{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T11:29:24Z","timestamp":1771500564492,"version":"3.50.1"},"reference-count":89,"publisher":"Emerald","issue":"2","license":[{"start":{"date-parts":[[2021,11,30]],"date-time":"2021-11-30T00:00:00Z","timestamp":1638230400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICS"],"published-print":{"date-parts":[[2022,3,29]]},"abstract":"<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Purpose<\/jats:title>\n<jats:p>The average employee spends a total of 18.6\u2009h every two months on password-related activities, including password retries and resets. The problem is caused by the user forgetting or mistyping the password (usually because of character switching). The source of this issue is that while a password containing combinations of lowercase characters, uppercase characters, digits and special characters (LUDS) offers a reasonable level of security, it is complex to type and\/or memorise, which prolongs the user authentication process. This results in much time being spent for no benefit (as perceived by users), as the user authentication process is merely a prerequisite for whatever a user intends to accomplish. This study aims to address this issue, passphrases that exclude the LUDS guidelines are proposed.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Design\/methodology\/approach<\/jats:title>\n<jats:p>To discover constructs that create security and to investigate usability concerns relating to the memory and typing issues concerning passphrases, this study was guided by three theories as follows: Shannon\u2019s entropy theory was used to assess security, chunking theory to analyse memory issues and the keystroke level model to assess typing issues. These three constructs were then evaluated against passwords and passphrases to determine whether passphrases better address the security and usability issues related to text-based user authentication. A content analysis was performed to identify common password compositions currently used. A login assessment experiment was used to collect data on user authentication and user \u2013 system interaction with passwords and passphrases in line with the constructs that have an impact on user authentication issues related to security, memory and typing. User\u2013system interaction data was collected from a purposeful sample size of 112 participants, logging in at least once a day for 10\u2009days. An expert review, which comprised usability and security experts with specific years of industry and\/or academic experience, was also used to validate results and conclusions. All the experts were given questions and content to ensure sufficient context was provided and relevant feedback was obtained. A pilot study involving 10 participants (experts in security and\/or usability) was performed on the login assessment website and the content was given to the experts beforehand. Both the website and the expert review content was refined after feedback was received from the pilot study.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Findings<\/jats:title>\n<jats:p>It was concluded that, overall, passphrases better support the user during the user authentication process in terms of security, memory issues and typing issues.<\/jats:p>\n<\/jats:sec>\n<jats:sec>\n<jats:title content-type=\"abstract-subheading\">Originality\/value<\/jats:title>\n<jats:p>This research aims at promoting the use of a specific type of passphrase instead of complex passwords. Three core aspects need to be assessed in conjunction with each other (security, memorisation and typing) to determine whether user-friendly passphrases can support user authentication better than passwords.