{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:48:41Z","timestamp":1743108521212,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_6","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"59-70","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Effects of Password Permutation on Subjective Usability Across Platforms"],"prefix":"10.1007","author":[{"given":"Kristen K.","family":"Greene","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"unstructured":"Honan, M.: Kill the password: why a string of characters can\u2019t protect us anymore. Wired (2012)","key":"6_CR1"},{"unstructured":"National Strategy for Trusted Identities in Cyberspace: Enhancing Online choice, Efficiency, Security, and Privacy. \n                      http:\/\/www.whitehouse.gov\/sites\/default\/files\/rss_viewer\/NSTICstrategy_041511.pdf\n                      \n                    . Accessed on 2011","key":"6_CR2"},{"unstructured":"United States Department of Homeland Security: United States Computer Emergency Readiness Team (US-CERT). Security tip (ST04-002): Choosing and protecting passwords. \n                      http:\/\/www.us-cert.gov\/cas\/tips\/ST04-002.htm.\n                      \n                     Accessed on 2009","key":"6_CR3"},{"key":"6_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"240","DOI":"10.1007\/978-3-319-07308-8_24","volume-title":"Cross-Cultural Design","author":"M Steves","year":"2014","unstructured":"Steves, M., Killourhy, K., Theofanos, M.F.: Clear, unambiguous password policies: an oxymoron? In: Rau, P. (ed.) CCD 2014. LNCS, vol. 8528, pp. 240\u2013251. Springer, Heidelberg (2014)"},{"unstructured":"Steves, M., Theofanos, M.F.: Password policy interpretation. In: Proceedings of the 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, in the 17th International Conference on Human-Computer Interaction (2015, to appear)","key":"6_CR5"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/978-3-319-07620-1_12","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"Y-Y Choong","year":"2014","unstructured":"Choong, Y.-Y.: A cognitive-behavioral framework of user password management lifecycle. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 127\u2013137. Springer, Heidelberg (2014)"},{"doi-asserted-by":"crossref","unstructured":"Greene, K.K., Kelsey, J., Franklin, J.M.: Measuring the Usability and Security of Permuted Passwords on Mobile Platforms. National Institute of Standards and Technology Interagency Report (NISTIR) 8040 (2015)","key":"6_CR7","DOI":"10.6028\/NIST.IR.8040"},{"doi-asserted-by":"crossref","unstructured":"Ploehn, C., Greene, K.K.: The authentication equation: visualizing the convergence of security and usability of system-generated passwords. In: Proceedings of the 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, in the 17th International Conference on Human-Computer Interaction (2015, to appear)","key":"6_CR8","DOI":"10.1007\/978-3-319-20376-8_9"},{"doi-asserted-by":"crossref","unstructured":"Lee, P., Choong, Y.: Human generated passwords \u2013 the impacts of password requirements and presentation styles. In: Proceedings of the 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, in the 17th International Conference on Human-Computer Interaction (2015, to appear)","key":"6_CR9","DOI":"10.1007\/978-3-319-20376-8_8"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/978-3-319-07620-1_18","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"BC Stanton","year":"2014","unstructured":"Stanton, B.C., Greene, K.K.: Character strings, memory and passwords: what a recall study can tell us. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 195\u2013206. Springer, Heidelberg (2014)"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"160","DOI":"10.1007\/978-3-319-07620-1_15","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"KK Greene","year":"2014","unstructured":"Greene, K.K., Gallagher, M.A., Stanton, B.C., Lee, P.Y.: I can\u2019t type that! p@$$w0rd entry on mobile devices. