{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T03:17:06Z","timestamp":1761621426302,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,5]],"date-time":"2018-12-05T00:00:00Z","timestamp":1543968000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Federal Ministry for Economic Affairs and Energy","award":["BMWi-VIA5-090168623-01-1\/2015"],"award-info":[{"award-number":["BMWi-VIA5-090168623-01-1\/2015"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,5]]},"DOI":"10.1145\/3167996.3167998","type":"proceedings-article","created":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T18:42:31Z","timestamp":1547059351000},"page":"16-27","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Addressing misconceptions about password security effectively"],"prefix":"10.1145","author":[{"given":"Peter","family":"Mayer","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt"}]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt and Karlstad University"}]}],"member":"320","published-online":{"date-parts":[[2018,12,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICEDSA.2016.7818558"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-017-0093-6"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143127"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979326"},{"key":"e_1_3_2_1_5_1","volume-title":"USENIX Security Symposium. 327--346","author":"Ion Iulia","year":"2015","unstructured":"Iulia Ion , Rob Reeder , and Sunny Consolvo . 2015 . \"... no one can hack my mind\": Comparing Expert and Non-Expert Security Practices . In USENIX Security Symposium. 327--346 . Iulia Ion, Rob Reeder, and Sunny Consolvo. 2015. \"...no one can hack my mind\": Comparing Expert and Non-Expert Security Practices. In USENIX Security Symposium. 327--346."},{"volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"Kauer Michaela","key":"e_1_3_2_1_6_1","unstructured":"Michaela Kauer , Sebastian G\u00fcnther , Daniel Storck , and Melanie Volkamer . 2013. A Comparison of American and German Folk Models of Home Computer Security . In Human Aspects of Information Security, Privacy, and Trust . Springer , 100--109. Michaela Kauer, Sebastian G\u00fcnther, Daniel Storck, and Melanie Volkamer. 2013. A Comparison of American and German Folk Models of Home Computer Security. In Human Aspects of Information Security, Privacy, and Trust. Springer, 100--109."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39345-7_29"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2015.23005"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3036699.3036712"},{"key":"e_1_3_2_1_10_1","volume-title":"Australasian Information Security Conference. Australian Computer Society, Inc., 71--78","author":"Notoatmodjo Gilbert","year":"2009","unstructured":"Gilbert Notoatmodjo and Clark Thomborson . 2009 . Passwords and perceptions . In Australasian Information Security Conference. Australian Computer Society, Inc., 71--78 . Gilbert Notoatmodjo and Clark Thomborson. 2009. Passwords and perceptions. In Australasian Information Security Conference. Australian Computer Society, Inc., 71--78."},{"key":"e_1_3_2_1_11_1","volume-title":"Jean-Paul Van Belle, and Ross Karia","author":"Parker Fayyaadh","year":"2015","unstructured":"Fayyaadh Parker , Jacques Ophoff , Jean-Paul Van Belle, and Ross Karia . 2015 . Security awareness and adoption of security controls by smartphone users. In eCrime Researchers Summit . Fayyaadh Parker, Jacques Ophoff, Jean-Paul Van Belle, and Ross Karia. 2015. Security awareness and adoption of security controls by smartphone users. In eCrime Researchers Summit."},{"volume-title":"Password creation strategies across high- and low-literacy web users","author":"Rinn Caitlin","key":"e_1_3_2_1_12_1","unstructured":"Caitlin Rinn , Kathryn Summers , Emily Rhodes , Jo\u00ebl Virothaisakun , and Dana Chisnell . 2015. Password creation strategies across high- and low-literacy web users . American Society for Information Science . Caitlin Rinn, Kathryn Summers, Emily Rhodes, Jo\u00ebl Virothaisakun, and Dana Chisnell. 2015. Password creation strategies across high- and low-literacy web users. American Society for Information Science."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011902718709"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2891411"},{"key":"e_1_3_2_1_15_1","volume-title":"The Password Life Cycle: User Behaviour in Managing Passwords. In USENIX Security Symposium.","author":"Stobert Elizabeth","year":"2014","unstructured":"Elizabeth Stobert and Robert Biddle . 