{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T17:52:50Z","timestamp":1742925170880,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030504380"},{"type":"electronic","value":"9783030504397"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-50439-7_26","type":"book-chapter","created":{"date-parts":[[2020,7,9]],"date-time":"2020-07-09T23:21:31Z","timestamp":1594336891000},"page":"383-394","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cognitive Variability Factors and Passphrase Selection"],"prefix":"10.1007","author":[{"given":"Lila A.","family":"Loos","sequence":"first","affiliation":[]},{"given":"Michael-Brian C.","family":"Ogawa","sequence":"additional","affiliation":[]},{"given":"Martha E.","family":"Crosby","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,10]]},"reference":[{"issue":"12","key":"26_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A Adams","year":"1999","unstructured":"Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40\u201346 (1999)","journal-title":"Commun. ACM"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Addas, A., Thorpe, J., Salehi-Abari, A.: Geographic hints for passphrase authentication. In: 2019 17th International Conference on Privacy, Security and Trust (PST), pp. 1\u20139. IEEE (2019)","DOI":"10.1109\/PST47121.2019.8949033"},{"volume-title":"Handbook of Psychophysiology","year":"2017","key":"26_CR3","unstructured":"Berntson, G.G., Cacioppo, J.T., Tassinary, L.G. (eds.): Handbook of Psychophysiology. Cambridge University Press, Cambridge (2017)"},{"issue":"1","key":"26_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1123\/jsep.21.1.1","volume":"21","author":"SJ Biddle","year":"1999","unstructured":"Biddle, S.J.: Motivation and perceptions of control: tracing its development and plotting its future in exercise and sport psychology. J. Sport Exerc. Psychol. 21(1), 1\u201323 (1999)","journal-title":"J. Sport Exerc. Psychol."},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Herley, C., Van Oorschot, P.C., Stajano, F.: The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: 2012 IEEE Symposium on Security and Privacy, pp. 553\u2013567. IEEE (2012)","DOI":"10.1109\/SP.2012.44"},{"key":"26_CR6","unstructured":"Bonneau, J., Preibusch, S.: The password thicket: technical and market failures in human authentication on the web. In: WEIS (2010)"},{"issue":"1","key":"26_CR7","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1037\/0003-066X.45.1.16","volume":"45","author":"JT Cacioppo","year":"1990","unstructured":"Cacioppo, J.T., Tassinary, L.G.: Inferring psychological significance from physiological signals. Am. Psychol. 45(1), 16 (1990)","journal-title":"Am. Psychol."},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Cacioppo, J.T., Tassinary, L.G., Berntson, G.G.: Psychophysiological science: interdisciplinary approaches to classic questions about the mind. In: Handbook of psychophysiology, vol. 3, pp. 1\u201316 (2007)","DOI":"10.1017\/CBO9780511546396.001"},{"key":"26_CR9","volume-title":"Manual for Kit of Factor-Referenced Cognitive Tests","author":"RB Ekstrom","year":"1976","unstructured":"Ekstrom, R.B., Dermen, D., Harman, H.H.: Manual for Kit of Factor-Referenced Cognitive Tests, vol. 102. Educational testing service, Princeton (1976)"},{"key":"26_CR10","volume-title":"Statistical Methods for Practice and Research: A Guide to Data Analysis Using SPSS","author":"AS Gaur","year":"2006","unstructured":"Gaur, A.S., Gaur, S.S.: Statistical Methods for Practice and Research: A Guide to Data Analysis Using SPSS. Sage, Thousand Oaks (2006)"},{"key":"26_CR11","volume-title":"DRAFT NIST Special Publication 800-63-3 Digital Identity Guidelines","author":"P Grassi","year":"2017","unstructured":"Grassi, P., Garcia, M., Fenton, J.: DRAFT NIST Special Publication 800-63-3 Digital Identity Guidelines. National Institute of Standards and Technology, Los Altos, CA (2017)"},{"key":"26_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-642-03549-4_14","volume-title":"Financial Cryptography and Data Security","author":"C Herley","year":"2009","unstructured":"Herley, C., van Oorschot, P.C., Patrick, Andrew S.: Passwords: if we\u2019re so smart, why are we still using them? In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 230\u2013237. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03549-4_14"},{"issue":"4","key":"26_CR13","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1080\/07421222.2014.1001255","volume":"31","author":"Q Hu","year":"2015","unstructured":"Hu, Q., West, R., Smarandescu, L.: The role of self-control in information security violations: insights from a cognitive neuroscience perspective. J. Manag. Inf. Syst. 31(4), 6\u201348 (2015)","journal-title":"J. Manag. Inf. Syst."