{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T12:25:27Z","timestamp":1755692727886},"reference-count":116,"publisher":"Informa UK Limited","issue":"10","license":[{"start":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T00:00:00Z","timestamp":1657843200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2023,7,27]]},"DOI":"10.1080\/0144929x.2022.2091474","type":"journal-article","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T10:03:51Z","timestamp":1657879431000},"page":"1548-1567","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing the user authentication process with colour memory cues"],"prefix":"10.1080","volume":"42","author":[{"given":"Naomi","family":"Woods","sequence":"first","affiliation":[{"name":"Faculty of Information Technology, University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland"}]},{"given":"Johanna","family":"Silvennoinen","sequence":"additional","affiliation":[{"name":"Faculty of Information Technology, University of Jyv\u00e4skyl\u00e4, Jyv\u00e4skyl\u00e4, Finland"}]}],"member":"301","published-online":{"date-parts":[[2022,7,15]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2020.1858161"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702241"},{"key":"CIT0004","volume-title":"Interaction of Color: Text of the Original Edition with Revised Plate Section","author":"Albers J.","year":"1975"},{"key":"CIT0005","volume-title":"Proceedings of the 52nd Hawaii International Conference on System Sciences","author":"Alkaldi N.","year":"2018"},{"key":"CIT0006","first-page":"191","volume-title":"Memory","author":"Anderson M.","year":"2009"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/S0079-7421(08)60422-3"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1126\/science.1736359"},{"key":"CIT0009","first-page":"1","volume-title":"Memory","author":"Baddeley A. D.","year":"2009"},{"key":"CIT0010","first-page":"293","volume-title":"Memory","author":"Baddeley A. D.","year":"2009"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1016\/S0079-7421(08)60452-1"},{"key":"CIT0012","doi-asserted-by":"crossref","unstructured":"Baddeley, A., and G. J. Hitch. 1977. Recency re-Examined, Attention and Performance VI. Hillsdale, NJ: Lawrence Erlbaum Associates, pp. 647\u2013667.","DOI":"10.4324\/9781003309734-35"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2012.01.001"},{"key":"CIT0014","volume-title":"Basic Color Terms: Their Universality and Evolution","author":"Berlin B.","year":"1969"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139051491"},{"key":"CIT0017","first-page":"1","volume-title":"Proceedings of the 9th Workshop on the Economics of Information Security, WEIS 2010","author":"Bonneau J.","year":"2010"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0515-2_27"},{"key":"CIT0019","doi-asserted-by":"publisher","DOI":"10.1002\/acp.1014"},{"key":"CIT0020","first-page":"60","volume-title":"Proceedings of the17th. Australasian Conference on Information Systems Password Composition Policy, ACIS","author":"Campbell J.","year":"2006"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493213"},{"key":"CIT0022","first-page":"1","volume-title":"The Proceedings of the 15th USENIX Security Symposium \u201806","author":"Chiasson S.","year":"2006"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.112.1.155"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-5371(72)80001-X"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23357"},{"issue":"5","key":"CIT0026","first-page":"1","volume":"7","author":"Dennis A.","year":"2001","journal-title":"Communications of the AIS"},{"issue":"1","key":"CIT0027","first-page":"7","volume":"29","author":"Derefeldt G.","year":"2004","journal-title":"Centre Fran\u00e7ais de la Couleur"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2012.02.008"},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501617"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.1080\/00223980.1976.9921410"},{"key":"CIT0031","doi-asserted-by":"publisher","DOI":"10.1364\/JOSA.33.000568"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"CIT0033","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837124"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1145\/1496984.1497044"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102561"},{"key":"CIT0036","first-page":"221","volume-title":"Proceedings of 27th USENIX Security Symposium (USENIX Security 18)","author":"Gao X.","year":"2018"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143127"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.03.007"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.10.003"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2012.08.001"},{"key":"CIT0041","first-page":"13","volume-title":"Proceedings of Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018)","author":"Habib H.","year":"2018"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1037\/h0078851"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.3758\/BF03213296"},{"key":"CIT0044","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2017.23034"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2021.1876167"},{"key":"CIT0046","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208545"},{"key":"CIT0047","first-page":"114","volume-title":"Proceedings of the Nordic Conference on Secure IT Systems","author":"Helkala K.","year":"2011"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.6"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.150"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1177\/154193120905300605"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.2466\/pms.107.2.587-596"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753384"},{"key":"CIT0053","unstructured":"Ishihara, S. 1917. \u201cTests for Color-blindness\u201d (Handaya, Tokyo, Hongo Harukicho, 1917)."