2014 . The Password Life Cycle: User Behaviour in Managing Passwords. In USENIX Security Symposium. Elizabeth Stobert and Robert Biddle. 2014. The Password Life Cycle: User Behaviour in Managing Passwords. In USENIX Security Symposium."},{"key":"e_1_3_2_1_16_1","volume-title":"Expert Password Management. In International Conference on Passwords. Springer International Publishing, 3--20","author":"Stobert Elizabeth","year":"2015","unstructured":"Elizabeth Stobert and Robert Biddle . 2015 . Expert Password Management. In International Conference on Passwords. Springer International Publishing, 3--20 . Elizabeth Stobert and Robert Biddle. 2015. Expert Password Management. In International Conference on Passwords. Springer International Publishing, 3--20."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858546"},{"key":"e_1_3_2_1_18_1","volume-title":"Symposium on Usable Privacy and Security. 123--140","author":"Ur Blase","year":"2015","unstructured":"Blase Ur , Fumiko Noma , Jonathan Bees , Sean M Segreti , Richard Shay , Lujo Bauer , Nicolas Christin , and Lorrie Faith Cranor . 2015 . \" I Added'!'at the End to Make It Secure\": Observing Password Creation in the Lab . In Symposium on Usable Privacy and Security. 123--140 . Blase Ur, Fumiko Noma, Jonathan Bees, Sean M Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. 2015. \" I Added'!'at the End to Make It Secure\": Observing Password Creation in the Lab. In Symposium on Usable Privacy and Security. 123--140."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Ding Wang Debiao He Haibo Cheng and Ping Wang. 2016. fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars. In eCrime Researchers Summit.  Ding Wang Debiao He Haibo Cheng and Ping Wang. 2016. fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars. In eCrime Researchers Summit.","DOI":"10.1109\/DSN.2016.60"},{"key":"e_1_3_2_1_20_1","volume-title":"USENIX Security Symposium.","author":"Wash Rick","year":"2016","unstructured":"Rick Wash , Emilee Rader , Ruthie Berman , and Zac Wellmer . 2016 . Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites . In USENIX Security Symposium. Rick Wash, Emilee Rader, Ruthie Berman, and Zac Wellmer. 2016. Understanding Password Choices: How Frequently Entered Passwords Are Re-used across Websites. In USENIX Security Symposium."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/2163571.2163581"},{"key":"e_1_3_2_1_22_1","volume-title":"WEIS '10: The 9th Workshop on the Economics of Information Security","author":"Bonneau J","year":"2010","unstructured":"J Bonneau and S Preibusch . 2010 . The password thicket: technical and market failures in human authentication on the web . WEIS '10: The 9th Workshop on the Economics of Information Security (2010). J Bonneau and S Preibusch. 2010. The password thicket: technical and market failures in human authentication on the web. WEIS '10: The 9th Workshop on the Economics of Information Security (2010)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Nathan Bos Darren Gergle Judith S Olson and Gary M Olson. 2001. Being there versus seeing there: trust via video. ACM.  Nathan Bos Darren Gergle Judith S Olson and Gary M Olson. 2001. Being there versus seeing there: trust via video. ACM.","DOI":"10.1145\/634067.634240"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-015-0071-9"},{"key":"e_1_3_2_1_25_1","volume-title":"Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts. In USENIX Security Symposium.","author":"Flor\u00eancio Dinei","year":"2014","unstructured":"Dinei Flor\u00eancio , Cormac Herley , and Paul C van Oorschot . 2014 . Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts. In USENIX Security Symposium. Dinei Flor\u00eancio, Cormac Herley, and Paul C van Oorschot. 2014. Password Portfolios and the Finite-Effort User: Sustainably Managing Large Numbers of Accounts. In USENIX Security Symposium."},{"key":"e_1_3_2_1_27_1","volume-title":"European Conference on Information Systems. 1--20","author":"Haeussinger Felix","year":"2017","unstructured":"Felix Haeussinger and Johann Kranz . 2017 . Antecedents of Employees' Information Security Awareness - Review, Synthesis, and Directions for Future Research . In European Conference on Information Systems. 1--20 . Felix Haeussinger and Johann Kranz. 