<\/jats:p>\n<\/jats:sec>","DOI":"10.1108\/ics-07-2021-0093","type":"journal-article","created":{"date-parts":[[2021,11,28]],"date-time":"2021-11-28T06:22:57Z","timestamp":1638080577000},"page":"280-305","source":"Crossref","is-referenced-by-count":11,"title":["Usability of the login authentication process: passphrases and passwords"],"prefix":"10.1108","volume":"30","author":[{"given":"Bhaveer","family":"Bhana","sequence":"first","affiliation":[]},{"given":"Stephen Vincent","family":"Flowerday","sequence":"additional","affiliation":[]}],"member":"140","published-online":{"date-parts":[[2021,11,30]]},"reference":[{"key":"key2022032616312989900_ref001","unstructured":"Alomari, R. and Thorpe, J. (2019), \u201cOn password behaviours and attitudes in different populations\u201d, available at: www.sciencedirect.com\/science\/article\/abs\/pii\/S2214212618305027 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref002","unstructured":"Antonov, P. and Georgieva, N. (2020), \u201cSecurity analysis of diceware passphrases\u201d, available at: www.semanticscholar.org\/paper\/Security-Analysis-of-Diceware-Passphrases-Antonov-Georgieva\/d8ee84fa7f167a1a72c1ece703a3d6abf656afeb (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref003","doi-asserted-by":"crossref","unstructured":"Arthur, N. and McMahon, M. (2018), \u201cContemporary career development theories: international perspectives\u201d, available at: www.researchgate.net\/publication\/330942601_Contemporary_career_development_theories_International_Perspectives (accessed 19 September 2021).","DOI":"10.4324\/9781315276175-2"},{"key":"key2022032616312989900_ref004","unstructured":"Bahman, R. and Vaibhav, G. (2021), \u201cOpen sesame: lessons in password-based user authentication\u201d, available at: www.ingentaconnect.com\/content\/hsp\/jcs\/2021\/00000004\/00000004\/art00003 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref005","unstructured":"Banerjee, S.P. and Woodard, D.L. (2012), \u201cBiometric authentication and identification using keystroke\u201d, available at: www.semanticscholar.org\/paper\/Biometric-Authentication-and-Identification-using-A-Banerjee-Woodard\/f7971a4341f968263a1d7d6ea219f3266bc7fcf9 (accessed 19 September 2021)."},{"issue":"1","key":"key2022032616312989900_ref006","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1016\/j.yrtph.2015.07.018","article-title":"Establishing best practise in the application of expert review of mutagenicity under ICH M7","volume":"73","year":"2015","journal-title":"Regulatory Toxicology and Pharmacology"},{"key":"key2022032616312989900_ref007","doi-asserted-by":"crossref","unstructured":"Bhana, B. and Flowerday, S. (2020), \u201cPassphrase and keystroke dynamics authentication: usable security\u201d, available at: www.sciencedirect.com\/science\/article\/abs\/pii\/S0273230015300283 (accessed 19 September 2021).","DOI":"10.1016\/j.cose.2020.101925"},{"key":"key2022032616312989900_ref008","unstructured":"Braunstein, P. (2015), \u201cMaking secure easy-to-remember passwords\u201d, available at: www.cs.tufts.edu\/comp\/116\/archive\/fall2015\/pbraunstein.pdf (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref009","unstructured":"Burr, W., Dodson, D., Perlner, R., Gupta, S. and Nabbus, E. (2013), \u201cNIST SP 800-63-2: electronic authentication guideline\u201d, available at: https:\/\/csrc.nist.gov\/csrc\/media\/publications\/sp\/800-63\/3\/archive\/2015-04-09\/documents\/sp800-63-2-comments-received-2015.pdf (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref010","unstructured":"Burr, W.E., Dodson, D.F. and Polk, W.T. (2017), \u201cElectronic authentication guideline (800-63-2)\u201d, available at: www.nist.gov\/publications\/electronic-authentication-guideline (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref011","unstructured":"Carstens, D.S., McCauley-Bell, P.R., Malone, L.C. and Demara, R.F. (2014), \u201cEvaluation of the human impact of password authentication practices on information security\u201d, available at: https:\/\/repository.lib.fit.edu\/handle\/11141\/813 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref012","unstructured":"Chaeikar, S.S., Zamani, M., Chukwuekezie, C.S. and Alizadeh, M. (2013), \u201cElectronic voting systems for European union countries\u201d, available at: www.researchgate.net\/publication\/260481185_Electronic_Voting_Systems_for_European_Union_Countries (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref013","doi-asserted-by":"crossref","unstructured":"Choi, H., Jeong, J., Woo, S.S., Kang, K. and Hur, J. (2019), \u201cPassword typographical error resilience in honey encryption\u201d, available at: www.researchgate.net\/publication\/328436929_Password_Typographical_Error_Resilience_in_Honey_Encryption (accessed 19 September 2021).","DOI":"10.1016\/j.cose.2018.07.020"},{"key":"key2022032616312989900_ref014","unstructured":"Choong, Y.Y., Theofanos, M. and Liu, H.K. (2014), \u201cUnited States federal employees\u2019 password management behaviors \u2013 a department of commerce case study\u201d, available at: www.semanticscholar.org\/paper\/United-States-Federal-Employees%27-Password-Behaviors-Choong-Theofanos\/ddfd21612bac75eb8791fa750f2d83174e3a9564 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref015","doi-asserted-by":"crossref","unstructured":"Cowan, N. (2010), \u201cThe magical mystery four: how is working memory capacity limited, and why?