{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T15:02:07Z","timestamp":1776783727770,"version":"3.51.2"},"reference-count":15,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[1991,1,1]],"date-time":"1991-01-01T00:00:00Z","timestamp":662688000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Systems"],"published-print":{"date-parts":[[1991,1]]},"DOI":"10.1016\/0306-4379(91)90005-t","type":"journal-article","created":{"date-parts":[[2003,8,8]],"date-time":"2003-08-08T01:31:39Z","timestamp":1060306299000},"page":"335-343","source":"Crossref","is-referenced-by-count":31,"title":["Question-and-answer passwords: An empirical evaluation"],"prefix":"10.1016","volume":"16","author":[{"given":"William J","family":"Haga","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Moshe","family":"Zviran","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"78","reference":[{"key":"10.1016\/0306-4379(91)90005-T_BIB1","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1016\/0167-4048(87)90086-1","article-title":"Verifying the authentication of an information system user","volume":"6","author":"Ahituv","year":"1987","journal-title":"Computers Secur."},{"key":"10.1016\/0306-4379(91)90005-T_BIB2","series-title":"Security in Computing","author":"Pfleeger","year":"1989"},{"key":"10.1016\/0306-4379(91)90005-T_BIB3","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1016\/0167-4048(88)90325-2","article-title":"Understanding the use of passwords","volume":"7","author":"Menkus","year":"1988","journal-title":"Computers Secur."},{"key":"10.1016\/0306-4379(91)90005-T_BIB4","series-title":"Management of Computer Operations","author":"Borovits","year":"1984"},{"key":"10.1016\/0306-4379(91)90005-T_BIB5","first-page":"19","article-title":"Cognitive passwords\u2014from theory to practice","volume":"13","author":"Haga","year":"1989","journal-title":"Data Process. Commun. Secur."},{"key":"10.1016\/0306-4379(91)90005-T_BIB6","series-title":"Security, Accuracy and Privacy in Computer Systems","author":"Martin","year":"1973"},{"key":"10.1016\/0306-4379(91)90005-T_BIB7","doi-asserted-by":"crossref","first-page":"464","DOI":"10.1016\/0167-4048(87)90027-7","article-title":"Authenticating users by word association","volume":"6","author":"Smith","year":"1987","journal-title":"Computers Secur."},{"key":"10.1016\/0306-4379(91)90005-T_BIB8","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1016\/0167-4048(90)90115-A","article-title":"Cognitive passwords: the key for easy access control","volume":"9","author":"Zviran","year":"1990","journal-title":"Computers Secur."},{"key":"10.1016\/0306-4379(91)90005-T_BIB9","series-title":"Security, IFIP\/sec'83","first-page":"15","article-title":"A dozen gross \u2018Mythconceptions\u2019 about information processing","author":"Kurzban","year":"1983"},{"key":"10.1016\/0306-4379(91)90005-T_BIB10","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1016\/0167-4048(82)90025-6","article-title":"A password exension for human factors","volume":"1","author":"Porter","year":"1982","journal-title":"Computers Secur."},{"key":"10.1016\/0306-4379(91)90005-T_BIB11","doi-asserted-by":"crossref","first-page":"186","DOI":"10.1016\/0167-4048(84)90040-3","article-title":"User-friendly password methods for computer-mediated information systems","volume":"3","author":"Barton","year":"1988","journal-title":"Computers Secur."},{"key":"10.1016\/0306-4379(91)90005-T_BIB12","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/0167-4048(83)90028-7","article-title":"Effective information system security with password controls","volume":"2","author":"Wood","year":"1983","journal-title":"Computers Secur."},{"key":"10.1016\/0306-4379(91)90005-T_BIB13","article-title":"Password security: an exploratory study","author":"Zviran","year":"1990"},{"key":"10.1016\/0306-4379(91)90005-T_BIB14","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1016\/0167-4048(87)90013-7","article-title":"Computer security: the long road ahead","volume":"6","author":"Paans","year":"1987","journal-title":"Computers Secur."},{"key":"10.1016\/0306-4379(91)90005-T_BIB15","first-page":"16","article-title":"How to find out a password","volume":"12","author":"Avarne","year":"1988","journal-title":"Data Process. Commun. Secur."}],"container-title":["Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:030643799190005T?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:030643799190005T?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T04:55:09Z","timestamp":1552625709000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/030643799190005T"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1991,1]]},"references-count":15,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1991,1]]}},"alternative-id":["030643799190005T"],"URL":"https:\/\/doi.org\/10.1016\/0306-4379(91)90005-t","relation":{},"ISSN":["0306-4379"],"issn-type":[{"value":"0306-4379","type":"print"}],"subject":[],"published":{"date-parts":[[1991,1]]}}}