{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T15:53:03Z","timestamp":1776095583374,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,4,10]],"date-time":"2010-04-10T00:00:00Z","timestamp":1270857600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,4,10]]},"DOI":"10.1145\/1753326.1753384","type":"proceedings-article","created":{"date-parts":[[2010,4,12]],"date-time":"2010-04-12T18:13:40Z","timestamp":1271096020000},"page":"383-392","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":194,"title":["The true cost of unusable password policies"],"prefix":"10.1145","author":[{"given":"Philip G.","family":"Inglesant","sequence":"first","affiliation":[{"name":"University College London, London, United Kingdom"}]},{"given":"M. Angela","family":"Sasse","sequence":"additional","affiliation":[{"name":"University College London, London, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2010,4,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_2_1","unstructured":"Allan A. Passwords Are Near the Breaking Point: Gartner Research Note (2004). http:\/\/www.indevis.de\/dokumente\/gartner_passwords_breakpoint.pdf.  Allan A. Passwords Are Near the Breaking Point: Gartner Research Note (2004). http:\/\/www.indevis.de\/dokumente\/gartner_passwords_breakpoint.pdf."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595676.1595684"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/508171.508178"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/332040.332472"},{"key":"e_1_3_2_1_6_1","volume-title":"SAGE Publications","author":"Charmaz K.","year":"2006"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-004-0308-5"},{"key":"e_1_3_2_1_8_1","unstructured":"Electric Alchemy Cracking Passwords in the Cloud: Insights on Password Policies http:\/\/news.electricalchemy.net\/2009\/10\/passwordcracking-in-cloud-part-5.html.  Electric Alchemy Cracking Passwords in the Cloud: Insights on Password Policies http:\/\/news.electricalchemy.net\/2009\/10\/passwordcracking-in-cloud-part-5.html."},{"key":"e_1_3_2_1_9_1","unstructured":"Federal Information Processing Standards Publication 112: Password Usage (Withdrawn February 2008) (1985) http:\/\/www.itl.nist.gov\/fipspubs\/fip112.htm.  Federal Information Processing Standards Publication 112: Password Usage (Withdrawn February 2008) (1985) http:\/\/www.itl.nist.gov\/fipspubs\/fip112.htm."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. HotSec'07","author":"Flor\u00eancio D.","year":"2007"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"e_1_3_2_1_14_1","unstructured":"National Institute of Science and Technology NIST Special Publication 800--118: Guide to Enterprise Password Management (Draft): Recommendations of the National Institute of Standards and Technology (2009). http:\/\/csrc.nist.gov\/publications\/drafts\/800-118\/draft-sp800-118.pdf.  National Institute of Science and Technology NIST Special Publication 800--118: Guide to Enterprise Password Management (Draft): Recommendations of the National Institute of Standards and Technology (2009). http:\/\/csrc.nist.gov\/publications\/drafts\/800-118\/draft-sp800-118.pdf."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/587078.587092"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011902718709"},{"key":"e_1_3_2_1_17_1","unstructured":"Schneier B. Secrets and Lies: Digital Security in a Networked World Wiley Indianapolis IN USA (2000).   Schneier B. Secrets and Lies: Digital Security in a Networked World Wiley Indianapolis IN USA (2000)."},{"key":"e_1_3_2_1_18_1","unstructured":"Schneier B. Write Down Your Password (2005). http:\/\/www.schneier.com\/blog\/archives\/2005\/06\/write_down_your.html.  Schneier B. Write Down Your Password (2005). http:\/\/www.schneier.com\/blog\/archives\/2005\/06\/write_down_your.html."},{"key":"e_1_3_2_1_19_1","unstructured":"Scientific Software Development 2006 'ATLAS.ti The Knowledge Workbench'.  Scientific Software Development 2006 'ATLAS.ti The Knowledge Workbench'."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240759"},{"key":"e_1_3_2_1_21_1","unstructured":"Trust Economics. http:\/\/www.trust-economics.org\/.  Trust Economics. http:\/\/www.trust-economics.org\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1999.11518226"}],"event":{"name":"CHI '10: CHI Conference on Human Factors in Computing Systems","location":"Atlanta Georgia USA","acronym":"CHI '10","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the SIGCHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1753326.1753384","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1753326.1753384","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:23:27Z","timestamp":1750245807000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1753326.1753384"}},"subtitle":["password use in the wild"],"short-title":[],"issued":{"date-parts":[[2010,4,10]]},"references-count":23,"alternative-id":["10.1145\/1753326.1753384","10.1145\/1753326"],"URL":"https:\/\/doi.org\/10.1145\/1753326.1753384","relation":{},"subject":[],"published":{"date-parts":[[2010,4,10]]},"assertion":[{"value":"2010-04-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}