{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:11:47Z","timestamp":1772039507579,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T00:00:00Z","timestamp":1493683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"ITRC","award":["IITP-2016-R0992-16-1006"],"award-info":[{"award-number":["IITP-2016-R0992-16-1006"]}]},{"name":"NRFK","award":["2014R1A1A1003707"],"award-info":[{"award-number":["2014R1A1A1003707"]}]},{"name":"School of EECS, Oregon State University"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,2]]},"DOI":"10.1145\/3025453.3025788","type":"proceedings-article","created":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T18:37:22Z","timestamp":1493750242000},"page":"387-391","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["I'm too Busy to Reset my LinkedIn Password"],"prefix":"10.1145","author":[{"given":"Jun Ho","family":"Huh","sequence":"first","affiliation":[{"name":"Honeywell ACS Labs, Golden Valley, MN, USA"}]},{"given":"Hyoungshick","family":"Kim","sequence":"additional","affiliation":[{"name":"Sungkyunkwan University, Suwon-si, Gyeonggi-do , Republic of Korea"}]},{"given":"Swathi S.V.P.","family":"Rayala","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR, USA"}]},{"given":"Rakesh B.","family":"Bobba","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, OR, USA"}]},{"given":"Konstantin","family":"Beznosov","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]}],"member":"320","published-online":{"date-parts":[[2017,5,2]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Proceedings of the 9th Annual Workshop on the Economics of Information Security.","author":"Bonneau Joseph","year":"2010","unstructured":"Joseph Bonneau and S\u00f6ren Preibusch . 2010 . The Password Thicket: Technical and Market Failures in Human Authentication on the Web . In Proceedings of the 9th Annual Workshop on the Economics of Information Security. Joseph Bonneau and S\u00f6ren Preibusch. 2010. The Password Thicket: Technical and Market Failures in Human Authentication on the Web. In Proceedings of the 9th Annual Workshop on the Economics of Information Security."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0071-9"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702442"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2007.09.001"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSECP.2003.1253564"},{"key":"e_1_3_2_2_7_1","volume-title":"Resetting passwords to keep your files safe. https:\/\/blogs.dropbox.com\/dropbox\/2016\/08\/ resetting-passwords-to-keep-your-files-safe\/. (August","author":"Heim Patrick","year":"2016","unstructured":"Patrick Heim . 2016. Resetting passwords to keep your files safe. https:\/\/blogs.dropbox.com\/dropbox\/2016\/08\/ resetting-passwords-to-keep-your-files-safe\/. (August 2016 ). Patrick Heim. 2016. Resetting passwords to keep your files safe. https:\/\/blogs.dropbox.com\/dropbox\/2016\/08\/ resetting-passwords-to-keep-your-files-safe\/. (August 2016)."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572532.1572578"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-007-0064-y"},{"key":"e_1_3_2_2_10_1","volume-title":"Protecting Our Members. https: \/\/blog.linkedin.com\/2016\/05\/18\/protecting-our-members. (May","author":"Scott Cory","year":"2016","unstructured":"Cory Scott . 2016. Protecting Our Members. https: \/\/blog.linkedin.com\/2016\/05\/18\/protecting-our-members. (May 2016 ). Cory Scott. 2016. Protecting Our Members. https: \/\/blog.linkedin.com\/2016\/05\/18\/protecting-our-members. (May 2016)."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866328"}],"event":{"name":"CHI '17: CHI Conference on Human Factors in Computing Systems","location":"Denver Colorado USA","acronym":"CHI '17","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025788","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:24Z","timestamp":1750215804000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025788"}},"subtitle":["On the Effectiveness of Password Reset Emails"],"short-title":[],"issued":{"date-parts":[[2017,5,2]]},"references-count":11,"alternative-id":["10.1145\/3025453.3025788","10.1145\/3025453"],"URL":"https:\/\/doi.org\/10.1145\/3025453.3025788","relation":{},"subject":[],"published":{"date-parts":[[2017,5,2]]},"assertion":[{"value":"2017-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}