{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T20:18:22Z","timestamp":1761164302641,"version":"build-2065373602"},"reference-count":22,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2016,2,24]],"date-time":"2016-02-24T00:00:00Z","timestamp":1456272000000},"content-version":"vor","delay-in-days":419,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":["asistdl.onlinelibrary.wiley.com"],"crossmark-restriction":true},"short-container-title":["Proc. Assoc. Info. Sci. Tech."],"published-print":{"date-parts":[[2015,1]]},"abstract":"<jats:title>ABSTRACT<\/jats:title>\n                  <jats:p>Research has shown that password security practices typically conflict with general usability principles. Though the challenges faced by low\u2010literacy users when creating and managing passwords are likely to extend beyond those experienced by the general public, little research has been done to explore password usability in this at\u2010risk group. This survey of 20 low\u2010literacy participants aims to examine password behaviors within this population, including password creation, recall strategies, and perceptions of password strength and security. It expands on the work of Chisnell and Newby () based on a nationwide survey exploring password use, password creation strategies, and perceptions regarding password security. Thus, this study allows for comparison between password use and perceptions among the broader population and those of users with low literacy skills. These results provide important insights into patterns of use and mental models of password requirements and password security among low\u2010literacy users.<\/jats:p>","DOI":"10.1002\/pra2.2015.145052010052","type":"journal-article","created":{"date-parts":[[2016,2,27]],"date-time":"2016-02-27T05:56:50Z","timestamp":1456552610000},"page":"1-9","update-policy":"https:\/\/doi.org\/10.1002\/crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Password creation strategies across high\u2010 and low\u2010literacy web users"],"prefix":"10.1002","volume":"52","author":[{"given":"Caitlin","family":"Rinn","sequence":"first","affiliation":[{"name":"University of Baltimore  1420 N. Charles St. Baltimore MD 21201"}]},{"given":"Kathryn","family":"Summers","sequence":"additional","affiliation":[{"name":"University of Baltimore"}]},{"given":"Emily","family":"Rhodes","sequence":"additional","affiliation":[{"name":"University of Baltimore"}]},{"given":"Jo\u00ebl","family":"Virothaisakun","sequence":"additional","affiliation":[{"name":"University of Baltimore"}]},{"given":"Dana","family":"Chisnell","sequence":"additional","affiliation":[{"name":"UsabilityWorks"}]}],"member":"311","published-online":{"date-parts":[[2016,2,24]]},"reference":[{"key":"e_1_2_8_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-3601-9_1"},{"key":"e_1_2_8_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_2_8_4_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.6.3.e25"},{"key":"e_1_2_8_5_1","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.6.3.e26"},{"volume-title":"Manuscript in preparation","year":"2015","author":"Chisnell D.","key":"e_1_2_8_6_1"},{"issue":"6","key":"e_1_2_8_7_1","first-page":"433","article-title":"Rapid assessment of literacy levels of adult primary care patients","volume":"23","author":"Davis T. C.","year":"1991","journal-title":"Family Medicine"},{"key":"e_1_2_8_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_2_8_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143127"},{"key":"e_1_2_8_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/154193120905300605"},{"key":"e_1_2_8_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753384"},{"key":"e_1_2_8_12_1","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/HCI2008.17"},{"key":"e_1_2_8_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979321"},{"volume-title":"Literacy in Everyday Life: Results from the 2003 National Assessment of Adult Literacy","year":"2007","author":"Kutner M.","key":"e_1_2_8_14_1"},{"key":"e_1_2_8_15_1","first-page":"71","volume-title":"Proceedings of the Seventh Australasian Conference on Information Security Volume","author":"Notoatmodjo G.","year":"2009"},{"key":"e_1_2_8_16_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03195438"},{"key":"e_1_2_8_17_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011902718709"},{"key":"e_1_2_8_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837113"},{"key":"e_1_2_8_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2579421"},{"key":"e_1_2_8_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/meet.14504301174"},{"issue":"1","key":"e_1_2_8_21_1","doi-asserted-by":"crossref","DOI":"10.1002\/meet.1450420179","article-title":"Reading and navigational strategies of web users with lower literacy skills","volume":"42","author":"Summers K.","year":"2005","journal-title":"Proceedings of the American Society for Information Science and Technology"},{"key":"e_1_2_8_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508195"},{"key":"e_1_2_8_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/10810730290088157"}],"container-title":["Proceedings of the Association for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fpra2.2015.145052010052","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fpra2.2015.145052010052","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/pra2.2015.145052010052","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1002\/pra2.2015.145052010052","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/pra2.2015.145052010052","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T18:03:43Z","timestamp":1761069823000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/pra2.2015.145052010052"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,1]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["10.1002\/pra2.2015.145052010052"],"URL":"https:\/\/doi.org\/10.1002\/pra2.2015.145052010052","archive":["Portico"],"relation":{},"ISSN":["2373-9231","2373-9231"],"issn-type":[{"type":"print","value":"2373-9231"},{"type":"electronic","value":"2373-9231"}],"subject":[],"published":{"date-parts":[[2015,1]]},"assertion":[{"value":"2016-02-24","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}