In other work it has already been noted that security is seldomly a user's primary goal [11, 18] and that users are
ad"in protecting their authentication tokens [1]. These results support our claim for authentication mechanisms that
have security built-in. However, this often comes at the cost of usability and has to be handled carefully.