{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T11:51:59Z","timestamp":1770465119730,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,21]],"date-time":"2024-11-21T00:00:00Z","timestamp":1732147200000},"content-version":"vor","delay-in-days":372,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["1845300"],"award-info":[{"award-number":["1845300"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,15]]},"DOI":"10.1145\/3576915.3623150","type":"proceedings-article","created":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T12:35:13Z","timestamp":1700570113000},"page":"3123-3137","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["\"I just stopped using one and started using the other\": Motivations, Techniques, and Challenges When Switching Password Managers"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1987-1685","authenticated-orcid":false,"given":"Collins W.","family":"Munyendo","sequence":"first","affiliation":[{"name":"The George Washington University, Washington, DC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6267-4874","authenticated-orcid":false,"given":"Peter","family":"Mayer","sequence":"additional","affiliation":[{"name":"University of Southern Denmark, Odense, Denmark"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3792-2485","authenticated-orcid":false,"given":"Adam J.","family":"Aviv","sequence":"additional","affiliation":[{"name":"The George Washington University, Washington, DC, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2016.23011"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.582"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818015"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi12110189"},{"key":"e_1_3_2_1_5_1","volume-title":"Proc. SOUPS.","author":"Amft Sabrina","year":"2023","unstructured":"Sabrina Amft, Sandra H\u00f6ltervennhoff, Nicolas Huaman, Yasemin Acar, and Sascha Fahl. 2023. \"Would You Give the Same Priority to the Bank and a Game? I Do Not!\" Exploring Credential Management Strategies and Obstacles during Password Manager Setup. In Proc. SOUPS."},{"key":"e_1_3_2_1_6_1","unstructured":"J. Craig Anderson. 2013. Identity theft growing costly to victims. https:\/\/www.usatoday.com\/story\/money\/personalfinance\/2013\/04\/14\/identity-theft-growing\/2082179\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.490"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.17705\/1atrr.00035"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-15497-3_18"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1002\/acp.1014"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.36"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.03.002"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2019.03.002"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. SOUPS.","author":"Chiasson Sonia","year":"2006","unstructured":"Sonia Chiasson, Paul C van Oorschot, and Robert Biddle. 2006. A Usability Study and Critique of Two Password Managers. In Proc. SOUPS."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/19361610.2013.825751"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174030"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23357"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13673-017-0093-6"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. SOUPS.","author":"Gautam Anuj","year":"2022","unstructured":"Anuj Gautam, Shan Lalani, and Scott Ruoti. 2022. Improving Password Generation Through the Design of a Password Composition Policy Description Language. In Proc. SOUPS."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978416"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174144"},{"key":"e_1_3_2_1_24_1","volume-title":"Proc. IEEE S&P.","author":"Huaman N.","unstructured":"N. Huaman, S. Amft, M. Oltrogge, Y. Acar, and S. Fahl. 2021. They Would do Better if They Worked Together: The Case of Interaction Problems Between Password Managers and Websites. In Proc. IEEE S&P."},{"key":"e_1_3_2_1_25_1","unstructured":"Identity Theft Resource Center. 2021. 2021 Consumer Aftermath Report: How Identity Crimes Impact Victims Their Families Friends and Workplaces. Technical Report. Identity Theft Resource Center. https:\/\/www.idtheftcenter.org\/event\/2021-consumer-aftermath-report\/"},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. SOUPS.","author":"Ion Iulia","year":"2015","unstructured":"Iulia Ion, Rob Reeder, and Sunny Consolvo. 2015. \"...No one Can Hack My Mind\": Comparing Expert and Non-Expert Security Practices. In Proc. SOUPS."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/975817.975820"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-55220-5_17"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA614474"},{"key":"e_1_3_2_1_30_1","volume-title":"Proc. USENIX Security.","author":"Lyastani Sanam Ghorbani","year":"2018","unstructured":"Sanam Ghorbani Lyastani, Michael Schilling, Sascha Fahl, Michael Backes, and Sven Bugiel. 