{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T23:14:15Z","timestamp":1776122055352,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,4,29]],"date-time":"2007-04-29T00:00:00Z","timestamp":1177804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,4,29]]},"DOI":"10.1145\/1240624.1240759","type":"proceedings-article","created":{"date-parts":[[2007,6,6]],"date-time":"2007-06-06T14:37:31Z","timestamp":1181140651000},"page":"895-904","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":82,"title":["Password sharing"],"prefix":"10.1145","author":[{"given":"Supriya","family":"Singh","sequence":"first","affiliation":[{"name":"RMIT University, Melbourne, Australia"}]},{"given":"Anuja","family":"Cabraal","sequence":"additional","affiliation":[{"name":"RMIT University, Melbourne, Australia"}]},{"given":"Catherine","family":"Demosthenous","sequence":"additional","affiliation":[{"name":"Griffith University, Brisbane, Australia"}]},{"given":"Gunela","family":"Astbrink","sequence":"additional","affiliation":[{"name":"GSA Information Consulants, Brisbane, Australia"}]},{"given":"Michele","family":"Furlong","sequence":"additional","affiliation":[{"name":"GSA Information Consulants, Brisbane, Australia"}]}],"member":"320","published-online":{"date-parts":[[2007,4,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Interaction in the New Millennium","author":"Ackerman M.S.","year":"2002","unstructured":"Ackerman , M.S. The intellectual challenge of CSCW: The gap between social requirements and technical feasibility . in Carroll, J.M. ed. Human-Computer Interaction in the New Millennium , ACM Press , New York , 2002 , 303--324. Ackerman, M.S. The intellectual challenge of CSCW: The gap between social requirements and technical feasibility. in Carroll, J.M. ed. Human-Computer Interaction in the New Millennium, ACM Press, New York, 2002, 303--324."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/275283.275284"},{"key":"e_1_3_2_1_4_1","volume-title":"Stay safe online: ABA supports the e-security awareness week","author":"Australian Bankers' Association Inc.","year":"2006","unstructured":"Australian Bankers' Association Inc. Stay safe online: ABA supports the e-security awareness week , Australian Bankers' Association Inc , 2006 . Australian Bankers' Association Inc. Stay safe online: ABA supports the e-security awareness week, Australian Bankers' Association Inc, 2006."},{"key":"e_1_3_2_1_5_1","volume-title":"Australian Securities and Investment Commission","author":"Australian Securities and Investment Commission","year":"2002","unstructured":"Australian Securities and Investment Commission . Electronic Funds Transfer Code of Conduct: As revised by the Australian Securities & Investments Commission's EFT Working Group , Australian Securities and Investment Commission , Sydney , 2002 . Australian Securities and Investment Commission. Electronic Funds Transfer Code of Conduct: As revised by the Australian Securities & Investments Commission's EFT Working Group, Australian Securities and Investment Commission, Sydney, 2002."},{"key":"e_1_3_2_1_6_1","volume-title":"Taking users up the value chain: Australian Internet research","author":"Barr T.","year":"2004","unstructured":"Barr , T. , Knowles , A. and Moore , S . Taking users up the value chain: Australian Internet research , Smart Internet Technology Cooperative Research Centre , Melbourne , 2004 , 89. Barr, T., Knowles, A. and Moore, S. Taking users up the value chain: Australian Internet research, Smart Internet Technology Cooperative Research Centre, Melbourne, 2004, 89."},{"key":"e_1_3_2_1_7_1","volume-title":"Being Black: Aboriginal cultures in 'settled' Australia","author":"Birdsall C.","year":"1994","unstructured":"Birdsall , C. All in the family . in Keen, I. ed. Being Black: Aboriginal cultures in 'settled' Australia , Aboriginal Studies Press for the Australian Institute of Aboriginal Studies, Canberra, 1994 , 137--158. Birdsall, C. All in the family. in Keen, I. ed. Being Black: Aboriginal cultures in 'settled' Australia, Aboriginal Studies Press for the Australian Institute of Aboriginal Studies, Canberra, 1994, 137--158."