{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T02:19:30Z","timestamp":1773973170480,"version":"3.50.1"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2019,4,11]],"date-time":"2019-04-11T00:00:00Z","timestamp":1554940800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100000838","name":"University of Sussex","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100000838","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s10207-019-00429-y","type":"journal-article","created":{"date-parts":[[2019,4,11]],"date-time":"2019-04-11T09:16:13Z","timestamp":1554974173000},"page":"741-759","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":85,"title":["Encouraging users to improve password security and memorability"],"prefix":"10.1007","volume":"18","author":[{"given":"M.","family":"Y\u0131ld\u0131r\u0131m","sequence":"first","affiliation":[]},{"given":"I.","family":"Mackie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,11]]},"reference":[{"issue":"12","key":"429_CR1","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A Adams","year":"1999","unstructured":"Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40\u201346 (1999). \n                    https:\/\/doi.org\/10.1145\/322796.322806","journal-title":"Commun. ACM"},{"issue":"3","key":"429_CR2","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1016\/0167-4048(84)90040-3","volume":"3","author":"BF Barton","year":"1984","unstructured":"Barton, B.F., Barton, M.S.: User-friendly password methods for computer-mediated information systems. Comput. Secur. 3(3), 186\u2013195 (1984)","journal-title":"Comput. Secur."},{"issue":"3","key":"429_CR3","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1016\/0167-4048(95)00003-Q","volume":"14","author":"M Bishop","year":"1995","unstructured":"Bishop, M., Klein, D.V.: Improving system security via proactive password checking. Comput. Secur. 14(3), 233\u2013249 (1995)","journal-title":"Comput. Secur."},{"key":"429_CR4","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Herley, C., van Oorschot, P.C., Stajano, F.: The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: Security & Privacy (SP), IEEE Symposium, pp. 553\u2013567 (2012)","DOI":"10.1109\/SP.2012.44"},{"key":"429_CR5","volume-title":"Perfect Passwords","year":"2006","unstructured":"Burnett, M., Kleiman, D. (eds.): Perfect Passwords. Syngress Publishing, Inc, Massachusetts (2006)"},{"key":"429_CR6","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-63v1.0.2","volume-title":"Electronic Authentication Guideline. Special Publication 800-63 Version 1.0.2","author":"W Burr","year":"2006","unstructured":"Burr, W., Dodson, D., Polk, W.: Electronic Authentication Guideline. Special Publication 800-63 Version 1.0.2. National Institute of Standards and Technology (NIST), Gaithersburg (2006)"},{"key":"429_CR7","unstructured":"Campbell, J., Ma, W., Kleeman, D.: Password composition policy: does enforcement lead to better password choices. In: Proceedings of the 17th Australian Conference on Information Systems, pp. 60\u201369 (2006)"},{"key":"429_CR8","first-page":"67","volume":"7","author":"DS Carstens","year":"2004","unstructured":"Carstens, D.S., McCauley-Bell, P.R., Malone, L.C., DeMara, R.F.: Evaluation of the human impact of password authentication practices on information security. Inf. Sci. J. 7, 67\u201385 (2004)","journal-title":"Inf. Sci. J."},{"key":"429_CR9","first-page":"97","volume":"1","author":"DS Carstens","year":"2006","unstructured":"Carstens, D.S., Malone, L.C., McCauley-Bell, P.: Applying chunking theory in organizational password guidelines. J. Inf. Inf. Technol. Organ. 1, 97\u2013113 (2006)","journal-title":"J. Inf. Inf. Technol. Organ."