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 160\u2013171. Springer, Heidelberg (2014)"},{"key":"6_CR12","series-title":"Springer Briefs in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-4878-5","volume-title":"Mobile Authentication Problems and Solutions","author":"M Jakobsson","year":"2013","unstructured":"Jakobsson, M.: Mobile Authentication Problems and Solutions. Springer Briefs in Computer Science. Springer, Heidelberg (2013)"},{"unstructured":"Gallagher, M.A.: Modeling password entry on mobile devices: please check your password and try again. Doctoral Dissertation, Rice University, Houston, TX (2015)","key":"6_CR13"},{"doi-asserted-by":"crossref","unstructured":"Choong, Y., Theofanos, M., Liu, H.K.: United States Federal Employees\u2019 Password Management Behaviors \u2013 a Department of Commerce Case Study. National Institute of Standards and Technology Interagency Report (NISTIR) 7991 (2014)","key":"6_CR14","DOI":"10.6028\/NIST.IR.7991"},{"unstructured":"Shelton, D.C.: Reasons for non-compliance with mandatory information assurance policies by a trained population. Doctoral Dissertation, Capitol Technology University (2014)","key":"6_CR15"},{"doi-asserted-by":"crossref","unstructured":"Choong, Y., Theofanos, M. F.: What 4,500\u00a0+\u00a0people can tell you \u2013 employees\u2019 attitudes toward organizational password policy do matter. In: Proceedings of the 3rd International Conference on Human Aspects of Information Security, Privacy and Trust, in the 17th International Conference on Human-Computer Interaction (2015, to appear)","key":"6_CR16","DOI":"10.1007\/978-3-319-20376-8_27"},{"doi-asserted-by":"crossref","unstructured":"Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on World Wide Web, pp. 657\u2013666 (2007)","key":"6_CR17","DOI":"10.1145\/1242572.1242661"},{"key":"6_CR18","series-title":"The Foundations of Remembering: Essays in Honor of Henry L. Roedgier III","first-page":"241","volume-title":"Individual differences in working memory capacity and retrieval: A cue-dependent search approach","author":"N Unsworth","year":"2007","unstructured":"Unsworth, N., Engle, R.W.: Individual Differences in Working Memory Capacity and Retrieval: A\nCue-Dependent Search Approach. The Foundations of Remembering:\nEssays in Honor of Henry L. Roedgier III, pp. 241\u2013258. Psychology Press, New York (2007)"},{"doi-asserted-by":"crossref","unstructured":"Forget, A., Biddle, R.: Memorability of persuasive passwords. In: CHI 2008 Extended Abstracts on Human Factors in Computing Systems, pp. 3759\u20133764 (2008)","key":"6_CR19","DOI":"10.1145\/1358628.1358926"},{"unstructured":"Vu, K., Cook, J., Bhargav-Spantzel, A., Proctor, R.W.: Short- and long-term retention of passwords generated by first-letter and entire-word mnemonic methods. In: Proceedings of the 5th Annual Security Conference, Las Vegas, NV (2006)","key":"6_CR20"},{"key":"6_CR21","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1016\/j.ijhcs.2007.03.007","volume":"65","author":"K Vu","year":"2006","unstructured":"Vu, K., Proctor, R., Bhargav-Spantzel, A., Tai, B., Cook, J., Schultz, E.: Improving password security and memorability to protect personal and organizational information. Int. J. Hum. \u2013Comput. Stud. 65, 744\u2013757 (2006)","journal-title":"Int. J. Hum. \u2013Comput. Stud."},{"issue":"5","key":"6_CR22","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MSP.2004.81","volume":"2","author":"J Yan","year":"2004","unstructured":"Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: empirical results. IEEE Secur. Priv. 2(5), 25\u201331 (2004)","journal-title":"IEEE Secur. Priv."},{"issue":"3","key":"6_CR23","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1037\/0033-2909.99.3.303","volume":"99","author":"T Salthouse","year":"1986","unstructured":"Salthouse, T.: Perceptual, cognitive, and motoric aspects of transcription typing. Psychol. Bull. 99(3), 303\u2013319 (1986)","journal-title":"Psychol. Bull."},{"key":"6_CR24","first-page":"561","volume":"61","author":"JE Coover","year":"1923","unstructured":"Coover, J.E.: A method of teaching typewriting based upon a psychological analysis of expert typing. Nat. Educ. Assoc. 61, 561\u2013567 (1923)","journal-title":"Nat. Educ. Assoc."},{"unstructured":"Gentner, D.: Skilled finger movements in typing. Center for Information Processing. University of California, San Diego. CHIP Report 104 (1981)","key":"6_CR25"},{"issue":"3","key":"6_CR26","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1037\/0096-3445.113.3.345","volume":"113","author":"T Salthouse","year":"1984","unstructured":"Salthouse, T.: Effects of age and skill in typing. J. Exp. Psychol. 113(3), 345\u2013371 (1984)","journal-title":"J. Exp. Psychol."},{"unstructured":"Greene, K.K., Franklin, J., Kelsey, J.: Tap on, tap off: onscreen keyboards and mobile password entry. In: Proceedings of ShmooCon 2015 (2015)","key":"6_CR27"},{"doi-asserted-by":"crossref","unstructured":"MacKenzie, I.S., Soukoreff, R.W.: Phrase sets for evaluating text entry techniques. In: Extended Abstracts of the ACM Conference on Human Factors in Computing Systems - CHI 2003, pp. 754\u2013755. ACM, New York (2003)","key":"6_CR28","DOI":"10.1145\/765891.765971"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:22:06Z","timestamp":1583508126000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}