Usability and Security of Different Authentication Methods for an Electronic Health Records System Article Swipe
YOU?
·
· 2021
· Open Access
·
· DOI: https://doi.org/10.48550/arxiv.2102.11849
We conducted a survey of 67 graduate students enrolled in the Privacy and Security in Healthcare course at Indiana University Purdue University Indianapolis. This was done to measure user preference and their understanding of usability and security of three different Electronic Health Records authentication methods: single authentication method (username and password), Single sign-on with Central Authentication Service (CAS) authentication method, and a bio-capsule facial authentication method. This research aims to explore the relationship between security and usability, and measure the effect of perceived security on usability in these three aforementioned authentication methods. We developed a formative-formative Partial Least Square Structural Equation Modeling (PLS-SEM) model to measure the relationship between the latent variables of Usability, and Security. The measurement model was developed using five observed variables (measures). - Efficiency and Effectiveness, Satisfaction, Preference, Concerns, and Confidence. The results obtained highlight the importance and impact of these measures on the latent variables and the relationship among the latent variables. From the PLS-SEM analysis, it was found that security has a positive impact on usability for Single sign-on and bio-capsule facial authentication methods. We conclude that the facial authentication method was the most secure and usable among the three authentication methods. Further, descriptive analysis was done to draw out the interesting findings from the survey regarding the observed variables.
Related Topics
- Type
- preprint
- Language
- en
- Landing Page
- http://arxiv.org/abs/2102.11849
- https://arxiv.org/pdf/2102.11849
- OA Status
- green
- Cited By
- 4
- References
- 16
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W3130710114
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W3130710114Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.48550/arxiv.2102.11849Digital Object Identifier
- Title
-
Usability and Security of Different Authentication Methods for an Electronic Health Records SystemWork title
- Type
-
preprintOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2021Year of publication
- Publication date
-
2021-02-23Full publication date if available
- Authors
-
Saptarshi Purkayastha, Shreya Goyal, Bolu Oluwalade, Tyler Phillips, Huanmei Wu, Xukai ZouList of authors in order
- Landing page
-
https://arxiv.org/abs/2102.11849Publisher landing page
- PDF URL
-
https://arxiv.org/pdf/2102.11849Direct link to full text PDF
- Open access
-
YesWhether a free full text is available
- OA status
-
greenOpen access status per OpenAlex
- OA URL
-
https://arxiv.org/pdf/2102.11849Direct OA link when available
- Concepts
-
Usability, Authentication (law), Computer science, Structural equation modeling, Password, Formative assessment, Latent variable, Multi-factor authentication, Computer security, Authentication protocol, Statistics, Human–computer interaction, Artificial intelligence, Mathematics, Machine learningTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
4Total citation count in OpenAlex
- Citations by year (recent)
-
2024: 2, 2022: 1, 2021: 1Per-year citation counts (last 5 years)
- References (count)
-
16Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W3130710114 |
|---|---|
| doi | https://doi.org/10.48550/arxiv.2102.11849 |
| ids.doi | https://doi.org/10.48550/arxiv.2102.11849 |
| ids.mag | 3130710114 |
| ids.openalex | https://openalex.org/W3130710114 |
| fwci | |
| type | preprint |
| title | Usability and Security of Different Authentication Methods for an Electronic Health Records System |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | |
| biblio.first_page | |
| topics[0].id | https://openalex.org/T11800 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 0.9796000123023987 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | User Authentication and Security Systems |
