{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T13:16:24Z","timestamp":1754486184709,"version":"3.40.5"},"reference-count":58,"publisher":"Informa UK Limited","issue":"10","funder":[{"name":"National Science Foundation","award":["CNS-2137312"],"award-info":[{"award-number":["CNS-2137312"]}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2025,5,19]]},"DOI":"10.1080\/10447318.2024.2376356","type":"journal-article","created":{"date-parts":[[2024,8,9]],"date-time":"2024-08-09T14:25:27Z","timestamp":1723213527000},"page":"6318-6334","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":1,"title":["Password Managers Use Among Individuals Who Are Visually Impaired: Awareness, Adoption, and Rejection"],"prefix":"10.1080","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3096-9907","authenticated-orcid":false,"given":"Nancy","family":"Alajarmeh","sequence":"first","affiliation":[{"name":"Computer Science Department, Tafila Technical University","place":["Tafila, Jordan"]}]},{"given":"Richard E.","family":"Ladner","sequence":"additional","affiliation":[{"name":"Paul G. Allen School of Computer Science and Engineering, University of Washington","place":["Seattle, USA"]}]}],"member":"301","published-online":{"date-parts":[[2024,8,9]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702334"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.77"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.displa.2021.102081"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.582"},{"key":"e_1_3_3_6_1","doi-asserted-by":"crossref","unstructured":"Alkaldi N. & Renaud K. (2016). Why do people adopt or reject smartphone password managers?","DOI":"10.14722\/eurousec.2016.23011"},{"key":"e_1_3_3_7_1","doi-asserted-by":"crossref","unstructured":"Aurigemma S. Mattson T. & Leonard L. (2017). So much promise so little use: What is stopping home end-users from using password manager applications? In Proceedings of the 50th Hawaii International Conference on System Sciences (HICSS \u201917).","DOI":"10.24251\/HICSS.2017.490"},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384916.2384945"},{"key":"e_1_3_3_9_1","first-page":"121","volume-title":"Proceedings of Graphics Interface 2012","author":"Azenkot S.","year":"2012","unstructured":"Azenkot, S., Wobbrock, J. O., Prasain, S., & Ladner, R. E. (2012). Input finger detection for nonvisual touch screen text entry in perkinput. In Proceedings of Graphics Interface 2012 (pp. 121\u2013129). Association for Computing Machinery (ACM)."},{"key":"e_1_3_3_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2971648.2971722"},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12654-3_24"},{"key":"e_1_3_3_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3234695.3236342"},{"key":"e_1_3_3_13_1","unstructured":"Chaikivsky A. (2017). Everything you need to know about password managers. Consumer Reports. https:\/\/www.consumerreports.org\/digital-security\/everythingyou-need-to-know-about-password-managers"},{"key":"e_1_3_3_14_1","first-page":"1","volume-title":"USENIX Security Symposium","volume":"15","author":"Chiasson S.","year":"2006","unstructured":"Chiasson, S., van Oorschot, P. C., & Biddle, R. (2006). A usability study and critique of two password managers. In USENIX Security Symposium (Vol. 15, pp. 1\u201316). USENIX Association."},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3641281"},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23357"},{"key":"e_1_3_3_17_1","first-page":"151","volume-title":"Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015)","author":"Dosono B.","year":"2015","unstructured":"Dosono, B., Hayes, J., & Wang, Y. (2015). \u201cI\u2019m stuck!\u201d: A contextual inquiry of people with visual impairments in authentication. In Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015) (pp. 151\u2013168). USENIX Association."},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW59978.2023.00070"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-017-0093-6"},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.8.7.1678-1698"},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.162"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2435349.2435373"},{"key":"e_1_3_3_24_1","volume-title":"iConference 2017 Proceedings","author":"Hayes J.","year":"2017","unstructured":"Hayes, J., Dosono, B., & Wang, Y. (2017). \u201cThey should be convenient and strong\u201d: Password perceptions and practices of visually impaired users [Paper presentation]. In iConference 2017 Proceedings. iSchools."},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1518\/107118109X12524441081983"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.23"},{"key":"e_1_3_3_27_1","first-page":"67","article-title":"Passwords evolved: Authentication guidance for the modern era","volume":"26","author":"Hunt T.","year":"2017","unstructured":"Hunt, T. (2017). Passwords evolved: Authentication guidance for the modern era. Blog Post, 26, 67.","journal-title":"Blog Post,"},{"issue":"5","key":"e_1_3_3_28_1","first-page":"95","article-title":"A review on authentication methods","volume":"7","author":"Idrus S. Z. S.","year":"2013","unstructured":"Idrus, S. Z. S., Cherrier, E., Rosenberger, C., & Schwartzmann, J.-J. (2013). A review on authentication methods. Australian Journal of Basic and Applied Sciences, 7(5), 95\u2013107.","journal-title":"Australian Journal of Basic and Applied Sciences,"},{"key":"e_1_3_3_29_1","first-page":"327","volume-title":"Eleventh Symposium on Usable Privacy and Security ({SOUPS} 2015)","author":"Ion I.","year":"2015","unstructured":"Ion, I., Reeder, R., & Consolvo, S. (2015). \u2026 no one can hack my mind\u201d: Comparing expert and non-expert security practices. In Eleventh Symposium on Usable Privacy and Security ({SOUPS} 2015) (pp. 327\u2013346). USENIX Association."},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639642.1639663"},{"key":"e_1_3_3_31_1","first-page":"233","volume-title":"International Conference on Information Security and Cryptology","author":"Karole A.","year":"2010","unstructured":"Karole, A., Saxena, N., & Christin, N. (2010). A comparative usability evaluation of traditional password managers. In International Conference on Information Security and Cryptology (pp. 233\u2013251). Springer."