{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:44:35Z","timestamp":1743075875931,"version":"3.40.3"},"publisher-location":"Cham","reference-count":65,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319914664"},{"type":"electronic","value":"9783319914671"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91467-1_10","type":"book-chapter","created":{"date-parts":[[2018,6,2]],"date-time":"2018-06-02T08:01:43Z","timestamp":1527926503000},"page":"117-132","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Cognition and Predictors of Password Selection and Usability"],"prefix":"10.1007","author":[{"given":"Lila A.","family":"Loos","sequence":"first","affiliation":[]},{"given":"Martha E.","family":"Crosby","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,3]]},"reference":[{"issue":"12","key":"10_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A Adams","year":"1999","unstructured":"Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40\u201346 (1999)","journal-title":"Commun. ACM"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/978-3-319-07620-1_11","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"P Andriotis","year":"2014","unstructured":"Andriotis, P., Tryfonas, T., Oikonomou, G.: Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 115\u2013126. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07620-1_11"},{"issue":"5","key":"10_CR3","doi-asserted-by":"publisher","first-page":"1328","DOI":"10.1037\/0022-3514.48.5.1328","volume":"48","author":"NM Ashkanasy","year":"1985","unstructured":"Ashkanasy, N.M.: Rotter\u2019s internal-external scale: confirmatory factor analysis and correlation with social desirability for alternative scale formats. J. Pers. Soc. Psychol. 48(5), 1328 (1985)","journal-title":"J. Pers. Soc. Psychol."},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Aurigemma, S., Mattson, T., Leonard, L.: So much promise, so little use: what is stopping home end-users from using password manager applications? In: Proceedings of the 50th Hawaii International Conference on System Sciences (2017)","DOI":"10.24251\/HICSS.2017.490"},{"issue":"5044","key":"10_CR5","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1126\/science.1736359","volume":"255","author":"A Baddeley","year":"1992","unstructured":"Baddeley, A.: Working memory. Science 255(5044), 556\u2013559 (1992)","journal-title":"Science"},{"issue":"1","key":"10_CR6","first-page":"256","volume":"XI","author":"LZ Bain","year":"2010","unstructured":"Bain, L.Z., Hayden, M., Sneesby, S.: An empirical study of user authentication: the perceptions versus practice of strong passwords. Issues Inf. Syst. XI(1), 256\u2013265 (2010)","journal-title":"Issues Inf. Syst."},{"issue":"3","key":"10_CR7","doi-asserted-by":"publisher","first-page":"439","DOI":"10.5465\/amr.1978.4305717","volume":"3","author":"LR Beach","year":"1978","unstructured":"Beach, L.R., Mitchell, T.R.: A contingency model for the selection of decision strategies. Acad. Manag. Rev. 3(3), 439\u2013449 (1978)","journal-title":"Acad. Manag. Rev."},{"issue":"7","key":"10_CR8","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/2699390","volume":"58","author":"J Bonneau","year":"2015","unstructured":"Bonneau, J., Herley, C., Van Oorschot, P.C., Stajano, F.: Passwords and the evolution of imperfect authentication. Commun. ACM 58(7), 78\u201387 (2015)","journal-title":"Commun. ACM"},{"issue":"6","key":"10_CR9","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1002\/acp.1014","volume":"18","author":"AS Brown","year":"2004","unstructured":"Brown, A.S., Bracken, E., Zoccoli, S., Douglas, K.: Generating and remembering passwords. Appl. Cogn. Psychol. 18(6), 641\u2013651 (2004)","journal-title":"Appl. Cogn. Psychol."},{"issue":"12","key":"10_CR10","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.1111\/j.1559-1816.1998.tb01668.x","volume":"28","author":"MA Busseri","year":"1998","unstructured":"Busseri, M.A., Lefcourt, H.M., Kerton, R.R.: Locus of control for consumer outcomes: Predicting consumer behavior. J. Appl. Soc. Psychol. 