| topics[1].id | https://openalex.org/T11045 |
| topics[1].field.id | https://openalex.org/fields/33 |
| topics[1].field.display_name | Social Sciences |
| topics[1].score | 0.957099974155426 |
| topics[1].domain.id | https://openalex.org/domains/2 |
| topics[1].domain.display_name | Social Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/3312 |
| topics[1].subfield.display_name | Sociology and Political Science |
| topics[1].display_name | Privacy, Security, and Data Protection |
| topics[2].id | https://openalex.org/T13155 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9136000275611877 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1709 |
| topics[2].subfield.display_name | Human-Computer Interaction |
| topics[2].display_name | Digital Communication and Language |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C170130773 |
| concepts[0].level | 2 |
| concepts[0].score | 0.8853425979614258 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q216378 |
| concepts[0].display_name | Usability |
| concepts[1].id | https://openalex.org/C148417208 |
| concepts[1].level | 2 |
| concepts[1].score | 0.6603670120239258 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q4825882 |
| concepts[1].display_name | Authentication (law) |
| concepts[2].id | https://openalex.org/C41008148 |
| concepts[2].level | 0 |
| concepts[2].score | 0.6241579651832581 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[2].display_name | Computer science |
| concepts[3].id | https://openalex.org/C71104824 |
| concepts[3].level | 2 |
| concepts[3].score | 0.6240570545196533 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q1476639 |
| concepts[3].display_name | Structural equation modeling |
| concepts[4].id | https://openalex.org/C109297577 |
| concepts[4].level | 2 |
| concepts[4].score | 0.49551594257354736 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q161157 |
| concepts[4].display_name | Password |
| concepts[5].id | https://openalex.org/C42525527 |
| concepts[5].level | 2 |
| concepts[5].score | 0.4899703562259674 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q1209955 |
| concepts[5].display_name | Formative assessment |
| concepts[6].id | https://openalex.org/C51167844 |
| concepts[6].level | 2 |
| concepts[6].score | 0.4228511452674866 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q4422623 |
| concepts[6].display_name | Latent variable |
| concepts[7].id | https://openalex.org/C194699767 |
| concepts[7].level | 4 |
| concepts[7].score | 0.419638454914093 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q7878662 |
| concepts[7].display_name | Multi-factor authentication |
| concepts[8].id | https://openalex.org/C38652104 |
| concepts[8].level | 1 |
| concepts[8].score | 0.39483359456062317 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[8].display_name | Computer security |
| concepts[9].id | https://openalex.org/C21564112 |
| concepts[9].level | 3 |
| concepts[9].score | 0.243742436170578 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q4825885 |
| concepts[9].display_name | Authentication protocol |
| concepts[10].id | https://openalex.org/C105795698 |
| concepts[10].level | 1 |
| concepts[10].score | 0.23088335990905762 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q12483 |
| concepts[10].display_name | Statistics |
| concepts[11].id | https://openalex.org/C107457646 |
| concepts[11].level | 1 |
| concepts[11].score | 0.1832299828529358 |
| concepts[11].wikidata | https://www.wikidata.org/wiki/Q207434 |
| concepts[11].display_name | Human–computer interaction |
| concepts[12].id | https://openalex.org/C154945302 |
| concepts[12].level | 1 |
| concepts[12].score | 0.16567349433898926 |
| concepts[12].wikidata | https://www.wikidata.org/wiki/Q11660 |
| concepts[12].display_name | Artificial intelligence |
| concepts[13].id | https://openalex.org/C33923547 |
| concepts[13].level | 0 |
| concepts[13].score | 0.15221872925758362 |
| concepts[13].wikidata | https://www.wikidata.org/wiki/Q395 |
| concepts[13].display_name | Mathematics |
