{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T15:45:00Z","timestamp":1742917500482,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_27","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"299-310","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["What 4,500+\u00a0People Can Tell You \u2013\u00a0Employees\u2019 Attitudes Toward Organizational Password Policy Do Matter"],"prefix":"10.1007","author":[{"given":"Yee-Yin","family":"Choong","sequence":"first","affiliation":[]},{"given":"Mary","family":"Theofanos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"issue":"3","key":"27_CR1","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1023\/A:1011902718709","volume":"19","author":"MA Sasse","year":"2001","unstructured":"Sasse, M.A., Brostoff, B., Weirich, D.: Transforming the \u2018weakest link\u2019 \u2014 a human\/computer interaction approach to usable and effective security. BT Technol. J. 19(3), 122\u2013131 (2001)","journal-title":"BT Technol. J."},{"key":"27_CR2","doi-asserted-by":"crossref","unstructured":"Vu, K.P.L., Bhargav, A., Proctor, R.W.: Imposing password restrictions for multiple accounts: Impact on generation and recall of passwords. In: Proceedings of the Human Factors and Ergonomics Society Annual Meeting 47(11), 1331\u20131335 (2003)","DOI":"10.1177\/154193120304701103"},{"issue":"6","key":"27_CR3","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1002\/acp.1014","volume":"18","author":"AS Brown","year":"2004","unstructured":"Brown, A.S., Bracken, E., Zoccoli, S., Douglas, K.: Generating and remembering passwords. Appl. Cogn. Psychol. 18(6), 641\u2013651 (2004)","journal-title":"Appl. Cogn. Psychol."},{"key":"27_CR4","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1016\/j.ijhcs.2007.03.007","volume":"65","author":"KL Vu","year":"2007","unstructured":"Vu, K.L., Proctor, R.W., Bhargav-Spantzel, A., Tai, B., Cook, J., Schultz, E.E.: Improving password security and memorability to protect personal and organizational information. Int. J. Hum Comput Stud. 65, 744\u2013757 (2007)","journal-title":"Int. J. Hum Comput Stud."},{"key":"27_CR5","doi-asserted-by":"crossref","unstructured":"Flor\u00eancio, D., Herley, C.: A Large-Scale Study of Web Password Habits. In: Proceedings of the 16th International Conference on World Wide Web 2007, pp. 657\u2013666 (2007)","DOI":"10.1145\/1242572.1242661"},{"key":"27_CR6","doi-asserted-by":"crossref","unstructured":"Das, A., Bonneau, J., Caesar, M., Borisov, N., Wang, X.: The tangled web of password reuse. In: Proceedings of NDSS (2014)","DOI":"10.14722\/ndss.2014.23357"},{"key":"27_CR7","doi-asserted-by":"crossref","unstructured":"Inglesant, P.G., Sasse, M.A.: The true cost of unusable password policies: password use in the wild. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 383\u2013392. ACM (2010)","DOI":"10.1145\/1753326.1753384"},{"issue":"3","key":"27_CR8","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.intcom.2011.03.007","volume":"23","author":"B Grawemeyer","year":"2011","unstructured":"Grawemeyer, B., Johnson, H.: Using and managing multiple passwords: a week to a view. Interact. Comput. 23(3), 256\u2013267 (2011)","journal-title":"Interact. Comput."},{"issue":"1","key":"27_CR9","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1177\/0146167295211007","volume":"21","author":"SJ Kraus","year":"1995","unstructured":"Kraus, S.J.: Attitudes and the prediction of behavior: a meta-analysis of the empirical literature. Pers. Soc. Psychol. Bull. 21(1), 58\u201375 (1995)","journal-title":"Pers. Soc. Psychol. Bull."},{"issue":"1","key":"27_CR10","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1177\/0021886307311470","volume":"44","author":"JB Avey","year":"2008","unstructured":"Avey, J.B., Wernsing, T.S., Luthans, F.: Can positive employees help positive organizational change? Impact of psychological capital and emotions on relevant attitudes and behaviors. J. Appl. Behav. Sci. 44(1), 48\u201370 (2008)","journal-title":"J. Appl. Behav. Sci."},{"key":"27_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/978-3-319-07620-1_12","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"Y-Y Choong","year":"2014","unstructured":"Choong, Y.-Y.: A cognitive-behavioral framework of user password management lifecycle. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 127\u2013137. Springer, Heidelberg (2014)"},{"issue":"8","key":"27_CR12","doi-asserted-by":"publisher","first-page":"1691","DOI":"10.1111\/j.1559-1816.2000.tb02462.x","volume":"30","author":"AD Ong","year":"2000","unstructured":"Ong, A.D., Weiss, D.J.: The impact of anonymity on responses to sensitive questions. J. Appl. Soc. Psychol. 30(8), 1691\u20131708 (2000)","journal-title":"J. Appl. Soc. Psychol."},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Choong, Y.-Y., Theofanos, M., Liu, H.-K.: United States Federal Employees\u2019 Password Management Behaviors \u2013 a Department of Commerce Case Study. NISTIR 7991, National Institute of Standards and Technology, Gaithersburg, US (2014)","DOI":"10.6028\/NIST.IR.7991"},{"issue":"4","key":"27_CR14","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/975817.975820","volume":"47","author":"B Ives","year":"2004","unstructured":"Ives, B., Walsh, K.R., Schneider, H.: The domino effect of password reuse. Commun. ACM 47(4), 75\u201378 (2004)","journal-title":"Commun. ACM"},{"key":"27_CR15","unstructured":"WEBROOT.com: New Webroot Survey Reveals Poor Password Practices that May Put Consumers\u2019 Identities At Risk (2010). \n                      http:\/\/www.webroot.com\/us\/en\/company\/press-room\/releases\/protect-your-computer-from-hackers\n                      \n                    . Accessed on 20 Jan 2015"},{"key":"27_CR16","unstructured":"National Strategy for Trusted Identities in Cyberspace. The White House, Washington, DC, US (2014). \n                      http:\/\/www.whitehouse.gov\/sites\/default\/files\/rss_viewer\/NSTICstrategy_041511.pdf\n                      \n                    . Accessed on 08 Jan 2015"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:18:19Z","timestamp":1583507899000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}