\u201d, available at: https:\/\/journals.sagepub.com\/doi\/10.1177\/0963721409359277 (accessed 19 September 2021).","DOI":"10.1177\/0963721409359277"},{"key":"key2022032616312989900_ref016","unstructured":"DeSantis, P.J. (2014), \u201cCyber-mugging: summary and analysis of a simulated ICS\/SCADA attack\u201d, available at: www.jinfowar.com\/journal\/volume-13-issue-2\/cyber-mugging-summary-and-analysis-simulated-icsscada-attack (accessed 19 September 2021)."},{"issue":"2","key":"key2022032616312989900_ref017","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1109\/TPC.2002.1003695","article-title":"Magical numbers: the seven-plus-or-minus-two myth","volume":"45","year":"2002","journal-title":"IEEE Transactions on Professional Communication"},{"key":"key2022032616312989900_ref018","unstructured":"Edwards, H., Dunlop, M., Mallick, A. and O\u2019Callaghan, F. (2015), \u201cOutcomes following childhood arterial ischaemic stroke: a Delphi consensus on what parents want from future research\u201d, available at: www.semanticscholar.org\/paper\/Outcomes-following-childhood-arterial-ischaemic-a-Edwards-Dunlop\/2965e01e5f06ab6c4a76cee0c6ee0c272a4a59f8 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref019","doi-asserted-by":"crossref","unstructured":"Forget, A. and Biddle, R. (2008), \u201cMemorability of persuasive passwords\u201d, available at: https:\/\/dl.acm.org\/doi\/abs\/10.1145\/1358628.1358926 (accessed 19 September 2021).","DOI":"10.1145\/1358628.1358926"},{"key":"key2022032616312989900_ref020","unstructured":"French, A.M. (2012), \u201cA case study on e-banking security \u2013 when security becomes too sophisticated for the user to access their information\u201d, available at: www.researchgate.net\/publication\/288777743_A_Case_Study_on_E_-_Banking_Security_-_When_Security_Becomes_Too_Sophisticated_for_the_User_to_Access_Their_Information (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref021","unstructured":"Gahlot, A. and Gupta, U. (2016), \u201cGaze-based authentication in cloud computing\u201d, available at: www.ijcaonline.org\/proceedings\/rtfem2016\/number1\/25481-5112 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref022","unstructured":"Gao, X., Yang, Y., Liu, C., Mitropoulos, C., Lindqvist, J. and Oulasvirta, A. (2018), \u201cForgetting of passwords: ecological theory and data. Baltimore\u201d, available at: www.usenix.org\/conference\/usenixsecurity18\/presentation\/gao-xianyi (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref023","unstructured":"Gerlitz, E., H\u00e4ring, M. and Smith, M. (2021), \u201cPlease do not use! ? Or your license plate number: analyzing password policies in German companies\u201d, available at: www.usenix.org\/conference\/soups2021\/presentation\/gerlitz (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref024","doi-asserted-by":"crossref","unstructured":"Goericke, S. (2020), \u201cThe future of software quality assurance\u201d, available at: https:\/\/link.springer.com\/book\/10.1007\/978-3-030-29509-7 (accessed 19 September 2021).","DOI":"10.1007\/978-3-030-29509-7"},{"key":"key2022032616312989900_ref025","unstructured":"Goorha, P. and Potts, J. (2019), \u201cMechanisms of the theory of ideas\u201d, available at: https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-94884-3_3 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref026","doi-asserted-by":"crossref","unstructured":"Grassi, P.A., Garcia, M.E. and Fenton, J.L. (2017), \u201cDigital identity guidelines: enrollment and identity proofing\u201d, available at: https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-63a\/final (accessed 19 September 2021).","DOI":"10.6028\/NIST.SP.800-63a"},{"issue":"4","key":"key2022032616312989900_ref028","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/MNET.001.1900482","article-title":"Group password strength meter based on attention mechanism","volume":"34","year":"2020","journal-title":"IEEE