{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T12:23:57Z","timestamp":1761740637068,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:00:00Z","timestamp":1633910400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,11]]},"DOI":"10.1145\/3481357.3481528","type":"proceedings-article","created":{"date-parts":[[2021,12,11]],"date-time":"2021-12-11T21:05:52Z","timestamp":1639256752000},"page":"124-128","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Vision: What Johnny learns about Password Security from Videos posted on YouTube"],"prefix":"10.1145","author":[{"given":"Mathieu","family":"Christmann","sequence":"first","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Germany"}]},{"given":"Peter","family":"Mayer","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[{"name":"Karlsruhe Institute of Technology, Germany"}]}],"member":"320","published-online":{"date-parts":[[2021,12,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Users Are Not the Enemy. Commun. ACM 42 (12","author":"Adams Anne","year":"1999","unstructured":"Anne Adams and Angela Sasse . 1999. Users Are Not the Enemy. Commun. ACM 42 (12 1999 ), 40\u201346. https:\/\/doi.org\/10.1145\/322796.322806 10.1145\/322796.322806 Anne Adams and Angela Sasse. 1999. Users Are Not the Enemy. Commun. ACM 42 (12 1999), 40\u201346. https:\/\/doi.org\/10.1145\/322796.322806"},{"key":"e_1_3_2_1_2_1","volume-title":"\u00a0C. Nurse","author":"Bada Maria","year":"2019","unstructured":"Maria Bada , Angela\u00a0 M. Sasse , and Jason R . \u00a0C. Nurse . 2019 . Cyber Security Awareness Campaigns : Why do they fail to change behaviour?arxiv:1901.02672\u00a0[cs.CR] Maria Bada, Angela\u00a0M. Sasse, and Jason R.\u00a0C. Nurse. 2019. Cyber Security Awareness Campaigns: Why do they fail to change behaviour?arxiv:1901.02672\u00a0[cs.CR]"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 27th USENIX Security Symposium","author":"Becker Ingolf","year":"2018","unstructured":"Ingolf Becker , Simon Parkin , and M.\u00a0 Angela Sasse . 2018 . The rewards and costs of stronger passwords in a university: Linking password lifetime to strength . Proceedings of the 27th USENIX Security Symposium (2018), 239\u2013253. Ingolf Becker, Simon Parkin, and M.\u00a0Angela Sasse. 2018. The rewards and costs of stronger passwords in a university: Linking password lifetime to strength. Proceedings of the 27th USENIX Security Symposium (2018), 239\u2013253."},{"key":"e_1_3_2_1_4_1","unstructured":"Bitkom. [n. d.]. Angriffsziel deutsche Wirtschaft: mehr als 100 Milliarden Euro Schaden pro Jahr. https:\/\/www.bitkom.org\/Presse\/Presseinformation\/Angriffsziel-deutsche-Wirtschaft-mehr-als-100-Milliarden-Euro-Schaden-pro-Jahr.  Bitkom. [n. d.]. Angriffsziel deutsche Wirtschaft: mehr als 100 Milliarden Euro Schaden pro Jahr. https:\/\/www.bitkom.org\/Presse\/Presseinformation\/Angriffsziel-deutsche-Wirtschaft-mehr-als-100-Milliarden-Euro-Schaden-pro-Jahr."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300733"},{"key":"e_1_3_2_1_6_1","volume-title":"Virtual Conference, 1\u20137.","author":"Christmann Mathieu","year":"2021","unstructured":"Mathieu Christmann , Peter Mayer , and Melanie Volkamer . 2021 . How to Effectively Communicate Benefits of Introducing a Modern Password Policy to Employees in Companies. In Who Are You?! Adventures in Authentication Workshop(WAY\u00a0\u201921) . Virtual Conference, 1\u20137. Mathieu Christmann, Peter Mayer, and Melanie Volkamer. 2021. How to Effectively Communicate Benefits of Introducing a Modern Password Policy to Employees in Companies. In Who Are You?! Adventures in Authentication Workshop(WAY\u00a0\u201921). Virtual Conference, 1\u20137."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.150"},{"key":"e_1_3_2_1_9_1","unstructured":"Alexa Internet. [n. d.]. Keyword Research Competitive Analysis & Website Ranking | Alexa. https:\/\/www.alexa.com\/.  