{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T17:55:19Z","timestamp":1778003719722,"version":"3.51.4"},"reference-count":81,"publisher":"Informa UK Limited","issue":"7","funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["SFB 1119 \u2013 236615297236615297"],"award-info":[{"award-number":["SFB 1119 \u2013 236615297236615297"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003495","name":"Hessisches Ministerium f\u00fcr Wissenschaft und Kunst","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003495","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2022,5,19]]},"DOI":"10.1080\/0144929x.2021.1876167","type":"journal-article","created":{"date-parts":[[2021,1,25]],"date-time":"2021-01-25T12:38:36Z","timestamp":1611578316000},"page":"1357-1380","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":24,"title":["Nudging users towards better security decisions in password creation using whitebox-based multidimensional visualisations"],"prefix":"10.1080","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4875-0110","authenticated-orcid":false,"given":"Katrin","family":"Hartwig","sequence":"first","affiliation":[{"name":"Science and Technology for Peace and Security (PEASEC), Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1920-038X","authenticated-orcid":false,"given":"Christian","family":"Reuter","sequence":"additional","affiliation":[{"name":"Science and Technology for Peace and Security (PEASEC), Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]}],"member":"301","published-online":{"date-parts":[[2021,1,25]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2012.708787"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174156"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2009.163"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2019.03.008"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.70"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1145\/2808117.2808119"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1145\/3272973.3274056"},{"key":"CIT0009","unstructured":"Biselli, T., and C. Reuter. 2021. \u201cOn the Relationship Between IT Privacy and Security Behavior: A Survey Among German Private Users.\u201d 16th International Conference on Wirtschaftsinformatik, 1\u201317."},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1177\/1071181311551233"},{"key":"CIT0011","first-page":"4","volume":"189","author":"Brooke J.","year":"1996","journal-title":"Usability Evaluation in Industry"},{"key":"CIT0012","first-page":"172","volume":"27","author":"Chen J.","year":"2016","journal-title":"Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300789"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1177\/001316446002000104"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.17265\/2159-5313\/2016.09.003"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.17265\/2159-5313\/2016.09.003"},{"key":"CIT0017","doi-asserted-by":"crossref","unstructured":"Egelman, S., and E. Peer. 2015. \u201cThe Myth of the Average User: Improving Privacy and Security Systems Through Individualization.\u201d Proceedings of the 2015 New Security Paradigms Workshop, 16\u201328. doi:10.1145\/2841113.2841115.arXiv:arXiv:1508.06655v1.","DOI":"10.1145\/2841113.2841115"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481329"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501617"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1177\/104973239300300403"},{"key":"CIT0021","unstructured":"Grassi, P. A., J. L. Fenton, E. M. Newton, R. A. Perlner, A. R. Regenscheid, W. E. Burr, J. P. Richer, et al. 2017. NIST Special Publication 800\u201363B, Digital Identity Guidelines, Technical Report. NIST. https:\/\/pages.nist.gov\/800-63-3\/sp800-63b.html."},{"key":"CIT0022","unstructured":"Hartwig, K., and C. Reuter. 2019. \u201cTrustyTweet: An Indicator-based Browser-Plugin to Assist Users in Dealing with Fake News on Twitter.\u201d In: Proceedings of the International Conference on Wirtschaftsinformatik (WI), 1858\u20131869."},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-658-32957-0_7"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.30844\/wi_2020_v3-herbert"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1657180"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025788"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-4878-5_2"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.10.004"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2011.632650"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1109\/STAST.2014.9"},{"key":"CIT0031","unstructured":"Jeske, D., L. Coventry, and P. Briggs. 2014b. \u201cNudging Whom How: IT Proficiency, Impulse Control and Secure Behaviour.\u201d Proceedings of the CHI Workshop on Personalizing Behavior Change Technologies, 1\u20134."},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188689"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1620334"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67256-4_38"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1653992"},{"key":"CIT0036","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3151331"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2019.1584644"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.17265\/2159-5313\/2016.09.003"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2013.875221"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1109\/VIZSEC.2015.7312771"},{"key":"CIT0041","unstructured":"Merkel, C., and R. Wiczorek. 2012. \u201cDoes Higher Security Always Result in Better Protection? An Approach for Mitigating the Trade-off Between Usability and Security. Human Factors: A View From an Integrative Perspective.\u201d Proceedings HFES Europe Chapter Conference Toulouse, 29\u201342."