{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:26:16Z","timestamp":1743132376940,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030114060"},{"type":"electronic","value":"9783030114077"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-11407-7_8","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T20:33:57Z","timestamp":1548362037000},"page":"104-114","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["An Evaluation of the Password Practices on Leading e-Commerce Websites in South Africa"],"prefix":"10.1007","author":[{"given":"Silas Formunyuy","family":"Verkijika","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,25]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.intmar.2017.01.001","volume":"38","author":"Y Kim","year":"2017","unstructured":"Kim, Y., Peterson, R.A.: A meta-analysis of online trust relationships in e-commerce. J. Interact. Mark. 38, 44\u201354 (2017)","journal-title":"J. Interact. Mark."},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"1665","DOI":"10.1016\/j.tele.2018.04.012","volume":"35","author":"SF Verkijika","year":"2018","unstructured":"Verkijika, S.F.: Factors influencing the adoption of mobile commerce applications in Cameroon. Telematics Inform. 35, 1665\u20131674 (2018). \n                  https:\/\/doi.org\/10.1016\/j.tele.2018.04.012","journal-title":"Telematics Inform."},{"key":"8_CR3","unstructured":"Mybroadband.co.za: Takealot\u2019s plan to grow its R2.3-billion annual revenue (2017). \n                  https:\/\/mybroadband.co.za\/news\/business\/229775-takealots-plan-to-grow-its-r2-3-billion-annual-revenue.html\n                  \n                . Accessed 26 Apr 2018"},{"key":"8_CR4","unstructured":"Fin24.Com: Spree records 500% growth (2014). \n                  https:\/\/www.fin24.com\/Companies\/Retail\/Spree-records-500-growth-20140221\n                  \n                . Accessed 26 Apr 2018"},{"key":"8_CR5","unstructured":"Smith, C.: How e-commerce is exploding in SA (2018). \n                  https:\/\/www.fin24.com\/Economy\/how-ecommerce-is-exploding-in-sa-20180316\n                  \n                . Accessed 26 Apr 2018"},{"issue":"4","key":"8_CR6","first-page":"100","volume":"3","author":"L Ndyali","year":"2013","unstructured":"Ndyali, L.: Adaptation and barriers of e-commerce in Tanzania small and medium enterprises. Dev. Country Stud. 3(4), 100\u2013105 (2013)","journal-title":"Dev. Country Stud."},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2011.150","volume":"10","author":"C Herley","year":"2012","unstructured":"Herley, C., Van Oorschot, P.: A research agenda acknowledging the persistence of passwords. IEEE Secur. Priv. 10, 28\u201336 (2012)","journal-title":"IEEE Secur. Priv."},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.cose.2016.05.007","volume":"6","author":"C Shen","year":"2016","unstructured":"Shen, C., Yu, T., Xu, H., Yang, G., Guan, X.: User practice in password security: an empirical study of real-life passwords in the wild. Comput. Secur. 6, 130\u2013141 (2016)","journal-title":"Comput. Secur."},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Burr, W.E., Dodson, D.F., Newton, E.M., Perlner, R.A., Polk, W.T., Gupta, S., et al.: Sp 800-63-1: electronic authentication guideline. In: National Institute of Standards and Technology (2011)","DOI":"10.6028\/NIST.SP.800-63-1"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1016\/j.cose.2007.09.001","volume":"26","author":"S Furnell","year":"2007","unstructured":"Furnell, S.: An assessment of website password practices. Comput. Secur. 26, 445\u2013451 (2007)","journal-title":"Comput. Secur."},{"key":"8_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2018.01.016","volume":"75","author":"S Furnell","year":"2018","unstructured":"Furnell, S., Khern-am-nuai, W., Esmael, R., Yang, W., Li, N.: Enhancing security behaviour by supporting the user. Comput. Secur. 75, 1\u20139 (2018)","journal-title":"Comput. Secur."},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1016\/S1361-3723(14)70555-X","volume":"12","author":"S Furnell","year":"2014","unstructured":"Furnell, S.: Password practices on leading websites\u2013revisited. Comput. Fraud Secur. 12, 5\u201311 (2014)","journal-title":"Comput. Fraud Secur."},{"issue":"1","key":"8_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4102\/sajim.v17i1.638","volume":"17","author":"R Butler","year":"2015","unstructured":"Butler, R., Butler, M.: The password practices applied by South African online consumers: perception versus reality. S. Afr. J. Inf. Manage. 17(1), 1\u201311 (2015). Art. #638","journal-title":"S. Afr. J. Inf. Manage."