28(12), 1067\u20131087 (1998)","journal-title":"J. Appl. Soc. Psychol."},{"key":"10_CR11","unstructured":"Calder, A.: ISO27001\/ISO27002 A Pocket Guide. IT Governance Pub (2008)"},{"issue":"7","key":"10_CR12","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/1005817.1005828","volume":"47","author":"H Cavusoglu","year":"2004","unstructured":"Cavusoglu, H., Mishra, B., Raghunathan, S.: A model for evaluating IT security investments. Commun. ACM 47(7), 87\u201392 (2004)","journal-title":"Commun. ACM"},{"issue":"5","key":"10_CR13","doi-asserted-by":"publisher","first-page":"559","DOI":"10.1089\/cpb.2004.7.559","volume":"7","author":"K Chak","year":"2004","unstructured":"Chak, K., Leung, L.: Shyness and locus of control as predictors of internet addiction and internet use. CyberPsychol. Behav. 7(5), 559\u2013570 (2004)","journal-title":"CyberPsychol. Behav."},{"issue":"5","key":"10_CR14","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.1016\/j.jss.2011.12.044","volume":"85","author":"TY Chang","year":"2012","unstructured":"Chang, T.Y., Tsai, C.J., Lin, J.H.: A graphical-based password keystroke dynamic authentication system for touch screen handheld mobile devices. J. Syst. Softw. 85(5), 1157\u20131165 (2012)","journal-title":"J. Syst. Softw."},{"key":"10_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-319-07620-1_12","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"Y-Y Choong","year":"2014","unstructured":"Choong, Y.-Y.: A cognitive-behavioral framework of user password management lifecycle. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 127\u2013137. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07620-1_12"},{"key":"10_CR16","doi-asserted-by":"crossref","unstructured":"Choong, Y.Y., Theofanos, M., Liu, H.K.: United States Federal Employees\u2019 Password Management Behaviors: A Department of Commerce Case Study. US Department of Commerce, National Institute of Standards and Technology (2014)","DOI":"10.6028\/NIST.IR.7991"},{"issue":"2","key":"10_CR17","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1016\/S0160-2896(01)00096-4","volume":"30","author":"AR Conway","year":"2002","unstructured":"Conway, A.R., Cowan, N., Bunting, M.F., Therriault, D.J., Minkoff, S.R.: A latent variable analysis of working memory capacity, short-term memory capacity, processing speed, and general fluid intelligence. Intelligence 30(2), 163\u2013183 (2002)","journal-title":"Intelligence"},{"issue":"3_suppl","key":"10_CR18","doi-asserted-by":"publisher","first-page":"1167","DOI":"10.2466\/pr0.1980.47.3f.1167","volume":"47","author":"MD Coovert","year":"1980","unstructured":"Coovert, M.D., Goldstein, M.: Locus of control as a predictor of users\u2019 attitude toward computers. Psychol. Rep. 47(3_suppl), 1167\u20131173 (1980)","journal-title":"Psychol. Rep."},{"key":"10_CR19","unstructured":"Duffy, T.F.: Why Strong, Unique Passwords Matter - Office of Enterprise (n.d.). http:\/\/ets.hawaii.gov\/why-strong-unique-passwords-matter. Accessed 8 Feb 2018"},{"issue":"1","key":"10_CR20","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1146\/annurev.ps.32.020181.000413","volume":"32","author":"HJ Einhorn","year":"1981","unstructured":"Einhorn, H.J., Hogarth, R.M.: Behavioral decision theory: processes of judgement and choice. Annu. Rev. Psychol. 32(1), 53\u201388 (1981)","journal-title":"Annu. Rev. Psychol."