{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T17:13:55Z","timestamp":1767374035294,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,7]],"date-time":"2020-07-07T00:00:00Z","timestamp":1594080000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["826278"],"award-info":[{"award-number":["826278"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,7]]},"DOI":"10.1145\/3340631.3394859","type":"proceedings-article","created":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T21:49:55Z","timestamp":1594676995000},"page":"43-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["A Cross-cultural Perspective for Personalizing Picture Passwords"],"prefix":"10.1145","author":[{"given":"Argyris","family":"Constantinides","sequence":"first","affiliation":[{"name":"University of Cyprus &amp; Cognitive UX Ltd., Nicosia, Cyprus"}]},{"given":"Anna Maria","family":"Pietron","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Marios","family":"Belk","sequence":"additional","affiliation":[{"name":"Cognitive UX GmbH &amp; University of Cyprus, Heidelberg, Germany"}]},{"given":"Christos","family":"Fidas","sequence":"additional","affiliation":[{"name":"University of Patras, Patras, Greece"}]},{"given":"Ting","family":"Han","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Andreas","family":"Pitsillides","sequence":"additional","affiliation":[{"name":"University of Cyprus, Nicosia, Cyprus"}]}],"member":"320","published-online":{"date-parts":[[2020,7,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818048.2819941"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-012-0610-6"},{"volume-title":"Trust and Trustworthy Computing","author":"Wang Yang","key":"e_1_3_2_2_3_1","unstructured":"Yang Wang , Gregory Norice , and Lorrie Faith Cranor . 2011. Who is concerned about what? A study of American, Chinese and Indian users' privacy concerns on social network sites . In Trust and Trustworthy Computing , Springer , 146--153. DOI: https:\/\/doi.org\/10.1007\/978--3--642--21599--5_11 10.1007\/978--3--642--21599--5_11 Yang Wang, Gregory Norice, and Lorrie Faith Cranor. 2011. Who is concerned about what? A study of American, Chinese and Indian users' privacy concerns on social network sites. In Trust and Trustworthy Computing, Springer, 146--153. DOI: https:\/\/doi.org\/10.1007\/978--3--642--21599--5_11"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145204.2145219"},{"key":"e_1_3_2_2_5_1","unstructured":"Sunil Chaudhary Yan Zhao Eleni Berki Juri Valtanen Linfeng Li Marko Helenius and Stylianos Mystakidis. 2015. A cross-cultural and gender-based perspective for online security: Exploring knowledge skills and attitudes of higher education students. IADIS International Journal on WWW\/Internet 13(1).  Sunil Chaudhary Yan Zhao Eleni Berki Juri Valtanen Linfeng Li Marko Helenius and Stylianos Mystakidis. 2015. A cross-cultural and gender-based perspective for online security: Exploring knowledge skills and attitudes of higher education students. IADIS International Journal on WWW\/Internet 13(1)."},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858273"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025926"},{"key":"e_1_3_2_2_8_1","volume-title":"van Oorschot","author":"Biddle Robert","year":"2012","unstructured":"Robert Biddle , Sonia Chiasson , and Paul C . van Oorschot . 2012 . Graphical passwords: Learning from the first twelve years. ACM Comput. Surv. 44, 4, Article 19 (September 2012), 41 pages. DOI: https:\/\/doi.org\/10.1145\/2333112.2333114 10.1145\/2333112.2333114 Robert Biddle, Sonia Chiasson, and Paul C. van Oorschot. 2012. Graphical passwords: Learning from the first twelve years. ACM Comput. Surv. 44, 4, Article 19 (September 2012), 41 pages. DOI: https:\/\/doi.org\/10.1145\/2333112.2333114"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-2010-0411"},{"key":"e_1_3_2_2_10_1","first-page":"1","article-title":"Human-seeded attacks and exploiting hot-spots in graphical passwords. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (SS'07). USENIX Association","volume":"8","author":"Thorpe Julie","year":"2007","unstructured":"Julie Thorpe and Paul C. van Oorschot . 2007 . Human-seeded attacks and exploiting hot-spots in graphical passwords. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (SS'07). USENIX Association , Article 8 , 1 -- 16 . Julie Thorpe and Paul C. van Oorschot. 2007. Human-seeded attacks and exploiting hot-spots in graphical passwords. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium (SS'07). USENIX Association, Article 8, 1--16.","journal-title":"Article"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208712"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785882"},{"key":"e_1_3_2_2_13_1","volume-title":"Gutchess and Allie Indeck","author":"Angela","year":"2009","unstructured":"Angela H. Gutchess and Allie Indeck . 2009 . Cultural influences on memory. Progress in brain research, 178, 137--150. DOI: https:\/\/doi.org\/10.1016\/S0079--6123(09)17809--3 10.1016\/S0079--6123(09)17809--3 Angela H. Gutchess and Allie Indeck. 2009. Cultural influences on memory. Progress in brain research, 178, 137--150. DOI: https:\/\/doi.org\/10.1016\/S0079--6123(09)17809--3"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.81.5.922"},{"key":"e_1_3_2_2_15_1","volume-title":"Gutchess","author":"Millar Peter R.","year":"2013","unstructured":"Peter R. Millar , Sarah J. Serbun , Akash Vadalia , and Angela H . Gutchess . 2013 . Cross-cultural differences in memory specificity. Culture and Brain , 1(2--4), 138--157. DOI: https:\/\/doi.org\/10.1007\/s40167-013-0011--3 10.1007\/s40167-013-0011--3 Peter R. Millar, Sarah J. Serbun, Akash Vadalia, and Angela H. Gutchess. 2013. Cross-cultural differences in memory specificity. Culture and Brain, 1(2--4), 138--157. DOI: https:\/\/doi.org\/10.1007\/s40167-013-0011--3"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1934527100"},{"key":"#cr-split#-e_1_3_2_2_17_1.1","doi-asserted-by":"crossref","unstructured":"Fred C. J. Stevens Charles D. Kaplan Rudolph W. H. M. Ponds Joseph P. M. Diederiks and Jellemer Jolles. 1999. How ageing and social factors affect memory. Age and ageing 28(4) 379--384. DOI: https:\/\/doi.org\/10.1093\/ageing\/28.4.379 10.1093\/ageing","DOI":"10.1093\/ageing\/28.4.379"},{"key":"#cr-split#-e_1_3_2_2_17_1.2","doi-asserted-by":"crossref","unstructured":"Fred C. J. Stevens Charles D. Kaplan Rudolph W. H. M. Ponds Joseph P. M. Diederiks and Jellemer Jolles. 1999. How ageing and social factors affect memory. Age and ageing 28(4) 379--384. DOI: https:\/\/doi.org\/10.1093\/ageing\/28.4.379","DOI":"10.1093\/ageing\/28.4.379"},{"volume-title":"Cognitive Learning and Memory in Children","author":"Rogoff Barbara","key":"e_1_3_2_2_18_1","unstructured":"Barbara Rogoff and Jayanthi Mistry . 1985. Memory development in cultural context . In Cognitive Learning and Memory in Children . Springer . DOI: https:\/\/doi.org\/10.1007\/978--1--4613--9544--7_4 10.1007\/978--1--4613--9544--7_4 Barbara Rogoff and Jayanthi Mistry. 1985. Memory development in cultural context. In Cognitive Learning and Memory in Children. Springer. DOI: https:\/\/doi.org\/10.1007\/978--1--4613--9544--7_4"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41666-018-0026-9"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028014.1028025"},{"key":"e_1_3_2_2_21_1","volume-title":"Proceedings of the International Workshop on Internationalisation of Products and Systems. IWIPS","author":"Evers Vanessa","year":"1999","unstructured":"Vanessa Evers , Agnes Kukulska-Hulme , and Ann Jones . 1999 . Cross-cultural understanding of interface design: A cross-cultural analysis of icon recognition . In Proceedings of the International Workshop on Internationalisation of Products and Systems. IWIPS 1999. Vanessa Evers, Agnes Kukulska-Hulme, and Ann Jones. 1999. Cross-cultural understanding of interface design: A cross-cultural analysis of icon recognition. In Proceedings of the International Workshop on Internationalisation of Products and Systems. IWIPS 1999."},{"key":"e_1_3_2_2_22_1","volume-title":"Proceedings of Customer Focused Mobile Services Workshop at WWW2005","author":"Nosseir Ann","year":"2005","unstructured":"Ann Nosseir , Richard Connor , and Mark Dunlop . 2005 . Internet authentication based on personal history-A feasibility test . In Proceedings of Customer Focused Mobile Services Workshop at WWW2005 . ACM. Ann Nosseir, Richard Connor, and Mark Dunlop. 2005. Internet authentication based on personal history-A feasibility test. In Proceedings of Customer Focused Mobile Services Workshop at WWW2005. ACM."},{"volume-title":"Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing (UbiComp '13)","author":"Das Sauvik","key":"e_1_3_2_2_23_1","unstructured":"Sauvik Das , Eiji Hayashi , and Jason I. Hong . 