{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T23:00:53Z","timestamp":1772838053305,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:00:00Z","timestamp":1633910400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002347","name":"Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["236615297"],"award-info":[{"award-number":["236615297"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003495","name":"Hessisches Ministerium f\u00fcr Wissenschaft und Kunst","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100003495","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,11]]},"DOI":"10.1145\/3481357.3481509","type":"proceedings-article","created":{"date-parts":[[2021,12,11]],"date-time":"2021-12-11T21:05:52Z","timestamp":1639256752000},"page":"105-117","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Finding Secret Treasure? Improving Memorized Secrets Through Gamification"],"prefix":"10.1145","author":[{"given":"Katrin","family":"Hartwig","sequence":"first","affiliation":[{"name":"Science and Technology for Peace and Security (PEASEC), Technische Universit\u00e4t Darmstadt, Germany"}]},{"given":"Atlas","family":"Englisch","sequence":"additional","affiliation":[{"name":"Science and Technology for Peace and Security (PEASEC), Technische Universit\u00e4t Darmstadt, Germany"}]},{"given":"Jan Pelle","family":"Thomson","sequence":"additional","affiliation":[{"name":"Science and Technology for Peace and Security (PEASEC), Technische Universit\u00e4t Darmstadt, Germany"}]},{"given":"Christian","family":"Reuter","sequence":"additional","affiliation":[{"name":"Science and Technology for Peace and Security (PEASEC), Technische Universit\u00e4t Darmstadt, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,12,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702241"},{"key":"e_1_3_2_1_3_1","volume-title":"CSCW1, Article 041 (May","author":"Bawa Anshul","year":"2020","unstructured":"Anshul Bawa , Pranav Khadpe , Pratik Joshi , Kalika Bali , and Monojit Choudhury . 2020. Do Multilingual Users Prefer Chat-Bots That Code-Mix? Let\u2019s Nudge and Find Out!Proc. ACM Hum.-Comput. Interact. 4 , CSCW1, Article 041 (May 2020 ), 23\u00a0pages. https:\/\/doi.org\/10.1145\/3392846 10.1145\/3392846 Anshul Bawa, Pranav Khadpe, Pratik Joshi, Kalika Bali, and Monojit Choudhury. 2020. Do Multilingual Users Prefer Chat-Bots That Code-Mix? Let\u2019s Nudge and Find Out!Proc. ACM Hum.-Comput. Interact. 4, CSCW1, Article 041 (May 2020), 23\u00a0pages. https:\/\/doi.org\/10.1145\/3392846"},{"key":"e_1_3_2_1_4_1","volume-title":"SUS - A quick and dirty usability scale. Usability evaluation in industry 189, 194","author":"Brooke John","year":"1996","unstructured":"John Brooke . 1996. SUS - A quick and dirty usability scale. Usability evaluation in industry 189, 194 ( 1996 ), 4\u20137. www.TBIStaffTraining.info John Brooke. 1996. SUS - A quick and dirty usability scale. Usability evaluation in industry 189, 194 (1996), 4\u20137. www.TBIStaffTraining.info"},{"key":"e_1_3_2_1_5_1","unstructured":"Pete Burnap Robert Carolina Awais Rashid M.\u00a0Angela Sasse Carmela Troncoso Wenke Lee Gianluca Stringhini Herve Debar Vassil Roussev Nigel Smart and et al.2019. The Cyber Security Body of Knowledge(1 ed.).  Pete Burnap Robert Carolina Awais Rashid M.\u00a0Angela Sasse Carmela Troncoso Wenke Lee Gianluca Stringhini Herve Debar Vassil Roussev Nigel Smart and et al.2019. The Cyber Security Body of Knowledge(1 ed.)."},{"key":"e_1_3_2_1_6_1","first-page":"88","article-title":"NoPhish: An anti-phishing education app","volume":"8743","author":"Canova Gamze","year":"2014","unstructured":"Gamze Canova , Melanie Volkamer , Clemens Bergmann , and Roland Borza . 2014 . NoPhish: An anti-phishing education app . Lecture Notes in Computer Science 8743 (2014), 88 \u2013 192 . https:\/\/doi.org\/10.1007\/978-3-319-11851-2_14 10.1007\/978-3-319-11851-2_14 Gamze Canova, Melanie Volkamer, Clemens Bergmann, and Roland Borza. 