{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T03:18:02Z","timestamp":1752549482494,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,3]],"date-time":"2018-07-03T00:00:00Z","timestamp":1530576000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"University of Cyprus Internal Funded Research Projects","award":["ADVisE"],"award-info":[{"award-number":["ADVisE"]}]},{"name":"EU Active and Assisted Living Programme","award":["SUCCESS (AAL-2016-089)"],"award-info":[{"award-number":["SUCCESS (AAL-2016-089)"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,3]]},"DOI":"10.1145\/3209219.3209254","type":"proceedings-article","created":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T12:23:03Z","timestamp":1530793383000},"page":"245-249","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["On Cultural-centered Graphical Passwords"],"prefix":"10.1145","author":[{"given":"Argyris","family":"Constantinides","sequence":"first","affiliation":[{"name":"University of Cyprus &amp; Cyprus &amp; CiTARD Services Ltd., Nicosia, Cyprus"}]},{"given":"Marios","family":"Belk","sequence":"additional","affiliation":[{"name":"Cognitive UX GmbH &amp; University of Cyprus, Heidelberg, Germany"}]},{"given":"Christos","family":"Fidas","sequence":"additional","affiliation":[{"name":"University of Patras, Patras, Greece"}]},{"given":"George","family":"Samaras","sequence":"additional","affiliation":[{"name":"University of Cyprus, Nicosia, Cyprus"}]}],"member":"320","published-online":{"date-parts":[[2018,7,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819941"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0610-6"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2022245.2022260"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145219"},{"key":"e_1_3_2_1_5_1","volume-title":"A cross-cultural and gender-based perspective for online security: Exploring knowledge, skills and attitudes of higher education students. IADIS International Journal on WWW\/Internet, 13(1)","author":"Chaudhary S.","year":"2015","unstructured":"Chaudhary , S. , Zhao , Y. , Berki , E. , Valtanen , J. , Li , L. , Helenius , M. , & Mystakidis , S. ( 2015 ). A cross-cultural and gender-based perspective for online security: Exploring knowledge, skills and attitudes of higher education students. IADIS International Journal on WWW\/Internet, 13(1) Chaudhary, S., Zhao, Y., Berki, E., Valtanen, J., Li, L., Helenius, M., & Mystakidis, S. (2015). A cross-cultural and gender-based perspective for online security: Exploring knowledge, skills and attitudes of higher education students. IADIS International Journal on WWW\/Internet, 13(1)"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858273"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025926"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493213"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837114"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493231"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 8th USENIX Security Symposium (Security '99)","author":"Jermyn I. H.","year":"1999","unstructured":"Jermyn , I. H. , Mayer , A. , Monrose , F. , Reiter , M. K. , & Rubin , A. D. ( 1999 ). The design and analysis of graphical passwords . In Proceedings of the 8th USENIX Security Symposium (Security '99) , USENIX Association Jermyn, I. H., Mayer, A., Monrose, F., Reiter, M. K., & Rubin, A. D. (1999). The design and analysis of graphical passwords. In Proceedings of the 8th USENIX Security Symposium (Security '99), USENIX Association"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"e_1_3_2_1_14_1","volume-title":"The Science Behind Passfaces. Technical report","author":"Real User Corporation","year":"2004","unstructured":"Real User Corporation ( 2004 ). The Science Behind Passfaces. Technical report . Real User Corporation (2004). The Science Behind Passfaces. Technical report."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.09.001"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the Annual Meeting of the Cognitive Science Society","author":"Ayd\u0131n A.","year":"2013","unstructured":"Ayd\u0131n , \u00dc. A. , Acart\u00fcrk , C. , & \u00c7a\u011f\u0131ltay , K. ( 2013 ). The Role of Visual Coherence in Graphical Passwords . In Proceedings of the Annual Meeting of the Cognitive Science Society Ayd\u0131n, \u00dc. A., Acart\u00fcrk, C., & \u00c7a\u011f\u0131ltay, K. (2013). The Role of Visual Coherence in Graphical Passwords. In Proceedings of the Annual Meeting of the Cognitive Science Society"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785882"},{"key":"e_1_3_2_1_18_1","volume-title":"On the Security of Picture Gesture Authentication. In USENIX Security Symposium (pp. 383--398)","author":"Zhao Z.","year":"2013","unstructured":"Zhao , Z. , Ahn , G. J. , Seo , J. J. , & Hu , H. ( 2013 ). On the Security of Picture Gesture Authentication. In USENIX Security Symposium (pp. 383--398) Zhao, Z., Ahn, G. J., Seo, J. J., & Hu, H. (2013). On the Security of Picture Gesture Authentication. In USENIX Security Symposium (pp. 383--398)"},{"key":"e_1_3_2_1_19_1","first-page":"11","volume-title":"On User Choice in Graphical Password Schemes. In USENIX Security Symposium (Vol. 13","author":"Davis D.","year":"2004","unstructured":"Davis , D. , Monrose , F. , & Reiter , M. K. ( 2004 ). On User Choice in Graphical Password Schemes. In USENIX Security Symposium (Vol. 13 , pp. 11 -- 11 ) Davis, D., Monrose, F., & Reiter, M. K. (2004). On User Choice in Graphical Password Schemes. In USENIX Security Symposium (Vol. 13, pp. 11--11)"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2016.1220103"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408670"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979242"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518837"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280682"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315252"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073002"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173661"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079628.3079690"},{"key":"e_1_3_2_1_29_1","unstructured":"Jeffrey Jay Johnson Steve Seixeiro Zachary Pace Giles van der Bogert Sean Gilmour Levi Siebens and Kenneth Tubbs. 2014. Picture Gesture Authentication. Retrieved from https:\/\/www.google.com\/patents\/US8910253  Jeffrey Jay Johnson Steve Seixeiro Zachary Pace Giles van der Bogert Sean Gilmour Levi Siebens and Kenneth Tubbs. 2014. Picture Gesture Authentication. Retrieved from https:\/\/www.google.com\/patents\/US8910253"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2701423"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0411"},{"key":"e_1_3_2_1_32_1","volume-title":"Signing in with a picture password.","author":"Zachary Pace","year":"2011","unstructured":"Zachary Pace ( 2011 ). Signing in with a picture password. Retrieved from https:\/\/blogs.msdn.microsoft.com\/b8\/2011\/12\/16\/signing-in-with-a-picture-password Zachary Pace (2011). Signing in with a picture password. Retrieved from https:\/\/blogs.msdn.microsoft.com\/b8\/2011\/12\/16\/signing-in-with-a-picture-password"},{"key":"e_1_3_2_1_33_1","first-page":"1","volume-title":"Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. In USENIX Security Symposium (Vol. 8","author":"Thorpe J.","year":"2007","unstructured":"Thorpe , J. , & van Oorschot , P. C. ( 2007 ). Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. In USENIX Security Symposium (Vol. 8 , pp. 1 -- 8 ) Thorpe, J., & van Oorschot, P. C. (2007). Human-Seeded Attacks and Exploiting Hot-Spots in Graphical Passwords. In USENIX Security Symposium (Vol. 8, pp. 1--8)"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/2354409.2355041"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501619"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2013.6738916"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.06.042"},{"key":"e_1_3_2_1_38_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS)","author":"Segreti S.M.","year":"2017","unstructured":"Segreti , S.M. , Melicher , W. , Komanduri , S. , Melicher , D. , Shay , R. , Ur , B. , Bauer , L. , Christin , N. , Cranor , L.F. and Mazurek , M.L . ( 2017 ). Diversify to Survive: Making Passwords Stronger with Adaptive Policies . In Symposium on Usable Privacy and Security (SOUPS) Segreti, S.M., Melicher, W., Komanduri, S., Melicher, D., Shay, R., Ur, B., Bauer, L., Christin, N., Cranor, L.F. and Mazurek, M.L. (2017). Diversify to Survive: Making Passwords Stronger with Adaptive Policies. In Symposium on Usable Privacy and Security (SOUPS)"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2732748"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08786-3_2"},{"key":"e_1_3_2_1_41_1","volume-title":"The origin of cultural differences in cognition: The social orientation hypothesis. Current directions in psychological science, 19(1), 9--13","author":"Varnum M. E.","year":"2010","unstructured":"Varnum , M. E. , Grossmann , I. , Kitayama , S. , & Nisbett , R. E. ( 2010 ). The origin of cultural differences in cognition: The social orientation hypothesis. Current directions in psychological science, 19(1), 9--13 Varnum, M. E., Grossmann, I., Kitayama, S., & Nisbett, R. E. (2010). The origin of cultural differences in cognition: The social orientation hypothesis. Current directions in psychological science, 19(1), 9--13"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1177\/0143034397182004"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1934527100"}],"event":{"name":"UMAP '18: 26th Conference on User Modeling, Adaptation and Personalization","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Singapore Singapore","acronym":"UMAP '18"},"container-title":["Proceedings of the 26th Conference on User Modeling, Adaptation and Personalization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209219.3209254","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3209219.3209254","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:25Z","timestamp":1750208905000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209219.3209254"}},"subtitle":["Leveraging on Users' Cultural Experiences for Improving Password Memorability"],"short-title":[],"issued":{"date-parts":[[2018,7,3]]},"references-count":43,"alternative-id":["10.1145\/3209219.3209254","10.1145\/3209219"],"URL":"https:\/\/doi.org\/10.1145\/3209219.3209254","relation":{},"subject":[],"published":{"date-parts":[[2018,7,3]]},"assertion":[{"value":"2018-07-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}