},{"key":"10_CR21","volume-title":"Manual for Kit of Factor-Referenced Cognitive Tests","author":"RB Ekstrom","year":"1976","unstructured":"Ekstrom, R.B., Dermen, D., Harman, H.H.: Manual for Kit of Factor-Referenced Cognitive Tests, vol. 102. Educational Testing Service, Princeton (1976)"},{"issue":"4","key":"10_CR22","doi-asserted-by":"publisher","first-page":"269","DOI":"10.24839\/2164-8204.JN21.4.269","volume":"21","author":"Lezlie Y. Espa\u00f1a","year":"2016","unstructured":"Espa\u00f1a, L.Y.: Effects of password type and memory techniques on user password memory. Psi Chi J. Psychol. Res. 21(4) (2016)","journal-title":"Psi Chi Journal of Psychological Research"},{"key":"10_CR23","doi-asserted-by":"crossref","unstructured":"Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on World Wide Web, pp. 657\u2013666. ACM (2007)","DOI":"10.1145\/1242572.1242661"},{"key":"10_CR24","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1016\/j.tourman.2017.03.002","volume":"61","author":"LHN Fong","year":"2017","unstructured":"Fong, L.H.N., Lam, L.W., Law, R.: How locus of control shapes intention to reuse mobile apps for making hotel reservations: evidence from Chinese consumers. Tour. Manag. 61, 331\u2013342 (2017)","journal-title":"Tour. Manag."},{"key":"10_CR25","doi-asserted-by":"publisher","unstructured":"Forget, A., Biddle, R.: Memorability of persuasive passwords. In: CHI 2008 Extended Abstracts on Human Factors in Computing Systems, pp. 3759\u20133764 (2008). https:\/\/doi.org\/10.1145\/1358628.1358926","DOI":"10.1145\/1358628.1358926"},{"key":"10_CR26","doi-asserted-by":"publisher","unstructured":"Gehringer, E.: Choosing passwords: security and human factors. In: Proceedings of the IEEE 2002 International Symposium on Technology and Society (ISTAS 2002). Social Implications of Information and Communication Technology, (Cat. No.02CH37293) (2002). https:\/\/doi.org\/10.1109\/istas.2002.1013839","DOI":"10.1109\/istas.2002.1013839"},{"key":"10_CR27","doi-asserted-by":"publisher","unstructured":"Grassi, P.A., Garcia, M.E., Fenton, J.L.: Digital identity guidelines (2017). https:\/\/doi.org\/10.6028\/NIST.SP.800-63-3","DOI":"10.6028\/NIST.SP.800-63-3"},{"key":"10_CR28","doi-asserted-by":"crossref","unstructured":"Greene, K.K., Franklin, J.M., Greene, K.K., Kelsey, J.: Measuring the Usability and Security of Permuted Passwords on Mobile Platforms. US Department of Commerce, National Institute of Standards and Technology (2016)","DOI":"10.6028\/NIST.IR.8040"},{"key":"10_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/978-3-319-07620-1_15","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"KK Greene","year":"2014","unstructured":"Greene, K.K., Gallagher, M.A., Stanton, B.C., Lee, P.Y.: I can\u2019t type that! P@$$w0rd entry on mobile devices. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 160\u2013171. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07620-1_15"},{"issue":"11","key":"10_CR30","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1037\/0003-066X.55.11.1217","volume":"55","author":"ET Higgins","year":"2000","unstructured":"Higgins, E.T.: Making a good decision: value from fit. Am. Psychol. 55(11), 1217 (2000)","journal-title":"Am. Psychol."},{"key":"10_CR31","first-page":"1","volume":"5","author":"M Hub","year":"2011","unstructured":"Hub, M., Capek, J., Myskova, R.: Relationship between security and usability-authentication case study. Int. J. Comput. Commun. 5, 1\u20139 (2011)","journal-title":"Int. J. Comput. Commun."},{"issue":"1","key":"10_CR32","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1080\/0144929X.2012.702284","volume":"33","author":"JW Hsia","year":"2014","unstructured":"Hsia, J.W., Chang, C.C., Tseng, A.H.: Effects of individuals\u2019 locus of control and computer self-efficacy on their e-learning acceptance in high-tech companies. Behav. Inf. Technol. 33(1), 51\u201364 (2014)","journal-title":"Behav. Inf. Technol."},{"issue":"4","key":"10_CR33","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1145\/975817.975820","volume":"47","author":"B Ives","year":"2004","unstructured":"Ives, B., Walsh, K.R., Schneider, H.: The domino effect of password reuse. Commun. ACM 47(4), 75\u201378 (2004)","journal-title":"Commun. ACM"},{"issue":"5","key":"10_CR34","doi-asserted-by":"publisher","first-page":"973","DOI":"10.1016\/j.jcss.2014.02.005","volume":"80","author":"J Jang-Jaccard","year":"2014","unstructured":"Jang-Jaccard, J., Nepal, S.: A survey of emerging threats in cybersecurity. J. Comput. Syst. Sci. 80(5), 973\u2013993 (2014)","journal-title":"J. Comput. Syst. Sci."