Article Title,Year,Volume,Issue,Page Range,Author Modeling the behavior of users who are confronted with security mechanisms,2011,30,4,242-256,Ben-Asher