{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:11:18Z","timestamp":1761621078155,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,21]],"date-time":"2011-10-21T00:00:00Z","timestamp":1319155200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,21]]},"DOI":"10.1145\/2046642.2046652","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"33-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Johnny in internet caf\u00e9"],"prefix":"10.1145","author":[{"given":"Kemal","family":"Bicakci","sequence":"first","affiliation":[{"name":"TOBB University of Economics and Technology, Ankara, Turkey"}]},{"given":"Nart Bedin","family":"Atalay","sequence":"additional","affiliation":[{"name":"Selcuk University, Konya, Turkey"}]},{"given":"Hakan Ezgi","family":"Kiziloz","sequence":"additional","affiliation":[{"name":"TOBB University of Economics and Technology, Ankara, Turkey"}]}],"member":"320","published-online":{"date-parts":[[2011,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Browser Market Share http:\/\/marketshare.hitslink.com\/report.aspx?qprid=0 last accessed on 02\/July\/2011.  Browser Market Share http:\/\/marketshare.hitslink.com\/report.aspx?qprid=0 last accessed on 02\/July\/2011."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1387649.1387650"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124861"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143127"},{"key":"e_1_3_2_1_6_1","unstructured":"Peter Gutmann: Security usability http:\/\/www.cs.auckland.ac.nz\/~pgut001\/pubs\/usability.pdf February 2008. Draft. Last accessed on 02\/July\/2011.  Peter Gutmann: Security usability http:\/\/www.cs.auckland.ac.nz\/~pgut001\/pubs\/usability.pdf February 2008. Draft. Last accessed on 02\/July\/2011."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979326"},{"key":"e_1_3_2_1_8_1","unstructured":"C. Heilman. Web Security: Are you part of the problem. White paper http:\/\/coding.smashingmagazine.com\/2010\/01\/14\/web-security-primer-are-you-part-of-the-problem\/ last accessed on 02\/July\/2011.  C. Heilman. Web Security: Are you part of the problem. White paper http:\/\/coding.smashingmagazine.com\/2010\/01\/14\/web-security-primer-are-you-part-of-the-problem\/ last accessed on 02\/July\/2011."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_14"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359172"},{"key":"e_1_3_2_1_11_1","volume-title":"Security and Usability: Designing Secure Systems that People Can Use","author":"Nodder C.","year":"2005","unstructured":"C. Nodder : Users and trust: A microsoft case study . In L. F. Cranor and S. Garfinkel, editors, Security and Usability: Designing Secure Systems that People Can Use , August 2005 . C. Nodder: Users and trust: A microsoft case study. In L. F. Cranor and S. Garfinkel, editors, Security and Usability: Designing Secure Systems that People Can Use, August 2005."},{"key":"e_1_3_2_1_12_1","unstructured":"Kevin Purdy post to lifehacker.com Available at http:\/\/lifehacker.com\/5431466\/autocomplete-extension-makes-chrome-save-nearly-any-password last accessed on 02\/July\/2011.  Kevin Purdy post to lifehacker.com Available at http:\/\/lifehacker.com\/5431466\/autocomplete-extension-makes-chrome-save-nearly-any-password last accessed on 02\/July\/2011."},{"key":"e_1_3_2_1_13_1","unstructured":"Portable Firefox project available at http:\/\/portablefirefox.mozdev.org\/ last accessed on 02\/July\/2011.  Portable Firefox project available at http:\/\/portablefirefox.mozdev.org\/ last accessed on 02\/July\/2011."},{"key":"e_1_3_2_1_14_1","unstructured":"PTFB Pro Mouse AutoClicker and Macro Recorder http:\/\/www.ptfbpro.com last accessed on 02\/July\/2011.  PTFB Pro Mouse AutoClicker and Macro Recorder http:\/\/www.ptfbpro.com last accessed on 02\/July\/2011."},{"key":"e_1_3_2_1_15_1","volume-title":"Security and Usability: Designing Secure Systems that People Can Use","author":"Ross B.","year":"2005","unstructured":"B. Ross : Firefox and the worry free web . In L.F. Cranor and S.Garfinkel, editors, Security and Usability: Designing Secure Systems that People Can Use , August 2005 . B.Ross: Firefox and the worry free web. In L.F. Cranor and S.Garfinkel, editors, Security and Usability: Designing Secure Systems that People Can Use, August 2005."},{"key":"e_1_3_2_1_16_1","unstructured":"Brent Strange Password harvesting with AutoComplete available at http:\/\/www.testingreflections.com\/node\/view\/3482 last accessed on 02\/July\/2011.  Brent Strange Password harvesting with AutoComplete available at http:\/\/www.testingreflections.com\/node\/view\/3482 last accessed on 02\/July\/2011."},{"key":"e_1_3_2_1_17_1","unstructured":"Usage share of web browsers http:\/\/en.wikipedia.org\/wiki\/Usage_share_of_web_browsers  Usage share of web browsers http:\/\/en.wikipedia.org\/wiki\/Usage_share_of_web_browsers"},{"key":"e_1_3_2_1_18_1","unstructured":"Walker News Why IE8 Displays Security Warning When Loading HTTPS Page? http:\/\/www.walkernews.net\/2009\/10\/19\/why-ie8-displays-security-warning-when-loading-https-page\/.  Walker News Why IE8 Displays Security Warning When Loading HTTPS Page? http:\/\/www.walkernews.net\/2009\/10\/19\/why-ie8-displays-security-warning-when-loading-https-page\/."},{"key":"e_1_3_2_1_19_1","first-page":"169","volume-title":"8th USENIX Security Symposium","author":"Whitten Alma","year":"1999","unstructured":"Alma Whitten and J. D. Tygar . Why Johnny can't encrypt: A usability evaluation of PGP 5.0 . In 8th USENIX Security Symposium , pages 169 -- 184 . Usenix , 1999 . Alma Whitten and J. D. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In 8th USENIX Security Symposium, pages 169 -- 184. Usenix, 1999."},{"key":"e_1_3_2_1_20_1","unstructured":"Windows XP http:\/\/en.wikipedia.org\/wiki\/Windows_XP  Windows XP http:\/\/en.wikipedia.org\/wiki\/Windows_XP"}],"event":{"name":"CCS'11: the ACM Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Chicago Illinois USA","acronym":"CCS'11"},"container-title":["Proceedings of the 7th ACM workshop on Digital identity management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046642.2046652","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2046642.2046652","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:48:20Z","timestamp":1750240100000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2046642.2046652"}},"subtitle":["user study and exploration of password autocomplete in web browsers"],"short-title":[],"issued":{"date-parts":[[2011,10,21]]},"references-count":20,"alternative-id":["10.1145\/2046642.2046652","10.1145\/2046642"],"URL":"https:\/\/doi.org\/10.1145\/2046642.2046652","relation":{},"subject":[],"published":{"date-parts":[[2011,10,21]]},"assertion":[{"value":"2011-10-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}