},{"key":"10_CR35","doi-asserted-by":"crossref","unstructured":"Khern-am-nuai, W., Yang, W., Li, N.: Using context-based password strength meter to nudge users\u2019 password generating behavior: a randomized experiment (2016)","DOI":"10.2139\/ssrn.2800499"},{"key":"10_CR36","doi-asserted-by":"publisher","first-page":"172","DOI":"10.1007\/978-3-319-07620-1_16","volume-title":"Lecture Notes in Computer Science","author":"Nina Kolb","year":"2014","unstructured":"Kolb, N., Bartsch, S., Volkamer, M., Vogt, J.: Capturing Attention for Warnings about Insecure Password Fields - Systematic Development of a Passive Security Intervention (2014). https:\/\/doi.org\/10.1007\/978-3-319-07620-1_16"},{"key":"10_CR37","doi-asserted-by":"crossref","unstructured":"Komanduri, S., Shay, R., Kelley, P.G., Mazurek, M.L., Bauer, L., Christin, N., Cranor, L.F., Egelman, S.: Of passwords and people: measuring the effect of password-composition policies. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2595\u20132604. ACM (2011)","DOI":"10.1145\/1978942.1979321"},{"issue":"4","key":"10_CR38","doi-asserted-by":"publisher","first-page":"398","DOI":"10.1207\/s15327752jpa4504_9","volume":"45","author":"RV Lange","year":"1981","unstructured":"Lange, R.V., Tiggemann, M.: Dimensionality and reliability of the Rotter IE locus of control scale. J. Pers. Assess. 45(4), 398\u2013406 (1981)","journal-title":"J. Pers. Assess."},{"key":"10_CR39","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1016\/j.chb.2015.06.021","volume":"52","author":"J Li","year":"2015","unstructured":"Li, J., Lepp, A., Barkley, J.E.: Locus of control and cell phone use: implications for sleep quality, academic performance, and subjective well-being. Comput. Hum. Behav. 52, 450\u2013457 (2015)","journal-title":"Comput. Hum. Behav."},{"issue":"2","key":"10_CR40","doi-asserted-by":"publisher","first-page":"655","DOI":"10.2466\/pr0.1985.57.2.655","volume":"57","author":"JR Lumpkin","year":"1985","unstructured":"Lumpkin, J.R.: Validity of a brief locus of control scale for survey research. Psychol. Rep. 57(2), 655\u2013659 (1985)","journal-title":"Psychol. Rep."},{"issue":"1","key":"10_CR41","first-page":"52","volume":"7","author":"P Madan","year":"2016","unstructured":"Madan, P., Srivastava, S.: Investigating the personality variable (LOC) & impression management relationship: exploring the role of demographic variables & sectoral difference of managers. OPUS 7(1), 52\u201371 (2016)","journal-title":"OPUS"},{"issue":"3","key":"10_CR42","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1002\/j.1556-6676.1998.tb02540.x","volume":"76","author":"LI Marks","year":"1998","unstructured":"Marks, L.I.: Deconstructing locus of control: Implications for practitioners. J. Couns. Dev. 76(3), 251\u2013260 (1998)","journal-title":"J. Couns. Dev."},{"key":"10_CR43","doi-asserted-by":"publisher","first-page":"809","DOI":"10.2307\/25148821","volume":"31","author":"JC McElroy","year":"2007","unstructured":"McElroy, J.C., Hendrickson, A.R., Townsend, A.M., DeMarie, S.M.: Dispositional factors in internet use: personality versus cognitive style. MIS Q. 31, 809\u2013820 (2007)","journal-title":"MIS Q."},{"key":"10_CR44","unstructured":"Michaelian, K., Sutton, J.: Memory. In: Zalta, E.N. (ed.) The Stanford Encyclopedia of Philosophy (2017). https:\/\/plato.stanford.edu\/archives\/sum2017\/entries\/memory"},{"issue":"8","key":"10_CR45","doi-asserted-by":"publisher","first-page":"1057","DOI":"10.1002\/job.416","volume":"27","author":"TW Ng","year":"2006","unstructured":"Ng, T.W., Sorensen, K.L., Eby, L.T.: Locus of control at work: a meta-analysis. J. Organ. Behav. 