{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T13:40:06Z","timestamp":1773409206357,"version":"3.50.1"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319076195","type":"print"},{"value":"9783319076201","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07620-1_12","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:55:03Z","timestamp":1402404903000},"page":"127-137","source":"Crossref","is-referenced-by-count":15,"title":["A Cognitive-Behavioral Framework of User Password Management Lifecycle"],"prefix":"10.1007","author":[{"given":"Yee-Yin","family":"Choong","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"12_CR1","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2011.150","volume":"10","author":"C. Herley","year":"2012","unstructured":"Herley, C., van Oorschot, P.: A Research Agenda Acknowledging the Persistence of Passwords. IEEE Security & Privacy\u00a010(1), 28\u201336 (2012)","journal-title":"IEEE Security & Privacy"},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Flor\u00eancio, D., Herley, C.: A Large-Scale Study of Web Password Habits. In: Proceedings of the 16th International Conference on World Wide Web, pp. 657\u2013666. ACM (2007)","DOI":"10.1145\/1242572.1242661"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Hoonakker, P., Bornoe, N., Carayon, P.: Password Authentication from a Human Factors Perspective: Results of a Survey among End-Users. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting, vol.\u00a053(6), pp. 459\u2013463. SAGE Publications (2009)","DOI":"10.1177\/154193120905300605"},{"key":"12_CR4","unstructured":"Choong, Y.-Y.T.M., Liu, H.-K.: A Large-Scale Survey of Employees\u2019 Password Behaviors. Manuscript submitted for publication (2014)"},{"key":"12_CR5","unstructured":"Goverance, I.T.: Boardroom Cyber Watch 2013 \u2013 Report (2013), \n                    \n                      http:\/\/www.itgovernance.co.uk\/what-is-cybersecurity\/boardroom-cyber-watch.aspx"},{"key":"12_CR6","unstructured":"Haskins, W.: Network Security: Gullible Users Are the Weakest Link. TechNewsWorld (November 29, 2007), \n                    \n                      http:\/\/www.technewsworld.com\/story\/60520.html\n                    \n                    \n                   (retrieved)"},{"key":"12_CR7","unstructured":"Malenkovich, S.: 10 Worst Password Ideas (As Seen In the Adobe Hack). Kaspersky Lab Daily (November 21, 2013), \n                    \n                      http:\/\/blog.kaspersky.com\/10-worst-password-ideas-as-seen-in-the-adobe-hack\/\n                    \n                    \n                   (retrieved)"},{"key":"12_CR8","unstructured":"MeriTalk.: Cyber Security Experience: Security Pros from Mars, Users from Mercury (2013), \n                    \n                      http:\/\/www.meritalk.com\/cybersecurityexperience\n                    \n                    \n                   (retrieved)"},{"issue":"3","key":"12_CR9","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1023\/A:1011902718709","volume":"19","author":"M.A. Sasse","year":"2001","unstructured":"Sasse, M.A., Brostoff, B., Weirich, D.: Transforming the \u2018weakest link\u2019 \u2014 a human\/computer interaction approach to usable and effective security. BT Technology Journal\u00a019(3), 122\u2013131 (2001)","journal-title":"BT Technology Journal"},{"issue":"6","key":"12_CR10","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1002\/acp.1014","volume":"18","author":"A.S. Brown","year":"2004","unstructured":"Brown, A.S., Bracken, E., Zoccoli, S., Douglas, K.: Generating and remembering passwords. Applied Cognitive Psychology\u00a018(6), 641\u2013651 (2004)","journal-title":"Applied Cognitive Psychology"},{"issue":"3","key":"12_CR11","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1080\/0144929X.2010.492876","volume":"30","author":"J. Campbell","year":"2011","unstructured":"Campbell, J., Ma, W., Kleeman, D.: Impact of restrictive composition policy on user password choices. Behaviour & Information Technology\u00a030(3), 379\u2013388 (2011)","journal-title":"Behaviour & Information Technology"},{"issue":"5","key":"12_CR12","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MSP.2004.81","volume":"2","author":"J. Yan","year":"2004","unstructured":"Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password Memorability and Security: Empirical Results. IEEE Security & Privacy\u00a02(5), 25\u201331 (2004)","journal-title":"IEEE Security & Privacy"},{"key":"12_CR13","unstructured":"Flor\u00eancio, D., Herley, C., Coskun, B.: Do Strong Web Passwords Accomplish Anything? In: Proceedings of the 2nd USENIX Workshop on Hot Topics in Security, pp. 1\u20136 (2007)"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Herley, C.: So Long, And No Thanks for the Externalities: The Rational Rejection of Security Advice by Users. In: NSPW 2009 Proceedings of the 2009 Workshop on New Security Paradigms Workshop, pp. 133\u2013144 (2009)","DOI":"10.1145\/1719030.1719050"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Inglesant, P., Sasse, M.A.: The True Cost of Unusable Password Policies: Password Use in the Wild. