source":{"id":"https://openalex.org/S4306400653","display_name":"Diva portal (Dalarna University Library)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:doaj.org/article:8077331d043646cd9791fb6f3b1f6402","is_oa":false,"landing_page_url":"https://doaj.org/article/8077331d043646cd9791fb6f3b1f6402","pdf_url":null,"source":{"id":"https://openalex.org/S4306401280","display_name":"DOAJ (DOAJ: Directory of Open Access Journals)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Frontiers in Computer Science, Vol 8 (2026)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.3389/fcomp.2026.1764808","is_oa":true,"landing_page_url":"https://doi.org/10.3389/fcomp.2026.1764808","pdf_url":"https://public-pages-files-2025.frontiersin.org/journals/computer-science/articles/10.3389/fcomp.2026.1764808/pdf","source":{"id":"https://openalex.org/S4210211086","display_name":"Frontiers in Computer Science","issn_l":"2624-9898","issn":["2624-9898"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310320527","host_organization_name":"Frontiers Media","host_organization_lineage":["https://openalex.org/P4310320527"],"host_organization_lineage_names":["Frontiers Media"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers in Computer Science","raw_type":"journal-article"},"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.5411688685417175,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W7131673044.pdf","grobid_xml":"https://content.openalex.org/works/W7131673044.grobid-xml"},"referenced_works_count":32,"referenced_works":["https://openalex.org/W1610251006","https://openalex.org/W2156098321","https://openalex.org/W2530155898","https://openalex.org/W2624826424","https://openalex.org/W2884609270","https://openalex.org/W2904220661","https://openalex.org/W3041263875","https://openalex.org/W3134449619","https://openalex.org/W3160872014","https://openalex.org/W3183966114","https://openalex.org/W4240110967","https://openalex.org/W4309231136","https://openalex.org/W4323568633","https://openalex.org/W4380345875","https://openalex.org/W4384835155","https://openalex.org/W4386590149","https://openalex.org/W4389683830","https://openalex.org/W4390976734","https://openalex.org/W4394812907","https://openalex.org/W4395055632","https://openalex.org/W4401553527","https://openalex.org/W4402809795","https://openalex.org/W4404129865","https://openalex.org/W4404200806","https://openalex.org/W4404695861","https://openalex.org/W4406404602","https://openalex.org/W4406461140","https://openalex.org/W4409904252","https://openalex.org/W4412002206","https://openalex.org/W4414054729","https://openalex.org/W4416499046","https://openalex.org/W4417133045"],"related_works":[],"abstract_inverted_index":{"Humans":[0],"play":[1],"a":[2,42,88,96,141,173,281],"vital":[3],"role":[4],"in":[5,22,275,304],"designing,":[6],"developing,":[7],"implementing,":[8],"and":[9,36,49,93,110,132,161,178,208,242,267,278],"using":[10,45],"technical":[11],"systems.":[12],"For":[13],"this":[14,83,119,212,305],"reason,":[15],"it":[16],"is":[17,85,273,280],"crucial":[18],"to":[19,31,40,53,58,77,86,94,136,146,293],"keep":[20],"humans":[21,104],"the":[23,80,121,125,170,214,247,258],"loop":[24],"at":[25],"each":[26,164],"phase":[27],"of":[28,82,169,176,289],"these":[29,46],"systems":[30,47,61,109],"make":[32],"them":[33,51,69,75],"more":[34,114],"secure":[35,59,70,225],"user-friendly.":[37],"There":[38],"needs":[39],"be":[41,230],"balance":[43],"between":[44],"securely":[48],"making":[50,68,74],"easy":[52,76],"use.":[54,78,290],"Today,":[55],"under":[56],"pressure":[57],"our":[60,300],"from":[62,144],"cyberattacks,":[63],"we":[64],"primarily":[65],"focus":[66],"on":[67,91,185,284],"but":[71],"often":[72],"overlook":[73],"Thus,":[79],"objective":[81],"paper":[84],"provide":[87],"human-centric":[89,97,138,153],"perspective":[90,283],"cybersecurity":[92,195,250],"introduce":[95],"framework":[98,303],"that":[99,112,151,190,237,295],"enables":[100],"Industry":[101],"5.0,":[102],"where":[103],"have":[105,123,216],"direct":[106],"interaction":[107],"with":[108,158,221],"solutions":[111],"are":[113,156,183,246],"customer-oriented.":[115],"To":[116,210],"carry":[117],"out":[118],"research,":[120,213],"authors":[122,215],"applied":[124,179],"Preferred":[126],"Reporting":[127],"Items":[128],"for":[129,166],"Systematic":[130],"Reviews":[131],"Meta-Analyses":[133],"(PRISMA)":[134],"guidelines":[135],"investigate":[137],"research":[139,154],"over":[140],"10-year":[142],"period,":[143],"2015":[145],"2025.":[147],"The":[148,233],"literature":[149,277],"shows":[150],"most":[152,248,253,259],"contributions":[155],"well-balanced,":[157],"conceptual,":[159],"experimental,":[160],"survey":[162],"approaches":[163,189],"accounting":[165],"approximately":[167],"64%":[168],"total,":[171],"indicating":[172],"mature":[174],"blend":[175],"theoretical":[177],"research.":[180],"These":[181],"studies":[182,279],"focused":[184],"developing":[186],"structured,":[187],"strategic":[188],"integrate":[191],"human":[192],"factors":[193],"into":[194],"practices":[196],"across":[197],"sectors":[198],"such":[199],"as":[200],"education,":[201],"government,":[202],"health,":[203],"software,":[204],"smart":[205],"home":[206],"networks,":[207],"others.":[209],"conduct":[211],"prepared":[217],"an":[218],"anonymous":[219],"questionnaire":[220],"fundamental":[222],"questions":[223],"about":[224],"system\u2019s":[226],"design,":[227],"which":[228],"can":[229],"easily":[231],"used.":[232],"evaluation":[234],"results":[235],"show":[236],"frequent":[238,243],"password":[239],"resets":[240],"(33.3%)":[241],"authentication":[244],"(26.7%)":[245],"\u201cannoying\u201d":[249],"measures.":[251],"Additionally,":[252],"respondents":[254],"consider":[255],"biometric":[256],"login":[257],"user-friendly":[260],"security":[261,269],"feature,":[262],"followed":[263],"by":[264,298],"single":[265],"sign-on":[266],"automatic":[268],"patch":[270],"updates.":[271],"What":[272],"missing":[274],"existing":[276],"holistic":[282],"human-centrism,":[285],"beyond":[286],"mere":[287],"ease":[288],"We":[291],"aim":[292],"cover":[294],"blind":[296],"spot":[297],"introducing":[299],"independently":[301],"developed":[302],"paper.":[306]},"counts_by_year":[],"updated_date":"2026-05-06T08:25:59.206177","created_date":"2026-02-27T00:00:00"}