| concepts[14].id | https://openalex.org/C119857082 |
| concepts[14].level | 1 |
| concepts[14].score | 0.12545451521873474 |
| concepts[14].wikidata | https://www.wikidata.org/wiki/Q2539 |
| concepts[14].display_name | Machine learning |
| keywords[0].id | https://openalex.org/keywords/usability |
| keywords[0].score | 0.8853425979614258 |
| keywords[0].display_name | Usability |
| keywords[1].id | https://openalex.org/keywords/authentication |
| keywords[1].score | 0.6603670120239258 |
| keywords[1].display_name | Authentication (law) |
| keywords[2].id | https://openalex.org/keywords/computer-science |
| keywords[2].score | 0.6241579651832581 |
| keywords[2].display_name | Computer science |
| keywords[3].id | https://openalex.org/keywords/structural-equation-modeling |
| keywords[3].score | 0.6240570545196533 |
| keywords[3].display_name | Structural equation modeling |
| keywords[4].id | https://openalex.org/keywords/password |
| keywords[4].score | 0.49551594257354736 |
| keywords[4].display_name | Password |
| keywords[5].id | https://openalex.org/keywords/formative-assessment |
| keywords[5].score | 0.4899703562259674 |
| keywords[5].display_name | Formative assessment |
| keywords[6].id | https://openalex.org/keywords/latent-variable |
| keywords[6].score | 0.4228511452674866 |
| keywords[6].display_name | Latent variable |
| keywords[7].id | https://openalex.org/keywords/multi-factor-authentication |
| keywords[7].score | 0.419638454914093 |
| keywords[7].display_name | Multi-factor authentication |
| keywords[8].id | https://openalex.org/keywords/computer-security |
| keywords[8].score | 0.39483359456062317 |
| keywords[8].display_name | Computer security |
| keywords[9].id | https://openalex.org/keywords/authentication-protocol |
| keywords[9].score | 0.243742436170578 |
| keywords[9].display_name | Authentication protocol |
| keywords[10].id | https://openalex.org/keywords/statistics |
| keywords[10].score | 0.23088335990905762 |
| keywords[10].display_name | Statistics |
| keywords[11].id | https://openalex.org/keywords/human–computer-interaction |
| keywords[11].score | 0.1832299828529358 |
| keywords[11].display_name | Human–computer interaction |
| keywords[12].id | https://openalex.org/keywords/artificial-intelligence |
| keywords[12].score | 0.16567349433898926 |
| keywords[12].display_name | Artificial intelligence |
| keywords[13].id | https://openalex.org/keywords/mathematics |
| keywords[13].score | 0.15221872925758362 |
| keywords[13].display_name | Mathematics |
| keywords[14].id | https://openalex.org/keywords/machine-learning |
| keywords[14].score | 0.12545451521873474 |
| keywords[14].display_name | Machine learning |
| language | en |
| locations[0].id | pmh:oai:arXiv.org:2102.11849 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4306400194 |
| locations[0].source.issn | |
| locations[0].source.type | repository |
| locations[0].source.is_oa | True |
| locations[0].source.issn_l | |
| locations[0].source.is_core | False |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | arXiv (Cornell University) |
| locations[0].source.host_organization | https://openalex.org/I205783295 |
| locations[0].source.host_organization_name | Cornell University |
| locations[0].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[0].license | |
| locations[0].pdf_url | https://arxiv.org/pdf/2102.11849 |
| locations[0].version | submittedVersion |
| locations[0].raw_type | text |
| locations[0].license_id | |
| locations[0].is_accepted | False |
| locations[0].is_published | False |
| locations[0].raw_source_name | |
| locations[0].landing_page_url | http://arxiv.org/abs/2102.11849 |
| locations[1].id | doi:10.48550/arxiv.2102.11849 |
| locations[1].is_oa | True |
| locations[1].source.id | https://openalex.org/S4306400194 |
| locations[1].source.issn | |
| locations[1].source.type | repository |
| locations[1].source.is_oa | True |
| locations[1].source.issn_l | |
| locations[1].source.is_core | False |
| locations[1].source.is_in_doaj | False |
| locations[1].source.display_name | arXiv (Cornell University) |