2013. Exploring capturable everyday memory for autobiographical authentication . In Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing (UbiComp '13) . ACM, 211--220. DOI: https:\/\/doi.org\/10.1145\/2493432.2493453 10.1145\/2493432.2493453 Sauvik Das, Eiji Hayashi, and Jason I. Hong. 2013. Exploring capturable everyday memory for autobiographical authentication. In Proceedings of the 2013 ACM international joint conference on Pervasive and ubiquitous computing (UbiComp '13). ACM, 211--220. DOI: https:\/\/doi.org\/10.1145\/2493432.2493453"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2013.187"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308992"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240759"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73289-1_55"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2659651.2659727"},{"key":"e_1_3_2_2_29_1","volume-title":"Proceedings of the Annual Meeting of the Cognitive Science Society (Vol. 35)","author":"Aydin \u00dclk\u00fc Arslan","year":"2013","unstructured":"\u00dclk\u00fc Arslan Aydin , Cengiz Acart\u00fcrk , and K\u00fcrat \u00c7altay . 2013 . The Role of Visual Coherence in Graphical Passwords . In Proceedings of the Annual Meeting of the Cognitive Science Society (Vol. 35) . \u00dclk\u00fc Arslan Aydin, Cengiz Acart\u00fcrk, and K\u00fcrat \u00c7altay. 2013. The Role of Visual Coherence in Graphical Passwords. In Proceedings of the Annual Meeting of the Cognitive Science Society (Vol. 35)."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/2534766.2534800"},{"key":"e_1_3_2_2_31_1","volume-title":"Proceedings of the 13th conference on USENIX Security Symposium -","volume":"13","author":"Davis Darren","unstructured":"Darren Davis , Fabian Monrose , and Michael K. Reiter . 2004. On user choice in graphical password schemes . In Proceedings of the 13th conference on USENIX Security Symposium - Volume 13 (SSYM'04). USENIX Association, 11. Darren Davis, Fabian Monrose, and Michael K. Reiter. 2004. On user choice in graphical password schemes. In Proceedings of the 13th conference on USENIX Security Symposium - Volume 13 (SSYM'04). USENIX Association, 11."},{"issue":"12","key":"e_1_3_2_2_32_1","first-page":"975","article-title":"Why that Picture? Discovering Password Properties in Recognition-Based Graphical Authentication","volume":"32","author":"Mihajlov Martin","year":"2016","unstructured":"Martin Mihajlov , Borka Jerman-Blai , and Anita Ciunova Shuleska . 2016 . Why that Picture? Discovering Password Properties in Recognition-Based Graphical Authentication . Elsevier IJHCS , 32 ( 12 ), 975 -- 988 . DOI: https:\/\/doi.org\/10.1080\/10447318.2016.1220103 10.1080\/10447318.2016.1220103 Martin Mihajlov, Borka Jerman-Blai, and Anita Ciunova Shuleska. 2016. Why that Picture? Discovering Password Properties in Recognition-Based Graphical Authentication. Elsevier IJHCS, 32(12), 975--988. DOI: https:\/\/doi.org\/10.1080\/10447318.2016.1220103","journal-title":"Elsevier IJHCS"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1464-0597.2004.00190.x"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.09.001"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408670"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979242"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518837"},{"volume-title":"Proceedings of the 3rd symposium on Usable privacy and security (SOUPS '07)","author":"Chiasson Sonia","key":"e_1_3_2_2_38_1","unstructured":"Sonia Chiasson , Robert Biddle , and Paul C . van Oorschot. 2007. A second look at the usability of click-based graphical passwords . In Proceedings of the 3rd symposium on Usable privacy and security (SOUPS '07) . ACM, 1--12. DOI: https:\/\/doi.org\/10.1145\/1280680.1280682 10.1145\/1280680.1280682 Sonia Chiasson, Robert Biddle, and Paul C. van Oorschot. 2007. A second look at the usability of click-based graphical passwords. In Proceedings of the 3rd symposium on Usable privacy and security (SOUPS '07). ACM, 1--12. DOI: https:\/\/doi.org\/10.1145\/1280680.1280682"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315252"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073002"},{"key":"e_1_3_2_2_41_1","first-page":"1","article-title":"Influences of Human Cognition and Visual Behavior on Password Strength during Picture Password Composition. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM","volume":"87","author":"Katsini Christina","year":"2018","unstructured":"Christina Katsini , Christos Fidas , George E. Raptis , Marios Belk , George Samaras , and Nikolaos Avouris . 