27(8), 1057\u20131087 (2006)","journal-title":"J. Organ. Behav."},{"key":"10_CR46","volume-title":"The Design of Everyday Things: Revised and Expanded Edition","author":"D Norman","year":"2013","unstructured":"Norman, D.: The Design of Everyday Things: Revised and Expanded Edition. Basic Books AZ, \u200eNew York (2013)"},{"key":"10_CR47","volume-title":"Emotional Design: Why We Love (or Hate) Everyday Things","author":"DA Norman","year":"2004","unstructured":"Norman, D.A.: Emotional Design: Why We Love (or Hate) Everyday Things. Basic Civitas Books, \u200eNew York (2004)"},{"issue":"6","key":"10_CR48","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1145\/1620693.1620708","volume":"16","author":"DA Norman","year":"2009","unstructured":"Norman, D.A.: THE WAY I SEE IT when security gets in the way. Interactions 16(6), 60\u201363 (2009). https:\/\/doi.org\/10.1145\/1620693.1620708","journal-title":"Interactions"},{"key":"10_CR49","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-319-07620-1_24","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"JRC Nurse","year":"2014","unstructured":"Nurse, J.R.C., Legg, P.A., Buckley, O., Agrafiotis, I., Wright, G., Whitty, M., Upton, D., Goldsmith, M., Creese, S.: A critical reflection on the threat from human insiders \u2013 its nature, industry perceptions, and detection approaches. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 270\u2013281. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07620-1_24"},{"issue":"2","key":"10_CR50","doi-asserted-by":"publisher","first-page":"382","DOI":"10.1037\/0033-2909.92.2.382","volume":"92","author":"JW Payne","year":"1982","unstructured":"Payne, J.W.: Contingent decision behavior. Psychol. Bull. 92(2), 382 (1982)","journal-title":"Psychol. Bull."},{"issue":"12","key":"10_CR51","doi-asserted-by":"publisher","first-page":"e51067","DOI":"10.1371\/journal.pone.0051067","volume":"7","author":"DR Pilar","year":"2012","unstructured":"Pilar, D.R., Jaeger, A., Gomes, C.F., Stein, L.M.: Passwords usage and human memory limitations: a survey across age and educational background. PLoS One 7(12), e51067 (2012)","journal-title":"PLoS One"},{"key":"10_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/978-3-319-07620-1_17","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"K Renaud","year":"2014","unstructured":"Renaud, K., Volkamer, M., Maguire, J.: ACCESS: describing and contrasting. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 183\u2013194. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07620-1_17"},{"issue":"1","key":"10_CR53","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1037\/h0092976","volume":"80","author":"JB Rotter","year":"1966","unstructured":"Rotter, J.B.: Generalized expectancies for internal versus external control of reinforcement. Psychol. Monogr.: Gen. Appl. 80(1), 1 (1966)","journal-title":"Psychol. Monogr.: Gen. Appl."},{"issue":"1","key":"10_CR54","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1037\/h0076301","volume":"43","author":"JB Rotter","year":"1975","unstructured":"Rotter, J.B.: Some problems and misconceptions related to the construct of internal versus external control of reinforcement. J. Consult. Clin. Psychol. 43(1), 56 (1975)","journal-title":"J. Consult. Clin. Psychol."},{"issue":"3","key":"10_CR55","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1111\/j.1521-0391.2012.00224.x","volume":"21","author":"C Sheffer","year":"2012","unstructured":"Sheffer, C., MacKillop, J., McGeary, J., Landes, R., Carter, L., Yi, R., Jones, B., Christensen, D., Stitzer, M., Jackson, L., Bickel, W.: Delay discounting, locus of control, and cognitive impulsiveness independently predict tobacco dependence treatment outcomes in a highly dependent, lower socioeconomic group of smokers. Am. J. Addict. 21(3), 221\u2013232 (2012)","journal-title":"Am. J. Addict."