| locations[1].source.host_organization | https://openalex.org/I205783295 |
| locations[1].source.host_organization_name | Cornell University |
| locations[1].source.host_organization_lineage | https://openalex.org/I205783295 |
| locations[1].license | |
| locations[1].pdf_url | |
| locations[1].version | |
| locations[1].raw_type | article |
| locations[1].license_id | |
| locations[1].is_accepted | False |
| locations[1].is_published | |
| locations[1].raw_source_name | |
| locations[1].landing_page_url | https://doi.org/10.48550/arxiv.2102.11849 |
| indexed_in | arxiv, datacite |
| authorships[0].author.id | https://openalex.org/A5075722115 |
| authorships[0].author.orcid | https://orcid.org/0000-0003-3625-534X |
| authorships[0].author.display_name | Saptarshi Purkayastha |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | Saptarshi Purkayastha |
| authorships[0].is_corresponding | False |
| authorships[1].author.id | https://openalex.org/A5037333525 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-3629-3701 |
| authorships[1].author.display_name | Shreya Goyal |
| authorships[1].author_position | middle |
| authorships[1].raw_author_name | Shreya Goyal |
| authorships[1].is_corresponding | False |
| authorships[2].author.id | https://openalex.org/A5006460613 |
| authorships[2].author.orcid | |
| authorships[2].author.display_name | Bolu Oluwalade |
| authorships[2].author_position | middle |
| authorships[2].raw_author_name | Bolu Oluwalade |
| authorships[2].is_corresponding | False |
| authorships[3].author.id | https://openalex.org/A5073695411 |
| authorships[3].author.orcid | https://orcid.org/0009-0008-5143-2213 |
| authorships[3].author.display_name | Tyler Phillips |
| authorships[3].author_position | middle |
| authorships[3].raw_author_name | Tyler Phillips |
| authorships[3].is_corresponding | False |
| authorships[4].author.id | https://openalex.org/A5011747432 |
| authorships[4].author.orcid | https://orcid.org/0000-0003-0346-6044 |
| authorships[4].author.display_name | Huanmei Wu |
| authorships[4].author_position | middle |
| authorships[4].raw_author_name | Huanmei Wu |
| authorships[4].is_corresponding | False |
| authorships[5].author.id | https://openalex.org/A5087196191 |
| authorships[5].author.orcid | https://orcid.org/0000-0001-5762-8876 |
| authorships[5].author.display_name | Xukai Zou |
| authorships[5].author_position | last |
| authorships[5].raw_author_name | Xukai Zou |
| authorships[5].is_corresponding | False |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://arxiv.org/pdf/2102.11849 |
| open_access.oa_status | green |
| open_access.any_repository_has_fulltext | False |
| created_date | 2025-10-10T00:00:00 |
| display_name | Usability and Security of Different Authentication Methods for an Electronic Health Records System |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T06:51:31.235846 |
| primary_topic.id | https://openalex.org/T11800 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 0.9796000123023987 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | User Authentication and Security Systems |
| related_works | https://openalex.org/W2784017372, https://openalex.org/W2363363251, https://openalex.org/W4309172146, https://openalex.org/W4238865314, https://openalex.org/W4291701200, https://openalex.org/W2784315464, https://openalex.org/W3010813109, https://openalex.org/W192327621, https://openalex.org/W4324137616, https://openalex.org/W2801543595 |
| cited_by_count | 4 |
| counts_by_year[0].year | 2024 |
| counts_by_year[0].cited_by_count | 2 |
| counts_by_year[1].year | 2022 |
| counts_by_year[1].cited_by_count | 1 |
| counts_by_year[2].year | 2021 |
| counts_by_year[2].cited_by_count | 1 |
| locations_count | 2 |
| best_oa_location.id | pmh:oai:arXiv.org:2102.11849 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4306400194 |
| best_oa_location.source.issn | |
| best_oa_location.source.type | repository |
| best_oa_location.source.is_oa | True |
| best_oa_location.source.issn_l | |
| best_oa_location.source.is_core | False |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | arXiv (Cornell University) |