},{"key":"429_CR10","unstructured":"Castelluccia, C., Duermuth, M., Perito, D.: Adaptive password-strength meters from Markov models. In: Network and Distributed System Security Symposium (NDSS, ISOC) (2012)"},{"key":"429_CR11","doi-asserted-by":"crossref","unstructured":"Chiasson, S., Biddle, R., van Oorschot, P.C.: A second look at the usability of click-based graphical password. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, pp. 1\u201312. ACM (2007)","DOI":"10.1145\/1280680.1280682"},{"key":"429_CR12","doi-asserted-by":"crossref","unstructured":"Chiasson, S., Forget, A., Stobert, E., van Oorschot, P., Biddle, R.: Multiple password interference in text and click-based graphical passwords. In: ACM Computer and Communications Security (CCS) (2009)","DOI":"10.1145\/1653662.1653722"},{"issue":"9","key":"429_CR13","first-page":"72","volume":"79","author":"RB Cialdini","year":"2001","unstructured":"Cialdini, R.B.: Harnessing the science of persuasion. Harv. Bus. Rev. 79(9), 72\u201381 (2001)","journal-title":"Harv. Bus. Rev."},{"key":"429_CR14","doi-asserted-by":"crossref","unstructured":"Clair, L.S., Johansen, L., Enck, W., Pirretti, M., Traynor, P., McDaniel, P., Jaeger, T.: Password exhaustion: predicting the end of password usefulness. In: International Conference on Information Systems Security, pp. 37\u201355. Springer (2006)","DOI":"10.1007\/11961635_3"},{"key":"429_CR15","unstructured":"Collider, S.: How secure is my password? Howsecureismypassword.net. \n                    https:\/\/howsecureismypassword.net\n                    \n                   (2016). Accessed 14 Jan 2017"},{"key":"429_CR16","doi-asserted-by":"crossref","unstructured":"Colnago, J., Devlin, S., Oates, M., Swoopes, C., Bauer, L., Cranor, L., Christin, N.: \u201cIt\u2019s not actually that horrible\u201d: exploring adoption of two-factor authentication at a university. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, CHI \u201918, pp. 1\u201311. ACM, New York, NY, USA (2018)","DOI":"10.1145\/3173574.3174030"},{"issue":"1","key":"429_CR17","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1017\/S0140525X01003922","volume":"24","author":"N Cowan","year":"2001","unstructured":"Cowan, N.: The magical number 4 in short-term memory: a reconsideration of mental storage capacity. Behav. Brain Sci. 24(1), 87\u2013114 (2001)","journal-title":"Behav. Brain Sci."},{"key":"429_CR18","doi-asserted-by":"crossref","unstructured":"Everitt, K.M., Bragin, T., Fogarty, J., Kohno, T.: A comprehensive study of frequency, interference, and training of multiple graphical passwords. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 889\u2013898. ACM(2009)","DOI":"10.1145\/1518701.1518837"},{"key":"429_CR19","doi-asserted-by":"publisher","unstructured":"Florencio, D., Herley, C.: A large-scale study of web password habits. In: Proceedings of the 16th International Conference on World Wide Web, WWW \u201907, pp. 657\u2013666. ACM, New York, NY, USA (2007). \n                    https:\/\/doi.org\/10.1145\/1242572.1242661","DOI":"10.1145\/1242572.1242661"},{"key":"429_CR20","doi-asserted-by":"publisher","unstructured":"Florencio, D., Herley, C.: Where do security policies come from? In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS \u201910, pp. 1\u201314. ACM, New York, NY, USA (2010). \n                    https:\/\/doi.org\/10.1145\/1837110.1837124","DOI":"10.1145\/1837110.1837124"},{"key":"429_CR21","unstructured":"Florencio, D., Herley, C., van Oorschot, P.C.: Password portfolios and the finite-effort user: sustainably managing large numbers of accounts. In: Proceedings USENIX Security, pp. 575\u2013590 (2014)"},{"key":"429_CR22","unstructured":"Forget, A.: A world with many authentication scheme. Ph.D. thesis, Carleton University, Ottawa, Ontario (2012)"},{"issue":"7","key":"429_CR23","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1016\/j.cose.2007.09.001","volume":"26","author":"S Furnell","year":"2007","unstructured":"Furnell, S.: An assessment of website password practices. Comput. Secur. 