{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:24:29Z","timestamp":1750220669966,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,22]],"date-time":"2020-11-22T00:00:00Z","timestamp":1606003200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-sa\/4.0\/"}],"funder":[{"name":"Bundesministerium f\u00fcr Bildung und Forschung","award":["16KIS1127"],"award-info":[{"award-number":["16KIS1127"]}]},{"DOI":"10.13039\/501100001663","name":"Volkswagen Foundation","doi-asserted-by":"publisher","award":["Lichtenberg Professorship"],"award-info":[{"award-number":["Lichtenberg Professorship"]}],"id":[{"id":"10.13039\/501100001663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,11,22]]},"DOI":"10.1145\/3428361.3428397","type":"proceedings-article","created":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T00:33:22Z","timestamp":1606091602000},"page":"201-211","source":"Crossref","is-referenced-by-count":3,"title":["MoiPrivacy: Design and Evaluation of a Personal Password Meter"],"prefix":"10.1145","author":[{"given":"Ankit","family":"Kariryaa","sequence":"first","affiliation":[{"name":"University of Bremen, Germany"}]},{"given":"Johannes","family":"Sch\u00f6ning","sequence":"additional","affiliation":[{"name":"University of Bremen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2037373.2037383"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/acp.1014"},{"key":"e_1_3_2_1_3_1","unstructured":"Claude Castelluccia Abdelberi Chaabane Markus D\u00fcrmuth and Daniele Perito. 2013. When privacy meets security: Leveraging personal information for password cracking. arXiv preprint arXiv:1304.6584(2013).  Claude Castelluccia Abdelberi Chaabane Markus D\u00fcrmuth and Daniele Perito. 2013. When privacy meets security: Leveraging personal information for password cracking. arXiv preprint arXiv:1304.6584(2013)."},{"key":"e_1_3_2_1_4_1","unstructured":"Claude Castelluccia Markus D\u00fcrmuth and Daniele Perito. 2012. Adaptive Password-Strength Meters from Markov Models.. In NDSS.  Claude Castelluccia Markus D\u00fcrmuth and Daniele Perito. 2012. Adaptive Password-Strength Meters from Markov Models.. In NDSS."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.21105\/joss.01317"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23268"},{"key":"e_1_3_2_1_7_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS 2015","author":"Dunphy Paul","year":"2015","unstructured":"Paul Dunphy , Vasilis Vlachokyriakos , Anja Thieme , James Nicholson , John McCarthy , and Patrick Olivier . 2015 . Social Media As a Resource for Understanding Security Experiences: A Qualitative Analysis of Math 1Password Tweets . In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015 ). USENIX Association, Ottawa, 141\u2013150. https:\/\/www.usenix.org\/conference\/soups 2015\/proceedings\/presentation\/dunphy Paul Dunphy, Vasilis Vlachokyriakos, Anja Thieme, James Nicholson, John McCarthy, and Patrick Olivier. 2015. Social Media As a Resource for Understanding Security Experiences: A Qualitative Analysis of Math 1Password Tweets. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 141\u2013150. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/dunphy"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481329"},{"key":"e_1_3_2_1_9_1","unstructured":"Facebook. 2008. Accessing and Downloading Your Information. Website. https:\/\/www.facebook.com\/help\/1701730696756992\/.  Facebook. 2008. Accessing and Downloading Your Information. Website. https:\/\/www.facebook.com\/help\/1701730696756992\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501617"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/3192928.3192930"},{"key":"e_1_3_2_1_12_1","first-page":"555","article-title":"Techniques for mitigating forgotten password attacks","volume":"8","author":"Gauvin William","year":"2013","unstructured":"William Gauvin . 2013 . Techniques for mitigating forgotten password attacks . US Patent 8 , 555 ,357. William Gauvin. 