| best_oa_location.source.host_organization | https://openalex.org/I205783295 |
| best_oa_location.source.host_organization_name | Cornell University |
| best_oa_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| best_oa_location.license | |
| best_oa_location.pdf_url | https://arxiv.org/pdf/2102.11849 |
| best_oa_location.version | submittedVersion |
| best_oa_location.raw_type | text |
| best_oa_location.license_id | |
| best_oa_location.is_accepted | False |
| best_oa_location.is_published | False |
| best_oa_location.raw_source_name | |
| best_oa_location.landing_page_url | http://arxiv.org/abs/2102.11849 |
| primary_location.id | pmh:oai:arXiv.org:2102.11849 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4306400194 |
| primary_location.source.issn | |
| primary_location.source.type | repository |
| primary_location.source.is_oa | True |
| primary_location.source.issn_l | |
| primary_location.source.is_core | False |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | arXiv (Cornell University) |
| primary_location.source.host_organization | https://openalex.org/I205783295 |
| primary_location.source.host_organization_name | Cornell University |
| primary_location.source.host_organization_lineage | https://openalex.org/I205783295 |
| primary_location.license | |
| primary_location.pdf_url | https://arxiv.org/pdf/2102.11849 |
| primary_location.version | submittedVersion |
| primary_location.raw_type | text |
| primary_location.license_id | |
| primary_location.is_accepted | False |
| primary_location.is_published | False |
| primary_location.raw_source_name | |
| primary_location.landing_page_url | http://arxiv.org/abs/2102.11849 |
| publication_date | 2021-02-23 |
| publication_year | 2021 |
| referenced_works | https://openalex.org/W2904158023, https://openalex.org/W2969468676, https://openalex.org/W2171193465, https://openalex.org/W2130892515, https://openalex.org/W2001818158, https://openalex.org/W2967695162, https://openalex.org/W2163544552, https://openalex.org/W2598211074, https://openalex.org/W2768503474, https://openalex.org/W3147261154, https://openalex.org/W2768945979, https://openalex.org/W2316482457, https://openalex.org/W1983271464, https://openalex.org/W2808360126, https://openalex.org/W75791967, https://openalex.org/W2013587667 |
| referenced_works_count | 16 |
| abstract_inverted_index.- | 126 |
| abstract_inverted_index.a | 2, 61, 94, 167 |
| abstract_inverted_index.67 | 5 |
| abstract_inverted_index.We | 0, 92, 180 |
| abstract_inverted_index.at | 17 |
| abstract_inverted_index.in | 9, 14, 86 |
| abstract_inverted_index.it | 161 |
| abstract_inverted_index.of | 4, 33, 37, 81, 112, 143 |
| abstract_inverted_index.on | 84, 146, 170 |
| abstract_inverted_index.to | 26, 69, 104, 203 |
| abstract_inverted_index.The | 116, 135 |
| abstract_inverted_index.and | 12, 30, 35, 49, 60, 75, 77, 114, 128, 133, 141, 150, 175, 191 |
| abstract_inverted_index.for | 172 |
| abstract_inverted_index.has | 166 |
| abstract_inverted_index.out | 205 |
| abstract_inverted_index.the | 10, 71, 79, 106, 109, 139, 147, 151, 154, 158, 183, 188, 194, 206, 210, 213 |
| abstract_inverted_index.was | 24, 119, 162, 187, 201 |
| abstract_inverted_index.From | 157 |
| abstract_inverted_index.This | 23, 66 |
| abstract_inverted_index.aims | 68 |
| abstract_inverted_index.done | 25, 202 |
| abstract_inverted_index.draw | 204 |
| abstract_inverted_index.five | 122 |
| abstract_inverted_index.from | 209 |
| abstract_inverted_index.most | 189 |
| abstract_inverted_index.that | 164, 182 |
| abstract_inverted_index.user | 28 |
| abstract_inverted_index.with | 53 |
| abstract_inverted_index.(CAS) | 57 |
| abstract_inverted_index.Least | 97 |
| abstract_inverted_index.among | 153, 193 |
| abstract_inverted_index.found | 163 |
| abstract_inverted_index.model | 103, 118 |
| abstract_inverted_index.their | 31 |
| abstract_inverted_index.these | 87, 144 |
| abstract_inverted_index.three | 38, 88, 195 |
| abstract_inverted_index.using | 121 |
| abstract_inverted_index.Health | 41 |
| abstract_inverted_index.Purdue | 20 |
| abstract_inverted_index.Single | 51, 173 |
