{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T19:54:04Z","timestamp":1725738844955},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642393761"},{"type":"electronic","value":"9783642393778"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39377-8_28","type":"book-chapter","created":{"date-parts":[[2013,7,3]],"date-time":"2013-07-03T08:45:33Z","timestamp":1372841133000},"page":"241-248","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Determinants of Password Security: Some Educational Aspects"],"prefix":"10.1007","author":[{"given":"Lynette","family":"Drevin","sequence":"first","affiliation":[]},{"given":"Hennie","family":"Kruger","sequence":"additional","affiliation":[]},{"given":"Tjaart","family":"Steyn","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Walton, R.: Balancing the insider and outsider threat. Computer Fraud & Security, November 8-11 (2006)","DOI":"10.1016\/S1361-3723(06)70440-7"},{"key":"28_CR2","first-page":"86","volume-title":"Readings and Cases in the Management of Information Security","author":"M.J. Dark","year":"2006","unstructured":"Dark, M.J.: Security education, Training and Awareness from a Human Performance Technology point of view. In: Whitman, M.E., Mattford, H.J. (eds.) Readings and Cases in the Management of Information Security, pp. 86\u2013104. Thomson Course Technology, Boston (2006)"},{"key":"28_CR3","doi-asserted-by":"crossref","unstructured":"Burnett, M., Kleiman, D.: Perfect Passwords. Selection, Protection, Authentication. Syngress (2006)","DOI":"10.1016\/B978-159749041-2\/50004-7"},{"key":"28_CR4","volume-title":"Security in Computing","author":"C.P. Pfleeger","year":"2007","unstructured":"Pfleeger, C.P., Pfleeger, S.L.: Security in Computing, 4th edn. Prentice Hall, Upper Saddle River (2007)","edition":"4"},{"key":"28_CR5","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ijhcs.2005.04.010","volume":"63","author":"S. Wiedenbeck","year":"2005","unstructured":"Wiedenbeck, S., Waters, J., Birget, J., Brodskiy, A., Memon, N.: PassPoints: Design and longitudinal evaluation of a graphical password system. International Journal of Human-Computer Studies\u00a063, 102\u2013127 (2005)","journal-title":"International Journal of Human-Computer Studies"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Singh, S., Cabraal, A., Demosthenous, C., Astbrink, G., Furlong, M.: Password sharing: implications for security design based on social practice. In: CHI Proceedings, April 27-May 3 (2007)","DOI":"10.1145\/1240624.1240759"},{"key":"28_CR7","doi-asserted-by":"crossref","unstructured":"Forget, A., Chiasson, S., Van Oorschot, P., Biddle, R.: Improving text passwords through persuasion. In: Symposium on Usable Privacy and Security, July 23-25 (2008)","DOI":"10.1145\/1408664.1408666"},{"key":"28_CR8","unstructured":"Kruger, H.A., Drevin, L., Steyn, T.: A framework for evaluating ICT security awareness. In: Proceedings of the 2006 ISSA Conference, Johannesburg, South Africa, July 5-7 (2006)"},{"key":"28_CR9","unstructured":"Gollmann, D.: Computer Security. Wiley (1999)"},{"key":"28_CR10","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1016\/j.ijhcs.2007.03.007","volume":"65","author":"K.L. Vu","year":"2007","unstructured":"Vu, K.L., Proctor, R.W., Bhargav-Spantzel, A., Tai, B.L., Cook, J., Schultz, E.: Improving password security and memorability to protect personal and organizational information. International Journal of Human-Computer Studies\u00a065, 744\u2013757 (2007)","journal-title":"International Journal of Human-Computer Studies"},{"key":"28_CR11","volume-title":"Basic Business Statistics. Concepts and Applications","author":"M.L. Berenson","year":"1996","unstructured":"Berenson, M.L., Levine, D.M.: Basic Business Statistics. Concepts and Applications, 6th edn. Prentice Hall, Upper Saddle River (1996)","edition":"6"},{"key":"28_CR12","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1016\/j.cose.2007.09.001","volume":"26","author":"S. Furnell","year":"2007","unstructured":"Furnell, S.: An assessment of website password practices. Computers & Security\u00a026, 445\u2013451 (2007)","journal-title":"Computers & Security"},{"key":"28_CR13","unstructured":"Kruger, H.A., Drevin, L., Steyn, T.: Password management assessment. Technical Report. North-West University, South Africa, FABWI-N-RKW:2008-222 (2008)"},{"key":"28_CR14","unstructured":"Pareto Diagram, \nhttp:\/\/mot.vuse.vanderbilt.edu\/mt322\/Pareto.htm\n\n\n (accessed July 9, 2007)"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Assurance and Security Education and Training"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39377-8_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,15]],"date-time":"2020-03-15T04:40:41Z","timestamp":1584247241000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39377-8_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642393761","9783642393778"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39377-8_28","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2013]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}