},{"key":"e_1_3_2_1_8_1","volume-title":"Security and Usability: Designing Secure Systems that People Can Use","author":"Bishop M.","year":"2005","unstructured":"Bishop , M. Psychological acceptability revisited . in Cranor, L.F. and Garfinkel, S. eds. Security and Usability: Designing Secure Systems that People Can Use , O'Reilly , Sebastopol, CA , 2005 , 1--11. Bishop, M. Psychological acceptability revisited. in Cranor, L.F. and Garfinkel, S. eds. Security and Usability: Designing Secure Systems that People Can Use, O'Reilly, Sebastopol, CA, 2005, 1--11."},{"key":"e_1_3_2_1_9_1","volume-title":"The future of electronic commerce: A report of the Fourth Annual Aspen Institute Roundtable on Information Technology","author":"Bollier D.","year":"1996","unstructured":"Bollier , D. The future of electronic commerce: A report of the Fourth Annual Aspen Institute Roundtable on Information Technology , The Aspen Institute , Aspen, Colorado , 1996 . Bollier, D. The future of electronic commerce: A report of the Fourth Annual Aspen Institute Roundtable on Information Technology, The Aspen Institute, Aspen, Colorado, 1996."},{"issue":"2","key":"e_1_3_2_1_10_1","first-page":"3","article-title":"Banking tips and tricks","volume":"15","author":"Buchanan R","unstructured":"Buchanan , R . Banking tips and tricks . Link , 15 ( 2 ). 3 -- 5 . Buchanan, R. Banking tips and tricks. Link, 15 (2). 3--5.","journal-title":"Link"},{"key":"e_1_3_2_1_11_1","volume-title":"Security and Usability: Designing Secure Systems that People Can Use","author":"Cranor L.F.","year":"2005","unstructured":"Cranor , L.F. and Garfinkel , S . Preface . in Cranor, L.F. and Garfinkel, S. eds. Security and Usability: Designing Secure Systems that People Can Use , O'Reilly , Sebastopol, CA , 2005 , ix--xviii. Cranor, L.F. and Garfinkel, S. Preface. in Cranor, L.F. and Garfinkel, S. eds. Security and Usability: Designing Secure Systems that People Can Use, O'Reilly, Sebastopol, CA, 2005, ix--xviii."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251306.1251310"},{"key":"e_1_3_2_1_13_1","volume-title":"Trust and the perception of security","author":"D'Hertefelt S.","year":"2000","unstructured":"D'Hertefelt , S. Trust and the perception of security , 2000 . D'Hertefelt, S. Trust and the perception of security, 2000."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0308-5"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/555337"},{"key":"e_1_3_2_1_16_1","volume-title":"Interaction in the New Millennium","author":"Erickson T.","year":"2002","unstructured":"Erickson , T. and Kellogg , W.A . Social translucence: Designing systems that support social processes . in Carroll, J.M. ed. Human-Computer Interaction in the New Millennium , ACM Press , New York , 2002 , 325--345. Erickson, T. and Kellogg, W.A. Social translucence: Designing systems that support social processes. in Carroll, J.M. ed. Human-Computer Interaction in the New Millennium, ACM Press, New York, 2002, 325--345."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/286498.286699"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124862"},{"key":"e_1_3_2_1_19_1","volume-title":"The discovery of grounded theory: Strategies for qualitative research","author":"Glaser B.G.","year":"1967","unstructured":"Glaser , B.G. and Strauss , A.L . The discovery of grounded theory: Strategies for qualitative research . Aldine , Chicago , 1967 . Glaser, B.G. and Strauss, A.L. The discovery of grounded theory: Strategies for qualitative research. Aldine, Chicago, 1967."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470774298.ch"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0963-8687(03)00034-9"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Karat C.-M. Karat J. and Brodie C. Why HCI research in privacy and security is critical now. Human-Computer Studies 63. 1--4. 10.1016\/j.ijhcs.2005 04.016   Karat C.-M. Karat J. and Brodie C. Why HCI research in privacy and security is critical now. Human-Computer Studies 63. 1--4. 