2017. Antecedents of Employees' Information Security Awareness - Review, Synthesis, and Directions for Future Research. In European Conference on Information Systems. 1--20."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753384"},{"key":"e_1_3_2_1_29_1","volume-title":"Password Guidance: Simplifying Your Approach. Technical Report.","author":"National Cyber Security Centre.","year":"2016","unstructured":"National Cyber Security Centre. 2016 . Password Guidance: Simplifying Your Approach. Technical Report. National Cyber Security Centre. 2016. Password Guidance: Simplifying Your Approach. Technical Report."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-64483-7_13"},{"key":"e_1_3_2_1_31_1","volume-title":"Payment Card Industry (PCI) Data Security Standard (Version 3.2). (April","author":"PCI Security Standards Council LLC. 2016.","year":"2016","unstructured":"PCI Security Standards Council LLC. 2016. Payment Card Industry (PCI) Data Security Standard (Version 3.2). (April 2016 ). PCI Security Standards Council LLC. 2016. Payment Card Industry (PCI) Data Security Standard (Version 3.2). (April 2016)."},{"volume-title":"Trust breaks down in electronic contexts but can be repaired by some initial face-to-face contact","author":"Rocco Elena","key":"e_1_3_2_1_32_1","unstructured":"Elena Rocco . 1998. Trust breaks down in electronic contexts but can be repaired by some initial face-to-face contact . ACM Press\/Addison-Wesley Publishing Co. Elena Rocco. 1998. Trust breaks down in electronic contexts but can be repaired by some initial face-to-face contact. ACM Press\/Addison-Wesley Publishing Co."},{"key":"e_1_3_2_1_33_1","volume-title":"Write Down Your Password. (May","author":"Schneier Bruce","year":"2005","unstructured":"Bruce Schneier . 2005. Write Down Your Password. (May 2005 ). https:\/\/www.schneier.com\/blog\/archives\/2005\/06\/write_down_your.html Bruce Schneier. 2005. Write Down Your Password. (May 2005). https:\/\/www.schneier.com\/blog\/archives\/2005\/06\/write_down_your.html"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2579421"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"crossref","unstructured":"Simon Stockhardt Benjamin Reinheimer Melanie Volkamer Peter Mayer Alexandra Kunz Philipp Rack and Daniel Lehmann. 2016. Teaching Phishing-Security: Which Way is Best? In ICT Systems Security and Privacy Protection. 135--149.  Simon Stockhardt Benjamin Reinheimer Melanie Volkamer Peter Mayer Alexandra Kunz Philipp Rack and Daniel Lehmann. 2016. Teaching Phishing-Security: Which Way is Best? In ICT Systems Security and Privacy Protection. 135--149.","DOI":"10.1007\/978-3-319-33630-5_10"},{"key":"e_1_3_2_1_36_1","volume-title":"USENIX Security Symposium.","author":"Ur Blase","year":"2015","unstructured":"Blase Ur , Sean M Segreti , L Bauer , N Christin , L F Cranor , Saranga Komanduri , Darya Kurilova , Michelle L Mazurek , William Melicher , and Richard Shay . 2015 . Measuring real-world accuracies and biases in modeling password guessability . In USENIX Security Symposium. Blase Ur, Sean M Segreti, L Bauer, N Christin, L F Cranor, Saranga Komanduri, Darya Kurilova, Michelle L Mazurek, William Melicher, and Richard Shay. 2015. Measuring real-world accuracies and biases in modeling password guessability. In USENIX Security Symposium."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Rafael Veras Julie Thorpe and Christopher Collins. 2012. Visualizing semantics in passwords: the role of dates. ACM.  Rafael Veras Julie Thorpe and Christopher Collins. 2012. Visualizing semantics in passwords: the role of dates. ACM.","DOI":"10.1145\/2379690.2379702"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866328"}],"event":{"name":"STAST2017: 7th International Workshop on Socio-Technical Aspects in Security and Trust","acronym":"STAST2017","location":"Orlando Florida USA"},"container-title":["Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167996.3167998","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3167996.3167998","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:07Z","timestamp":1750213567000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167996.3167998"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,5]]},"references-count":37,"alternative-id":["10.1145\/3167996.3167998","10.1145\/3167996"],"URL":"https:\/\/doi.org\/10.1145\/3167996.3167998","relation":{},"subject":[],"published":{"date-parts":[[2018,12,5]]},"assertion":[{"value":"2018-12-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}