2013. Techniques for mitigating forgotten password attacks. US Patent 8,555,357.","journal-title":"US Patent"},{"key":"e_1_3_2_1_13_1","volume-title":"Code Overload: Doing a Number on Memory. APS Observer 14, 7","author":"H\u00e9bert Richard","year":"2001","unstructured":"Richard H\u00e9bert . 2001 . Code Overload: Doing a Number on Memory. APS Observer 14, 7 (2001). Richard H\u00e9bert. 2001. Code Overload: Doing a Number on Memory. APS Observer 14, 7 (2001)."},{"key":"e_1_3_2_1_14_1","volume-title":"2015 International Conference on Information Systems Security and Privacy (ICISSP). IEEE, 246\u2013253","author":"Hossain Al\u00a0Amin","year":"2015","unstructured":"Al\u00a0Amin Hossain and Weining Zhang . 2015 . Privacy and security concern of online social networks from user perspective . In 2015 International Conference on Information Systems Security and Privacy (ICISSP). IEEE, 246\u2013253 . Al\u00a0Amin Hossain and Weining Zhang. 2015. Privacy and security concern of online social networks from user perspective. In 2015 International Conference on Information Systems Security and Privacy (ICISSP). IEEE, 246\u2013253."},{"key":"e_1_3_2_1_15_1","volume-title":"Using Personal Information in Targeted Grammar-Based Probabilistic Password Attacks. In IFIP International Conference on Digital Forensics. Springer, 285\u2013303","author":"Houshmand Shiva","year":"2017","unstructured":"Shiva Houshmand and Sudhir Aggarwal . 2017 . Using Personal Information in Targeted Grammar-Based Probabilistic Password Attacks. In IFIP International Conference on Digital Forensics. Springer, 285\u2013303 . Shiva Houshmand and Sudhir Aggarwal. 2017. Using Personal Information in Targeted Grammar-Based Probabilistic Password Attacks. In IFIP International Conference on Digital Forensics. Springer, 285\u2013303."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813622"},{"key":"e_1_3_2_1_17_1","volume-title":"Minds. In 23rd USENIX Security Symposium (USENIX Security 14)","author":"Komanduri Saranga","year":"2014","unstructured":"Saranga Komanduri , Richard Shay , Lorrie\u00a0Faith Cranor , Cormac Herley , and Stuart Schechter . 2014 . Telepathwords: Preventing Weak Passwords by Reading Users\u2019 Minds. In 23rd USENIX Security Symposium (USENIX Security 14) . USENIX Association, San Diego, CA, 591\u2013606. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/komanduri Saranga Komanduri, Richard Shay, Lorrie\u00a0Faith Cranor, Cormac Herley, and Stuart Schechter. 2014. Telepathwords: Preventing Weak Passwords by Reading Users\u2019 Minds. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 591\u2013606. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/komanduri"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979321"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524583"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516726"},{"key":"e_1_3_2_1_21_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Melicher William","year":"2016","unstructured":"William Melicher , Blase Ur , Sean\u00a0 M. Segreti , Saranga Komanduri , Lujo Bauer , Nicolas Christin , and Lorrie\u00a0Faith Cranor . 2016 . Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks . In 25th USENIX Security Symposium (USENIX Security 16) . USENIX Association, Austin, TX, 175\u2013191. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/melicher William Melicher, Blase Ur, Sean\u00a0M. Segreti, Saranga Komanduri, Lujo Bauer, Nicolas Christin, and Lorrie\u00a0Faith Cranor. 2016. Fast, Lean, and Accurate: Modeling Password Guessability Using Neural Networks. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 175\u2013191. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/melicher"},{"key":"e_1_3_2_1_22_1","unstructured":"Mozilla. 2015. Browser Extensions. Website. https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Add-ons\/WebExtensions.  Mozilla. 2015. Browser Extensions. Website. https:\/\/developer.mozilla.org\/en-US\/docs\/Mozilla\/Add-ons\/WebExtensions."},{"key":"e_1_3_2_1_23_1","volume-title":"Website. Retrieved","author":"Ortiz-Ospina Esteban","year":"2019","unstructured":"Esteban Ortiz-Ospina . 