{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,18]],"date-time":"2026-05-18T11:03:46Z","timestamp":1779102226261,"version":"3.51.4"},"reference-count":64,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Management Information Systems"],"published-print":{"date-parts":[[1999,3]]},"DOI":"10.1080\/07421222.1999.11518226","type":"journal-article","created":{"date-parts":[[2015,12,8]],"date-time":"2015-12-08T23:56:21Z","timestamp":1449618981000},"page":"161-185","source":"Crossref","is-referenced-by-count":143,"title":["Password Security: An Empirical Study"],"prefix":"10.1080","volume":"15","author":[{"given":"Moshe","family":"Zviran","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"William J.","family":"Haga","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"301","published-online":{"date-parts":[[2015,12,7]]},"reference":[{"issue":"7","key":"CIT0001","first-page":"108","volume":"157","author":"Adams S.","year":"1996","journal-title":"Forbes"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90086-1"},{"issue":"2","key":"CIT0003","first-page":"16","volume":"72","author":"Avarne S.","year":"1988","journal-title":"Data Processing & Communication Security"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.2307\/248752"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(95)00003-Q"},{"issue":"12","key":"CIT0007","first-page":"77","volume":"31","author":"Botting J.","year":"1997","journal-title":"Telecommunications"},{"issue":"4","key":"CIT0008","first-page":"32","volume":"14","author":"Bradner S.","year":"1997","journal-title":"Network World"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.2307\/248822"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.2307\/249479"},{"issue":"24","key":"CIT0011","first-page":"108","volume":"19","author":"Broderick J.","year":"1997","journal-title":"Infoworld"},{"key":"CIT0012","volume-title":"Business Research Methods","author":"Cooper D.R.","year":"1995","edition":"5"},{"key":"CIT0013","volume-title":"Computer and Communications Security, Strategies for the 1990s","author":"Cooper J.A.","year":"1989"},{"issue":"5","key":"CIT0014","first-page":"24","volume":"41","author":"Corbitt T.","year":"1997","journal-title":"Management Services"},{"key":"CIT0015","first-page":"443","volume-title":"Educational Measurement","author":"Cronbach L.","year":"1971","edition":"2"},{"key":"CIT0016","volume-title":"The Research Act","author":"Denzin N.K.","year":"1989","edition":"3"},{"issue":"4","key":"CIT0017","first-page":"42","volume":"11","author":"Dichter C.","year":"1993","journal-title":"Unix Review"},{"issue":"13","key":"CIT0018","first-page":"49","volume":"32","author":"DiDio L.","year":"1998","journal-title":"ComputerWorld"},{"issue":"9","key":"CIT0019","first-page":"14","volume":"32","author":"DiDio L.","year":"1998","journal-title":"ComputerWorld"},{"key":"CIT0020","volume-title":"Department of Defense Password Management Guideline","author":"DoD","year":"1985"},{"key":"CIT0021","volume-title":"U.S. Computer Security Survey of Fortune 500 Industrial Companies","author":"Ernst","year":"1987"},{"key":"CIT0022","unstructured":"Ernst & Whinney. The 1989 Computer Abuse Survey: A Report. Cleveland: Ernst & Whinney, 1989."},{"key":"CIT0023","volume-title":"The Cyber Thief and the Samurai","author":"Goodell J.","year":"1996"},{"key":"CIT0024","volume-title":"Research Methods","author":"Graziano A.M.","year":"1997","edition":"3"},{"key":"CIT0025","volume-title":"Net Wars","author":"Grossman W.","year":"1997"},{"issue":"2","key":"CIT0026","first-page":"133","volume":"6","author":"Herschberg I.","year":"1987","journal-title":"Comity"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(90)90164-O"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1080\/07366989109451232"},{"issue":"3","key":"CIT0029","first-page":"183","volume":"16","author":"Highland J.H.","year":"1997","journal-title":"Computers and Security"},{"issue":"4","key":"CIT0030","first-page":"35","volume":"30","author":"Hoffer J.","year":"1989","journal-title":"Sloan Management Review"},{"key":"CIT0031","volume-title":"Modern Methods for Computer Security and Privacy","author":"Hoffman L.J.","year":"1977"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.2307\/3151627"},{"key":"CIT0033","volume-title":"Computer Crime: A Crime Fighter\u2019s Handbook","author":"Icove D.","year":"1995"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(89)90051-5"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(89)90006-0"},{"issue":"23","key":"CIT0036","first-page":"28","volume":"13","author":"Kearns D.","year":"1996","journal-title":"Network World"},{"key":"CIT0037","first-page":"47","volume":"18","author":"LaPlante A.","year":"1987","journal-title":"Infoworld"},{"key":"CIT0038","doi-asserted-by":"publisher","DOI":"10.2307\/249574"},{"key":"CIT0039","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(88)90325-2"},{"key":"CIT0040","doi-asserted-by":"publisher","DOI":"10.1037\/h0043158"},{"issue":"24","key":"CIT0041","first-page":"122","volume":"19","author":"Morrey B.","year":"1997","journal-title":"Inforworld"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.2307\/249452"},{"issue":"21","key":"CIT0044","first-page":"88","volume":"31","author":"Nelson M.","year":"1997","journal-title":"Computer World"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90013-7"},{"key":"CIT0046","volume-title":"Fighting Computer Crime","author":"Parker D.","year":"1983"},{"key":"CIT0047","volume-title":"Security in Computing","author":"Pfleeger C.P.","year":"1997","edition":"2"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(82)90025-6"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1145\/63526.63529"},{"key":"CIT0050","volume-title":"Nonparametric Statistics for the Behavioral Sciences","author":"Castellan Siand J.N.","year":"1988","edition":"2"},{"key":"CIT0051","doi-asserted-by":"publisher","DOI":"10.1145\/63526.63527"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(87)90011-3"},{"key":"CIT0053","volume-title":"The Cuckoo\u2019s Egg","author":"Stoll C.","year":"1995"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1145\/42411.42412"},{"issue":"2","key":"CIT0055","first-page":"21","volume":"4","author":"Straub D.W.","year":"1986","journal-title":"Security, Audit and Control Review"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.2307\/248922"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.2307\/249307"},{"key":"CIT0058","volume-title":"Managing Information as a Corporate Resource","author":"Tom P.L.","year":"1991","edition":"2"},{"key":"CIT0059","first-page":"1","volume-title":"Sunday Times","author":"Ungoed-Thomas J.","year":"1998"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(83)90028-7"},{"key":"CIT0061","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(96)00004-1"},{"issue":"12","key":"CIT0062","first-page":"33","volume":"15","author":"Yager T.","year":"1997","journal-title":"Unix Review"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(90)90115-A"},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/36.3.227"},{"key":"CIT0065","volume-title":"Foundations of Information Systems","author":"Zwass V.","year":"1997"}],"container-title":["Journal of Management Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/07421222.1999.11518226","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,7,16]],"date-time":"2018-07-16T19:20:04Z","timestamp":1531768804000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/07421222.1999.11518226"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999,3]]},"references-count":64,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2015,12,7]]},"published-print":{"date-parts":[[1999,3]]}},"alternative-id":["10.1080\/07421222.1999.11518226"],"URL":"https:\/\/doi.org\/10.1080\/07421222.1999.11518226","relation":{},"ISSN":["0742-1222","1557-928X"],"issn-type":[{"value":"0742-1222","type":"print"},{"value":"1557-928X","type":"electronic"}],"subject":[],"published":{"date-parts":[[1999,3]]}}}