{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T16:24:33Z","timestamp":1764433473466,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,4,27]],"date-time":"2022-04-27T00:00:00Z","timestamp":1651017600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,27]]},"DOI":"10.1145\/3491102.3517534","type":"proceedings-article","created":{"date-parts":[[2022,4,28]],"date-time":"2022-04-28T17:08:31Z","timestamp":1651165711000},"page":"1-23","source":"Crossref","is-referenced-by-count":16,"title":["\u201cIt Basically Started Using Me:\u201d An Observational Study of Password Manager Usage"],"prefix":"10.1145","author":[{"given":"Sean","family":"Oesch","sequence":"first","affiliation":[{"name":"University of Tennessee, United States"}]},{"given":"Scott","family":"Ruoti","sequence":"additional","affiliation":[{"name":"Electrical Engineering and Computer Science, University of Tennessee, United States"}]},{"given":"James","family":"Simmons","sequence":"additional","affiliation":[{"name":"University of Tennessee, United States"}]},{"given":"Anuj","family":"Gautam","sequence":"additional","affiliation":[{"name":"University of Tennessee, United States"}]}],"member":"320","published-online":{"date-parts":[[2022,4,28]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2016.23011"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.582"},{"key":"e_1_3_2_1_3_1","volume-title":"Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS quarterly","author":"Anderson L","year":"2010","unstructured":"Catherine\u00a0 L Anderson and Ritu Agarwal . 2010. Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS quarterly ( 2010 ), 613\u2013643. Catherine\u00a0L Anderson and Ritu Agarwal. 2010. Practicing safe computing: A multimethod empirical examination of home computer user security behavioral intentions. MIS quarterly (2010), 613\u2013643."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243778"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.490"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.17705\/1atrr.00035"},{"key":"e_1_3_2_1_7_1","unstructured":"Talal\u00a0Haj Bakry and Tommy Mysk. 2020. Precise Location Information Leaking Through System Pasteboard. https:\/\/www.mysk.blog\/2020\/02\/24\/precise- location-information-leaking-through-system- pasteboard\/. Accessed: 2020-06-13.  Talal\u00a0Haj Bakry and Tommy Mysk. 2020. Precise Location Information Leaking Through System Pasteboard. https:\/\/www.mysk.blog\/2020\/02\/24\/precise- location-information-leaking-through-system- pasteboard\/. Accessed: 2020-06-13."},{"volume-title":"23rd {USENIX} Security Symposium ({USENIX} Security 14). 607\u2013623.","author":"Bonneau Joseph","key":"e_1_3_2_1_8_1","unstructured":"Joseph Bonneau and Stuart Schechter . 2014. Towards reliable storage of 56-bit secrets in human memory . In 23rd {USENIX} Security Symposium ({USENIX} Security 14). 607\u2013623. Joseph Bonneau and Stuart Schechter. 2014. Towards reliable storage of 56-bit secrets in human memory. In 23rd {USENIX} Security Symposium ({USENIX} Security 14). 607\u2013623."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.03.002"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1080\/19361610.2013.825751"},{"key":"e_1_3_2_1_11_1","volume-title":"Grounded theory research: Procedures, canons, and evaluative criteria. Qualitative sociology 13, 1","author":"Corbin M","year":"1990","unstructured":"Juliet\u00a0 M Corbin and Anselm Strauss . 1990. Grounded theory research: Procedures, canons, and evaluative criteria. Qualitative sociology 13, 1 ( 1990 ), 3\u201321. Juliet\u00a0M Corbin and Anselm Strauss. 1990. Grounded theory research: Procedures, canons, and evaluative criteria. Qualitative sociology 13, 1 (1990), 3\u201321."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702249"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-017-0093-6"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_12"},{"key":"e_1_3_2_1_15_1","volume-title":"Effects of Password Permutation on Subjective Usability Across Platforms. In International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, 59\u201370","author":"Greene K","year":"2015","unstructured":"Kristen\u00a0 K Greene . 