2019 . The rise of social media . Website. Retrieved January 12, 2020 from https:\/\/ourworldindata.org\/rise-of-social-media. Esteban Ortiz-Ospina. 2019. The rise of social media. Website. Retrieved January 12, 2020 from https:\/\/ourworldindata.org\/rise-of-social-media."},{"key":"e_1_3_2_1_24_1","unstructured":"Andrei Queiroz Brian Keegan and Fredrick Mtenzi. 2017. Predicting Software Vulnerability Using Security Discussion in Social Media. (2017).  Andrei Queiroz Brian Keegan and Fredrick Mtenzi. 2017. Predicting Software Vulnerability Using Security Discussion in Social Media. (2017)."},{"key":"e_1_3_2_1_25_1","volume-title":"Whither Information Security?Retrieved","author":"Rivest Ronald","year":"2020","unstructured":"Ronald Rivest . 2001. Whither Information Security?Retrieved January 12, 2020 from http:\/\/web.archive.org\/web\/2007*\/http:\/\/wean1.ulib.org\/Lectures\/Distinguished%20Lectures\/2001\/03.0%20Ronald%20L%20Rivest\/6SLIDES\/security.ppt. Ronald Rivest. 2001. Whither Information Security?Retrieved January 12, 2020 from http:\/\/web.archive.org\/web\/2007*\/http:\/\/wean1.ulib.org\/Lectures\/Distinguished%20Lectures\/2001\/03.0%20Ronald%20L%20Rivest\/6SLIDES\/security.ppt."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837113"},{"volume-title":"Website. Retrieved","year":"2019","key":"e_1_3_2_1_27_1","unstructured":"Statista. 2019 . Number of monthly active Facebook users worldwide as of 2nd quarter 2019 (in millions) . Website. Retrieved January 12, 2020 from https:\/\/www.statista.com\/statistics\/264810. Statista. 2019. Number of monthly active Facebook users worldwide as of 2nd quarter 2019 (in millions). Website. Retrieved January 12, 2020 from https:\/\/www.statista.com\/statistics\/264810."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2017.7997248"},{"key":"e_1_3_2_1_29_1","unstructured":"Carnegie\u00a0Mellon University. 2015. Password Guessability Service. Website. https:\/\/pgs.ece.cmu.edu\/.  Carnegie\u00a0Mellon University. 2015. Password Guessability Service. Website. https:\/\/pgs.ece.cmu.edu\/."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3026050"},{"volume-title":"Presented as part of the 21st USENIX Security Symposium (USENIX Security 12)","author":"Ur Blase","key":"e_1_3_2_1_31_1","unstructured":"Blase Ur , Patrick\u00a0Gage Kelley , Saranga Komanduri , Joel Lee , Michael Maass , Michelle\u00a0 L. Mazurek , Timothy Passaro , Richard Shay , Timothy Vidas , Lujo Bauer , Nicolas Christin , and Lorrie\u00a0Faith Cranor . 2012. How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation . In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12) . USENIX , Bellevue, WA , 65\u201380. https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/ur Blase Ur, Patrick\u00a0Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle\u00a0L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, Nicolas Christin, and Lorrie\u00a0Faith Cranor. 2012. How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation. In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12). USENIX, Bellevue, WA, 65\u201380. https:\/\/www.usenix.org\/conference\/usenixsecurity12\/technical-sessions\/presentation\/ur"},{"key":"e_1_3_2_1_32_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Ur Blase","year":"2015","unstructured":"Blase Ur , Sean\u00a0 M Segreti , Lujo Bauer , Nicolas Christin , Lorrie\u00a0Faith Cranor , Saranga Komanduri , Darya Kurilova , Michelle\u00a0 L Mazurek , William Melicher , and Richard Shay . 2015 . Measuring real-world accuracies and biases in modeling password guessability . In 24th USENIX Security Symposium (USENIX Security 15) . 463\u2013481. Blase Ur, Sean\u00a0M Segreti, Lujo Bauer, Nicolas Christin, Lorrie\u00a0Faith Cranor, Saranga Komanduri, Darya Kurilova, Michelle\u00a0L Mazurek, William Melicher, and Richard Shay. 2015. Measuring real-world accuracies and biases in modeling password guessability. In 24th USENIX Security Symposium (USENIX Security 15). 463\u2013481."