{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T05:55:27Z","timestamp":1761630927816,"version":"3.37.3"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2020,11,7]],"date-time":"2020-11-07T00:00:00Z","timestamp":1604707200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,7]],"date-time":"2020-11-07T00:00:00Z","timestamp":1604707200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s00779-020-01477-1","type":"journal-article","created":{"date-parts":[[2020,11,7]],"date-time":"2020-11-07T17:02:45Z","timestamp":1604768565000},"page":"813-827","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["The importance of social identity on password formulations"],"prefix":"10.1007","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6933-0145","authenticated-orcid":false,"given":"Marthie","family":"Grobler","sequence":"first","affiliation":[]},{"given":"M. A. P.","family":"Chamikara","sequence":"additional","affiliation":[]},{"given":"Jacob","family":"Abbott","sequence":"additional","affiliation":[]},{"given":"Jongkil Jay","family":"Jeong","sequence":"additional","affiliation":[]},{"given":"Surya","family":"Nepal","sequence":"additional","affiliation":[]},{"given":"Cecile","family":"Paris","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,7]]},"reference":[{"key":"1477_CR1","unstructured":"Christopher JD (2014) Cybersecurity capability maturity model. Department of Homeland Security"},{"issue":"12","key":"1477_CR2","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A Adams","year":"1999","unstructured":"Adams A, Sasse M (1999) Users are not the enemy. Commun ACM 42(12):40\u201346","journal-title":"Commun ACM"},{"key":"1477_CR3","doi-asserted-by":"crossref","unstructured":"De Donno M, Dragoni N, Giaretta A, Spognardi A (2018) DDoS-capable IoT malwares: comparative analysis and mirai investigation. Security and Communication Networks","DOI":"10.1155\/2018\/7178164"},{"issue":"7","key":"1477_CR4","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MC.2017.201","volume":"50","author":"C Kolias","year":"2017","unstructured":"Kolias C, Kambourakis G, Stavrou S, Voas J (2017) DDoS in the IoT: Mirai and other botnets. Computer 50(7):80\u201384","journal-title":"Computer"},{"key":"1477_CR5","doi-asserted-by":"crossref","unstructured":"Malderle T, Wubbeling M, Knauer S, Sykosch A, Meier M (2018) Gathering and analyzing identity leaks for a proactive warning of affected users. In: Proceedings of the 15th ACM international conference on computing frontiers. pp 208\u20132011, ACM","DOI":"10.1145\/3203217.3203269"},{"key":"1477_CR6","first-page":"1","volume":"11","author":"T Wu","year":"2019","unstructured":"Wu T, Yang Y, Wang C, Wang R (2019) Study on massive-scale slow-hash recovery using unified probabilistic context-free grammar and symmetrical collaborative prioritization with parallel machines. Symmetry 11:1\u201320","journal-title":"Symmetry"},{"key":"1477_CR7","doi-asserted-by":"crossref","unstructured":"Braz C, Seffah A, M\u2019Raihi D (2007) Designing a trade-off between usability and security: a metrics based-model. In: IFIP Conference on human-computer interaction, pp 114\u2013126, Springer","DOI":"10.1007\/978-3-540-74800-7_9"},{"issue":"4","key":"1477_CR8","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1016\/j.cose.2010.12.001","volume":"30","author":"N Gunson","year":"2011","unstructured":"Gunson N, Marshall D, Morton H, Jack M (2011) User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking. Comput Secur 30(4):208\u2013220","journal-title":"Comput Secur"},{"key":"1477_CR9","unstructured":"Anderson CL (2015) Review of national identity programs Pierre Biscaye, Sarah Coney, Eugenia Ho EPAR request no. 306 Brian Hutchinson, Mia Neidhardt C. Leigh Anderson & Travis Reynolds prepared for the Focus Group on Digital Financial Services of the International Telecommunication Union and the Financial Services. Leigh Anderson & Travis Reynolds Prepared for the Focus Group on Digital Financial Services of the International Telecommunication Union and the Financial Services"},{"key":"1477_CR10","first-page":"7","volume":"10","author":"G Wolfond","year":"2017","unstructured":"Wolfond G (2017) A blockchain ecosystem for digital identity: improving service delivery in Canada\u2019s public and private sectors. Technol Innov Manage Rev 10:7","journal-title":"Technol Innov Manage