Network"},{"key":"key2022032616312989900_ref029","doi-asserted-by":"crossref","unstructured":"He, Y. Alem, E.E. and Wang, W. (2020b), \u201cHybritus: a password strength checker by ensemble learning from the query feedbacks of websites\u201d, available at: https:\/\/link.springer.com\/article\/10.1007\/s11704-019-7342-y (accessed 19 September 2021).","DOI":"10.1007\/s11704-019-7342-y"},{"key":"key2022032616312989900_ref027","unstructured":"He, J., Tang, Z., Wu, D., Wu, L., Lin, C. and Luo, F. (2019), \u201cMultidimensional data security exchange modeling and its optimization\u201d, available at: http:\/\/ieeexplore.ieee.org\/document\/9003368 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref030","unstructured":"Heuer, H. and Sanders, A.F. (1989), \u201cPerspectives on perception and action\u201d, available at: www.jstor.org\/stable\/1423061 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref031","unstructured":"Hevner, A.R., March, S.T., Park, J. and Ram, S. (2004), \u201cDesign science in information systems research\u201d, available at: www.jstor.org\/stable\/25148625 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref032","doi-asserted-by":"crossref","unstructured":"Ho, J., Tumkaya, T., Aryal, S., Choi, H. and Claridge-Chang, A. (2019), \u201cMoving beyond P values: data analysis with estimation graphics\u201d, available at: www.researchgate.net\/publication\/333884529_Moving_beyond_P_values_data_analysis_with_estimation_graphics (accessed 19 September 2021).","DOI":"10.1101\/377978"},{"key":"key2022032616312989900_ref033","doi-asserted-by":"crossref","unstructured":"Hussain, T., Atta, K., Bawany, N.Z. and Qamar, T. (2018), \u201cPasswords and user behavior\u201d, available at: www.researchgate.net\/publication\/319815106_Passwords_and_User_Behavior (accessed 19 September 2021).","DOI":"10.17706\/jcp.13.6.692-704"},{"key":"key2022032616312989900_ref034","doi-asserted-by":"crossref","unstructured":"Jakobsson, M. and Dhiman, M. (2012), \u201cThe benefits of understanding passwords\u201d, available at: https:\/\/dl.acm.org\/doi\/10.5555\/2372387.2372397 (accessed 19 September 2021).","DOI":"10.1007\/978-1-4614-4878-5_2"},{"key":"key2022032616312989900_ref036","doi-asserted-by":"crossref","unstructured":"John, B.E. and Kieras, D.E. (1994), \u201cThe GOMS family of analysis techniques: tools for design and evaluation\u201d, available at: https:\/\/dl.acm.org\/doi\/10.1145\/235833.236054 (accessed 19 September 2021).","DOI":"10.21236\/ADA309174"},{"key":"key2022032616312989900_ref035","unstructured":"John, B., Kadadevaramath, R.S. and Edinbarough, I.A. (2017), \u201cDesigning software development processes to optimize multiple output performance characteristics\u201d, available at: www.proquest.com\/openview\/666919c19d0eb7a37a94bc65d5f707d4\/1?pq-origsite=gscholar&cbl=25782 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref037","doi-asserted-by":"crossref","unstructured":"Kang, W., Liu, H., Luo, W. and Deng, F. (2020), \u201cStudy of a full-view 3D finger vein verification technique\u201d, available at: https:\/\/ieeexplore.ieee.org\/document\/8763986 (accessed 19 September 2021).","DOI":"10.1109\/TIFS.2019.2928507"},{"key":"key2022032616312989900_ref038","unstructured":"Kasiani, K. and Yusuf, M. (2019), \u201cDeveloping ergonomics-based practice system to improve students typing skills\u201d, available at: https:\/\/sloap.org\/journals\/index.php\/irjeis\/article\/view\/688 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref039a","unstructured":"Keith, M., Shao, B. and Steinbart, P. (2007), \u201cThe usability of passphrases for authentication: an empirical field study\u201d, available at: www.sciencedirect.com\/science\/article\/abs\/pii\/S1071581906001236 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref039","doi-asserted-by":"crossref","unstructured":"Keith, M., Shao, B. and Steinbart, P. (2009), \u201cA behavioral analysis of passphrase design and effectiveness\u201d, available at: https:\/\/aisel.aisnet.org\/jais\/vol10\/iss2\/2\/ (accessed 19 September 2021).","DOI":"10.17705\/1jais.00184"},{"key":"key2022032616312989900_ref040","doi-asserted-by":"crossref","unstructured":"Kelley, P.G., Komanduri, S., Mazurek, M.L., Shay, R., Vidas, T., Bauer, L., Christin, N., Cranor, L.F. and Lopez, J. (2012), \u201cGuess again (and again and again): measuring password strength by simulating password-cracking algorithms\u201d, available