},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1145\/3152771.3156139"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2016.1262897"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.76.6.972"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106347"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2017.1369569"},{"key":"CIT0047","first-page":"1","volume":"1","author":"Reeder R.","year":"2018","journal-title":"Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. ACM"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2017.8251779"},{"key":"CIT0049","unstructured":"Renaud, K., V. Zimmerman, J. Maguire, and S. Draper. 2017. \u201cLessons Learned From Evaluating Eight Password Nudges in the Wild.\u201d In: The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER 2017). 25\u201337, USENIX Association. https:\/\/www.usenix.org\/conference\/laser2017\/presentation\/renaud."},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.05.011"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.23919\/SAIEE.2018.8531951"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.17265\/2159-5313\/2016.09.003"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2007.00957.x"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1109\/ISSA.2011.6027518"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1177\/0013164495055005017"},{"key":"CIT0056","unstructured":"Segreti, S. M., W. Melicher, S. Komanduri, D. Melicher, R. Shay, B. Ur, L. Bauer, N. Christin, L. F. Cranor, and M. L. Mazurek. 2017. \u201cDiversify to Survive: Making Passwords Stronger With Adaptive Policies.\u201d In: Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). 1\u201312, Santa Clara, CA: USENIX Association. https:\/\/www.usenix.org\/conference\/soups2017\/technical-sessions\/presentation\/segreti."},{"key":"CIT0057","unstructured":"Story, P., D. Smullen, A. Acquisti, L. F. Cranor, N. Sadeh, and F. Schaub. 2020. \u201cFrom Intent to Action: Nudging Users Towards Secure Mobile Payments.\u201d In: Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020), 379\u2013415."},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417882"},{"key":"CIT0059","volume-title":"Nudge: Improving Decisions About Health, Wealth, and Happiness","author":"Thaler R.","year":"2009"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1145\/2783446.2783588"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-05940-8_22"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3026050"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.17265\/2159-5313\/2016.09.003"},{"key":"CIT0064","unstructured":"Ur, B., P. G. Kelley, S. Komanduri, J. Lee, M. Maass, M. L. Mazurek, T. Passaro, et al. 2012. \u201cHow Does Your Password Measure up? The Effect of Strength Meters on Password Creation.\u201d in: 21st USENIX Security Symposium (USENIX Security 12), 65\u201380. Bellevue, WA: USENIX Association. https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/ur."},{"key":"CIT0065","unstructured":"Ur, B., F. Noma, J. Bees, S. M. Segreti, R. Shay, L. Bauer, N. Christin, and L. F. Cranor. 2015. \u201c\u201ci added \u2018!\u2019 at the end to Make it Secure\u201d: Observing Password Creation in the Lab.\u201d In: Eleventh Symposium On Usable Privacy and Security (SOUPS 2015), 123\u2013140. Ottawa: USENIX Association. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/ur."},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2018.11.003"},{"key":"CIT0067","unstructured":"Vance, A. 2010. \u201cIf Your Password Is 123456, Just Make It HackMe.\u201d https:\/\/www.nytimes.com\/2010\/01\/21\/technology\/21password.html."},{"key":"CIT0068","volume-title":"The Think Aloud Method: a Practical Approach to Modelling Cognitive Processes","author":"Van Someren M. W.","year":"1994"},{"key":"CIT0069","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23103"},{"key":"CIT0070","doi-asserted-by":"publisher","DOI":"10.1145\/2379690.2379702"},{"key":"CIT0071","doi-asserted-by":"publisher","DOI":"10.1080\/23743603.2020.1808782"},{"key":"CIT0072","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557413"},{"key":"CIT0073","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300831"},{"key":"CIT0074","volume-title":"Information Visualization: Perception for Design","author":"Ware C.","year":"2012"},{"key":"CIT0075","doi-asserted-by":"publisher","DOI":"10.17265\/2159-5313\/2016.09.003"},{"key":"CIT0076","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2016.09.006"},{"key":"CIT0077","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"},{"key":"CIT0078","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-06-2015-0026"},{"key":"CIT0079","first-page":"1676","volume":"27","author":"Zhang B.","year":"2016","journal-title":"Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW"},{"key":"CIT0080","doi-asserted-by":"publisher","DOI":"10.1145\/3295750.3298952"},{"key":"CIT0081","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2019.08.006"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2021.1876167","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,31]],"date-time":"2022-05-31T18:34:15Z","timestamp":1654022055000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2021.1876167"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,25]]},"references-count":81,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2022,5,19]]}},"alternative-id":["10.1080\/0144929X.2021.1876167"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2021.1876167","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,25]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2020-04-07","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-05","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}