2014. NoPhish: An anti-phishing education app. Lecture Notes in Computer Science 8743 (2014), 88\u2013192. https:\/\/doi.org\/10.1007\/978-3-319-11851-2_14","journal-title":"Lecture Notes in Computer Science"},{"key":"#cr-split#-e_1_3_2_1_7_1.1","doi-asserted-by":"crossref","unstructured":"Ana Caraban Evangelos Karapanos Daniel Gon\u00e7alves and Pedro Campos. 2019. 23 Ways to Nudge: A Review of Technology-Mediated Nudging in Human-Computer Interaction. (2019) 1-15. https:\/\/doi.org\/10.1145\/3290605.3300733 10.1145\/3290605.3300733","DOI":"10.1145\/3290605.3300733"},{"key":"#cr-split#-e_1_3_2_1_7_1.2","doi-asserted-by":"crossref","unstructured":"Ana Caraban Evangelos Karapanos Daniel Gon\u00e7alves and Pedro Campos. 2019. 23 Ways to Nudge: A Review of Technology-Mediated Nudging in Human-Computer Interaction. (2019) 1-15. https:\/\/doi.org\/10.1145\/3290605.3300733","DOI":"10.1145\/3290605.3300733"},{"key":"e_1_3_2_1_8_1","volume-title":"Sony Stresses that PSN Passwords Were Hashed","author":"Constantin Lucian","unstructured":"Lucian Constantin . 2011. Sony Stresses that PSN Passwords Were Hashed . http:\/\/news.softpedia.com\/news\/SonyStresses-PSN-Passwords-Were-Hashed-198218.shtml. http:\/\/news.softpedia.com\/news\/SonyStresses-PSN-Passwords-Were-Hashed-198218.shtml Accessed: 2021-01-18. Lucian Constantin. 2011. Sony Stresses that PSN Passwords Were Hashed. http:\/\/news.softpedia.com\/news\/SonyStresses-PSN-Passwords-Were-Hashed-198218.shtml. http:\/\/news.softpedia.com\/news\/SonyStresses-PSN-Passwords-Were-Hashed-198218.shtml Accessed: 2021-01-18."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5461951"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858214"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2841113.2841115"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501617"},{"key":"e_1_3_2_1_13_1","volume-title":"A Description of Think Aloud Method and Protocol Analysis. Qualitative Health Research 3, 4 (Nov","author":"Fonteyn E.","year":"1993","unstructured":"Marsha\u00a0 E. Fonteyn , Benjamin Kuipers , and Susan\u00a0 J. Grobe . 1993. A Description of Think Aloud Method and Protocol Analysis. Qualitative Health Research 3, 4 (Nov . 1993 ), 430\u2013441. https:\/\/doi.org\/10.1177\/104973239300300403 Publisher : SAGE Publications Inc . 10.1177\/104973239300300403 Marsha\u00a0E. Fonteyn, Benjamin Kuipers, and Susan\u00a0J. Grobe. 1993. A Description of Think Aloud Method and Protocol Analysis. Qualitative Health Research 3, 4 (Nov. 1993), 430\u2013441. https:\/\/doi.org\/10.1177\/104973239300300403 Publisher: SAGE Publications Inc."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.676"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2005.12.004"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2755205"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/N15-1180"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556978"},{"key":"e_1_3_2_1_20_1","unstructured":"Katrin Hartwig and Christian Reuter. 2020. Dealing with Transparency in Nudges: Nudging Users Towards Stronger Passwords by Using Transparent Visualizations. Behaviour & Information Technology(2020).  Katrin Hartwig and Christian Reuter. 2020. Dealing with Transparency in Nudges: Nudging Users Towards Stronger Passwords by Using Transparent Visualizations. Behaviour & Information Technology(2020)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3481357.3481514"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the CHI Workshop on Personalizing Behavior Change TechnologiesApril(2014)","author":"Jeske Debora","year":"2014","unstructured":"Debora Jeske , Lynne Coventry , and Pam Briggs . 2014 . Nudging whom how : IT proficiency, impulse control and secure behaviour . Proceedings of the CHI Workshop on Personalizing Behavior Change TechnologiesApril(2014) , 1\u20134. Debora Jeske, Lynne Coventry, and Pam Briggs. 2014. Nudging whom how : IT proficiency, impulse control and secure behaviour. Proceedings of the CHI Workshop on Personalizing Behavior Change TechnologiesApril(2014), 1\u20134."