10.1016\/j.ijhcs.2005 04.016","DOI":"10.1016\/j.ijhcs.2005.04.016"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1108\/08876040210443418"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2004.01.002"},{"key":"e_1_3_2_1_25_1","volume-title":"Making and Breaking Cooperative Relations","author":"Luhmann N.","year":"1988","unstructured":"Luhmann , N. Familiarity , confidence, trust: problems and alternatives . in Gambetta, D. ed. Trust: Making and Breaking Cooperative Relations , Basil Blackwell , New York , 1988 , 94--107. Luhmann, N. Familiarity, confidence, trust: problems and alternatives. in Gambetta, D. ed. Trust: Making and Breaking Cooperative Relations, Basil Blackwell, New York, 1988, 94--107."},{"key":"e_1_3_2_1_26_1","volume-title":"The Internet: An ethnographic approach","author":"Miller D.","year":"2000","unstructured":"Miller , D. and Slater , D . The Internet: An ethnographic approach . Berg , Oxford , 2000 . Miller, D. and Slater, D. The Internet: An ethnographic approach. Berg, Oxford, 2000."},{"key":"e_1_3_2_1_27_1","volume-title":"CNET News.com","author":"Mills E.","year":"2006","unstructured":"Mills , E. Taking passwords to the grave , CNET News.com , 2006 , September 22. Mills, E. Taking passwords to the grave, CNET News.com, 2006, September 22."},{"key":"e_1_3_2_1_28_1","volume-title":"Readme First for a User's Guide to Qualitative Methods","author":"Morse J.M.","year":"2002","unstructured":"Morse , J.M. and Richards , L . Readme First for a User's Guide to Qualitative Methods . Sage Publications, Thousand Oaks , Calif ., 2002 . Morse, J.M. and Richards, L. Readme First for a User's Guide to Qualitative Methods. Sage Publications, Thousand Oaks, Calif., 2002."},{"key":"e_1_3_2_1_29_1","volume-title":"Accessible e-commerce in Australia: A discussion paper about the effects of electronic commerce developments on people with disabilities","author":"Noonan T.","year":"1999","unstructured":"Noonan , T. Accessible e-commerce in Australia: A discussion paper about the effects of electronic commerce developments on people with disabilities , 1999 . Noonan, T. Accessible e-commerce in Australia: A discussion paper about the effects of electronic commerce developments on people with disabilities, 1999."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/288759"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1057073"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_3_2_1_33_1","volume-title":"Security and Usability: Designing Secure Systems that People Can Use","author":"Renaud K.","year":"2005","unstructured":"Renaud , K. Evaluating authentication mechanisms . in Cranor, L.F. and Garfinkel, S. eds. Security and Usability: Designing Secure Systems that People Can Use , O'Reilly , Sebastopol, CA , 2005 , 103--128. Renaud, K. Evaluating authentication mechanisms. in Cranor, L.F. and Garfinkel, S. eds. Security and Usability: Designing Secure Systems that People Can Use, O'Reilly, Sebastopol, CA, 2005, 103--128."},{"key":"e_1_3_2_1_34_1","volume-title":"Bookup -- some consumer problems. A report for ASIC","author":"Renouf G.","year":"2002","unstructured":"Renouf , G. Bookup -- some consumer problems. A report for ASIC , 2002 . Renouf, G. Bookup -- some consumer problems. A report for ASIC, 2002."},{"key":"e_1_3_2_1_35_1","volume-title":"Usable security: Why do we need it? How do we get it? in Cranor","author":"Sasse M.A.","year":"2005","unstructured":"Sasse , M.A. and Flechais , I . Usable security: Why do we need it? How do we get it? in Cranor , L.F. and Garfinkel, S. eds. Security and Usability: Designing Secure Systems that People Can Use, O'Reilly , Sebastopol, CA, 2005 , 13--30. Sasse, M.A. and Flechais, I. Usable security: Why do we need it? How do we get it? in Cranor, L.F. and Garfinkel, S. eds. Security and Usability: Designing Secure Systems that People Can Use, O'Reilly, Sebastopol, CA, 2005, 13--30."},{"key":"e_1_3_2_1_36_1","volume-title":"Applied Cryptography","author":"Schneier B.","year":"1996","unstructured":"Schneier , B. Applied Cryptography . John Wiley & Sons , New York , 1996 . Schneier, B. Applied Cryptography. John Wiley & Sons, New York, 1996."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/517959"},{"key":"e_1_3_2_1_38_1","volume-title":"South East Arnhem Land Collaborative Research Project","author":"Senior K.","year":"2002","unstructured":"Senior , K. , Perkins , D. and Bern , J . Variation in material wellbeing in a welfare based economy , South East Arnhem Land Collaborative Research Project , University of Wollongong , Wollongong , 2002 . Senior, K., Perkins, D. and Bern, J. Variation in material wellbeing in a welfare based economy, South East Arnhem Land Collaborative Research Project, University of Wollongong, Wollongong, 2002."