Rev"},{"key":"1477_CR11","doi-asserted-by":"crossref","unstructured":"Petrie H, Merdenyan B (2016) Cultural and gender differences in password behaviors: evidence from China, Turkey and the UK. In: Proceedings of the 9th Nordic conference on human-computer interaction. pp 1\u201310","DOI":"10.1145\/2971485.2971563"},{"key":"1477_CR12","doi-asserted-by":"crossref","unstructured":"Grassi P, Fenton J, Newton E, Perlner R, Regenscheid A, Burr W, Richer J, Lefkovitz N, Danker J, Choong Y et al (2017) Nist special publication 800-63b. digital identity guidelines: authentication and lifecycle management, Bericht NIST","DOI":"10.6028\/NIST.SP.800-63b"},{"key":"1477_CR13","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.cose.2015.10.002","volume":"56","author":"G \u00d6\u011f\u00fct\u00e7\u00fc","year":"2016","unstructured":"\u00d6\u011f\u00fct\u00e7\u00fc G, Testik \u00d6M, Chouseinoglou O (2016) Analysis of personal information security behavior and awareness. Comput Secur 56:83\u201393","journal-title":"Comput Secur"},{"key":"1477_CR14","doi-asserted-by":"crossref","unstructured":"Genc ZA, Karda\u015f S, Kiraz MS (2017) Examination of a new defense mechanism: honeywords. In: IFIP International conference on information security theory and practice. pp 130\u2013139, Springer","DOI":"10.1007\/978-3-319-93524-9_8"},{"key":"1477_CR15","doi-asserted-by":"crossref","unstructured":"Bosnjak L, Brumen B (2016) What do students do with their assigned default passwords?. In: 2016 39th International convention on information and communication technology, electronics and microelectronics (MIPRO). pp 1430\u20131435","DOI":"10.1109\/MIPRO.2016.7522364"},{"issue":"2017","key":"1477_CR16","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1016\/j.chb.2017.05.038","volume":"75","author":"P Van Schaik","year":"2017","unstructured":"Van Schaik P, Jeske D, Onibokun J, Coventry L, Jansen J, Kusev P (2017) Risk perceptions of cyber-security and precautionary behaviour. Comput Human Behav 75(2017):547\u2013559","journal-title":"Comput Human Behav"},{"key":"1477_CR17","unstructured":"Haeussinger F, Kranz J (2017) Antecedents of employees\u2019 information security awareness-review, synthesis, and directions for future research. European Conference on Information Systems (ECIS)"},{"key":"1477_CR18","first-page":"1","volume":"2","author":"J Abbott","year":"2015","unstructured":"Abbott J, Garcia V (2015) Password differences based on language and testing of memory recall. NNGT Int J Inf Secur 2:1\u20136","journal-title":"NNGT Int J Inf Secur"},{"key":"1477_CR19","doi-asserted-by":"crossref","unstructured":"McEvoy P, Still JD (2016) Contextualizing mnemonic phrase passwords. In: Advances in human factors in cybersecurity. pp 295\u2013304, Springer","DOI":"10.1007\/978-3-319-41932-9_24"},{"key":"1477_CR20","unstructured":"Ur B, Noma F, Bees J, Segreti S, Shay R, Bauer L, Christin N, Cranor L (2015) I added \u2018!\u2019 at the end to make it secure: observing password creation in the lab. In: Eleventh symposium on usable privacy and security (SOUPS 2017) USENIX association"},{"key":"1477_CR21","unstructured":"Devillers M (2010) Analyzing password strength, Radboud University Nijmegen, Tech. Rep, vol. 2"},{"issue":"3","key":"1477_CR22","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1080\/01449290903121386","volume":"29","author":"L Tam","year":"2010","unstructured":"Tam L, Glassman M, Vandenwauver M (2010) The psychology of password management: a tradeoff between security and convenience. Behav Inf Technol 29(3):233\u2013244","journal-title":"Behav Inf Technol"},{"key":"1477_CR23","unstructured":"Stobert E, Biddle R (2014) The password life cycle: user behaviour in managing passwords. In: Tenth symposium on usable privacy and security (SOUPS 2017) USENIX association"},{"key":"1477_CR24","unstructured":"Bartsch S, Sasse A (2013) How users bypass access control - and why: the impact of authorization problems on individuals and the organization. In: European conference on information systems (ECIS)"},{"issue":"2018","key":"1477_CR25","first-page":"47","volume":"28","author":"X Gao","year":"2018","unstructured":"Gao X, Yang Y, Liu C, Mitropoulos C, Lindqvist J (2018) Forgetting of passwords: ecological theory and data. Proceedings of the 27th USENIX security symposium 28(2018):47\u201362","journal-title":"Proceedings of the 27th USENIX security