26(7), 445\u2013451 (2007)","journal-title":"Comput. Secur."},{"key":"429_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2018.01.016","volume":"75","author":"S Furnell","year":"2018","unstructured":"Furnell, S., Esmael, R., Yang, W., Li, N.: Enhancing security behaviour by supporting the user. Comput. Secur. 75, 1\u20139 (2018)","journal-title":"Comput. Secur."},{"issue":"5","key":"429_CR25","first-page":"70","volume":"78","author":"CP Garrison","year":"2008","unstructured":"Garrison, C.P.: An evaluation of passwords. CPA J. 78(5), 70 (2008)","journal-title":"CPA J."},{"key":"429_CR26","doi-asserted-by":"crossref","unstructured":"Goldberg, J., Hagman, J., Sazawal, V.: Doodling our way to better authentication. In: CHI Extended Abstracts on Human Factors in Computing Systems, pp. 868\u2013869. ACM (2002)","DOI":"10.1145\/506443.506639"},{"key":"429_CR27","volume-title":"Digital Identity Guidelines. Special Publication (NIST SP) 800-63-3","author":"PA Grassi","year":"2017","unstructured":"Grassi, P.A., Garcia, M.E., Fenton, J.L.: Digital Identity Guidelines. Special Publication (NIST SP) 800-63-3. NIST, Gaithersburg (2017)"},{"issue":"3","key":"429_CR28","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1016\/j.intcom.2011.03.007","volume":"23","author":"B Grawmeyer","year":"2011","unstructured":"Grawmeyer, B., Johnson, H.: Using multiple password: a week to a view. Interact. Comput. 23(3), 256\u2013267 (2011)","journal-title":"Interact. Comput."},{"key":"429_CR29","doi-asserted-by":"crossref","unstructured":"Habib, H., Colnago, J., Melicher, W., Ur, B., Segreti, S.M., Bauer, L., Christin, N., Cranor, L.F.: Password creation in the presence of blacklists. In: Workshop on Usable Security, USEC \u201917, Internet Society (2017)","DOI":"10.14722\/usec.2017.23043"},{"key":"429_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-642-03549-4_14","volume-title":"Financial Cryptography and Data Security, FC 2009","author":"C Herley","year":"2009","unstructured":"Herley, C., van Oorschot, P., Patrick, A.: Passwords: If we\u2019re so smart, why are we still using them? In: Dingledine, R., Golle, P. (eds.) Financial Cryptography and Data Security, FC 2009. Lecture Notes in Computer Science, vol. 5628, pp. 230\u2013237. Springer, Berlin (2009)"},{"issue":"1","key":"429_CR31","first-page":"1","volume":"5","author":"M Hub","year":"2011","unstructured":"Hub, M., \u010capek, J., My\u0161kov\u00e1, R.: Relationship between security and usability-authentication case study. Int. J. Comput. Commun. 5(1), 1\u20139 (2011)","journal-title":"Int. J. Comput. Commun."},{"key":"429_CR32","doi-asserted-by":"publisher","unstructured":"Inglesant, P.G., Sasse, M.A.: The true cost of unusable password policies: Password use in the wild. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI \u201910, pp. 383\u2013392. ACM, New York, NY, USA (2010). \n                    https:\/\/doi.org\/10.1145\/1753326.1753384","DOI":"10.1145\/1753326.1753384"},{"key":"429_CR33","doi-asserted-by":"publisher","unstructured":"Jeyaraman, S., Topkara, U.: Have the cake and eat it too - infusing usability into text-password based authentication systems. In: Proceedings of the 21st Annual Computer Security Applications Conference, ACSAC \u201905, pp. 473\u2013482. IEEE Computer Society, Washington, DC, USA (2005). \n                    https:\/\/doi.org\/10.1109\/CSAC.2005.28","DOI":"10.1109\/CSAC.2005.28"},{"issue":"1","key":"429_CR34","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.ijhcs.2006.08.005","volume":"65","author":"M Keith","year":"2007","unstructured":"Keith, M., Shao, B., Steinbart, P.J.: The usability of passphrases for authentication: an empirical field study. Int. J. Hum. Comput. Stud. 65(1), 17\u201328 (2007)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"429_CR35","doi-asserted-by":"crossref","unstructured":"Kelley, P.G., Komanduri, S., Mazurek, M.L., Shay, R., Vidas, T., Bauer, L., Christin, N., Cranor, L.F., Lopez, J.: Guess again (and again and again): measuring password strength by simulating password-cracking algorithms. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy, pp. 523\u2013537. IEEE (2012)","DOI":"10.1109\/SP.2012.38"},{"key":"429_CR36","unstructured":"Klein, D.V.: Foiling the cracker: a survey of, and improvements to, password security. In: Proceedings of the 2nd USENIX Security Workshop, pp. 5\u201314 (1990)"},{"key":"429_CR37","doi-asserted-by":"crossref","unstructured":"Knieriem, B., Zhang, X., Levine, P., Breitinger, F., Baggili, I.: An overview of the usage of default passwords. In: Matou\u0161ek, P., Schmiedecker, M. (eds.) Digital Forensics and Cyber Crime. ICDF2C 2017, Springer, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 216, pp. 195\u2013203 (2018)","DOI":"10.1007\/978-3-319-73697-6_15"},{"key":"429_CR38","doi-asserted-by":"crossref","unstructured":"Komanduri, S., Shay, R., Kelly, P.G., Mazurek, M.L., Bauer, L., Christin, N., Egelman, S.: Of passwords and people: Measuring the effect of password-composition policies. In: Proceedings of the Human Factors and Computing Systems, pp. 2595\u20132604. ACM (2011)","DOI":"10.1145\/1978942.1979321"},{"key":"429_CR39","unstructured":"Kotadia, M.: Gates predicts death of the password. \n                    https:\/\/www.cnet.com\/news\/gates-predicts-death-of-the-password\/\n                    \n                   (2014). Accessed 10 May 2014"},{"key":"429_CR40","volume-title":"Foundations of Statistical Natural Language Processing","author":"CD Manning","year":"1999","unstructured":"Manning, C.D., Schutze, H.: Foundations of Statistical Natural Language Processing. The MIT press, Cambridge (1999)"},{"issue":"2","key":"429_CR41","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1037\/h0043158","volume":"63","author":"GA Miller","year":"1956","unstructured":"Miller, G.A.: The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychol. Rev. 63(2), 81 (1956)","journal-title":"Psychol. Rev."},{"key":"429_CR42","doi-asserted-by":"crossref","unstructured":"Moncur, W., Lepl\u00e2tre, G.: Pictures at the atm: exploring the usability of multiple graphical passwords. In: Proceedings of the SIGCHI conference on Human factors in computing system, pp. 887\u2013894 (2007)","DOI":"10.1145\/1240624.1240758"},{"key":"429_CR43","doi-asserted-by":"crossref","unstructured":"Murray, H., Malone, D.: Evaluating password advice. In: 28th Irish Signals and Systems Conference (ISSC), pp. 1\u20136 (2017)","DOI":"10.1109\/ISSC.2017.7983609"},{"key":"429_CR44","doi-asserted-by":"publisher","unstructured":"Nithyanand, R., Johnson, R.: The password allocation problem: strategies for reusing passwords effectively. In: Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, WPES \u201913, pp. 255\u2013260. ACM, New York, NY, USA (2013). \n                    https:\/\/doi.org\/10.1145\/2517840.2517870","DOI":"10.1145\/2517840.2517870"},{"key":"429_CR45","unstructured":"Passwordmetercom: password strength checker. \n                    http:\/\/www.passwordmeter.com\n                    \n                   (2017). Accessed 5 Jan 2017"},{"key":"429_CR46","doi-asserted-by":"publisher","DOI":"10.4324\/9781315657714","volume-title":"The Dynamics of Persuasion","author":"RM Perloff","year":"2016","unstructured":"Perloff, R.M.: The Dynamics of Persuasion. Taylor and Francis, London (2016)"},{"issue":"2","key":"429_CR47","doi-asserted-by":"publisher","first-page":"163","DOI":"10.3758\/BF03195438","volume":"34","author":"RW Proctor","year":"2002","unstructured":"Proctor, R.W., Lien, M.C., Vu, K.P.L., Schultz, E.E., Salvendy, G.: Improving computer security for authentication of users: influence of proactive password restrictions. Behav. Res. Methods 34(2), 163\u2013169 (2002)","journal-title":"Behav. Res. Methods"},{"key":"429_CR48","unstructured":"Roig, J.: Do smarter people have better passwords? (2018). \n                    arXiv:1805.02931"},{"issue":"1","key":"429_CR49","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1002\/j.1538-7305.1951.tb01366.x","volume":"30","author":"CE Shannon","year":"1951","unstructured":"Shannon, C.E.: Prediction and entropy of printed english. Bell Syst. Tech. J. 30(1), 50\u201364 (1951). \n                    https:\/\/doi.org\/10.1002\/j.1538-7305.1951.tb01366.x","journal-title":"Bell Syst. Tech. J."