{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:57:43Z","timestamp":1743105463778,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819750276"},{"type":"electronic","value":"9789819750283"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-981-97-5028-3_20","type":"book-chapter","created":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T16:02:12Z","timestamp":1721059332000},"page":"393-411","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Deep Dive on\u00a0Relationship Between Personality and\u00a0Password Creation"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5028-035X","authenticated-orcid":false,"given":"Madeline","family":"Moran","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Arrianna","family":"Szymczak","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Anna","family":"Hart","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9298-3152","authenticated-orcid":false,"given":"Shelia","family":"Kennison","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8367-5836","authenticated-orcid":false,"given":"Eric","family":"Chan-Tin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2024,7,16]]},"reference":[{"key":"20_CR1","doi-asserted-by":"publisher","unstructured":"Bakas, A., Wagner, A., Johnston, S., Kennison, S., Chan-Tin, E.: Impact of personality types and matching messaging on password strength. EAI Endorsed Trans. Secur. Saf. 8(28) (2021). https:\/\/doi.org\/10.4108\/eai.1-6-2021.170012","DOI":"10.4108\/eai.1-6-2021.170012"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Brannon, L.A., Brock, T.C.: Test of schema correspondence theory of persuasion: effects of matching an appeal to actual, ideal, and product \u201cSelves\u201d. In: Clark, E.M., Brock, T.C., Stewart, D.W. (eds.), Attention, Attitude, and Affect in Response to Advertising, pp. 169\u2013188. Lawrence Erlbaum Associates, Inc. (1994)","DOI":"10.4324\/9781315807386-10"},{"issue":"2","key":"20_CR3","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1109\/MSP.2010.198","volume":"9","author":"C Bravo-Lillo","year":"2011","unstructured":"Bravo-Lillo, C., Cranor, L.F., Downs, J., Komanduri, S.: Bridging the gap in computer security warnings: a mental model approach. IEEE Secur. Priv. 9(2), 18\u201326 (2011)","journal-title":"IEEE Secur. Priv."},{"key":"20_CR4","doi-asserted-by":"publisher","unstructured":"Bryant, K., Campbell, J.: User behaviours associated with password security and management. Australasian J. Inf. Syst. 14(1) (2006). https:\/\/doi.org\/10.3127\/ajis.v14i1.9","DOI":"10.3127\/ajis.v14i1.9"},{"key":"20_CR5","doi-asserted-by":"publisher","unstructured":"Crews, T.B., Bodenhamer, J., Weaver, T.: Understanding true colors personality trait spectrums of hotel, restaurant, and tourism management students to enhance classroom instruction. J. Teach. Travel Tour. 10(1), 22\u201341 (2010). https:\/\/doi.org\/10.1080\/15313220903558538, https:\/\/doi.org\/10.1080\/15313220903558538","DOI":"10.1080\/15313220903558538"},{"key":"20_CR6","unstructured":"Dropbox: zxcvbn (2017). https:\/\/github.com\/dropbox\/zxcvbn"},{"key":"20_CR7","unstructured":"Weber, E.U., Blais, A.-R., Betz, N.E.: A domain-specific risk-attitude scale: measuring risk perceptions and risk behaviors. https:\/\/psycnet.apa.org\/doi\/10.1037\/t01397-000. Accessed 2023"},{"issue":"13","key":"20_CR8","doi-asserted-by":"publisher","first-page":"2361","DOI":"10.1002\/sec.1184","volume":"8","author":"M Farcasin","year":"2015","unstructured":"Farcasin, M., Chan-tin, E.: Why we hate it: two surveys on pre-generated and expiring passwords in an academic setting. Secur. Commun. Networks 8(13), 2361\u20132373 (2015). https:\/\/doi.org\/10.1002\/sec.1184","journal-title":"Secur. Commun. Networks"},{"key":"20_CR9","doi-asserted-by":"publisher","unstructured":"Gaw, S., Felten, E.W.: Password management strategies for online accounts. In: Proceedings of the Second Symposium on Usable Privacy and Security. SOUPS \u201906, New York, NY, USA, pp. 44\u201355. Association for Computing Machinery (2006). https:\/\/doi.org\/10.1145\/1143120.1143127","DOI":"10.1145\/1143120.1143127"},{"key":"20_CR10","unstructured":"Hebblethwaite, C.: The average person has 7 social media accounts. https:\/\/marketingtechnews.net\/news\/2017\/nov\/17\/average-person-has-7-social-media-accounts\/. Accessed 2020"},{"key":"20_CR11","doi-asserted-by":"publisher","unstructured":"Herley, C.: So long, and no thanks for the externalities: The rational rejection of security advice by users. In: Proceedings of the 2009 Workshop on New Security Paradigms Workshop. NSPW \u201909, New York, NY, USA, pp. 133\u2013144. Association for Computing Machinery (2009). https:\/\/doi.org\/10.1145\/1719030.1719050","DOI":"10.1145\/1719030.1719050"},{"key":"20_CR12","unstructured":"International, T.C. (2013). https:\/\/www.truecolorsintl.com\/research-precis"},{"key":"20_CR13","unstructured":"Underwood, J., Aldrich, E.: U.S. Consumer Banking Statistics 2023 (2023). https:\/\/www.forbes.com\/advisor\/banking\/banking-trends-and-statistics\/"},{"key":"20_CR14","doi-asserted-by":"publisher","first-page":"3030","DOI":"10.3389\/fpsyg.2020.546546","volume":"11","author":"SM Kennison","year":"2020","unstructured":"Kennison, S.M., Chan-Tin, E.: Taking risks with cybersecurity: using knowledge and personal characteristics to predict self-reported cybersecurity behaviors. Front. Psychol. 