},{"key":"8_CR14","unstructured":"Clover, J.: Celebrity iCloud accounts compromised by weak passwords, not iCloud breach (2014). \n                  www.macrumors.com\/2014\/09\/02\/apple-no-celebrityicloud-breach\/\n                  \n                . Accessed 28 Apr 2018"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Verkijika, S.F.: Evaluating and improving the usability of e-government websites in Sub-Saharan Africa for enhancing citizen adoption and usage. Ph.D. thesis, University of the Free State, Bloemfontein, South Africa (2017)","DOI":"10.1016\/j.ijinfomgt.2017.11.003"},{"key":"8_CR16","volume-title":"Security Program and Policies: Principles and Practices","author":"SS Greene","year":"2014","unstructured":"Greene, S.S.: Security Program and Policies: Principles and Practices. Pearson, Indianapolis (2014)"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/j.cose.2017.07.012","volume":"73","author":"Y Guo","year":"2018","unstructured":"Guo, Y., Zhang, Z.: LPSE: lightweight password-strength estimation for password meters. Comput. Secur. 73, 507\u2013518 (2018)","journal-title":"Comput. Secur."},{"key":"8_CR18","unstructured":"Splashdata: Worst passwords of 2017: Top 100 (2017). \n                  https:\/\/s13639.pcdn.co\/wp-content\/uploads\/2017\/12\/Top-100-Worst-Passwords-of-2017a.pdf\n                  \n                . Accessed 8 July 2018"},{"key":"8_CR19","unstructured":"Segreti, S.M., Melicher, W., Komanduri, S., Melicher, D., Shay, R., Ur, B., et al.: Diversify to survive: making passwords stronger with adaptive policies. In: Symposium on Usable Privacy and Security (SOUPS) (2017)"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Ur, B., Alfieri, F., Aung, M., Bauer, L., Christin, N., Colnago, J., et al.: Design and evaluation of a data-driven password meter. In: Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, pp. 3775\u20133786. ACM (2017)","DOI":"10.1145\/3025453.3026050"},{"key":"8_CR21","unstructured":"Stuart, T.: 50 of South Africa\u2019s top e-commerce sites (2015). \n                  http:\/\/ventureburn.com\/2015\/08\/50-south-africas-top-ecommerce-sites\/\n                  \n                . Accessed 1 Apr 2018"},{"key":"8_CR22","unstructured":"Rankin, K.: Why final passwords are at least 12 characters (2016). \n                  https:\/\/getfinal.com\/company-news\/2016\/03\/08\/why-final-passwords-are-at-least-12-characters\/\n                  \n                . Accessed 2 May 2018"},{"key":"8_CR23","unstructured":"Gamby, R.: Minimum password length best practices: are 14-character passwords necessary? (2012). \n                  https:\/\/searchsecurity.techtarget.com\/answer\/Minimum-password-length-best-practices-Are-14-character-passwords-necessary\n                  \n                . Accessed 2 May 2018"},{"key":"8_CR24","volume-title":"Social Media Security: Leveraging Social Networking While Mitigating Risk","author":"M Cross","year":"2014","unstructured":"Cross, M.: Social Media Security: Leveraging Social Networking While Mitigating Risk. Syngress, Waltham (2014)"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Komanduri, S., Shay, R., Kelley, P.G., Mazurek, M.L., Bauer, L., Christin, N., et al.: Of passwords and people: measuring the effect of password-composition policies. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2595\u2013604 (2011)","DOI":"10.1145\/1978942.1979321"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Shay, R., Komanduri, S., Kelley, P.G., Leon, P.G., Mazurek, M.L., Bauer, L., et al.: Encountering stronger password requirements: user attitudes and behaviors. In: Proceedings of the Sixth Symposium on Usable Privacy and Security, pp. 1\u201320 (2010)","DOI":"10.1145\/1837110.1837113"}],"container-title":["Communications in Computer and Information Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-11407-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T23:57:02Z","timestamp":1558396622000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-11407-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030114060","9783030114077"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-11407-7_8","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"25 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Information Security Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pretoria","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"South Africa","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"issa2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.infosecsa.co.za\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"40","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"13","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}