},{"issue":"2","key":"10_CR56","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1086\/208799","volume":"7","author":"SM Shugan","year":"1980","unstructured":"Shugan, S.M.: The cost of thinking. J. Consum. Res. 7(2), 99\u2013111 (1980)","journal-title":"J. Consum. Res."},{"key":"10_CR57","unstructured":"Silver, D., Jana, S., Boneh, D., Chen, E.Y., Jackson, C.: Password managers: attacks and defenses. In: USENIX Security Symposium, pp. 449\u2013464 (2014)"},{"issue":"4","key":"10_CR58","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1111\/j.2044-8325.1988.tb00470.x","volume":"61","author":"PE Spector","year":"1988","unstructured":"Spector, P.E.: Development of the work locus of control scale. J. Occup. Organ. Psychol. 61(4), 335\u2013340 (1988)","journal-title":"J. Occup. Organ. Psychol."},{"issue":"3","key":"10_CR59","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1080\/01449290903121386","volume":"29","author":"L Tam","year":"2010","unstructured":"Tam, L., Glassman, M., Vandenwauver, M.: The psychology of password management: a tradeoff between security and convenience. Behav. Inf. Technol. 29(3), 233\u2013244 (2010)","journal-title":"Behav. Inf. Technol."},{"key":"10_CR60","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cogpsych.2014.01.003","volume":"71","author":"N Unsworth","year":"2014","unstructured":"Unsworth, N., Fukuda, K., Awh, E., Vogel, E.K.: Working memory and fluid intelligence: capacity, attention control, and secondary memory retrieval. Cogn. Psychol. 71, 1\u201326 (2014)","journal-title":"Cogn. Psychol."},{"key":"10_CR61","doi-asserted-by":"publisher","unstructured":"Vu, K.L., Cook, J., Bhargav-Spantzel, A., Proctor, R.W.: Short- and long-term retention of passwords generated by first-letter and entire- word mnemonic methods. In: Proceedings of the 5th Annual Security Conference, Las Vegas, NV, pp. 1\u201313 (2006). https:\/\/doi.org\/10.15417\/1881","DOI":"10.15417\/1881"},{"issue":"8","key":"10_CR62","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1016\/j.ijhcs.2007.03.007","volume":"65","author":"KL Vu","year":"2007","unstructured":"Vu, K.L., Proctor, R.W., Bhargav-Spantzel, A., Tai, B., Cook, J., Schultz, E.E.: Improving password security and memorability to protect personal and organizational information. Int. J. Hum Comput Stud. 65(8), 744\u2013757 (2007). https:\/\/doi.org\/10.1016\/j.ijhcs.2007.03.007","journal-title":"Int. J. Hum Comput Stud."},{"issue":"4","key":"10_CR63","doi-asserted-by":"publisher","first-page":"580","DOI":"10.1037\/0022-006X.44.4.580","volume":"44","author":"BS Wallston","year":"1976","unstructured":"Wallston, B.S., Wallston, K.A., Kaplan, G.D., Maides, S.A.: Development and validation of the health locus of control (HLC) scale. J. Consult. Clin. Psychol. 44(4), 580 (1976)","journal-title":"J. Consult. Clin. Psychol."},{"key":"10_CR64","unstructured":"Watkins, S.G.: An introduction to information security and ISO27001. IT Governance Pub (2008)"},{"key":"10_CR65","unstructured":"Wu, T.D.: A real-world analysis of Kerberos password security. In: NDSS (1999)"}],"container-title":["Lecture Notes in Computer Science","Augmented Cognition: Users and Contexts"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91467-1_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,7]],"date-time":"2022-07-07T00:15:52Z","timestamp":1657152952000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-91467-1_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319914664","9783319914671"],"references-count":65,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91467-1_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"3 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Augmented Cognition","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Las Vegas, NV","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ac2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2018.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}