11, 3030 (2020)","journal-title":"Front. Psychol."},{"key":"20_CR15","doi-asserted-by":"publisher","unstructured":"Kennison, S.M., Jones, I.T., Spooner, V.H., Chan-Tin, D.E.: Who creates strong passwords when nudging fails. Comput. Hum. Behavior Rep. 4, 100132 (2021). https:\/\/doi.org\/10.1016\/j.chbr.2021.100132, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2451958821000804","DOI":"10.1016\/j.chbr.2021.100132"},{"key":"20_CR16","unstructured":"LastPass: Psychology of Passwords (2021). https:\/\/www.lastpass.com\/-\/media\/9fe0bf5dc473413b8ab4df3bd8688295.pdf"},{"key":"20_CR17","unstructured":"Lord, N.: Uncovering Password Habits: Are Users\u2019 Password Security Habits Improving? (2020). https:\/\/www.digitalguardian.com\/blog\/uncovering-password-habits-are-users-password-security-habits-improving-infographic"},{"key":"20_CR18","unstructured":"Poll, G.H.: The United States of P@ssw0rd\\$ (2019). https:\/\/storage.googleapis.com\/gweb-uniblog-publish-prod\/documents\/PasswordCheckup-HarrisPoll-InfographicFINAL.pdf"},{"key":"20_CR19","unstructured":"Ray, H., Wolf, F., Kuber, R., Aviv, A.J.: Why older adults (don\u2019t) use password managers. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 73\u201390 (2021)"},{"key":"20_CR20","doi-asserted-by":"publisher","unstructured":"Shay, R., et al.: Encountering stronger password requirements: user attitudes and behaviors. In: Proceedings of the Sixth Symposium on Usable Privacy and Security. SOUPS \u201910, New York, NY, USA. Association for Computing Machinery (2010). https:\/\/doi.org\/10.1145\/1837110.1837113","DOI":"10.1145\/1837110.1837113"},{"key":"20_CR21","first-page":"91","volume":"2","author":"C Simon","year":"2018","unstructured":"Simon, C., Tagliabue, M.: Feeding the behavioral revolution: contributions of behavior analysis to nudging and vice versa. J. Behav. Econo. Policy 2, 91\u201397 (2018)","journal-title":"J. Behav. Econo. Policy"},{"key":"20_CR22","unstructured":"True Colors: The four color personalities: True colors intl.: Personality assessment training. http:\/\/www.truecolorsintl.com\/. Accessed 2023"},{"key":"20_CR23","doi-asserted-by":"publisher","unstructured":"Weirich, D., Sasse, M.A.: Pretty good persuasion: a first step towards effective password security in the real world. In: Proceedings of the 2001 Workshop on New Security Paradigms, New York, NY, USA, pp. 137\u2013143. NSPW \u201901, Association for Computing Machinery (2001). https:\/\/doi.org\/10.1145\/508171.508195","DOI":"10.1145\/508171.508195"},{"issue":"3","key":"20_CR24","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1080\/10410236.2011.585450","volume":"27","author":"VK York","year":"2012","unstructured":"York, V.K., Brannon, L.A., Miller, M.M.: Increasing the effectiveness of messages promoting responsible undergraduate drinking: tailoring to personality and matching to context. Health Commun. 27(3), 302\u2013309 (2012)","journal-title":"Health Commun."},{"key":"20_CR25","doi-asserted-by":"crossref","unstructured":"Zimbardo, P. G., \u2018I &\u2018 Boyd, J. N.: A domain-specific risk-attitude scale: measuring risk perceptions and risk behaviors. https:\/\/doi.org\/10.1002\/bdm.414. Accessed 2023","DOI":"10.1002\/bdm.414"}],"container-title":["Lecture Notes in Computer Science","Information Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-97-5028-3_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,15]],"date-time":"2024-07-15T16:08:11Z","timestamp":1721059691000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-97-5028-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9789819750276","9789819750283"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-97-5028-3_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"16 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACISP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australasian Conference on Information Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 July 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 July 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"acisp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.acisp24.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}