2018. Better managed than memorized? Studying the Impact of Managers on Password Strength and Reuse. In Proc. USENIX Security."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICONIC.2018.8601223"},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. USENIX Security.","author":"Mayer Peter","unstructured":"Peter Mayer, Collins W. Munyendo, Michelle L. Mazurek, and Adam J. Aviv. 2022. Why Users (Don't) Use Password Managers at a Large Educational Institution. In Proc. USENIX Security."},{"key":"e_1_3_2_1_33_1","volume-title":"Aviv","author":"Mayer Peter","year":"2023","unstructured":"Peter Mayer, Yixin Zou, Byron M. Lowens, Hunter A. Dyer, Khue Le, Florian Schaub, and Adam J. Aviv. 2023. Awareness, Intention, (In)Action: Individuals' Reactions to Data Breaches. ACM Trans. Comput.-Hum. Interact. (2023)."},{"key":"e_1_3_2_1_34_1","volume-title":"Proc. USENIX Security.","author":"Mayer Peter","unstructured":"Peter Mayer, Yixin Zou, Florian Schaub, and Adam J. Aviv. 2021. \"Now I'm a bit angry:\" Individuals Awareness, Perception, and Responses to Data Breaches that Affected Them. In Proc. USENIX Security."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420964"},{"key":"e_1_3_2_1_36_1","volume-title":"Proc. USENIX Security.","author":"Nisenoff Alexandra","year":"2023","unstructured":"Alexandra Nisenoff, Maximilian Golla, Miranda Wei, Juliette Hainline, Hayley Szymanek, Annika Braun, Annika Hildebrandt, Blair Christensen, David Langenberg, and Blase Ur. 2023. A Two-Decade Retrospective Analysis of a University's Vulnerability to Attacks Exploiting Reused Passwords. In Proc. USENIX Security."},{"key":"e_1_3_2_1_37_1","volume-title":"Proc. USENIX Security.","author":"Oesch Sean","year":"2020","unstructured":"Sean Oesch and Scott Ruoti. 2020. That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password Managers. In Proc. USENIX Security."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517534"},{"key":"e_1_3_2_1_39_1","volume-title":"Proc. SOUPS.","author":"Pearman Sarah","year":"2019","unstructured":"Sarah Pearman, Shikun Aerin Zhang, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. 2019. Why people (don't) use password managers effectively. In Proc. SOUPS."},{"key":"e_1_3_2_1_40_1","volume-title":"Aviv","author":"Ray Hirak","year":"2021","unstructured":"Hirak Ray, Flynn Wolf, Ravi Kuber, and Adam J. Aviv. 2021. Why Older Adults (Don't) Use Password Managers. In Proc. USENIX Security."},{"key":"e_1_3_2_1_41_1","volume-title":"The coding manual for qualitative researchers","author":"Salda\u00f1a Johnny","unstructured":"Johnny Salda\u00f1a. 2013. The coding manual for qualitative researchers 2nd ed.). SAGE, Los Angeles. OCLC: ocn796279115.","edition":"2"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354192"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24192-0_4"},{"key":"e_1_3_2_1_44_1","article-title":"The Password Life Cycle","volume":"21","author":"Stobert Elizabeth","year":"2018","unstructured":"Elizabeth Stobert and Robert Biddle. 2018. The Password Life Cycle. ACM Transactions on Privacy and Security (TOPS), Vol. 21, 3 (2018), 32 pages.","journal-title":"ACM Transactions on Privacy and Security (TOPS)"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1177\/1098214005283748"},{"key":"e_1_3_2_1_46_1","unstructured":"Karim Toubba. 2022. https:\/\/blog.lastpass.com\/2022\/12\/notice-of-recent-security-incident\/."},{"key":"e_1_3_2_1_47_1","volume-title":"Aviv","author":"Wu Xiaoyuan","year":"2022","unstructured":"Xiaoyuan Wu, Collins W. Munyendo, Eddie Cosic, Genevieve A. Flynn, Olivia Legault, and Adam J. Aviv. 2022. User Perceptions of Five-Word Passwords. In Proc. ACSAC."},{"key":"e_1_3_2_1_48_1","volume-title":"Proc. SOUPS.","author":"Zibaei Samira","year":"2023","unstructured":"Samira Zibaei, Amirali Salehi-Abari, and Julie Thorpe. 2023. Dissecting Nudges in Password Managers: Simple Defaults are Powerful. In Proc. SOUPS."}],"event":{"name":"CCS '23: ACM SIGSAC Conference on Computer and Communications Security","location":"Copenhagen Denmark","acronym":"CCS '23","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623150","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3623150","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3576915.3623150","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T01:43:14Z","timestamp":1755740594000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3576915.3623150"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,15]]},"references-count":48,"alternative-id":["10.1145\/3576915.3623150","10.1145\/3576915"],"URL":"https:\/\/doi.org\/10.1145\/3576915.3623150","relation":{},"subject":[],"published":{"date-parts":[[2023,11,15]]},"assertion":[{"value":"2023-11-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}