},{"key":"e_1_3_2_1_23_1","volume-title":"fast and slow","author":"Kahneman Daniel","unstructured":"Daniel Kahneman . 2011. Thinking , fast and slow . Macmillan . Daniel Kahneman. 2011. Thinking, fast and slow. Macmillan."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"crossref","unstructured":"Jeffrey\u00a0P. Kaleta Jong\u00a0Seok Lee and Sungjin Yoo. 2019. Nudging with construal level theory to improve online password use and intended password choice. Information Technology & People(2019).  Jeffrey\u00a0P. Kaleta Jong\u00a0Seok Lee and Sungjin Yoo. 2019. Nudging with construal level theory to improve online password use and intended password choice. Information Technology & People(2019).","DOI":"10.1108\/ITP-01-2018-0001"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188689"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.28991\/esj-2017-01114"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","unstructured":"Johannes Kiesel Benno Stein and Stefan Lucks. 2017. A Large-scale Analysis of the Mnemonic Password Advice.. In NDSS.  Johannes Kiesel Benno Stein and Stefan Lucks. 2017. A Large-scale Analysis of the Mnemonic Password Advice.. In NDSS.","DOI":"10.14722\/ndss.2017.23077"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.3151331"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2018.10.013"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979321"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.4018\/ijesma.2020040102"},{"key":"e_1_3_2_1_32_1","volume-title":"Memorability of Security Questions. In Australasian Conference on Information Systems. 1\u201311","author":"Micallef Nicholas","year":"2017","unstructured":"Nicholas Micallef and Nalin Asanka\u00a0Gamagedara Arachchilage . 2017 . A Serious Game Design : Nudging Users \u2019 Memorability of Security Questions. In Australasian Conference on Information Systems. 1\u201311 . Nicholas Micallef and Nalin Asanka\u00a0Gamagedara Arachchilage. 2017. A Serious Game Design : Nudging Users \u2019 Memorability of Security Questions. In Australasian Conference on Information Systems. 1\u201311."},{"key":"e_1_3_2_1_33_1","unstructured":"Randall Munroe. 2011. XKCD #936: \u201cPassword Strength\u201d. https:\/\/xkcd.com\/936\/ Accessed: 2021-01-18.  Randall Munroe. 2011. XKCD #936: \u201cPassword Strength\u201d. https:\/\/xkcd.com\/936\/ Accessed: 2021-01-18."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcps.2011.08.002"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23451-5_12"},{"key":"e_1_3_2_1_36_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS) (2019","author":"Pearman Sarah","year":"2019","unstructured":"Sarah Pearman , Shikun\u00a0Aerin Zhang , Lujo Bauer , Nicolas Christin , and Lorrie\u00a0Faith Cranor . 2019 . Why people (don\u2019t) use password managers effectively . Fifteenth Symposium on Usable Privacy and Security (SOUPS) (2019 ). https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/pearman Sarah Pearman, Shikun\u00a0Aerin Zhang, Lujo Bauer, Nicolas Christin, and Lorrie\u00a0Faith Cranor. 2019. Why people (don\u2019t) use password managers effectively. Fifteenth Symposium on Usable Privacy and Security (SOUPS) (2019). https:\/\/www.usenix.org\/conference\/soups2019\/presentation\/pearman"},{"key":"#cr-split#-e_1_3_2_1_37_1.1","doi-asserted-by":"crossref","unstructured":"Eyal Pe'er Serge Egelman Marian Harbach Nathan Malkin Arunesh Mathur and Alisa Frik. 2019. Nudge Me Right: Personalizing Online Nudges to People's Decision-Making Styles. SSRN Electronic Journal(2019). https:\/\/doi.org\/10.2139\/ssrn.3324907 10.2139\/ssrn.3324907","DOI":"10.2139\/ssrn.3324907"},{"key":"#cr-split#-e_1_3_2_1_37_1.2","doi-asserted-by":"crossref","unstructured":"Eyal Pe'er Serge Egelman Marian Harbach Nathan Malkin Arunesh Mathur and Alisa Frik. 2019. Nudge Me Right: Personalizing Online Nudges to People's Decision-Making Styles. SSRN Electronic Journal(2019). https:\/\/doi.org\/10.2139\/ssrn.3324907","DOI":"10.2139\/ssrn.3324907"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the Pattern Languages of Programming Conference, Vol.