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"Rafael Veras Christopher Collins and Julie Thorpe. 2014. On Semantic Patterns of Passwords and their Security Impact.. In NDSS.  Rafael Veras Christopher Collins and Julie Thorpe. 2014. On Semantic Patterns of Passwords and their Security Impact.. In NDSS.","DOI":"10.14722\/ndss.2014.23103"},{"key":"e_1_3_2_1_34_1","volume-title":"fundamental algorithms for scientific computing in Python. Nature methods 17, 3","author":"Virtanen Pauli","year":"2020","unstructured":"Pauli Virtanen , Ralf Gommers , Travis\u00a0 E Oliphant , Matt Haberland , Tyler Reddy , David Cournapeau , Evgeni Burovski , Pearu Peterson , Warren Weckesser , Jonathan Bright , 2020. SciPy 1.0 : fundamental algorithms for scientific computing in Python. Nature methods 17, 3 ( 2020 ), 261\u2013272. Pauli Virtanen, Ralf Gommers, Travis\u00a0E Oliphant, Matt Haberland, Tyler Reddy, David Cournapeau, Evgeni Burovski, Pearu Peterson, Warren Weckesser, Jonathan Bright, 2020. SciPy 1.0: fundamental algorithms for scientific computing in Python. Nature methods 17, 3 (2020), 261\u2013272."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2016.60"},{"key":"e_1_3_2_1_36_1","volume-title":"Applying For a Visa? Here\u2019s Why You Should be Careful About Your Social Media Posts!Retrieved","author":"Wangchuk Rinchen\u00a0Norbu","year":"2020","unstructured":"Rinchen\u00a0Norbu Wangchuk . 2019. Applying For a Visa? Here\u2019s Why You Should be Careful About Your Social Media Posts!Retrieved January 12, 2020 from https:\/\/www.thebetterindia.com\/153762\/applying-visa-passport-social-media-posts\/. Rinchen\u00a0Norbu Wangchuk. 2019. Applying For a Visa? Here\u2019s Why You Should be Careful About Your Social Media Posts!Retrieved January 12, 2020 from https:\/\/www.thebetterindia.com\/153762\/applying-visa-passport-social-media-posts\/."},{"key":"e_1_3_2_1_37_1","unstructured":"Percy Wegmann. 2017. PosJs. Git. https:\/\/github.com\/dariusk\/pos-js.  Percy Wegmann. 2017. PosJs. Git. https:\/\/github.com\/dariusk\/pos-js."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866327"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.8"},{"key":"e_1_3_2_1_40_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Wheeler Daniel\u00a0Lowe","year":"2016","unstructured":"Daniel\u00a0Lowe Wheeler . 2016 . zxcvbn: Low-Budget Password Strength Estimation . In 25th USENIX Security Symposium (USENIX Security 16) . USENIX Association, Austin, TX, 157\u2013173. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/wheeler Daniel\u00a0Lowe Wheeler. 2016. zxcvbn: Low-Budget Password Strength Estimation. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 157\u2013173. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/wheeler"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2004.81"},{"key":"e_1_3_2_1_42_1","volume-title":"Retrieved","author":"Zivkovic Mile","year":"2018","unstructured":"Mile Zivkovic . 2018 . The Dos and Don\u2019ts of Social Media Screening in the Hiring Process . Retrieved January 12, 2020 from https:\/\/toggl.com\/blog\/social-media-screening. Mile Zivkovic. 2018. The Dos and Don\u2019ts of Social Media Screening in the Hiring Process. Retrieved January 12, 2020 from https:\/\/toggl.com\/blog\/social-media-screening."}],"event":{"name":"MUM 2020: 19th International Conference on Mobile and Ubiquitous Multimedia","acronym":"MUM 2020","location":"Essen Germany"},"container-title":["19th International Conference on Mobile and Ubiquitous Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428361.3428397","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3428361.3428397","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:02:58Z","timestamp":1750197778000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3428361.3428397"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,22]]},"references-count":42,"alternative-id":["10.1145\/3428361.3428397","10.1145\/3428361"],"URL":"https:\/\/doi.org\/10.1145\/3428361.3428397","relation":{},"subject":[],"published":{"date-parts":[[2020,11,22]]}}}