},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Jeong, B., Vallat, A., Csikszentmihalyi, C., Park, J., Pacheco, D.: MementoKey: keeping passwords in mind. In: Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, pp. 1\u20136 (2019)","DOI":"10.1145\/3290607.3313066"},{"key":"26_CR15","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-319-91467-1_10","volume-title":"Augmented Cognition: Users and Contexts","author":"LA Loos","year":"2018","unstructured":"Loos, L.A., Crosby, M.E.: Cognition and predictors of password selection and usability. In: Schmorrow, D.D., Fidopiastis, C.M. (eds.) AC 2018. LNCS (LNAI), vol. 10916, pp. 117\u2013132. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91467-1_10"},{"issue":"1","key":"26_CR16","first-page":"17","volume":"1","author":"S Lowes","year":"2015","unstructured":"Lowes, S., Lin, P.: Learning to learn online: using locus of control to help students become successful online learners. J. Online Learn. Res. 1(1), 17\u201348 (2015)","journal-title":"J. Online Learn. Res."},{"issue":"2","key":"26_CR17","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1037\/0033-2909.109.2.163","volume":"109","author":"CM MacLeod","year":"1991","unstructured":"MacLeod, C.M.: Half a century of research on the Stroop effect: an integrative review. Psychol. Bull. 109(2), 163 (1991)","journal-title":"Psychol. Bull."},{"issue":"3","key":"26_CR18","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1002\/j.1556-6676.1998.tb02540.x","volume":"76","author":"LI Marks","year":"1998","unstructured":"Marks, L.I.: Deconstructing locus of control: implications for practitioners. J. Couns. Dev. 76(3), 251\u2013260 (1998)","journal-title":"J. Couns. Dev."},{"key":"26_CR19","doi-asserted-by":"publisher","unstructured":"Mavilidi, M.F., Zhong, L.: Exploring the development and research focus of cognitive load theory, as described by its founders: interviewing John Sweller, Fred Paas, and Jeroen van Merri\u00ebnboer. Educ. Psychol. Rev. 1\u201310 (2019). https:\/\/doi.org\/10.1007\/s10648-019-09463-7","DOI":"10.1007\/s10648-019-09463-7"},{"issue":"11","key":"26_CR20","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1145\/359168.359172","volume":"22","author":"R Morris","year":"1979","unstructured":"Morris, R., Thompson, K.: Password security: a case history. Commun. ACM 22(11), 594\u2013597 (1979)","journal-title":"Commun. ACM"},{"key":"26_CR21","unstructured":"Naden, C.: International Organization for Standardization. https:\/\/www.iso.org\/home.html. Accessed 17 May 2019"},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Nielsen, G., Vedel, M., Jensen, C.D.: Improving usability of passphrase authentication. In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, pp. 189\u2013198. IEEE (2014)","DOI":"10.1109\/PST.2014.6890939"},{"key":"26_CR23","volume-title":"Conducting Research in Psychology: Measuring the Weight of Smoke","author":"BW Pelham","year":"2013","unstructured":"Pelham, B.W., Blanton, H.: Conducting Research in Psychology: Measuring the Weight of Smoke, 4th edn. Cengage, Boston (2013)","edition":"4"},{"issue":"1","key":"26_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1037\/h0092976","volume":"80","author":"JB Rotter","year":"1966","unstructured":"Rotter, J.B.: Generalized expectancies for internal versus external control of reinforcement. Psychol. Monogr. Gen. Appl. 80(1), 1 (1966)","journal-title":"Psychol. Monogr. Gen. Appl."},{"issue":"1","key":"26_CR25","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1037\/0033-295X.110.1.145","volume":"110","author":"JA Russell","year":"2003","unstructured":"Russell, J.A.: Core affect and the psychological construction of emotion. Psychol. Rev. 110(1), 145 (2003)","journal-title":"Psychol. Rev."},{"key":"26_CR26","unstructured":"Spector, P.E.: Sage encyclopedia of social science research methods. In: The SAGE Encyclopedia of Social Science Research Methods, Sage Publications Inc. (2004)"},{"key":"26_CR27","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1037\/h0054651","volume":"18","author":"JR Stroop","year":"1935","unstructured":"Stroop, J.R.: Studies of interference in serial verbal reactions. J. Exp. Psychol. 18, 643\u2013662 (1935)","journal-title":"J. Exp. Psychol."},{"issue":"6","key":"26_CR28","doi-asserted-by":"publisher","first-page":"741","DOI":"10.1007\/s10207-019-00429-y","volume":"18","author":"M Y\u0131ld\u0131r\u0131m","year":"2019","unstructured":"Y\u0131ld\u0131r\u0131m, M., Mackie, I.: Encouraging users to improve password security and memorability. Int. J. Inf. Secur. 18(6), 741\u2013759 (2019)","journal-title":"Int. J. Inf. Secur."}],"container-title":["Lecture Notes in Computer Science","Augmented Cognition. Human Cognition and Behavior"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50439-7_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:15:36Z","timestamp":1720570536000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-50439-7_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030504380","9783030504397"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50439-7_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"10 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 July 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2020.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}