symposium"},{"key":"1477_CR26","unstructured":"Ruoti S, Monson T, Wu J, Zappala D, Seamons K (2017) Weighing context and trade-offs: how suburban adults selected their online security posture. In: Thirteenth symposium on usable privacy and security (SOUPS 2017) USENIX association"},{"issue":"2","key":"1477_CR27","first-page":"293","volume":"9","author":"Z Liu","year":"2014","unstructured":"Liu Z, Hong Y, Pi D (2014) A large-scale study of Web password habits of Chinese network users. J Soc Work 9(2):293\u2013297","journal-title":"J Soc Work"},{"issue":"1","key":"1477_CR28","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/TEM.2015.2488698","volume":"63","author":"P Song","year":"2016","unstructured":"Song P, Wei Phang C (2016) Promoting continuance through shaping members\u2019 social identity in knowledge-based versus support\/advocacy virtual communities. IEEE Transactions on Engineering Management 63(1):16\u201326","journal-title":"IEEE Transactions on Engineering Management"},{"key":"1477_CR29","unstructured":"Yan Q, Wu L, Yi L (2012) Influence of social identity on information release in microblog. 2012 Second International Conference on Intelligent System Design and Engineering Application"},{"key":"1477_CR30","doi-asserted-by":"crossref","unstructured":"Fahl S, Harbach M, Acar Y, Smith M (2013) On the ecological validity of a password study. In: Ninth symposium on usable privacy and security (SOUPS 2013) USENIX association","DOI":"10.1145\/2501604.2501617"},{"key":"1477_CR31","unstructured":"HackRead (2017) Anti public combo list with billions of accounts leaked"},{"key":"1477_CR32","unstructured":"Choudhary R (2017) Anti public combo list, leaked email passwords check have you been pwned"},{"key":"1477_CR33","unstructured":"International Assigned Numbers Authority Root zone database"},{"key":"1477_CR34","doi-asserted-by":"crossref","unstructured":"Burr W, Dodson D, Newton E, Perlner R, Polk W, Gupta S, Nabbus E (2013) Nist special publication 800-63-2. electronic authentication guideline, Computer Security Resource Center NIST","DOI":"10.6028\/NIST.SP.800-63-2"},{"key":"1477_CR35","unstructured":"Anderson C (2018) Top 10 most spoken languages in the world"},{"issue":"6","key":"1477_CR36","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1109\/TPAMI.2007.1078","volume":"29","author":"L Yujian","year":"2007","unstructured":"Yujian L, Bo L (2007) A normalized Levenshtein distance metric. IEEE Trans Pattern Anal Mach Intell 29(6):1091\u20131095","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"1477_CR37","unstructured":"Campbell M (2018) Behind the name: meaning of names, baby name meanings"},{"key":"1477_CR38","doi-asserted-by":"crossref","unstructured":"Haunts S (2019) What are data breaches?. Applied Cryptography in.NET and Azure Key Vault 1\u201310","DOI":"10.1007\/978-1-4842-4375-6_1"},{"key":"1477_CR39","unstructured":"Rodrigues B, Paiva J, Gomes V, Morris C, Calixto W (2017) Passfault: an open source tool for measuring password complexity and strength, Orlando, Florida, Mar"},{"key":"1477_CR40","unstructured":"LastPass (2020) Psychology of passwords: The online behavior that\u2019s putting you at risk. https:\/\/lp-cdn.lastpass.com\/lporcamedia\/document-library\/lastpass\/pdf\/en\/LastPass-B2C-Assets-Ebook.pdf\/. Available at https:\/\/lp-cdn.lastpass.com\/lporcamedia\/documentlibrary\/lastpass\/pdf\/en\/LastPass-B2C-Assets-Ebook.pdf\/"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-020-01477-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00779-020-01477-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-020-01477-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,7]],"date-time":"2021-10-07T05:00:53Z","timestamp":1633582853000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00779-020-01477-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,7]]},"references-count":40,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["1477"],"URL":"https:\/\/doi.org\/10.1007\/s00779-020-01477-1","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"type":"print","value":"1617-4909"},{"type":"electronic","value":"1617-4917"}],"subject":[],"published":{"date-parts":[[2020,11,7]]},"assertion":[{"value":"11 March 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2020","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 November 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}