},{"key":"e_1_3_2_1_39_1","volume-title":"NSW","author":"Singh S.","year":"1997","unstructured":"Singh , S. Marriage money: the social shaping of money in marriage and banking. Allen & Unwin, St. Leonards , NSW , 1997 . Singh, S. Marriage money: the social shaping of money in marriage and banking. Allen & Unwin, St. Leonards, NSW, 1997."},{"key":"e_1_3_2_1_40_1","volume-title":"OZCHI","author":"Singh S.","year":"2004","unstructured":"Singh , S. and Cassar-Bartolo , K. , The privacy of money and health . in OZCHI , ( Wollongong , 2004 ). Singh, S. and Cassar-Bartolo, K., The privacy of money and health. in OZCHI, (Wollongong, 2004)."},{"key":"e_1_3_2_1_41_1","volume-title":"Banking and Life Stage. in CHI2006 Workshop on Privacy-Enhanced Personalization","author":"Singh S.","year":"2006","unstructured":"Singh , S. , Jackson , M. , Beekhuyzen , J. and Cabraal , A ., The Bank and I: Privacy , Banking and Life Stage. in CHI2006 Workshop on Privacy-Enhanced Personalization , ( Montreal, Canada , 2006 ), National Science Foundation, 74--82. Singh, S., Jackson, M., Beekhuyzen, J. and Cabraal, A., The Bank and I: Privacy, Banking and Life Stage. in CHI2006 Workshop on Privacy-Enhanced Personalization, (Montreal, Canada, 2006), National Science Foundation, 74--82."},{"key":"e_1_3_2_1_42_1","volume-title":"Centre for International Research on Communication and Information Technologies","author":"Singh S.","year":"1997","unstructured":"Singh , S. and Slegers , C . Trust and electronic money , Centre for International Research on Communication and Information Technologies , Melbourne , 1997 . Singh, S. and Slegers, C. Trust and electronic money, Centre for International Research on Communication and Information Technologies, Melbourne, 1997."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1567-4223(02)00017-0"},{"key":"e_1_3_2_1_44_1","volume-title":"Security and Usability: Designing Secure Systems that People Can Use","author":"Tognazzini B.","year":"2005","unstructured":"Tognazzini , B. Design for usability . in Cranor, L.F. and Garfinkel, S. eds. Security and Usability: Designing Secure Systems that People Can Use , O'Reilly , Sebastopol, CA , 2005 , 31--46. Tognazzini, B. Design for usability. in Cranor, L.F. and Garfinkel, S. eds. Security and Usability: Designing Secure Systems that People Can Use, O'Reilly, Sebastopol, CA, 2005, 31--46."},{"key":"e_1_3_2_1_45_1","volume-title":"Internet Banking Terms and Conditions","author":"Westpac Banking Corporation","year":"2006","unstructured":"Westpac Banking Corporation . Internet Banking Terms and Conditions , Sydney , 2006 . Westpac Banking Corporation. Internet Banking Terms and Conditions, Sydney, 2006."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.64"},{"key":"e_1_3_2_1_47_1","volume-title":"The social meaning of money","author":"Zelizer V.","year":"1994","unstructured":"Zelizer , V. The social meaning of money . Basic Books , New York , 1994 . Zelizer, V. The social meaning of money. Basic Books, New York, 1994."}],"event":{"name":"CHI07: CHI Conference on Human Factors in Computing Systems","location":"San Jose California USA","acronym":"CHI07","sponsor":["ACM Association for Computing Machinery","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the SIGCHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1240624.1240759","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1240624.1240759","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:34Z","timestamp":1750258294000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1240624.1240759"}},"subtitle":["implications for security design based on social practice"],"short-title":[],"issued":{"date-parts":[[2007,4,29]]},"references-count":47,"alternative-id":["10.1145\/1240624.1240759","10.1145\/1240624"],"URL":"https:\/\/doi.org\/10.1145\/1240624.1240759","relation":{},"subject":[],"published":{"date-parts":[[2007,4,29]]},"assertion":[{"value":"2007-04-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}