2018 . Influences of Human Cognition and Visual Behavior on Password Strength during Picture Password Composition. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM , Paper 87 , 1 -- 14 . DOI: https:\/\/doi.org\/10.1145\/3173574.3173661 10.1145\/3173574.3173661 Christina Katsini, Christos Fidas, George E. Raptis, Marios Belk, George Samaras, and Nikolaos Avouris. 2018. Influences of Human Cognition and Visual Behavior on Password Strength during Picture Password Composition. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems (CHI '18). ACM, Paper 87, 1--14. DOI: https:\/\/doi.org\/10.1145\/3173574.3173661","journal-title":"Paper"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3079628.3079690"},{"key":"e_1_3_2_2_43_1","unstructured":"Jeff Johnson Steve Seixeiro Zachary Pace Giles van der Bogert Sean Gilmour Levi Siebens Ken Tubbs. 2014. U.S. Patent 8650636 DC: U.S. Patent and Trademark Office.  Jeff Johnson Steve Seixeiro Zachary Pace Giles van der Bogert Sean Gilmour Levi Siebens Ken Tubbs. 2014. U.S. Patent 8650636 DC: U.S. Patent and Trademark Office."},{"key":"e_1_3_2_2_44_1","article-title":"Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation","volume":"17","author":"Zhao Ziming","year":"2015","unstructured":"Ziming Zhao , Gail-Joon Ahn , and Hongxin Hu . 2015 . Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation . Journal of ACM Transactions on Information and System Security (TISSEC) 17 , 4, Article 14 (April 2015), 37 pages. DOI:https:\/\/doi.org\/10.1145\/2701423 10.1145\/2701423 Ziming Zhao, Gail-Joon Ahn, and Hongxin Hu. 2015. Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation. Journal of ACM Transactions on Information and System Security (TISSEC) 17, 4, Article 14 (April 2015), 37 pages. DOI:https:\/\/doi.org\/10.1145\/2701423","journal-title":"Journal of ACM Transactions on Information and System Security (TISSEC)"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2012.6247743"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/1519556.1519901"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3350546.3352557"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377325.3377537"},{"key":"e_1_3_2_2_49_1","volume-title":"Beom Jun Kim, and Richard E. Nisbett","author":"Norenzayan Ara","year":"2002","unstructured":"Ara Norenzayan , Edward E. Smith , Beom Jun Kim, and Richard E. Nisbett . 2002 . Cultural preferences for formal versus intuitive reasoning. Cognitive science 26, no. 5 (2002): 653--684. DOI: https:\/\/doi.org\/10.1207\/s15516709cog2605_4 10.1207\/s15516709cog2605_4 Ara Norenzayan, Edward E. Smith, Beom Jun Kim, and Richard E. Nisbett. 2002. Cultural preferences for formal versus intuitive reasoning. Cognitive science 26, no. 5 (2002): 653--684. DOI: https:\/\/doi.org\/10.1207\/s15516709cog2605_4"},{"key":"e_1_3_2_2_50_1","volume-title":"Larsen","author":"Kitayama Shinobu","year":"2003","unstructured":"Shinobu Kitayama , Sean Duffy , Tadashi Kawamura , and Jeff T . Larsen . 2003 . Perceiving an object and its context in different cultures: A cultural look at new look. Psychological science 14, no. 3 (2003): 201--206. DOI: https:\/\/doi.org\/10.1111\/1467--9280.02432 10.1111\/1467--9280.02432 Shinobu Kitayama, Sean Duffy, Tadashi Kawamura, and Jeff T. Larsen. 2003. Perceiving an object and its context in different cultures: A cultural look at new look. Psychological science 14, no. 3 (2003): 201--206. DOI: https:\/\/doi.org\/10.1111\/1467--9280.02432"},{"key":"#cr-split#-e_1_3_2_2_51_1.1","doi-asserted-by":"crossref","unstructured":"William L. Phillips. 2019. Cross?cultural differences in visual perception of color illusions depth and pictures. Cross-Cultural Psychology: Contemporary Themes and Perspectives (2019): 287--308. DOI:https:\/\/doi.org\/10.1002\/9781119519348.ch13 10.1002\/9781119519348.ch13","DOI":"10.1002\/9781119519348.ch13"},{"key":"#cr-split#-e_1_3_2_2_51_1.2","doi-asserted-by":"crossref","unstructured":"William L. Phillips. 2019. Cross?cultural differences in visual perception of color illusions depth and pictures. Cross-Cultural Psychology: Contemporary Themes and Perspectives (2019): 287--308. DOI:https:\/\/doi.org\/10.1002\/9781119519348.ch13","DOI":"10.1002\/9781119519348.ch13"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.06.042"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2053706"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209219.3209254"},{"volume-title":"Episodic and semantic memory","author":"Tulving Endel","key":"e_1_3_2_2_55_1","unstructured":"Endel Tulving . 