{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:24:25Z","timestamp":1743071065324,"version":"3.40.3"},"publisher-location":"Cham","reference-count":39,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030582005"},{"type":"electronic","value":"9783030582012"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58201-2_7","type":"book-chapter","created":{"date-parts":[[2020,9,13]],"date-time":"2020-09-13T23:02:29Z","timestamp":1600038149000},"page":"95-108","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Assisting Users to Create Stronger Passwords Using ContextBased MicroTraining"],"prefix":"10.1007","author":[{"given":"Joakim","family":"K\u00e4vrestad","sequence":"first","affiliation":[]},{"given":"Marcus","family":"Nohlberg","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,9,14]]},"reference":[{"issue":"3","key":"7_CR1","doi-asserted-by":"publisher","first-page":"453","DOI":"10.1108\/ICS-06-2018-0077","volume":"27","author":"J K\u00e4vrestad","year":"2019","unstructured":"K\u00e4vrestad, J., Eriksson, F., Nohlberg, M.: Understanding passwords\u2013a taxonomy of password creation strategies. Inf. Comput. Secur. 27(3), 453\u2013467 (2019)","journal-title":"Inf. Comput. Secur."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Wang, C., Jan, S.T., Hu, H., Bossart, D., Wang, G.: The next domino to fall: empirical analysis of user passwords across online services. In: Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy. ACM (2018)","DOI":"10.1145\/3176258.3176332"},{"key":"7_CR3","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1016\/j.ijhcs.2017.11.002","volume":"111","author":"N Woods","year":"2018","unstructured":"Woods, N., Siponen, M.: Too many passwords? How understanding our memory can increase password memorability. Int. J. Hum. Comput. Stud. 111, 36\u201348 (2018)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.ijhcs.2019.01.004","volume":"126","author":"B Brumen","year":"2019","unstructured":"Brumen, B.: Security analysis of game changer password system. Int. J. Hum. Comput. Stud. 126, 44\u201352 (2019)","journal-title":"Int. J. Hum. Comput. Stud."},{"issue":"4","key":"7_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2891411","volume":"18","author":"R Shay","year":"2016","unstructured":"Shay, R., et al.: Designing password policies for strength and usability. ACM Trans. Inf. Syst. Secur. 18(4), 1\u201334 (2016)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"7_CR6","doi-asserted-by":"crossref","unstructured":"Petsas, T., Tsirantonakis, G., Athanasopoulos, E., Ioannidis, S.: Two-factor authentication: is the world ready?: Quantifying 2FA adoption. In: Proceedings of the Eighth European Workshop on System Security. ACM (2015)","DOI":"10.1145\/2751323.2751327"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-662-58387-6_9","volume-title":"Financial Cryptography and Data Security","author":"S Das","year":"2018","unstructured":"Das, S., Dingman, A., Camp, L.J.: Why Johnny doesn\u2019t use two factor a two-phase usability study of the FIDO U2F security key. In: Meiklejohn, S., Sako, K. (eds.) FC 2018. LNCS, vol. 10957, pp. 160\u2013179. Springer, Heidelberg (2018). https:\/\/doi.org\/10.1007\/978-3-662-58387-6_9"},{"key":"7_CR8","unstructured":"Whitten, A., Tygar, J.D.: Why Johnny can\u2019t encrypt: a usability evaluation of PGP 5.0. In: USENIX Security Symposium (1999)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Weirich, D., Sasse, M.A.: Pretty good persuasion: a first step towards effective password security in the real world. In: Proceedings of the 2001 Workshop on New Security Paradigms. ACM (2001)","DOI":"10.1145\/508171.508195"},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.cose.2015.05.012","volume":"53","author":"NS Safa","year":"2015","unstructured":"Safa, N.S., Sookhak, M., Von Solms, R., Furnell, S., Ghani, N.A., Herawan, T.: Information security conscious care behaviour formation in organizations. Comput. Secur. 53, 65\u201378 (2015)","journal-title":"Comput. Secur."},{"key":"7_CR11","unstructured":"K\u00e4vrestad, J., Sk\u00e4rg\u00e5rd, M., Nohlberg, M.: Users perception of using CBMT for information security training. In: Human Aspects of Information Security & Assurance (HAISA 2019) Nicosia (2019)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"K\u00e4vrestad, J., Nohlberg, M.: Using context based micro training to develop OER for the benefit of all. In: Proceedings of the 15th International Symposium on Open Collaboration. ACM (2019)","DOI":"10.1145\/3306446.3340814"},{"key":"7_CR13","unstructured":"Hedin, A.: L\u00e4rande p\u00e5 h\u00f6g niv\u00e5. Uppsala Universitet (2006)"},{"key":"7_CR14","volume-title":"Andragogy in Action: Applying Principles of Adult Learning","author":"MS Knowles","year":"1984","unstructured":"Knowles, M.S.: Andragogy in Action: Applying Principles of Adult Learning. Jossey-Bass, San Farancisco (1984)"},{"key":"7_CR15","unstructured":"Herrington, J., Oliver, R.: Critical characteristics of situated learning: implications for the instructional design of multimedia (1995)"},{"key":"7_CR16","unstructured":"Parsons, K., Butavicius, M., Lillie, M., Calic, D., McCormac, A., Pattinson, M.: Which individual, cultural, organisational and inerventional factors explain phishing resilience? In: Twelfth International Symposium on Human Aspects of Information Security & Assurance, Dundee, Scotland, UK. University of Plymouth (2018)"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Wang, M., Xiao, J., Chen, Y., Min, W.: Mobile learning design: the LTCS model. In: 2014 International Conference on Intelligent