},{"key":"CIT0054","volume-title":"The Art of Color: The Subjective Experience and Objective Rationale of Color","author":"Itten J.","year":"1973"},{"key":"CIT0055","doi-asserted-by":"publisher","DOI":"10.1145\/975817.975820"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.1080\/02681102.2013.814040"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2015\/39.1.06"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.3389\/fnhum.2012.00318"},{"key":"CIT0059","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00184"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300916"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.1145\/3144569"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979321"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-017-0484-2"},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.1108\/13287261111118322"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.1523\/JNEUROSCI.07-11-03416.1987"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1113347109"},{"key":"CIT0067","doi-asserted-by":"publisher","DOI":"10.1037\/a0016818"},{"key":"CIT0068","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.01.028"},{"key":"CIT0069","volume-title":"In Proceedings of the 8th Americas Conference on Information Systems (AMCIS)","author":"Marquardson J.","year":"2012"},{"key":"CIT0070","volume-title":"Proceedings of the 21st Workshop on Interactive Systems and Software (WISS2013) (pp. 109-114).","author":"Masui T.","year":"2013"},{"key":"CIT0071","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516726"},{"key":"CIT0072","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2021.2019832"},{"key":"CIT0073","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.01.007"},{"key":"CIT0074","volume-title":"Proceedings of the 7th Australasian Information Security Conference, AISC","author":"Notoatmodjo G.","year":"2009"},{"key":"CIT0075","volume-title":"Imagery and Verbal Processes","author":"Paivio A.","year":"1971"},{"key":"CIT0076","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0906172107"},{"key":"CIT0077","first-page":"821","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Pasquini D.","year":"2021"},{"key":"CIT0078","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2020.106347"},{"key":"CIT0079","volume-title":"The Language of Graphic Design: An Illustrated Handbook for Understanding Fundamental Design Principles","author":"Poulin R.","year":"2011"},{"key":"CIT0080","doi-asserted-by":"publisher","DOI":"10.1145\/1610252.1610287"},{"key":"CIT0081","unstructured":"Renaud, K., and J. Ramsay. 2014. \u201cHow Helpful is Colour-Cueing of PIN Entry?\u201d. Cornell University arXiv preprint arXiv:1407.8007."},{"key":"CIT0082","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2006.00214.x"},{"key":"CIT0083","unstructured":"Saastamoinen, A. 2014. \u201cLomalla unohtuneet salasanat tulevat ty\u00f6nantajille kalliiksi \u2013 jopa satojen tuhansien kustannukset.\u201d Accessed 24.09.15. http:\/\/yle.fi\/ylex\/uutiset\/lomalla_unohtuneet_salasanat_tulevat_tyonantajille_kalliiksi__jopa_satojen_tuhansien_kustannukset\/3-7580109."},{"key":"CIT0084","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011902718709"},{"key":"CIT0085","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053100"},{"key":"CIT0086","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2018.12.035"},{"key":"CIT0087","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702586"},{"key":"CIT0088","doi-asserted-by":"publisher","DOI":"10.1145\/2891411"},{"key":"CIT0089","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837113"},{"key":"CIT0090","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2012.59"},{"key":"CIT0091","doi-asserted-by":"publisher","DOI":"10.1145\/2683467.2683471"},{"key":"CIT0092","doi-asserted-by":"publisher","DOI":"10.1080\/01449290903121386"},{"key":"CIT0093","doi-asserted-by":"publisher","DOI":"10.1037\/a0030273"},{"key":"CIT0094","doi-asserted-by":"publisher","DOI":"10.1145\/3322645.3322682"},{"key":"CIT0095","doi-asserted-by":"publisher","DOI":"10.1037\/h0020071"},{"key":"CIT0096","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858546"},{"key":"CIT0097","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2013.196"},{"key":"CIT0098","doi-asserted-by":"publisher","DOI":"10.1145\/1284680.1284685"},{"key":"CIT0099","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2007.03.007"},{"key":"CIT0100","first-page":"1537","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Wang D.","year":"2019"},{"key":"CIT0101","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978339"},{"key":"CIT0102","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.09.008"},{"key":"CIT0103","doi-asserted-by":"publisher","DOI":"10.1037\/0278-7393.28.3.509"},{"key":"CIT0104","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"CIT0105","doi-asserted-by":"publisher","DOI":"10.1145\/3308992"},{"key":"CIT0106","first-page":"1","volume-title":"Proceedings of the 23rd Americas Conference on Information Systems (AMCIS 2017)","author":"Woods N.","year":"2017"},{"key":"CIT0107","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-91293-2_5"},{"key":"CIT0108","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2017.11.002"},{"key":"CIT0109","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2019.02.003"},{"key":"CIT0110","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2008.04.005"},{"key":"CIT0111","unstructured":"World Internet Users Statistics. 2019. Accessed: 01\/05\/2019, http:\/\/www.internetworldstats.com\/stats.htm."},{"key":"CIT0112","volume-title":"Colour and Language: Colour Terms in English","volume":"364","author":"Wyler S.","year":"1992"},{"key":"CIT0113","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978346"},{"key":"CIT0114","volume-title":"A Vision of the Brain","author":"Zeki S.","year":"1993"},{"key":"CIT0115","doi-asserted-by":"publisher","DOI":"10.1093\/brain\/121.9.1669"},{"key":"CIT0116","doi-asserted-by":"publisher","DOI":"10.1057\/ejis.2009.9"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2022.2091474","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,14]],"date-time":"2023-07-14T12:43:07Z","timestamp":1689338587000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2022.2091474"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,15]]},"references-count":116,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2023,7,27]]}},"alternative-id":["10.1080\/0144929X.2022.2091474"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2022.2091474","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"value":"0144-929X","type":"print"},{"value":"1362-3001","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,15]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2022-01-12","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-06-14","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-07-15","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}