Alexa Internet. [n. d.]. Keyword Research Competitive Analysis & Website Ranking | Alexa. https:\/\/www.alexa.com\/."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings (2011","author":"Jameson Anthony","year":"2011","unstructured":"Anthony Jameson , Silvia Gabrieli , Per\u00a0Ola Kristensson , Katharina Reinecke , Federica Cena , Cristina Gena , and Fabiana Vernero . 2011 . How can we support users\u2019 preferential choice?Conference on Human Factors in Computing Systems - Proceedings (2011 ), 409\u2013418. https:\/\/doi.org\/10.1145\/1979742.1979620 10.1145\/1979742.1979620 Anthony Jameson, Silvia Gabrieli, Per\u00a0Ola Kristensson, Katharina Reinecke, Federica Cena, Cristina Gena, and Fabiana Vernero. 2011. How can we support users\u2019 preferential choice?Conference on Human Factors in Computing Systems - Proceedings (2011), 409\u2013418. https:\/\/doi.org\/10.1145\/1979742.1979620"},{"key":"e_1_3_2_1_11_1","volume-title":"19th Americas Conference on Information Systems, AMCIS 2013 - Hyperconnected World: Anything, Anywhere, Anytime 5 (01","author":"Lin C.","year":"2013","unstructured":"C. Lin and A.S. Kunnathur . 2013. Toward developing a theory of end user information security competence . 19th Americas Conference on Information Systems, AMCIS 2013 - Hyperconnected World: Anything, Anywhere, Anytime 5 (01 2013 ), 3578\u20133587. C. Lin and A.S. Kunnathur. 2013. Toward developing a theory of end user information security competence. 19th Americas Conference on Information Systems, AMCIS 2013 - Hyperconnected World: Anything, Anywhere, Anytime 5 (01 2013), 3578\u20133587."},{"key":"e_1_3_2_1_12_1","volume-title":"On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials. In Annual Computer Security Applications Conference. ACM, 733\u2013748","author":"Mayer Peter","year":"2018","unstructured":"Peter Mayer , Christian Schwartz , and Melanie Volkamer . 2018 . On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials. In Annual Computer Security Applications Conference. ACM, 733\u2013748 . https:\/\/doi.org\/10.1145\/3274694.3274747 10.1145\/3274694.3274747 Peter Mayer, Christian Schwartz, and Melanie Volkamer. 2018. On The Systematic Development and Evaluation Of Password Security Awareness-Raising Materials. In Annual Computer Security Applications Conference. ACM, 733\u2013748. https:\/\/doi.org\/10.1145\/3274694.3274747"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167996.3167998"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516726"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.02428"},{"key":"#cr-split#-e_1_3_2_1_16_1.1","doi-asserted-by":"crossref","unstructured":"Karen Renaud and Verena Zimmermann. 2019. Nudging folks towards stronger password choices: providing certainty is the key. Behavioural Public Policy(2019). https:\/\/doi.org\/10.1017\/bpp.2018.3 10.1017\/bpp.2018.3","DOI":"10.1017\/bpp.2018.3"},{"key":"#cr-split#-e_1_3_2_1_16_1.2","doi-asserted-by":"crossref","unstructured":"Karen Renaud and Verena Zimmermann. 2019. Nudging folks towards stronger password choices: providing certainty is the key. Behavioural Public Policy(2019). https:\/\/doi.org\/10.1017\/bpp.2018.3","DOI":"10.1017\/bpp.2018.3"},{"key":"#cr-split#-e_1_3_2_1_17_1.1","doi-asserted-by":"crossref","unstructured":"Stefan Stieglitz Tobias Potthoff and Tobias Ki\u00dfmer. 2017. Digital Nudging am Arbeitsplatz. HMD Praxis der Wirtschaftsinformatik(2017). https:\/\/doi.org\/10.1365\/s40702-017-0367-5 10.1365\/s40702-017-0367-5","DOI":"10.1365\/s40702-017-0367-5"},{"key":"#cr-split#-e_1_3_2_1_17_1.2","doi-asserted-by":"crossref","unstructured":"Stefan Stieglitz Tobias Potthoff and Tobias Ki\u00dfmer. 2017. Digital Nudging am Arbeitsplatz. HMD Praxis der Wirtschaftsinformatik(2017). https:\/\/doi.org\/10.1365\/s40702-017-0367-5","DOI":"10.1365\/s40702-017-0367-5"},{"key":"e_1_3_2_1_18_1","volume-title":"Observing Password Creation in the Lab. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015","author":"Ur Blase","year":"2015","unstructured":"Blase Ur , Fumiko Noma , Jonathan Bees , Sean\u00a0 M. Segreti , Richard Shay , Lujo Bauer , Nicolas Christin , and Lorrie\u00a0Faith Cranor . 2015 . \u201d I Added \u2019!\u2019 at the End to Make It Secure \u201d: Observing Password Creation in the Lab. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015 ). USENIX Association, Ottawa, 123\u2013140. https:\/\/www.usenix.org\/conference\/soups 2015\/proceedings\/presentation\/ur Blase Ur, Fumiko Noma, Jonathan Bees, Sean\u00a0M. Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, and Lorrie\u00a0Faith Cranor. 2015. \u201dI Added \u2019!\u2019 at the End to Make It Secure\u201d: Observing Password Creation in the Lab. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 123\u2013140. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/ur"},{"key":"e_1_3_2_1_20_1","unstructured":"Melanie Volkamer and Benjamin Bachmann. [n. d.]. Wie Sie Ihre Mitarbeiter f\u00fcr IT-Sicherheit sensibilisieren. https:\/\/www.verwaltung-der-zukunft.org\/oeffentliche-it\/wie-sie-ihre-mitarbeiter-fuer-it-sicherheit-sensibilisieren.  Melanie Volkamer and Benjamin Bachmann. [n. d.]. Wie Sie Ihre Mitarbeiter f\u00fcr IT-Sicherheit sensibilisieren. https:\/\/www.verwaltung-der-zukunft.org\/oeffentliche-it\/wie-sie-ihre-mitarbeiter-fuer-it-sicherheit-sensibilisieren."},{"key":"#cr-split#-e_1_3_2_1_21_1.1","doi-asserted-by":"crossref","unstructured":"M. Y\u0131ld\u0131r\u0131m and I. Mackie. 2019. Encouraging users to improve password security and memorability. International Journal of Information Security (2019). https:\/\/doi.org\/10.1007\/s10207-019-00429-y 10.1007\/s10207-019-00429-y","DOI":"10.1007\/s10207-019-00429-y"},{"key":"#cr-split#-e_1_3_2_1_21_1.2","doi-asserted-by":"crossref","unstructured":"M. Y\u0131ld\u0131r\u0131m and I. Mackie. 2019. Encouraging users to improve password security and memorability. International Journal of Information Security (2019). https:\/\/doi.org\/10.1007\/s10207-019-00429-y","DOI":"10.1007\/s10207-019-00429-y"},{"key":"e_1_3_2_1_22_1","unstructured":"Nur\u00a0Haryani Zakaria. 2013. Exploring human factors issues & possible countermeasures in password authentication.  Nur\u00a0Haryani Zakaria. 2013. Exploring human factors issues & possible countermeasures in password authentication."},{"key":"#cr-split#-e_1_3_2_1_23_1.1","doi-asserted-by":"crossref","unstructured":"Leah Zhang-Kennedy Sonia Chiasson and P Oorschot. 2016. Revisiting Password Rules: Facilitating Human Management of Passwords. https:\/\/doi.org\/10.1109\/ECRIME.2016.7487945 10.1109\/ECRIME.2016.7487945","DOI":"10.1109\/ECRIME.2016.7487945"},{"key":"#cr-split#-e_1_3_2_1_23_1.2","doi-asserted-by":"crossref","unstructured":"Leah Zhang-Kennedy Sonia Chiasson and P Oorschot. 2016. Revisiting Password Rules: Facilitating Human Management of Passwords. https:\/\/doi.org\/10.1109\/ECRIME.2016.7487945","DOI":"10.1109\/ECRIME.2016.7487945"}],"event":{"name":"EuroUSEC '21: European Symposium on Usable Security 2021","acronym":"EuroUSEC '21","location":"Karlsruhe Germany"},"container-title":["Proceedings of the 2021 European Symposium on Usable Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3481357.3481528","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3481357.3481528","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:12Z","timestamp":1750193292000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3481357.3481528"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,11]]},"references-count":26,"alternative-id":["10.1145\/3481357.3481528","10.1145\/3481357"],"URL":"https:\/\/doi.org\/10.1145\/3481357.3481528","relation":{},"subject":[],"published":{"date-parts":[[2021,10,11]]},"assertion":[{"value":"2021-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}