Environments (IE). IEEE (2014)","DOI":"10.1109\/IE.2014.68"},{"key":"7_CR18","unstructured":"McLoughlin, C., Lee, M.: Mapping the digital terrain: new media and social software as catalysts for pedagogical change. Ascilite Melbourne (2008)"},{"key":"7_CR19","unstructured":"Bruck, P.A., Motiwalla, L., Foerster, F.: Mobile learning with micro-content: a framework and evaluation. In: Bled eConference, vol. 25 (2012)"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Koedinger, K.R., Kim, J., Jia, J.Z., McLaughlin, E.A., Bier, N.L.: Learning is not a spectator sport: doing is better than watching for learning from a MOOC. In: 2015 Proceedings of the Second ACM Conference on Learning@ Scale. ACM (2015)","DOI":"10.1145\/2724660.2724681"},{"key":"7_CR21","doi-asserted-by":"publisher","DOI":"10.4324\/9781315042039","volume-title":"The Challenge of Problem-Based Learning","author":"D Boud","year":"2013","unstructured":"Boud, D., Feletti, G.: The Challenge of Problem-Based Learning. Psychology Press, Routledge (2013)"},{"key":"7_CR22","unstructured":"K\u00e4vrestad, J., Nohlberg, M.: Online fraud defence by context based micro training. In: HAISA (2015)"},{"key":"7_CR23","unstructured":"Werme, J.: Security awareness through micro-training: an initial evaluation of a context based micro-training framework (2014)"},{"key":"7_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2018.01.016","volume":"75","author":"S Furnell","year":"2018","unstructured":"Furnell, S., Esmael, R., Yang, W., Li, N.: Enhancing security behaviour by supporting the user. Comput. Secur. 75, 1\u20139 (2018)","journal-title":"Comput. Secur."},{"key":"7_CR25","unstructured":"Microsoft. Security Identifier (2019). https:\/\/docs.microsoft.com\/en-us\/windows\/security\/identity-protection\/access-control\/security-identifiers#security-identifier-architecture. Accessed 2019"},{"key":"7_CR26","unstructured":"Yahoo: Password tips (n.d.). https:\/\/safety.yahoo.com\/Security\/STRONG-PASSWORD.html"},{"key":"7_CR27","unstructured":"Apple. Security and your Apple ID. (n.d.) https:\/\/support.apple.com\/en-us\/HT201303. Accessed 12 Sept 2019"},{"key":"7_CR28","unstructured":"Grassi, P., et al.: NIST special publication 800\u201363b: digital identity guidelines. National Institute of Standards and Technology (NIST) (2017)"},{"key":"7_CR29","unstructured":"ENISA. Authentication Methods (n.d.). https:\/\/www.enisa.europa.eu\/topics\/csirts-in-europe\/glossary\/authentication-methods. Accessed 04 Oct 2019"},{"key":"7_CR30","unstructured":"ISO\/IEC, Information technology - Security techniques - Code of practice for information security controls. ISO\/IEC (2017)"},{"key":"7_CR31","doi-asserted-by":"publisher","unstructured":"K\u00e4vrestad, J., Lennartsson, M., Birath, M., Nohlberg, M.: Constructing secure and memorable passwords. Inf. Comput. Secur. https:\/\/doi.org\/10.1108\/ICS-07-2019-0077","DOI":"10.1108\/ICS-07-2019-0077"},{"key":"7_CR32","doi-asserted-by":"crossref","unstructured":"Lincoln, Y.S., Guba, E.G.: Naturalistic Inquiry, vol. 75. Sage (1985)","DOI":"10.1016\/0147-1767(85)90062-8"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Schrittwieser, S., Mulazzani, M., Weippl, E.: Ethics in security research which lines should not be crossed? In: Security and Privacy Workshops (SPW), IEEE (2013)","DOI":"10.1109\/spw.2013.6914700"},{"key":"7_CR34","unstructured":"Wheeler, D.L.: zxcvbn: low-budget password strength estimation. In: USENIX Security Symposium (2016)"},{"key":"7_CR35","doi-asserted-by":"crossref","unstructured":"XDCD Carnavalet, Mannan, M.: A large-scale evaluation of high-impact password strength meters. ACM Trans. Inf. Syst. Secur. (TISSEC) 18(1), 1 (2015)","DOI":"10.1145\/2739044"},{"key":"7_CR36","unstructured":"Dropbox: Low-Budget Password Strength Estimation (2019). https:\/\/github.com\/dropbox\/zxcvbn. Accessed 07 Oct 2019"},{"issue":"2","key":"7_CR37","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1145\/503345.503348","volume":"31","author":"MT Siponen","year":"2001","unstructured":"Siponen, M.T.: Five dimensions of information security awareness. SIGCAS Comput. Soc. 31(2), 24\u201329 (2001)","journal-title":"SIGCAS Comput. Soc."},{"issue":"2","key":"7_CR38","doi-asserted-by":"publisher","first-page":"135","DOI":"10.3923\/itj.2003.135.139","volume":"2","author":"M Mendes","year":"2003","unstructured":"Mendes, M., Pala, A.: Type I error rate and power of three normality tests. Pak. J. Inf. Technol. 2(2), 135\u2013139 (2003)","journal-title":"Pak. J. Inf. Technol."},{"key":"7_CR39","doi-asserted-by":"crossref","unstructured":"McKnight, P.E., Najab, J.: Mann-Whitney U test. Corsini Encycl. Psychol. 1 (2010)","DOI":"10.1002\/9780470479216.corpsy0524"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58201-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T00:05:42Z","timestamp":1726272342000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58201-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030582005","9783030582012"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58201-2_7","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"14 September 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Maribor","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Slovenia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/sec2020.um.si\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"149","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"19% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.88","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.14","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}