{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:48Z","timestamp":1750221048543,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,12,3]],"date-time":"2018-12-03T00:00:00Z","timestamp":1543795200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,12,3]]},"DOI":"10.1145\/3283458.3283530","type":"proceedings-article","created":{"date-parts":[[2019,1,23]],"date-time":"2019-01-23T13:10:20Z","timestamp":1548249020000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Personality, culture and password behavior"],"prefix":"10.1145","author":[{"given":"Abdullahi Abubakar","family":"Kawu","sequence":"first","affiliation":[{"name":"Ibrahim Badamasi Babangida University, Lapai, Nigeria"}]},{"given":"Rita","family":"Orji","sequence":"additional","affiliation":[{"name":"Dalhousie University, Halifax, NS, Canada"}]},{"given":"Aisha","family":"Awal","sequence":"additional","affiliation":[{"name":"Ibrahim Badamasi Babangida University, Lapai, Nigeria"}]},{"given":"Usman","family":"Gana","sequence":"additional","affiliation":[{"name":"Ibrahim Badamasi Babangida University, Lapai, Nigeria"}]}],"member":"320","published-online":{"date-parts":[[2018,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Bryant K. and Campbell J. 2006. User behaviours associated with password security and Management. Australasian Journal of Information Systems 14(1).  Bryant K. and Campbell J. 2006. User behaviours associated with password security and Management. Australasian Journal of Information Systems 14(1).","DOI":"10.3127\/ajis.v14i1.9"},{"key":"e_1_3_2_1_3_1","first-page":"1","volume-title":"15th USENIX Security Symposium","author":"Chiasson S.","year":"2006"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAFRICA.2016.7530607"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1002\/wics.106"},{"key":"e_1_3_2_1_7_1","first-page":"13","volume-title":"5th Annual Symposium on Information Assurance (ASIA'10)","author":"Greene G.","year":"2010"},{"key":"e_1_3_2_1_8_1","unstructured":"Gross T. Coopamootoo K.P. and Al-Jabri A. 2016 June. Effect of Cognitive Effort on Password Choice. In WAY@ SOUPS.3  Gross T. Coopamootoo K.P. and Al-Jabri A. 2016 June. Effect of Cognitive Effort on Password Choice. In WAY@ SOUPS.3"},{"first-page":"102","volume-title":"L. A. Pervin & O","author":"John O. P.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","unstructured":"Kawu A. A Muhammad I Awal A and Abdullah M. B 2018. Effect of mental state on password selection among mobile phone users. In Proceedings of the 2nd International Conference on Information and Communication Technology and its Application (ICTA) FUT Minna Minna Nigeria.5  Kawu A. A Muhammad I Awal A and Abdullah M. B 2018. Effect of mental state on password selection among mobile phone users. In Proceedings of the 2nd International Conference on Information and Communication Technology and its Application (ICTA) FUT Minna Minna Nigeria.5"},{"key":"e_1_3_2_1_11_1","unstructured":"Keepass. 2018. KeePass Help Center: Password Quality Estimation. Retrieved 29 August 2018 from http:\/\/keepass.info\/help\/kb\/pw_quality_est.html.19  Keepass. 2018. KeePass Help Center: Password Quality Estimation. Retrieved 29 August 2018 from http:\/\/keepass.info\/help\/kb\/pw_quality_est.html.19"},{"volume-title":"Culture: A critical review of concepts and definitions. Papers. Peabody Museum of Archaeology & Ethnology","year":"1952","author":"Kroeber A.L.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","unstructured":"Orji R. 2016. Persuasion and Culture: Individualism-Collectivism and Susceptibility to Influence Strategies. In PPT@ PERSUASIVE (pp. 30--39).10  Orji R. 2016. Persuasion and Culture: Individualism-Collectivism and Susceptibility to Influence Strategies. In PPT@ PERSUASIVE (pp. 30--39).10"},{"key":"e_1_3_2_1_14_1","unstructured":"Oxford Dictionaries. 2018. \"Ethnicity: definition of ethnicity\". Oxford University Press. Retrieved August 2 2018 from https:\/\/en.oxforddictionaries.com\/definition\/ethnicity.12  Oxford Dictionaries. 2018. \"Ethnicity: definition of ethnicity\". Oxford University Press. Retrieved August 2 2018 from https:\/\/en.oxforddictionaries.com\/definition\/ethnicity.12"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3099023.3099074"},{"key":"e_1_3_2_1_16_1","unstructured":"Passwordmeter 2018. Password Strength Checker. Retrieved from http:\/\/www.passwordmeter.com\/ 20.  Passwordmeter 2018. Password Strength Checker. Retrieved from http:\/\/www.passwordmeter.com\/ 20."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jrp.2006.02.001"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025926"},{"key":"e_1_3_2_1_19_1","first-page":"243","volume-title":"Proc. SOUPS","author":"Stobert E.","year":"2014"},{"volume-title":"USENIX Security Symposium (pp. 157--173)","year":"2016","author":"Wheeler D.L.","key":"e_1_3_2_1_20_1"}],"event":{"name":"AfriCHI '18: 2nd African Conference for Human Computer Interaction","acronym":"AfriCHI '18","location":"Windhoek Namibia"},"container-title":["Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3283458.3283530","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3283458.3283530","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:44:10Z","timestamp":1750207450000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3283458.3283530"}},"subtitle":["a relationship study"],"short-title":[],"issued":{"date-parts":[[2018,12,3]]},"references-count":20,"alternative-id":["10.1145\/3283458.3283530","10.1145\/3283458"],"URL":"https:\/\/doi.org\/10.1145\/3283458.3283530","relation":{},"subject":[],"published":{"date-parts":[[2018,12,3]]},"assertion":[{"value":"2018-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}