},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1177\/1071181312561240"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524583"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-68059-0_1"},{"key":"e_1_3_3_35_1","unstructured":"Napoli D. (2018). Accessible and usable security: Exploring visually impaired users\u2019 online security and privacy strategies [PhD thesis]. Carleton University."},{"key":"e_1_3_3_36_1","first-page":"263","volume-title":"Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021)","author":"Napoli D.","year":"2021","unstructured":"Napoli, D., Baig, K., Maqsood, S., & Chiasson, S. (2021). \u201cI\u2019m literally just hoping this will {Work:\u2019}\u201d obstacles blocking the online security and privacy of users with visual disabilities. In Seventeenth Symposium on Usable Privacy and Security (SOUPS 2021) (pp. 263\u2013280). USENIX Association."},{"key":"e_1_3_3_37_1","first-page":"71","volume-title":"Proceedings of the Seventh Australasian Conference on Information Security","author":"Notoatmodjo G.","year":"2009","unstructured":"Notoatmodjo, G., & Thomborson, C. (2009). Passwords and perceptions. In Proceedings of the Seventh Australasian Conference on Information Security (Vol. 98, pp. 71\u201378). Citeseer."},{"key":"e_1_3_3_38_1","doi-asserted-by":"crossref","unstructured":"Oliveira J. Guerreiro T. Nicolau H. Jorge J. & Gon\u00e7alves D. (2011). Blind people and mobile touch-based text-entry: Acknowledging the need for different flavors. In The Proceedings of the 13th International ACM SIGACCESS Conference on Computers and Accessibility (pp. 179\u2013186).","DOI":"10.1145\/2049536.2049569"},{"key":"e_1_3_3_39_1","first-page":"319","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019)","author":"Pearman S.","year":"2019","unstructured":"Pearman, S., Zhang, S. A., Bauer, L., Christin, N., & Cranor, L. F. (2019). Why people (don\u2019t) use password managers effectively. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019) (pp. 319\u2013338). USENIX Association."},{"issue":"6","key":"e_1_3_3_40_1","first-page":"25","article-title":"Towards understanding user perceptions of biometrics authentication technologies","volume":"13","author":"Rashed A.","year":"2015","unstructured":"Rashed, A., & Alajarmeh, N. (2015). Towards understanding user perceptions of biometrics authentication technologies. International Journal of Computer Science and Information Security, 13(6), 25.","journal-title":"International Journal of Computer Science and Information Security,"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.157"},{"key":"e_1_3_3_42_1","doi-asserted-by":"crossref","unstructured":"Renaud K. (2021). Accessible cyber security: The next frontier? In Proceedings of the 7th International Conference on Information Systems Security and Privacy (ICISSP 2021) (pp. 9\u201318).","DOI":"10.5220\/0010419500090018"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-022-01239-1"},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2020.1768672"},{"key":"e_1_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2017.1357905"},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-08645-8_6"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-22312-0_14"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2683467.2683471"},{"key":"e_1_3_3_49_1","first-page":"3","volume-title":"International Conference on Passwords","author":"Stobert E.","year":"2015","unstructured":"Stobert, E., & Biddle, R. (2015). Expert password management. In International Conference on Passwords (pp. 3\u201320). Springer."},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183341"},{"key":"e_1_3_3_51_1","first-page":"123","volume-title":"Eleventh Symposium on Usable Privacy and Security ({SOUPS} 2015)","author":"Ur B.","year":"2015","unstructured":"Ur, B., Noma, F., Bees, J., Segreti, S. M., Shay, R., Bauer, L., Christin, N., & Cranor, L. F. (2015). \u201cI added\u2019!\u2019 at the end to make it secure\u201d: Observing password creation in the lab. In Eleventh Symposium on Usable Privacy and Security ({SOUPS} 2015) (pp. 123\u2013140). Association for Computing Machinery (ACM)."},{"key":"e_1_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2017.1279827"},{"key":"e_1_3_3_53_1","unstructured":"Wakefield M. (2022). Digital Identity Authentication for blind and partially sighted people [PhD thesis]. University of York."},{"key":"e_1_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107118"},{"key":"e_1_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2023.2217608"},{"key":"e_1_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2022.2154903"},{"key":"e_1_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.90"},{"key":"e_1_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2023.2260673"},{"issue":"4","key":"e_1_3_3_59_1","first-page":"1","article-title":"Vulnerability and risk analysis of two commercial browser and cloud based password managers","volume":"1","author":"Zhao R.","year":"2013","unstructured":"Zhao, R., Yue, C., & Sun, K. (2013). Vulnerability and risk analysis of two commercial browser and cloud based password managers. ASE Science Journal, 1(4), 1\u201315.","journal-title":"ASE Science Journal,"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2024.2376356","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T12:06:42Z","timestamp":1746792402000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2024.2376356"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,9]]},"references-count":58,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2025,5,19]]}},"alternative-id":["10.1080\/10447318.2024.2376356"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2024.2376356","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"type":"print","value":"1044-7318"},{"type":"electronic","value":"1532-7590"}],"subject":[],"published":{"date-parts":[[2024,8,9]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-12-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-05-14","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-07-01","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-08-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}