\u00a099","author":"Perzel Kimberly","year":"1999","unstructured":"Kimberly Perzel and David Kane . 1999 . Usability patterns for applications on the world wide web . In Proceedings of the Pattern Languages of Programming Conference, Vol.\u00a099 . Kimberly Perzel and David Kane. 1999. Usability patterns for applications on the world wide web. In Proceedings of the Pattern Languages of Programming Conference, Vol.\u00a099."},{"key":"e_1_3_2_1_39_1","volume-title":"The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER 2017","author":"Renaud Karen","year":"2017","unstructured":"Karen Renaud , Verena Zimmerman , Joseph Maguire , and Steve Draper . 2017 . Lessons Learned from Evaluating Eight Password Nudges in the Wild . In The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER 2017 ). USENIX Association, 25\u201337. https:\/\/www.usenix.org\/conference\/laser 2017\/presentation\/renaud Karen Renaud, Verena Zimmerman, Joseph Maguire, and Steve Draper. 2017. Lessons Learned from Evaluating Eight Password Nudges in the Wild. In The LASER Workshop: Learning from Authoritative Security Experiment Results (LASER 2017). USENIX Association, 25\u201337. https:\/\/www.usenix.org\/conference\/laser2017\/presentation\/renaud"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1017\/bpp.2018.3"},{"key":"e_1_3_2_1_41_1","unstructured":"Karen Renaud Verena Zimmermann Joseph Maguire and Steve Draper. 2017. Lessons Learned from Evaluating Eight Password Nudges in the Wild.  Karen Renaud Verena Zimmermann Joseph Maguire and Steve Draper. 2017. Lessons Learned from Evaluating Eight Password Nudges in the Wild."},{"key":"e_1_3_2_1_42_1","unstructured":"Eva Ruegenhagen and Bernard Rummel. 2013. System Usability Scale\u2013jetzt auch auf Deutsch. SAP Global Design Enablement Team(2013).  Eva Ruegenhagen and Bernard Rummel. 2013. System Usability Scale\u2013jetzt auch auf Deutsch. SAP Global Design Enablement Team(2013)."},{"key":"e_1_3_2_1_43_1","volume-title":"Gamification Techniques for Raising Cyber Security Awareness. In International Conference on HCI for Cybersecurity, Privacy and Trust (HCI-CPT).","author":"Scholefield Sam","year":"2019","unstructured":"Sam Scholefield and Lynsay\u00a0 A Shepherd . 2019 . Gamification Techniques for Raising Cyber Security Awareness. In International Conference on HCI for Cybersecurity, Privacy and Trust (HCI-CPT). Sam Scholefield and Lynsay\u00a0A Shepherd. 2019. Gamification Techniques for Raising Cyber Security Awareness. In International Conference on HCI for Cybersecurity, Privacy and Trust (HCI-CPT)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280692"},{"key":"e_1_3_2_1_45_1","volume-title":"Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance. Journal of Management Information Systems (JMIS)","author":"Silic Mario","year":"2019","unstructured":"Mario Silic and Paul\u00a0Benjamin Lowry . 2019. Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance. Journal of Management Information Systems (JMIS) ( 2019 ). Mario Silic and Paul\u00a0Benjamin Lowry. 2019. Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance. Journal of Management Information Systems (JMIS) (2019)."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3399715.3399950"},{"key":"e_1_3_2_1_47_1","volume-title":"Nudge: Improving decisions about health, wealth, and happiness","author":"Thaler H.","year":"2009","unstructured":"Richard\u00a0 H. Thaler and Cass\u00a0 R. Sunstein . 2009 . Nudge: Improving decisions about health, wealth, and happiness . Penguin . Richard\u00a0H. Thaler and Cass\u00a0R. Sunstein. 2009. Nudge: Improving decisions about health, wealth, and happiness. Penguin."},{"key":"e_1_3_2_1_48_1","volume-title":"Privacy protection in tourism: Where we are and where we should be heading for. Information and Communication Technologies in Tourism","author":"Tussyadiah Iis","year":"2019","unstructured":"Iis Tussyadiah , Shujun Li , and Graham Miller . 