},{"key":"429_CR50","doi-asserted-by":"publisher","unstructured":"Shay, R., Komanduri, S., Kelley, P.G., Leon, P.G., Mazurek, M.L., Bauer, L., Christin, N., Cranor, L.F.: Encountering stronger password requirements: User attitudes and behaviors. In: Proceedings of the Sixth Symposium on Usable Privacy and Security, SOUPS \u201910, pp. 1\u201320. ACM, New York, NY, USA (2010). \n                    https:\/\/doi.org\/10.1145\/1837110.1837113","DOI":"10.1145\/1837110.1837113"},{"key":"429_CR51","doi-asserted-by":"publisher","unstructured":"Shay, R., Kelley, P.G., Komanduri, S., Mazurek, M.L., Ur, B., Vidas, T., Bauer, L., Christin, N., Cranor, L.F.: Correct horse battery staple: Exploring the usability of system-assigned passphrases. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS \u201912, pp. 1\u201320. ACM, New York, NY, USA (2012). \n                    https:\/\/doi.org\/10.1145\/2335356.2335366","DOI":"10.1145\/2335356.2335366"},{"key":"429_CR52","unstructured":"Summers, W., Bosworth, E.: Password policy: the good, the bad, and the ugly. In: Proceedings of the Winter International Symposium on Information and Communication Technologies, pp. 1\u20136. ACM (2004)"},{"key":"429_CR53","doi-asserted-by":"publisher","unstructured":"Thorpe J, MacRae, B., Salehi-Abari, A.: Usability and security evaluation of geopass: A geographic location-password scheme. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, SOUPS \u201913, pp. 1\u201314. ACM, New York, NY, USA (2013). \n                    https:\/\/doi.org\/10.1145\/2501604.2501618","DOI":"10.1145\/2501604.2501618"},{"key":"429_CR54","unstructured":"Topkara, U., Topkara, M., Atallah, M.J.: Passwords for everyone: secure mnemonic-based accessible authentication. In: USENIX Annual Technical Conference, pp. 369\u2013374 (2007)"},{"key":"429_CR55","unstructured":"Ur, B., Kelley, P.G., Komanduri, S., Lee, J., Maass, M., Mazurek, M.L., Passaro, T., Shay, R., Vidas, T., Bauer, L., Christin, N., Cranor, L.F.: How does your password measure up? The effect of strength meters on password creation. In: Presented as Part of the 21st USENIX Security Symposium (USENIX Security 12), USENIX, Bellevue, WA, pp. 65\u201380 (2012)"},{"key":"429_CR56","unstructured":"Ur, B., Noma, F., Bees, J., Segreti, S.M., Shay, R., Bauer, L., Christin, N., Cranor, L.F.: \u201di added \u2019!\u2019 at the end to make it secure\u201d: Observing password creation in the lab. In: Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), USENIX Association, Ottawa, pp. 123\u2013140 (2015)"},{"issue":"8","key":"429_CR57","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1016\/j.ijhcs.2007.03.007","volume":"65","author":"KPL Vu","year":"2007","unstructured":"Vu, K.P.L., Proctor, R.W., Bhargav-Spantzel, A., Tai, B.L.B., Cook, J., Eugene Schultz, E.: Improving password security and memorability to protect personal and organizational information. Int. J. Hum. Comput. Stud. 65(8), 744\u2013757 (2007)","journal-title":"Int. J. Hum. Comput. Stud."},{"key":"429_CR58","doi-asserted-by":"crossref","unstructured":"Weir, M., Aggarwal, S., Collins, M., Stern, H.: Testing metrics for password creation policies by attacking large sets of revealed passwords. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS \u201910, pp. 162\u2013175. ACM, New York, NY, USA (2010)","DOI":"10.1145\/1866307.1866327"},{"key":"429_CR59","doi-asserted-by":"crossref","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: Authentication using graphical passwords: effects of tolerance and image choice. In: Proceedings of the 2005 Symposium on Usable Privacy and Security, SOUPS \u201905, pp. 1\u201312. ACM, New York, NY, USA (2005)","DOI":"10.1145\/1073001.1073002"},{"issue":"2","key":"429_CR60","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1111\/j.1469-7610.1976.tb00381.x","volume":"17","author":"D Wood","year":"1976","unstructured":"Wood, D., Bruner, J.S., Ross, G.: The role of tutoring in problem solving. J. Child Psychol. Psychiatry 17(2), 89\u2013100 (1976)","journal-title":"J. Child Psychol. Psychiatry"},{"key":"429_CR61","doi-asserted-by":"crossref","unstructured":"Wright, N., Patrick, A.S., Biddle, R.: Do you see your password?: Applying recognition to textual passwords. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, SOUPS \u201912, pp. 8:1\u20138:14. ACM, New York, NY, USA (2012)","DOI":"10.1145\/2335356.2335367"},{"issue":"5","key":"429_CR62","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MSP.2004.81","volume":"2","author":"J Yan","year":"2004","unstructured":"Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: empirical results. IEEE Priv. Secur. 2(5), 25\u201331 (2004)","journal-title":"IEEE Priv. Secur."},{"key":"429_CR63","doi-asserted-by":"crossref","unstructured":"Yan, J.J.: A note on proactive password checking. In: Proceedings of the 2001 Workshop on New Security Paradigms, NSPW \u201901, pp. 127\u2013135. ACM, New York, NY, USA (2001)","DOI":"10.1145\/508171.508194"},{"key":"429_CR64","unstructured":"Zakaria, N.H.B.: Exploring human factors issues & possible countermeasures in password authentication. Ph.D. thesis, Newcastle University (2013)"},{"key":"429_CR65","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1080\/15332860903467508","volume":"8","author":"L Zhang","year":"2009","unstructured":"Zhang, L., McDowell, C.W.: Am I really at risk? Determinants of online users\u2019 intention to use strong passwords. J. Internet Commer. 8, 180\u2013197 (2009)","journal-title":"J. Internet Commer."},{"key":"429_CR66","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Monrose, F., Reiter, M.K.: The security of modern password expiration: an algorithmic framework and empirical analysis. In: Proceedings of the 17th ACM Conference on Computer and Communications Security, pp. 176\u2013186 (2010)","DOI":"10.1145\/1866307.1866328"},{"key":"429_CR67","doi-asserted-by":"crossref","unstructured":"Zhang-Kennedy, L., Chiasson, S., Biddle, R.: Password advice shouldn\u2019t be boring: visualizing password guessing attacks. In: 2013 APWG eCrime Researchers Summit, pp. 1\u201311 (2013)","DOI":"10.1109\/eCRS.2013.6805770"},{"issue":"3","key":"429_CR68","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1093\/comjnl\/36.3.227","volume":"36","author":"M Zviran","year":"1993","unstructured":"Zviran, M., Haga, W.J.: Comparison of password techniques for multilevel authentication mechanisms. Comput. J. 36(3), 227\u2013237 (1993)","journal-title":"Comput. J."}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-019-00429-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10207-019-00429-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-019-00429-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,9]],"date-time":"2020-04-09T23:26:41Z","timestamp":1586474801000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10207-019-00429-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,11]]},"references-count":68,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["429"],"URL":"https:\/\/doi.org\/10.1007\/s10207-019-00429-y","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,11]]},"assertion":[{"value":"11 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}