1972. Episodic and semantic memory . Organization of memory, 1, 381--403. Endel Tulving. 1972. Episodic and semantic memory. Organization of memory, 1, 381--403."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2008.04.001"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236112.3236150"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481329"},{"key":"#cr-split#-e_1_3_2_2_59_1.1","doi-asserted-by":"crossref","unstructured":"Angela Martina Sasse Sacha Brostoff and Dirk Weirich. 2001. Transforming the 'weakest link'-a human\/computer interaction approach to usable and effective security. BT technology journal 19(3) 122--131. DOI:https:\/\/doi.org\/10.1023\/A:1011902718709 10.1023\/A:1011902718709","DOI":"10.1023\/A:1011902718709"},{"key":"#cr-split#-e_1_3_2_2_59_1.2","doi-asserted-by":"crossref","unstructured":"Angela Martina Sasse Sacha Brostoff and Dirk Weirich. 2001. Transforming the 'weakest link'-a human\/computer interaction approach to usable and effective security. BT technology journal 19(3) 122--131. DOI:https:\/\/doi.org\/10.1023\/A:1011902718709","DOI":"10.1023\/A:1011902718709"},{"volume-title":"Password memorability and security: Empirical results","author":"Yan Jeff","key":"e_1_3_2_2_60_1","unstructured":"Jeff Yan , Alan Blackwell , Ross Anderson , and Alasdair Grant . 2004. Password memorability and security: Empirical results . IEEE Security & privacy, 2(5), 25--31. DOI:https:\/\/doi.org\/10.1109\/MSP.2004.81 10.1109\/MSP.2004.81 Jeff Yan, Alan Blackwell, Ross Anderson, and Alasdair Grant. 2004. Password memorability and security: Empirical results. IEEE Security & privacy, 2(5), 25--31. DOI:https:\/\/doi.org\/10.1109\/MSP.2004.81"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68504-3_20"},{"issue":"1","key":"e_1_3_2_2_62_1","first-page":"7","article-title":"Designing Persuasive Applications to Motivate Sustainable Behavior in Collectivist Cultures","volume":"9","author":"Kimura Hiroaki","year":"2011","unstructured":"Hiroaki Kimura and Tatsuo Nakajima . 2011 . Designing Persuasive Applications to Motivate Sustainable Behavior in Collectivist Cultures . PsychNology Journal , 9 ( 1 ), 7 -- 28 . Hiroaki Kimura and Tatsuo Nakajima. 2011. Designing Persuasive Applications to Motivate Sustainable Behavior in Collectivist Cultures. PsychNology Journal, 9(1), 7--28.","journal-title":"PsychNology Journal"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1002\/cb.43"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2013.08.012"},{"volume-title":"Adjunct Publication of the 25th Conference on User Modeling, Adaptation and Personalization (UMAP '17). ACM, 47--52. DOI:https:\/\/doi.org\/10.1145\/3099023.3099071","author":"Oyibo Kiemute","key":"e_1_3_2_2_65_1","unstructured":"Kiemute Oyibo , Rita Orji , and Julita Vassileva . 2017. The Influence of Culture in the Effect of Age and Gender on Social Influence in Persuasive Technology . In Adjunct Publication of the 25th Conference on User Modeling, Adaptation and Personalization (UMAP '17). ACM, 47--52. DOI:https:\/\/doi.org\/10.1145\/3099023.3099071 10.1145\/3099023.3099071 Kiemute Oyibo, Rita Orji, and Julita Vassileva. 2017. The Influence of Culture in the Effect of Age and Gender on Social Influence in Persuasive Technology. In Adjunct Publication of the 25th Conference on User Modeling, Adaptation and Personalization (UMAP '17). ACM, 47--52. DOI:https:\/\/doi.org\/10.1145\/3099023.3099071"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3320435.3320474"}],"event":{"name":"UMAP '20: 28th ACM Conference on User Modeling, Adaptation and Personalization","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Genoa Italy","acronym":"UMAP '20"},"container-title":["Proceedings of the 28th ACM Conference on User Modeling, Adaptation and Personalization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340631.3394859","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3340631.3394859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:10Z","timestamp":1750200070000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3340631.3394859"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,7]]},"references-count":69,"alternative-id":["10.1145\/3340631.3394859","10.1145\/3340631"],"URL":"https:\/\/doi.org\/10.1145\/3340631.3394859","relation":{},"subject":[],"published":{"date-parts":[[2020,7,7]]},"assertion":[{"value":"2020-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}