J. Johnston, J. H. Eloff, and L. Labuschagne, Security and human computer interfaces, vol.22, pp.675-684, 2003.

S. Furnell, Usability versus complexity-striking the balance in end-user security, Network Security, pp.13-17, 2010.

E. Wästlund, S. Fischer-hübner, C. Graf, C. Hochleitner, P. Wolkerstorfer et al., Towards Usable Privacy Enhancing Technologies: Lessons Learned from the PrimeLife Project, 2011.

, Enisa report: PETs controls matrix A systematic approach for assessing online and mobile privacy tools, 2016.

A. Whitten and J. D. Tygar, Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0, USENIX Security Symposium, 1999.

C. S. Weir, G. Douglas, M. Carruthers, and M. Jack, User perceptions of security, convenience and usability for ebanking authentication tokens, Computers & Security, vol.28, issue.1, pp.47-62, 2009.

Y. Lee and K. A. Kozar, Investigating factors affecting the adoption of anti-spyware systems, Communications of the ACM, vol.48, issue.8, pp.72-77, 2005.

J. Nielsen, Usability engineering, 1994.

I. Flechais, C. Mascolo, and M. A. Sasse, Integrating security and usability into the requirements and design process, Electronic Security and Digital Forensics, vol.1, issue.1, pp.12-26, 2007.

T. Herath, R. Chen, J. Wang, K. Banjara, J. Wilbur et al., Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service, Information systems journal, vol.24, issue.1, pp.61-84, 2014.

K. Krol, E. Philippou, E. De-cristofaro, and A. Sasse, They brought in the horrible key ring thing!"Analysing the Usability of Two-Factor Authentication in UK Online Banking, NDSS Workshop on Usable Security (USEC, 2015.

J. Clark, P. C. Van-oorschot, and C. Adams, Usability of anonymous web browsing: an examination of tor interfaces and deployability, Symposium on Usable Privacy & Security, pp.41-51, 2007.

L. F. Cranor and N. Buchler, Better together: Usability and security go hand in hand, IEEE Security & Privacy, vol.12, issue.6, pp.89-93, 2014.

K. P. Yee, Aligning security and usability, Nielsen J.:10 Usability Heuristics for User Interface Design, vol.2, p.15, 2004.

A. Seffah, M. Donyaee, R. B. Kline, and H. K. Padda, Usability measurement and metrics: A consolidated model, Software Quality Journal, vol.14, issue.2, pp.159-178, 2006.

G. Dhillon, T. Oliveira, S. Susarapu, and M. Caldeira, Deciding between information security and usability: Developing value based objectives, Computers in Human Behavior, 2016.

, Ergonomic requirements for office work with visual display terminals, Guidance on usability, vol.11, pp.9241-9252, 1998.

A. E. Howe, I. Ray, M. Roberts, M. Urbanska, and Z. Byrne, The psychology of security for the home computer user, IEEE Symposium on Security and Privacy, pp.209-223, 2012.