at: https:\/\/ieeexplore.ieee.org\/stamp\/stamp.jsp?arnumber=6234434 (accessed 19 September 2021).","DOI":"10.21236\/ADA570747"},{"key":"key2022032616312989900_ref041","doi-asserted-by":"crossref","unstructured":"Koester, H.H. and Mankowski, J. (2015), \u201cAutomatic adjustment of keyboard settings can enhance typing\u201d, available at: www.researchgate.net\/publication\/279169992_Automatic_Adjustment_of_Keyboard_Settings_Can_Enhance_Typing (accessed 19 September 2021).","DOI":"10.1080\/10400435.2014.997899"},{"key":"key2022032616312989900_ref042","unstructured":"Kozak, M., Krzanowski, W., Cichocka, I. and Hartley, J. (2015), \u201cThe effects of data input errors on subsequent statistical inference\u201d, available at: www.tandfonline.com\/doi\/abs\/10.1080\/02664763.2015.1016410 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref043","unstructured":"Lau, S.H., Siena, S., Pandey, A., Sosothikul, S., Cranor, L., Ur, B. and Shay, R. (2014), \u201cExploring the usability of pronounceable passwords\u201d, available at: www.semanticscholar.org\/paper\/Exploring-the-Usability-of-Pronounceable-Passwords-Lau-Siena\/726b0dc7a95f9ffefbc72dcd4095d2c22a0aae86 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref044","doi-asserted-by":"crossref","unstructured":"Leino, K., Oulasvirta, A. and Kurimo, M. (2019a), \u201cRL-KLM: automating keystroke-level modeling with reinforcement learning\u201d, available at: https:\/\/dl.acm.org\/doi\/10.1145\/3301275.3302285 (accessed 19 September 2021).","DOI":"10.1145\/3301275.3302285"},{"key":"key2022032616312989900_ref045","doi-asserted-by":"crossref","unstructured":"Leino, K., Todi, K., Oulasvirta, A. and Kurimo, M. (2019b), \u201cComputer-supported form design using keystroke-level modeling with reinforcement learning\u201d, available at: https:\/\/dl.acm.org\/doi\/10.1145\/3308557.3308704 (accessed 19 September 2021).","DOI":"10.1145\/3308557.3308704"},{"key":"key2022032616312989900_ref046","doi-asserted-by":"crossref","unstructured":"Maoneke, P.B. and Flowerday, S. (2019), \u201cPassword policies adopted by South African organizations: influential factors and weaknesses\u201d, available at: https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-11407-7_3 (accessed 19 September 2021).","DOI":"10.1007\/978-3-030-11407-7_3"},{"key":"key2022032616312989900_ref047","unstructured":"Melicher, W., Ur, B., Segreti, S.M., Komanduri, S., Bauer, L., Christin, N. and Cranor, L.F. (2016), \u201cFast, lean, and accurate: modeling password guess ability using neural networks\u201d, available at: https:\/\/dl.acm.org\/doi\/10.5555\/3241094.3241109 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref048","unstructured":"Miller, G. (1956), \u201cThe magical number seven, plus or minus two: some limits on our capacity for processing information\u201d, available at: https:\/\/psycnet.apa.org\/record\/1957-02914-001 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref049","unstructured":"Monrose, F. and Rubin, A.D. (2000), \u201cKeystroke dynamics as a biometric for authentication\u201d, available at: www.sciencedirect.com\/science\/article\/abs\/pii\/S0167739X9900059X#:\u223c:text=how%20you%20type-Keystroke%20dynamics%20is%20the%20process%20of%20analyzing%20the%20way%20a_on%20habitual%20typing%20rhythm%20patterns (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref050","doi-asserted-by":"crossref","unstructured":"Mudasih, I. and Subroto, W.T. (2019), \u201cComparison of student learning outcomes through video learning media with powerpoint\u201d, available at: www.ijere.com\/article\/comparison-of-student-learning-outcomes-through-video-learning-media-with-powerpoint (accessed 19 September 2021).","DOI":"10.24331\/ijere.517997"},{"key":"key2022032616312989900_ref051","unstructured":"Muhamad, W.N.W., Razali, N.A.M., Ishak, K.K., Hasbullah, N.A., Zainudin, N.M., Ramli, S., Wook, M., Ishak, Z. and MSaad, N.J.A. (2019), \u201cEnhance multi-factor authentication model for intelligence community access to critical surveillance data\u201d, available at: https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-34032-2_49 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref052","unstructured":"Pal, B., Daniel, T., Chatterjee, R. and Ristenpar, T. (2019), \u201cBeyond credential stuffing: password similarity models using neural networks\u201d, available at: www.semanticscholar.org\/paper\/Beyond-Credential-Stuffing%3A-Password-Similarity-Pal-Daniel\/ccfd04396b1f520e34f90fdb3ba4b81044e4a061 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref053","doi-asserted-by":"crossref","unstructured":"Pansa, D. and Chomsiri, T. (2018), \u201cIntegrating the dynamic password authentication with possession factor and CAPTCHA\u201d, available at: https:\/\/ieeexplore.ieee.org\/document\/8716067 (accessed 19 September 2021).","DOI":"10.1109\/SCIS-ISIS.2018.00093"},{"key":"key2022032616312989900_ref054","doi-asserted-by":"crossref","unstructured":"Parkinson, S., Khan, S., Crampton, A., Xu, Q., Xie, W., Liu, N. and Dakin, K. (2021), \u201cPassword policy characteristics and keystroke biometric authentication\u201d, available at: https:\/\/pure.hud.ac.uk\/en\/publications\/password-policy-characteristics-and-keystroke-biometric-authentic (accessed 19 September 2021).","DOI":"10.1049\/bme2.12017"},{"key":"key2022032616312989900_ref055","unstructured":"Parsons, K., McCormac, A., Butavicius, M. and Ferguson, L. (2010), \u201cHuman factors and information security: individual, culture and security environment\u201d, available at: https:\/\/www.semanticscholar.org\/paper\/Human-Factors-and-Information-Security-%3A-Individual-Parsons-McCormac\/8be2087c789a1e1f37bae5e3d397ca7a36fc5d3f (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref056","doi-asserted-by":"crossref","unstructured":"Permatasari, A. (2020), \u201cThe influence of perceived value towards customer satisfaction in hostel business: a case of young adult tourist in Indonesia\u201d, available at: www.igi-global.com\/article\/the-influence-of-perceived-value-towards-customer-satisfaction-in-hostel-business\/259004 (accessed 19 September 2021).","DOI":"10.4018\/IJTHMDA.2020070102"},{"key":"key2022032616312989900_ref057","unstructured":"Proctor, R.W., Lien, M.C., Vu, K.P.L., Schultz, E.E. and Salvendy, G. (2002), \u201cImproving computer security for authentication of users: influence of proactive password restrictions\u201d, available at: https:\/\/link.springer.com\/article\/10.3758\/BF03195438 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref058","unstructured":"Renaud, K. (2019), \u201cPeople need an incentive to use strong passwords, we gave them one\u201d, available at: www.wsj.com\/articles\/people-need-an-incentive-to-use-strong-passwords-we-gave-them-one-11568734702 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref059","unstructured":"Sasse, M.A., Steves, M., Krol, K. and Chisnell, D. (2014), \u201cThe great authentication fatigue \u2013 and how to overcome it\u201d, available at: https:\/\/link.springer.com\/chapter\/10.1007\/978-3-319-07308-8_23 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref060","unstructured":"Sawant, M.M., Nagargoje, Y., Bora, D., Shelke, S. and Borate, V. (2013), \u201cKeystroke dynamics: review paper\u201d, available at: www.ijcaonline.org\/proceedings\/icrtstmsd2018\/number1\/30846-1806 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref061","doi-asserted-by":"crossref","unstructured":"Shannon, C.E. (1948), \u201cA mathematical theory of communication\u201d, available at: https:\/\/ieeexplore.ieee.org\/document\/6773024 (accessed 19 September 2021).","DOI":"10.7551\/mitpress\/12274.003.0014"},{"key":"key2022032616312989900_ref062","doi-asserted-by":"crossref","unstructured":"Shay, R., Komanduri, S., Kelley, P.G., Leon, P.G., Mazurek, M.L., Bauer, L., Christin, N. and Cranor, L.F. (2010), \u201cEncountering stronger password requirements: user attitudes and behaviors\u201d, available at: https:\/\/dl.acm.org\/doi\/10.1145\/1837110.1837113 (accessed 19 September 2021).","DOI":"10.1145\/1837110.1837113"},{"key":"key2022032616312989900_ref063","doi-asserted-by":"crossref","unstructured":"Shay, R., Kelley, P.G., Komanduri, S., Mazurek, M.L., Ur, B., Vidas, T., Bauer, L., Christin, N. and Cranor, L.F. (2012), \u201cCorrect horse battery staple: exploring the usability of system-assigned passphrases\u201d, available at: https:\/\/dl.acm.org\/doi\/abs\/10.1145\/2335356.2335366 (accessed 19 September 2021).","DOI":"10.1145\/2335356.2335366"},{"key":"key2022032616312989900_ref064","unstructured":"Shay, R., Komanduri, S., Durity, A.L., Huh, P., Mazurek, M.L., Segreti, S.M., Ur, B., Bauer, L., Christin, N. and Cranor, L.F. (2014), \u201cCan long passwords be secure and usable?