{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T16:17:26Z","timestamp":1776097046199,"version":"3.50.1"},"publisher-location":"Cham","reference-count":49,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319396958","type":"print"},{"value":"9783319396965","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39696-5_7","type":"book-chapter","created":{"date-parts":[[2016,5,20]],"date-time":"2016-05-20T15:37:48Z","timestamp":1463758668000},"page":"101-115","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["The Authentication Game - Secure User Authentication by Gamification?"],"prefix":"10.1007","author":[{"given":"Frank","family":"Ebbers","sequence":"first","affiliation":[]},{"given":"Philipp","family":"Brune","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,21]]},"reference":[{"key":"7_CR1","unstructured":"Amorin, J.A., Hendix, M., Andler, S.F., Gustavsson, P.M.: Gamified training for cyber defence: Methods and automated tools for situation and threat assessment (2013)"},{"key":"7_CR2","volume-title":"The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice","author":"J Andress","year":"2014","unstructured":"Andress, J.: The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice, 2nd edn. Elsevier Science, USA (2014)","edition":"2"},{"issue":"5","key":"7_CR3","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MSP.2004.71","volume":"2","author":"D Balfanz","year":"2004","unstructured":"Balfanz, D., Durfee, G., Smetters, D., Grinter, R.: In search of usable security: five lessons from the field. IEEE Secur. Priv. 2(5), 19\u201324 (2004)","journal-title":"IEEE Secur. Priv."},{"key":"7_CR4","unstructured":"Blonder, G.E.: Graphical password (1996). http:\/\/www.google.com\/patents\/US5559961"},{"key":"7_CR5","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/978-1-4471-0515-2_27","volume-title":"People and Computers XIV \u2013 Usability or Else!","author":"S Brostoff","year":"2000","unstructured":"Brostoff, S., Sasse, M.A.: Are passfaces more usable than passwords? a field trial investigation. In: McDonald, S., Waern, Y., Cockton, G. (eds.) People and Computers XIV \u2013 Usability or Else!, pp. 405\u2013424. Springer, London (2000)"},{"issue":"6","key":"7_CR6","doi-asserted-by":"publisher","first-page":"999","DOI":"10.1006\/imms.1993.1092","volume":"39","author":"M Brown","year":"1993","unstructured":"Brown, M., Rogers, S.J.: User identification via keystroke characteristics of typed names using neural networks. Int. J. Man Mach. Stud. 39(6), 999\u20131014 (1993)","journal-title":"Int. J. Man Mach. Stud."},{"issue":"2","key":"7_CR7","first-page":"8","volume":"16","author":"M Burke","year":"2011","unstructured":"Burke, M., Hiltbrand, T.: How gamification will change business intelligence. Bus. Intell. J. 16(2), 8\u201316 (2011)","journal-title":"Bus. Intell. J."},{"key":"7_CR8","series-title":"Lecture Notes in Electrical Engineering","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-6154-8","volume-title":"Computer Networks & Communications (NetCom): Proceedings of the Fourth International Conference on Networks et Communications","author":"N Chaki","year":"2013","unstructured":"Chaki, N.: Computer Networks & Communications (NetCom): Proceedings of the Fourth International Conference on Networks et Communications. Lecture Notes in Electrical Engineering, vol. 131. Springer, New York (2013)"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/978-3-319-07620-1_12","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"Y-Y Choong","year":"2014","unstructured":"Choong, Y.-Y.: A cognitive-behavioral framework of user password management lifecycle. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 127\u2013137. Springer, Heidelberg (2014)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Das, A., Bonneau, J., Caesar, M., Borisov, N., Wang, X.: The tangled web of password reuse. In: Symposium on Network and Distributed System Security 2014, Washington, D.C. (2014)","DOI":"10.14722\/ndss.2014.23357"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Deterding, S., Sicart, M., Nacke, L., O\u2019Hara, K., Dixon, D.: Gamification: using game-design elements in non-gaming contexts. In: Tan, D., Amershi, S., Begole, B., Kellogg, W.A., Tungare, M. (eds.) The 2011 Annual Conference Extended Abstracts, pp. 2425\u20132428 (2011)","DOI":"10.1145\/1979742.1979575"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Dunphy, P., Heiner, A.P., Asokan, N.: A closer look at recognition-based graphical passwords on mobile devices. In: Cranor, L.F. (ed.) SOUPS 2010. ACM International Conference Proceedings Series, p. 1. ACM, New York (2010). http:\/\/dl.acm.org\/citation.cfm?id=1837114","DOI":"10.1145\/1837110.1837114"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Dunphy, P., Yan, J.: Do background images improve draw a secret graphical passwords?. In: Ning, P., Capitani, D., di Vimercati, S., Syverson, P., Capitani, D., di Vimercati, S., Syverson, P.F., Evans, D. (eds.) Proceedings of the 14th ACM conference on Computer and Communications Security, pp. 36\u201347. ACM Digital Library, New York (2007). http:\/\/dl.acm.org\/citation.cfm?id=1315252","DOI":"10.1145\/1315245.1315252"},{"key":"7_CR14","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.procs.2012.10.059","volume":"15","author":"J Fernandes","year":"2012","unstructured":"Fernandes, J., Duarte, D., Ribeiro, C., Farinha, C., Pereira, J.M., da Silva, M.M.: ithink: A game-based approach towards improving collaboration and participation in requirement elicitation. Procedia Comput. Sci. 15, 66\u201377 (2012)","journal-title":"Procedia Comput. Sci."},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Florencio, D., Herley, C.: A large-scale study of web password habits. In: Williamson, C., Zurko, M.E. (eds.) Proceedings of the 16th International Conference on World Wide Web 2007, pp. 657\u2013666. ACM, New York (2007)","DOI":"10.1145\/1242572.1242661"},{"key":"7_CR16","unstructured":"Forget, A., Chiasson, S., Biddle, R.: Persuasion as education for computer security. In: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education, vol. 2007(1), pp. 822\u2013829 (2007)"},{"key":"7_CR17","unstructured":"Fortinet: Multiple password tendencies of gen x online users in the united states, as of February 2014: Statista (2014). http:\/\/www.statista.com\/statistics\/305462\/generation-x-multiple-internet-account-passwords\/"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Gallego, A., Saxena, N., Voris, J.: Playful security: a computer game for secure wireless device pairing. In: 2011 16th International Conference on Computer Games (CGAMES), pp. 177\u2013184, July 2011","DOI":"10.1109\/CGAMES.2011.6000336"},{"key":"7_CR19","volume-title":"Computer Applications I: Proceedings of the International Conference on Computer Applications, 24\u201327 December 2010, Pondicherry, India","year":"2011","unstructured":"Hari, K.K.K., Anbuoli, P., Manikandan, A., Saikishore, E. (eds.): Computer Applications I: Proceedings of the International Conference on Computer Applications, 24\u201327 December 2010, Pondicherry, India. Research Pub. Services, Singapore (2011)"},{"key":"7_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-642-29615-4_9","volume-title":"Information Security Technology for Applications","author":"K Helkala","year":"2012","unstructured":"Helkala, K., Svendsen, N.K.: The security and memorability of passwords generated by using an association element and a personal factor. In: Laud, P. (ed.) NordSec 2011. LNCS, vol. 7161, pp. 114\u2013130. Springer, Heidelberg (2012)"},{"key":"7_CR21","volume-title":"Managing an Information Security and Privacy Awareness and Training Program","author":"R Herold","year":"2011","unstructured":"Herold, R.: Managing an Information Security and Privacy Awareness and Training Program, 2nd edn. CRC Press, Boca Raton (2011)","edition":"2"},{"key":"7_CR22","unstructured":"InformationWeeks Analytics: Analytics report: Identity management - saas, mobility add urgency (2011). http:\/\/www.exactidentity.com\/wp-content\/uploads\/2012\/07\/InformationWeek-Identity-Management.pdf"},{"key":"7_CR23","first-page":"2963","volume":"2","author":"A Iranna","year":"2013","unstructured":"Iranna, A., Pankaja, P.: Graphical password authentication using persuasive cued click point. Int. J. Eng. Res. Appl. 2, 2963\u20132974 (2013)","journal-title":"Int. J. Eng. Res. Appl."