2015 . Effects of Password Permutation on Subjective Usability Across Platforms. In International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, 59\u201370 . Kristen\u00a0K Greene. 2015. Effects of Password Permutation on Subjective Usability Across Platforms. In International Conference on Human Aspects of Information Security, Privacy, and Trust. Springer, 59\u201370."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07620-1_15"},{"key":"e_1_3_2_1_17_1","volume-title":"How many interviews are enough? An experiment with data saturation and variability. Field methods 18, 1","author":"Guest Greg","year":"2006","unstructured":"Greg Guest , Arwen Bunce , and Laura Johnson . 2006. How many interviews are enough? An experiment with data saturation and variability. Field methods 18, 1 ( 2006 ), 59\u201382. Greg Guest, Arwen Bunce, and Laura Johnson. 2006. How many interviews are enough? An experiment with data saturation and variability. Field methods 18, 1 (2006), 59\u201382."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00094"},{"key":"e_1_3_2_1_19_1","volume-title":"10th Symposium On Usable Privacy and Security ({SOUPS}","author":"Kang Ruogu","year":"2014","unstructured":"Ruogu Kang , Stephanie Brown , Laura Dabbish , and Sara Kiesler . 2014 . Privacy attitudes of mechanical turk workers and the us public . In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 37\u201349. Ruogu Kang, Stephanie Brown, Laura Dabbish, and Sara Kiesler. 2014. Privacy attitudes of mechanical turk workers and the us public. In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 37\u201349."},{"key":"e_1_3_2_1_20_1","volume-title":"International Conference on Information Security and Cryptology. Springer, 233\u2013251","author":"Karole Ambarish","year":"2010","unstructured":"Ambarish Karole , Nitesh Saxena , and Nicolas Christin . 2010 . A comparative usability evaluation of traditional password managers . In International Conference on Information Security and Cryptology. Springer, 233\u2013251 . Ambarish Karole, Nitesh Saxena, and Nicolas Christin. 2010. A comparative usability evaluation of traditional password managers. In International Conference on Information Security and Cryptology. Springer, 233\u2013251."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA614474"},{"key":"e_1_3_2_1_22_1","volume-title":"Studying the Impact of Managers on Password Strength and Reuse. In 27th USENIX Security Symposium. 203\u2013220","author":"Lyastani Sanam\u00a0Ghorbani","year":"2018","unstructured":"Sanam\u00a0Ghorbani Lyastani , Michael Schilling , Sascha Fahl , Michael Backes , and Sven Bugiel . 2018 . Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse. In 27th USENIX Security Symposium. 203\u2013220 . Sanam\u00a0Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Michael Backes, and Sven Bugiel. 2018. Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse. In 27th USENIX Security Symposium. 203\u2013220."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICONIC.2018.8601223"},{"volume-title":"Situational privacy and self-disclosure: Communication processes in online environments","author":"Masur K","key":"e_1_3_2_1_24_1","unstructured":"Philipp\u00a0 K Masur . 2018. Situational privacy and self-disclosure: Communication processes in online environments . Springer . Philipp\u00a0K Masur. 2018. Situational privacy and self-disclosure: Communication processes in online environments. Springer."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485832.3485884"},{"key":"e_1_3_2_1_26_1","volume-title":"29th USENIX Security Symposium (USENIX Security 20)","author":"Oesch Sean","year":"2020","unstructured":"Sean Oesch and Scott Ruoti . 2020 . That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers . In 29th USENIX Security Symposium (USENIX Security 20) . USENIX Association, Boston, MA. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/oesch Sean Oesch and Scott Ruoti. 2020. That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers. In 29th USENIX Security Symposium (USENIX Security 20). USENIX Association, Boston, MA. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/oesch"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3133973"},{"key":"e_1_3_2_1_28_1","volume-title":"Fifteenth Symposium on Usable Privacy and Security (SOUPS","author":"Pearman Sarah","year":"2019","unstructured":"Sarah Pearman , Shikun\u00a0Aerin Zhang , Lujo Bauer , and Nicolas Christin . 2019 . Why people (don\u2019t) use password managers effectively . In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). Sarah Pearman, Shikun\u00a0Aerin Zhang, Lujo Bauer, and Nicolas Christin. 2019. Why people (don\u2019t) use password managers effectively. In Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019)."},{"key":"e_1_3_2_1_29_1","volume-title":"Structured methods: interviews, questionnaires and observation. Researching society and culture 3","author":"Phellas N","year":"2011","unstructured":"Constantinos\u00a0 N Phellas , Alice Bloch , and Clive Seale . 2011. Structured methods: interviews, questionnaires and observation. Researching society and culture 3 ( 2011 ), 181\u2013205. Constantinos\u00a0N Phellas, Alice Bloch, and Clive Seale. 2011. Structured methods: interviews, questionnaires and observation. Researching society and culture 3 (2011), 181\u2013205."},{"key":"e_1_3_2_1_30_1","volume-title":"Why Older Adults (Don\u2019t) Use Password Managers. In 30th USENIX Security Symposium (USENIX Security 21)","author":"Ray Hirak","year":"2021","unstructured":"Hirak Ray , Flynn Wolf , Ravi Kuber , and Adam\u00a0 J. Aviv . 2021 . Why Older Adults (Don\u2019t) Use Password Managers. In 30th USENIX Security Symposium (USENIX Security 21) . USENIX Association, 73\u201390. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/ray Hirak Ray, Flynn Wolf, Ravi Kuber, and Adam\u00a0J. Aviv. 2021. Why Older Adults (Don\u2019t) Use Password Managers. In 30th USENIX Security Symposium (USENIX Security 21). USENIX Association, 73\u201390. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/ray"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354192"},{"key":"e_1_3_2_1_32_1","volume-title":"USENIX Security Symposium. 449\u2013464","author":"Silver David","year":"2014","unstructured":"David Silver , Suman Jana , Dan Boneh , Eric\u00a0Yawei Chen , and Collin Jackson . 2014 . Password Managers: Attacks and Defenses .. In USENIX Security Symposium. 449\u2013464 . David Silver, Suman Jana, Dan Boneh, Eric\u00a0Yawei Chen, and Collin Jackson. 2014. Password Managers: Attacks and Defenses.. In USENIX Security Symposium. 449\u2013464."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 37th Annual Computer Security Applications Conference. ACM.","author":"Simmons James","year":"2021","unstructured":"James Simmons , Oumar Diallo , Sean Oesch , and Scott Ruoti . 2021 . Systematization of password manager use cases and design paradigms . In Proceedings of the 37th Annual Computer Security Applications Conference. ACM. James Simmons, Oumar Diallo, Sean Oesch, and Scott Ruoti. 2021. Systematization of password manager use cases and design paradigms. In Proceedings of the 37th Annual Computer Security Applications Conference. ACM."},{"key":"e_1_3_2_1_34_1","volume-title":"International Conference on Passwords. Springer, 3\u201320","author":"Stobert Elizabeth","year":"2015","unstructured":"Elizabeth Stobert and Robert Biddle . 2015 . Expert password management . In International Conference on Passwords. Springer, 3\u201320 . Elizabeth Stobert and Robert Biddle. 2015. Expert password management. In International Conference on Passwords. Springer, 3\u201320."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2590296.2590336"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025733"}],"event":{"name":"CHI '22: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"New Orleans LA USA","acronym":"CHI '22"},"container-title":["CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491102.3517534","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3491102.3517534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:31:12Z","timestamp":1750188672000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3491102.3517534"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,27]]},"references-count":36,"alternative-id":["10.1145\/3491102.3517534","10.1145\/3491102"],"URL":"https:\/\/doi.org\/10.1145\/3491102.3517534","relation":{},"subject":[],"published":{"date-parts":[[2022,4,27]]}}}