\u201d, available at: https:\/\/dl.acm.org\/doi\/10.1145\/2556288.2557377#:\u223c:text=Recent%20research%20has%20suggested%2C%20however_secure%20than%20this%20traditional%20policy.&text=Our%20analyses%20additionally%20reveal%20common%20patterns%20and%20strings%20found%20in%20cracked%20passwords (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref065","unstructured":"Skovgaard, C., Almquist, N.W. and Bangsbo, J. (2018), \u201cThe effect of repeated periods of speed endurance training on performance, running economy, and muscle adaptations\u201d, available at: https:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/sms.12916 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref066","doi-asserted-by":"crossref","unstructured":"Teh, P.S., Teoh, A.B.J. and Yue, S. (2013), \u201cA survey of keystroke dynamics biometrics\u201d, available at: www.hindawi.com\/journals\/tswj\/2013\/408280\/ (accessed 19 September 2021).","DOI":"10.1155\/2013\/408280"},{"key":"key2022032616312989900_ref067","unstructured":"Trumbo, C.W. (2002), \u201cInformation processing and risk perception: an adaptation of the heuristic-systematic model\u201d, available at: www.semanticscholar.org\/paper\/Information-Processing-and-Risk-Perception%3A-An-of-Trumbo\/f39961261a747389f2851c0695297a6cc1e8da60 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref068a","unstructured":"Victor, A.N., Noel, M., Victor, L., Baba, M. and Ekundayo, A. (2018), \u201cPassword knowledge versus password management\u201d, available at: www.researchgate.net\/publication\/332734638_PASSWORD_KNOWLEDGE_VERSUS_PASSWORD_MANAGEMENT (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref068","unstructured":"Walia, K.S., Shenoy, S. and Cheng, Y. (2020), \u201cAn empirical analysis on the usability and security of passwords\u201d, available at: https:\/\/ieeexplore.ieee.org\/document\/9191658 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref069","unstructured":"Wang, D. and Wang, P. (2015), \u201cOn the usability of two-factor authentication\u201d, available at: https:\/\/eudl.eu\/doi\/10.1007\/978-3-319-23829-6_11 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref070","doi-asserted-by":"crossref","unstructured":"Wash, R. and MacKie-Mason, J.K. (2007), \u201cSecurity when people matter: structuring incentives for user behavior\u201d, available at: https:\/\/dl.acm.org\/doi\/10.1145\/1282100.1282105 (accessed 19 September 2021).","DOI":"10.1145\/1282100.1282105"},{"key":"key2022032616312989900_ref071","doi-asserted-by":"crossref","unstructured":"Wash, R. and Rader, E. (2021), \u201cPrioritizing security over usability: strategies for how people choose passwords\u201d, available at: https:\/\/academic.oup.com\/cybersecurity\/article\/7\/1\/tyab012\/6291418 (accessed 19 September 2021).","DOI":"10.1093\/cybsec\/tyab012"},{"key":"key2022032616312989900_ref072","unstructured":"Wash, R., Rader, E., Berman, R. and Wellmer, Z. (2016), \u201cUnderstanding password choices: how frequently entered passwords are re-used across websites\u201d, available at: www.usenix.org\/conference\/soups2016\/technical-sessions\/presentation\/wash (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref073","unstructured":"Wheeler, D.L. (2016), \u201cZxcvbn: low-budget password strength estimation\u201d, available at: www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/wheeler (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref074","doi-asserted-by":"crossref","unstructured":"Woo, S.S. and Mirkovic, J. (2018), \u201cGuidedPass: helping users to create strong and memorable passwords\u201d, available at: https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-00470-5_12 (accessed 19 September 2021).","DOI":"10.1007\/978-3-030-00470-5_12"},{"key":"key2022032616312989900_ref075","doi-asserted-by":"crossref","unstructured":"Wright, N., Patrick, A.S. and Biddle, R. (2012), \u201cDo you see your password? Applying recognition to textual passwords\u201d, available at: www.researchgate.net\/publication\/241770661_Do_you_see_your_password_Applying_recognition_to_textual_passwords (accessed 19 September 2021).","DOI":"10.1145\/2335356.2335367"},{"key":"key2022032616312989900_ref076","unstructured":"Yang, Y., Lindqvist, J. and Oulasvirta, A. (2014), \u201cText entry method affects password security\u201d, available at: www.researchgate.net\/publication\/260678570_Text_Entry_Method_Affects_Password_Security (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref077","unstructured":"Yazdi, M.A.A., Negahban, A., Cavuoto, L. and Megahed, F.M. (2019), \u201cOptimization of split keyboard design for touchscreen devices\u201d, available at: www.researchgate.net\/publication\/324661875_Optimization_of_Split_Keyboard_Design_for_Touchscreen_Devices (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref078","unstructured":"Zhang, L. and McDowell, W.C. (2009), \u201cAm I really at risk? Determinants of online users' intentions to use strong passwords\u201d, available at: www.tandfonline.com\/doi\/abs\/10.1080\/15332860903467508 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref079","unstructured":"Zhang, Z., Zhang, Z. and Yang, Y. (2016), \u201cThe power of expert identity: how website-recognized expert reviews\u201d, available at: www.sciencedirect.com\/science\/article\/abs\/pii\/S0261517716300048 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref080","doi-asserted-by":"crossref","unstructured":"Zheng, Y., Jiang, Y., Dorsch, M.P., Ding, Y., Vydiswaran, V.V. and Lester, C.A. (2021), \u201cWork effort, readability and quality of pharmacy transcription of patient directions from electronic prescriptions: a retrospective observational cohort analysis\u201d, available at: https:\/\/qualitysafety.bmj.com\/content\/30\/4\/311 (accessed 19 September 2021).","DOI":"10.1136\/bmjqs-2019-010405"},{"key":"key2022032616312989900_ref081","unstructured":"Zimmermann, V. and Gerber, N. (2020), \u201cThe password is dead, long live the password \u2013 a laboratory study on user perceptions of authentication schemes\u201d, available at: www.sciencedirect.com\/science\/article\/abs\/pii\/S1071581919301119 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref082","unstructured":"Adama, V.N., Dogonyaro, N.M., Yisa, V.L., Meshach, B. and Ayobami, E. (2018), \u201cPassword knowledge versus password management. I-manager's\u201d, available at: www.proquest.com\/openview\/a54ea2e11f37315a3fa331f37cf9ef07\/1?pq-origsite=gscholar&cbl=2037358 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref083","unstructured":"Adams, A. and Sasse, M.A. (1999), \u201cUsers are not the enemy\u201d, available at: https:\/\/dl.acm.org\/doi\/10.1145\/322796.322806 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref084","doi-asserted-by":"crossref","unstructured":"Althubaiti, S. (2017), \u201cImproving the design and usability of password creation systems. Denver\u201d, available at: https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3027063.3027131 (accessed 19 September 2021).","DOI":"10.1145\/3027063.3027131"},{"key":"key2022032616312989900_ref085","unstructured":"Bhivgade, T., Bhusari, M., Kuthe, A., Jiddewar, B. and Dubey, P. (2014), \u201cMulti-factor authentication in banking sector\u201d, available at: www.semanticscholar.org\/paper\/Multi-factor-Authentication-in-Banking-Sector-Bhivgade-Bhusari\/14f322162470056ce6f18fa8a30c0cf7f6d78748 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref086","unstructured":"Furnell, S. (2007), \u201cAn assessment of website password practices\u201d, available at: www.sciencedirect.com\/science\/article\/pii\/S0167404807001083 (accessed 19 September 2021)."},{"key":"key2022032616312989900_ref087","doi-asserted-by":"crossref","unstructured":"Golla, M. and D\u00fcrmuth, M. (2018), \u201cOn the accuracy of password strength meters\u201d, available at: https:\/\/dl.acm.org\/doi\/10.1145\/3243734.3243769 (accessed 19 September 2021).","DOI":"10.1145\/3243734.3243769"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-07-2021-0093\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-07-2021-0093\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:23:04Z","timestamp":1753406584000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/30\/2\/280-305\/111625"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,11,30]]},"references-count":89,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2021,11,30]]},"published-print":{"date-parts":[[2022,3,29]]}},"alternative-id":["10.1108\/ICS-07-2021-0093"],"URL":"https:\/\/doi.org\/10.1108\/ics-07-2021-0093","relation":{},"ISSN":["2056-4961","2056-4961"],"issn-type":[{"value":"2056-4961","type":"print"},{"value":"2056-4961","type":"print"}],"subject":[],"published":{"date-parts":[[2021,11,30]]}}}