},{"key":"7_CR24","volume-title":"Handbook of Biometrics","author":"AK Jain","year":"2007","unstructured":"Jain, A.K., Flynn, P.J., Ross, A.A.: Handbook of Biometrics. Springer, New York (2007)"},{"key":"7_CR25","unstructured":"Jermyn, I., Mayer, A.J., Monrose, F., Reiter, M.K., Rubin, A.D., et al.: The design and analysis of graphical passwords. In: Association, U. (ed.) Proceedings of the 8th USENIX Security Symposium, Washington, D.C., USA, vol. 8. (1999)"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Khot, R.A., Srinathan, K., Kumaraguru, P.: Marasim: a novel jigsaw based authentication scheme using tagging. In: Tan, D.S., Fitzpatrick, G., Gutwin, C., Begole, B., Kellogg, W.A. (eds.) CHI 2011, pp. 2605\u20132614 (2011). http:\/\/dl.acm.org\/citation.cfm?d=1978942.1979322","DOI":"10.1145\/1978942.1979322"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Kroeze, C., Olivier, M.S.: Gamifying authentication. In: Venter, H.S., Loock, M., Coetzee, M. (eds.) 2012 Information Security for South Africa, pp. 1\u20138. IEEE, Piscataway (2012)","DOI":"10.1109\/ISSA.2012.6320439"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Kuo, C., Romanosky, S., Cranor, L.F.: Human selection of mnemonic phrase-based passwords. In: Cranor, L.F. (ed.) SOUPS 2006: Proceedings of the Second Symposium on Usable Privacy and Security, pp. 67\u201378. ACM, New York (2006)","DOI":"10.1145\/1143120.1143129"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Loy, C.C., Lai, W.K., Lim, C.P.: Keystroke patterns classification using the artmap-fd neural network. In: Liao, B.Y. (ed.) IIHMSP 2007, pp. 61\u201364. IEEE Computer Society, Los Alamitos (2007)","DOI":"10.1109\/IIH-MSP.2007.218"},{"key":"7_CR30","unstructured":"Luca, A.D., Hang, A., Brudy, F., Lindner, C., Hussmann, H.: Touch me once and i know it\u2019s you! implicit authentication based on touch screen patterns. In: Konstan, J.A., Chi, E.H., H\u00f6\u00f6k, K. (eds.) Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 987\u2013996. ACM, New York (2012). http:\/\/dl.acm.org\/citation.cfm?id=2208544"},{"key":"7_CR31","volume-title":"Security and Access Control Using Biometric Technologies","author":"R Newman","year":"2009","unstructured":"Newman, R.: Security and Access Control Using Biometric Technologies. Cengage Learning, New Delhi (2009)"},{"key":"7_CR32","unstructured":"Nielsen, J.: Usability Engineering. Morgan Kaufmann Publishers, San Francisco (1994). Updated edn"},{"issue":"12","key":"7_CR33","doi-asserted-by":"publisher","first-page":"2021","DOI":"10.1109\/JPROC.2003.819611","volume":"91","author":"L O\u2019Gorman","year":"2003","unstructured":"O\u2019Gorman, L.: Comparing passwords, tokens, and biometrics for user authentication. Proc. IEEE 91(12), 2021\u20132040 (2003)","journal-title":"Proc. IEEE"},{"key":"7_CR34","unstructured":"Parsons, K., McCormac, A., Butavicius, M., Ferguson, L.: Human factors and information security: Individual, culture and security environment (2010)"},{"key":"7_CR35","unstructured":"SafeNet Inc.: Multi-factor authentication: Current usage and trends (2013). http:\/\/www2.safenet-inc.com\/email\/pdf\/Multi_Factor_Authentication_WP_EN_A4_v3_3Apr2013_web.pdf"},{"issue":"2","key":"7_CR36","first-page":"437","volume":"10","author":"HK Sarohi","year":"2013","unstructured":"Sarohi, H.K., Khan, F.U.: Graphical password authentication schemes: current status and key issues. Int. J. Comput. Sci. Issues (IJCSI) 10(2), 437 (2013)","journal-title":"Int. J. Comput. Sci. Issues (IJCSI)"},{"key":"7_CR37","volume-title":"Secrets and Lies: Digital Security in a Networked World","author":"B Schneier","year":"2011","unstructured":"Schneier, B.: Secrets and Lies: Digital Security in a Networked World. Wiley, New York (2011)"},{"key":"7_CR38","volume-title":"Secrets and Lies: Digital Security in a Networked World","author":"B Schneier","year":"2000","unstructured":"Schneier, B.: Secrets and Lies: Digital Security in a Networked World. Wiley, New York (2000)"},{"issue":"6","key":"7_CR39","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1016\/j.cose.2005.07.002","volume":"24","author":"E Schultz","year":"2005","unstructured":"Schultz, E.: The human factor in security. Comput. Secur. 