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 383\u2013392 (2010)","DOI":"10.1145\/1753326.1753384"},{"issue":"4","key":"12_CR16","doi-asserted-by":"publisher","first-page":"365","DOI":"10.2307\/356600","volume":"32","author":"L.H. Flower","year":"1981","unstructured":"Flower, L.H., Hayes, J.R.: A Cognitive Process Theory of Writing. College Composition and Communication\u00a032(4), 365\u2013387 (1981)","journal-title":"College Composition and Communication"},{"issue":"4","key":"12_CR17","doi-asserted-by":"publisher","first-page":"449","DOI":"10.2307\/375768","volume":"39","author":"L.H. Flower","year":"1977","unstructured":"Flower, L.H., Hayes, J.R.: Problem-solving strategies and the writing process. College English\u00a039(4), 449\u2013461 (1977)","journal-title":"College English"},{"key":"12_CR18","unstructured":"Imerva Application Defense Center (ADC).: Consumer Password Worst Practices. Imperva White Paper (2009), \n                    \n                      http:\/\/www.imperva.com\/docs\/wp_consumer_password_worst_practices.pdf\n                    \n                    \n                   (retrieved)"},{"key":"12_CR19","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Monrose, F., Reiter, M.K.: The Security of Modern Password Expiration: An Algorithmic Framework and Empirical Analysis. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 176\u2013186 (2010)","DOI":"10.1145\/1866307.1866328"},{"issue":"2","key":"12_CR20","doi-asserted-by":"publisher","first-page":"163","DOI":"10.3758\/BF03195438","volume":"34","author":"R.W. Proctor","year":"2002","unstructured":"Proctor, R.W., Lien, M.-C., Vu, K.-P.L., Schultz, E.E., Salvendy, G.: Improving computer security for authentication of users: Influence of proactive password restrictions. Behavior Research Methods, Instruments, & Computers\u00a034(2), 163\u2013169 (2002)","journal-title":"Behavior Research Methods, Instruments, & Computers"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"Vu, K.-P.L., Bhargav, A., Proctor, R.W.: Imposing Password Restrictions for Multiple Accounts: Impact on Generation and Recall of Passwords. In: Proceed-ings of the Human Factors and Ergonomics Society Annual Meeting, vol.\u00a047(11), pp. 1331\u20131335. SAGE Publications (2003)","DOI":"10.1177\/154193120304701103"},{"key":"12_CR22","unstructured":"Pratt, M.K.: 5 Annonying Help Desk Calls - And How to Banish Them. PCWorld (April 3, 2012), \n                    \n                      http:\/\/www.pcworld.com\/article\/253073\/5_annoying_help_desk_calls_and_how_to_banish_them.html\n                    \n                    \n                   (retrieved)"},{"key":"12_CR23","unstructured":"Abel, S.: Industry Average Help Desk Support Costs. The Content Wrangler (April 28, 2011), \n                    \n                      http:\/\/thecontentwrangler.com\/2011\/04\/28\/industry-average-help-desk-support-costs\/\n                    \n                    \n                   (retrieved)"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Steves, M., Chisnell, D., Sasse, M.A., Krol, K., Theofanos, M., Wald, H.: Report: Authentication Diary Study. NISTIR 7983. National Institute of Standards and Technology, Gaithersburg, MD (2014)","DOI":"10.6028\/NIST.IR.7983"},{"key":"12_CR25","unstructured":"U.S. Bureau of Economic Analysis: National Income and Product Accounts, Tables 6.6D, Wages and Salaries Per Full-Time Equivalent Employee by Industry (August 7, 2013), \n                    \n                      http:\/\/www.bea.gov\/national\/nipaweb\n                    \n                    \n                   (retrieved)"},{"issue":"3","key":"12_CR26","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.intcom.2011.03.007","volume":"23","author":"B. Grawemeyer","year":"2011","unstructured":"Grawemeyer, B., Johnson, H.: Using and managing multiple passwords: A week to a view. Interacting with Computers\u00a023(3), 256\u2013267 (2011)","journal-title":"Interacting with Computers"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Hayashi, E., Hong, J.I.: A Diary Study of Password Usage in Daily Life. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2627\u20132630. ACM (2011)","DOI":"10.1145\/1978942.1979326"},{"issue":"2","key":"12_CR28","doi-asserted-by":"crossref","first-page":"63","DOI":"10.17705\/1jais.00184","volume":"10","author":"M. Keith","year":"2009","unstructured":"Keith, M., Shao, B., Steinbart, P.: A Behavioral Analysis of Passphrase Design and Effectiveness. Journal of the Association for Information Systems\u00a010(2), 63\u201389 (2009)","journal-title":"Journal of the Association for Information Systems"},{"key":"12_CR29","unstructured":"Stanton, B., Greene, K.K.: Character Strings, Memory and Passwords: What a Recall Study Can Tell Us. In: Proceedings of the 16th International Conference on Human-Computer Interaction (in press, 2014)"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07620-1_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T23:13:17Z","timestamp":1582413197000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07620-1_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076195","9783319076201"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07620-1_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}