2019. Privacy protection in tourism: Where we are and where we should be heading for. Information and Communication Technologies in Tourism ( 2019 ), 278\u2013290. https:\/\/doi.org\/10.1007\/978-3-030-05940-8_22 10.1007\/978-3-030-05940-8_22 Iis Tussyadiah, Shujun Li, and Graham Miller. 2019. Privacy protection in tourism: Where we are and where we should be heading for. Information and Communication Technologies in Tourism (2019), 278\u2013290. https:\/\/doi.org\/10.1007\/978-3-030-05940-8_22"},{"key":"e_1_3_2_1_49_1","volume-title":"Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security 12). 65\u201380.","author":"Ur Blase","unstructured":"Blase Ur , Patrick\u00a0Gage Kelley , Saranga Komanduri , Joel Lee , Michael Maass , Michelle\u00a0 L. Mazurek , Timothy Passaro , Richard Shay , Timothy Vidas , Lujo Bauer , 2012. How does your password measure up? the effect of strength meters on password creation . In Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security 12). 65\u201380. Blase Ur, Patrick\u00a0Gage Kelley, Saranga Komanduri, Joel Lee, Michael Maass, Michelle\u00a0L. Mazurek, Timothy Passaro, Richard Shay, Timothy Vidas, Lujo Bauer, 2012. How does your password measure up? the effect of strength meters on password creation. In Presented as part of the 21st {USENIX} Security Symposium ({USENIX} Security 12). 65\u201380."},{"key":"#cr-split#-e_1_3_2_1_50_1.1","doi-asserted-by":"crossref","unstructured":"Blase Ur Gloria Mark Susan Fussell Cliff Lampe Juan\u00a0Pablo Hourcade Caroline Appert Daniel Wigdor Felicia Alfieri Maung Aung Lujo Bauer Nicolas Christin Jessica Colnago Lorrie\u00a0Faith Cranor Henry Dixon Pardis\u00a0Emami Naeini Hana Habib Noah Johnson and William Melicher. 2017. Design and Evaluation of a Data-Driven Password Meter. (2017) 3775-3786. https:\/\/doi.org\/10.1145\/3025453.3026050 10.1145\/3025453.3026050","DOI":"10.1145\/3025453.3026050"},{"key":"#cr-split#-e_1_3_2_1_50_1.2","doi-asserted-by":"crossref","unstructured":"Blase Ur Gloria Mark Susan Fussell Cliff Lampe Juan\u00a0Pablo Hourcade Caroline Appert Daniel Wigdor Felicia Alfieri Maung Aung Lujo Bauer Nicolas Christin Jessica Colnago Lorrie\u00a0Faith Cranor Henry Dixon Pardis\u00a0Emami Naeini Hana Habib Noah Johnson and William Melicher. 2017. Design and Evaluation of a Data-Driven Password Meter. (2017) 3775-3786. https:\/\/doi.org\/10.1145\/3025453.3026050","DOI":"10.1145\/3025453.3026050"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2018.2794629"},{"key":"e_1_3_2_1_52_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Wheeler Daniel\u00a0Lowe","year":"2016","unstructured":"Daniel\u00a0Lowe Wheeler . 2016 . zxcvbn: Low-budget password strength estimation . In 25th USENIX Security Symposium (USENIX Security 16) . 157\u2013173. Daniel\u00a0Lowe Wheeler. 2016. zxcvbn: Low-budget password strength estimation. In 25th USENIX Security Symposium (USENIX Security 16). 157\u2013173."},{"key":"e_1_3_2_1_53_1","unstructured":"Luke Wroblewski. 2008. Web form design: filling in the blanks. Rosenfeld Media.  Luke Wroblewski. 2008. Web form design: filling in the blanks. Rosenfeld Media."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2019.08.006"}],"event":{"name":"EuroUSEC '21: European Symposium on Usable Security 2021","location":"Karlsruhe Germany","acronym":"EuroUSEC '21"},"container-title":["Proceedings of the 2021 European Symposium on Usable Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3481357.3481509","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3481357.3481509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:17:32Z","timestamp":1750191452000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3481357.3481509"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,11]]},"references-count":56,"alternative-id":["10.1145\/3481357.3481509","10.1145\/3481357"],"URL":"https:\/\/doi.org\/10.1145\/3481357.3481509","relation":{},"subject":[],"published":{"date-parts":[[2021,10,11]]},"assertion":[{"value":"2021-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}