User motivations in protecting information security: Protection motivation theory versus self-determination theory

P Menard, GJ Bott, RE Crossler - Journal of Management …, 2017 - Taylor & Francis
Managers desiring to protect information systems must understand how to most effectively
motivate users to engage in secure behaviors. Information security researchers have …

A survey on adaptive authentication

P Arias-Cabarcos, C Krupitzer, C Becker - ACM Computing Surveys …, 2019 - dl.acm.org
Adaptive Authentication allows a system to dynamically select the best mechanism (s) for
authenticating a user depending on contextual factors, such as location, proximity to …

Why people (don't) use password managers effectively

S Pearman, SA Zhang, L Bauer, N Christin… - Fifteenth symposium on …, 2019 - usenix.org
Security experts often recommend using password-management tools that both store
passwords and generate random passwords. However, research indicates that only a small …

Why users (don't) use password managers at a large educational institution

P Mayer, CW Munyendo, ML Mazurek… - 31st USENIX Security …, 2022 - usenix.org
We quantitatively investigated the current state of Password Manager (PM) usage and
general password habits at a large, private university in the United States. Building on prior …

Examining the adoption and abandonment of security, privacy, and identity theft protection practices

Y Zou, K Roundy, A Tamersoy, S Shintre… - Proceedings of the …, 2020 - dl.acm.org
Users struggle to adhere to expert-recommended security and privacy practices. While prior
work has studied initial adoption of such practices, little is known about the subsequent …

Why older adults (Don't) use password managers

H Ray, F Wolf, R Kuber, AJ Aviv - 30th USENIX Security Symposium …, 2021 - usenix.org
Password managers (PMs) are considered highly effective tools for increasing security, and
a recent study by Pearman et al.(SOUPS'19) highlighted the motivations and barriers to …

Distrust of big tech and a desire for privacy: Understanding the motivations of people who have voluntarily adopted secure email

W Usman, J Hu, MK Wilson, D Zappala - Nineteenth Symposium on …, 2023 - usenix.org
Secure email systems that use end-to-end encryption are the best method we have for
ensuring user privacy and security in email communication. However, the adoption of secure …

Do password managers nudge secure (random) passwords?

S Zibaei, DR Malapaya, B Mercier… - … Symposium on Usable …, 2022 - usenix.org
Passwords are the most popular authentication method due to their simplicity and
widespread adoption. However, the prevalence of password reuse undermines its security …

Unraveling the dynamics of password manager adoption: a deeper dive into critical factors

X Tian - Information & Computer Security, 2025 - emerald.com
Purpose The purpose of this study is to comprehensively explore the password manager
adoption landscape, delving into crucial factors such as performance, trust, social influence …

" I just stopped using one and started using the other": Motivations, Techniques, and Challenges When Switching Password Managers

CW Munyendo, P Mayer, AJ Aviv - Proceedings of the 2023 ACM …, 2023 - dl.acm.org
This paper explores what motivates password manager (PM) users in the US to switch from
one PM to another, the techniques they employ when switching, and challenges they …