| abstract_inverted_index.Square | 98 |
| abstract_inverted_index.course | 16 |
| abstract_inverted_index.effect | 80 |
| abstract_inverted_index.facial | 63, 177, 184 |
| abstract_inverted_index.impact | 142, 169 |
| abstract_inverted_index.latent | 110, 148, 155 |
| abstract_inverted_index.method | 47, 186 |
| abstract_inverted_index.secure | 190 |
| abstract_inverted_index.single | 45 |
| abstract_inverted_index.survey | 3, 211 |
| abstract_inverted_index.usable | 192 |
| abstract_inverted_index.Central | 54 |
| abstract_inverted_index.Indiana | 18 |
| abstract_inverted_index.PLS-SEM | 159 |
| abstract_inverted_index.Partial | 96 |
| abstract_inverted_index.Privacy | 11 |
| abstract_inverted_index.Records | 42 |
| abstract_inverted_index.Service | 56 |
| abstract_inverted_index.between | 73, 108 |
| abstract_inverted_index.explore | 70 |
| abstract_inverted_index.measure | 27, 78, 105 |
| abstract_inverted_index.method, | 59 |
| abstract_inverted_index.method. | 65 |
| abstract_inverted_index.results | 136 |
| abstract_inverted_index.sign-on | 52, 174 |
| abstract_inverted_index.Equation | 100 |
| abstract_inverted_index.Further, | 198 |
| abstract_inverted_index.Modeling | 101 |
| abstract_inverted_index.Security | 13 |
| abstract_inverted_index.analysis | 200 |
| abstract_inverted_index.conclude | 181 |
| abstract_inverted_index.enrolled | 8 |
| abstract_inverted_index.findings | 208 |
| abstract_inverted_index.graduate | 6 |
| abstract_inverted_index.measures | 145 |
| abstract_inverted_index.methods. | 91, 179, 197 |
| abstract_inverted_index.methods: | 44 |
| abstract_inverted_index.observed | 123, 214 |
| abstract_inverted_index.obtained | 137 |
| abstract_inverted_index.positive | 168 |
| abstract_inverted_index.research | 67 |
| abstract_inverted_index.security | 36, 74, 83, 165 |
| abstract_inverted_index.students | 7 |
| abstract_inverted_index.(PLS-SEM) | 102 |
| abstract_inverted_index.(username | 48 |
| abstract_inverted_index.Concerns, | 132 |
| abstract_inverted_index.Security. | 115 |
| abstract_inverted_index.analysis, | 160 |
| abstract_inverted_index.conducted | 1 |
| abstract_inverted_index.developed | 93, 120 |
| abstract_inverted_index.different | 39 |
| abstract_inverted_index.highlight | 138 |
| abstract_inverted_index.perceived | 82 |
| abstract_inverted_index.regarding | 212 |
| abstract_inverted_index.usability | 34, 85, 171 |
| abstract_inverted_index.variables | 111, 124, 149 |
| abstract_inverted_index.Efficiency | 127 |
| abstract_inverted_index.Electronic | 40 |
| abstract_inverted_index.Healthcare | 15 |
| abstract_inverted_index.Structural | 99 |
| abstract_inverted_index.University | 19, 21 |
| abstract_inverted_index.Usability, | 113 |
| abstract_inverted_index.importance | 140 |
| abstract_inverted_index.password), | 50 |
| abstract_inverted_index.preference | 29 |
| abstract_inverted_index.usability, | 76 |
| abstract_inverted_index.variables. | 156, 215 |
| abstract_inverted_index.(measures). | 125 |
| abstract_inverted_index.Confidence. | 134 |
| abstract_inverted_index.Preference, | 131 |
| abstract_inverted_index.bio-capsule | 62, 176 |
| abstract_inverted_index.descriptive | 199 |
| abstract_inverted_index.interesting | 207 |
| abstract_inverted_index.measurement | 117 |
| abstract_inverted_index.relationship | 72, 107, 152 |
| abstract_inverted_index.Indianapolis. | 22 |
| abstract_inverted_index.Satisfaction, | 130 |
| abstract_inverted_index.understanding | 32 |
| abstract_inverted_index.Authentication | 55 |
| abstract_inverted_index.Effectiveness, | 129 |
| abstract_inverted_index.aforementioned | 89 |
| abstract_inverted_index.authentication | 43, 46, 58, 64, 90, 178, 185, 196 |
| abstract_inverted_index.formative-formative | 95 |
| cited_by_percentile_year | |
| countries_distinct_count | 0 |
| institutions_distinct_count | 6 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/16 |
| sustainable_development_goals[0].score | 0.5099999904632568 |
| sustainable_development_goals[0].display_name | Peace, Justice and strong institutions |
| citation_normalized_percentile |