24(6), 425\u2013426 (2005)","journal-title":"Comput. Secur."},{"key":"7_CR40","doi-asserted-by":"crossref","unstructured":"Shahzad, M., Liu, A.X., Samuel, A.: Secure unlocking of mobile touch screen devices by simple gestures: you can see it but you can not do it. In: Proceedings of the 19th Annual International Conference on Mobile Computing & Networking, MobiCom 2013, pp. 39\u201350. ACM, New York (2013). http:\/\/doi.acm.org\/10.1145\/2500423.2500434","DOI":"10.1145\/2500423.2500434"},{"key":"7_CR41","doi-asserted-by":"crossref","unstructured":"Sharif, M., Faiz, T., Raza, M.: Time signatures - an implementation of keystroke and click patterns for practical and secure authentication. In: Third International Conference on Digital Information Management (ICDIM 2008), pp. 559\u2013562. IEEE, Piscataway (2008)","DOI":"10.1109\/ICDIM.2008.4746782"},{"key":"7_CR42","unstructured":"Thiebes, S., Lins, S., Basten, D. (eds.): Gamifying information systems - a synthesis of gamification mechanics and dynamics. In: ECIS, Tel Aviv, Israel (2014)"},{"issue":"1","key":"7_CR43","first-page":"19","volume":"1","author":"D Thornton","year":"2014","unstructured":"Thornton, D., Francia, G.I.: Gamification of information systems and security training: Issues and case studies. Inf. Secur. Edu. J. 1(1), 19\u201329 (2014)","journal-title":"Inf. Secur. Edu. J."},{"key":"7_CR44","doi-asserted-by":"crossref","unstructured":"Uellenbeck, S., D\u00fcrmuth, M., Wolf, C., Holz, T.: Quantifying the security of graphical passwords: the case of android unlock patterns. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS 2013, pp. 161\u2013172. ACM, New York (2013). http:\/\/doi.acm.org\/10.1145\/2508859.2516700","DOI":"10.1145\/2508859.2516700"},{"key":"7_CR45","volume-title":"Pattern Recognition, Machine Intelligence and Biometrics","author":"P Wang","year":"2012","unstructured":"Wang, P.: Pattern Recognition, Machine Intelligence and Biometrics. Springer, Heidelberg (2012)"},{"issue":"5","key":"7_CR46","first-page":"48","volume":"2","author":"KP Yee","year":"2004","unstructured":"Yee, K.P.: Aligning security and usability. IEEE Comput. Soc. 2(5), 48\u201355 (2004)","journal-title":"IEEE Comput. Soc."},{"key":"7_CR47","doi-asserted-by":"crossref","unstructured":"Zakaria, N.H., Griffiths, D., Brostoff, S., Yan, J.: Shoulder surfing defence for recall-based graphical passwords. In: Cranor, L.F. (ed.) Proceedings of the Seventh Symposium on Usable Privacy and Security, vol. 2011, pp. 1\u201312. ACM, New York (2011)","DOI":"10.1145\/2078827.2078835"},{"key":"7_CR48","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1007\/978-3-642-40477-1_28","volume-title":"Human-Computer Interaction \u2013 INTERACT 2013","author":"E von Zezschwitz","year":"2013","unstructured":"von Zezschwitz, E., De Luca, A., Hussmann, H.: Survival of the shortest: a retrospective analysis of influencing factors on password composition. In: Kotz\u00e9, P., Marsden, G., Lindgaard, G., Wesson, J., Winckler, M. (eds.) INTERACT 2013, Part III. LNCS, vol. 8119, pp. 460\u2013467. Springer, Heidelberg (2013)"},{"key":"7_CR49","volume-title":"Gamification by Design: Implementing Game Mechanics in Web and Mobile Apps","author":"G Zichermann","year":"2011","unstructured":"Zichermann, G., Cunningham, C.: Gamification by Design: Implementing Game Mechanics in Web and Mobile Apps, 1st edn. O\u2019Reilly Media, Sebastopol (2011)","edition":"1"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39696-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,21]],"date-time":"2021-05-21T00:06:30Z","timestamp":1621555590000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-39696-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319396958","9783319396965"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39696-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"21 May 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}