{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T02:39:03Z","timestamp":1768012743572,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,14]],"date-time":"2023-10-14T00:00:00Z","timestamp":1697241600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,14]]},"DOI":"10.1145\/3584931.3606983","type":"proceedings-article","created":{"date-parts":[[2023,10,13]],"date-time":"2023-10-13T22:23:10Z","timestamp":1697235790000},"page":"164-171","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Can Password Meter be More Effective Towards User Attention, Engagement, and Attachment?: A Study of Metaphor-based Designs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8547-7868","authenticated-orcid":false,"given":"Arezou","family":"Behfar","sequence":"first","affiliation":[{"name":"Computer science, Utah State university, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7626-629X","authenticated-orcid":false,"given":"Hanieh","family":"Atashpanjeh","sequence":"additional","affiliation":[{"name":"Computer Science, Utah State Univseristy, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5764-2253","authenticated-orcid":false,"given":"Mahdi Nasrullah","family":"Al-Ameen","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Utah State University, United States"}]}],"member":"320","published-online":{"date-parts":[[2023,10,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0067"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_3_2_1_3_1","volume-title":"Transforming qualitative information: Thematic analysis and code development. sage","author":"Boyatzis E","unstructured":"Richard\u00a0 E Boyatzis . 1998. Transforming qualitative information: Thematic analysis and code development. sage , Thousand Oaks, CA, USA . Richard\u00a0E Boyatzis. 1998. Transforming qualitative information: Thematic analysis and code development. sage, Thousand Oaks, CA, USA."},{"key":"e_1_3_2_1_4_1","volume-title":"Using thematic analysis in psychology. Qualitative research in psychology 3, 2","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke . 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 ( 2006 ), 77\u2013101. Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77\u2013101."},{"key":"e_1_3_2_1_5_1","volume-title":"Conducting clinical research using crowdsourced convenience samples. Annual review of clinical psychology 12","author":"Chandler Jesse","year":"2016","unstructured":"Jesse Chandler and Danielle Shapiro . 2016. Conducting clinical research using crowdsourced convenience samples. Annual review of clinical psychology 12 ( 2016 ), 53\u201381. Jesse Chandler and Danielle Shapiro. 2016. Conducting clinical research using crowdsourced convenience samples. Annual review of clinical psychology 12 (2016), 53\u201381."},{"key":"e_1_3_2_1_6_1","volume-title":"Statistical power analysis for the behavioral sciences","author":"Cohen Jacob","unstructured":"Jacob Cohen . 2013. Statistical power analysis for the behavioral sciences . Academic press . Jacob Cohen. 2013. Statistical power analysis for the behavioral sciences. Academic press."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/job.1962"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481329"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501617"},{"key":"e_1_3_2_1_10_1","volume-title":"A research agenda acknowledging the persistence of passwords","author":"Herley Cormac","year":"2011","unstructured":"Cormac Herley and Paul Van\u00a0Oorschot . 2011. A research agenda acknowledging the persistence of passwords . IEEE Security & privacy 10, 1 ( 2011 ), 28\u201336. Cormac Herley and Paul Van\u00a0Oorschot. 2011. A research agenda acknowledging the persistence of passwords. IEEE Security & privacy 10, 1 (2011), 28\u201336."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_14"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557165"},{"key":"e_1_3_2_1_13_1","volume-title":"Comparing Expert and Non-Expert Security Practices. In Eleventh Symposium On Usable Privacy and Security (SOUPS). 327\u2013346","author":"Ion Iulia","year":"2015","unstructured":"Iulia Ion , Rob Reeder , and Sunny Consolvo . 2015 . \u201c... No one Can Hack My Mind \u201d: Comparing Expert and Non-Expert Security Practices. In Eleventh Symposium On Usable Privacy and Security (SOUPS). 327\u2013346 . Iulia Ion, Rob Reeder, and Sunny Consolvo. 2015. \u201c... No one Can Hack My Mind\u201d: Comparing Expert and Non-Expert Security Practices. In Eleventh Symposium On Usable Privacy and Security (SOUPS). 327\u2013346."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3003733.3003764"},{"key":"e_1_3_2_1_15_1","volume-title":"Are attention check questions a threat to scale validity?Applied Psychology 67, 2","author":"Kung YH","year":"2018","unstructured":"Franki\u00a0 YH Kung , Navio Kwok , and Douglas\u00a0 J Brown . 2018. Are attention check questions a threat to scale validity?Applied Psychology 67, 2 ( 2018 ), 264\u2013283. Franki\u00a0YH Kung, Navio Kwok, and Douglas\u00a0J Brown. 2018. Are attention check questions a threat to scale validity?Applied Psychology 67, 2 (2018), 264\u2013283."},{"key":"e_1_3_2_1_16_1","volume-title":"The metaphorical structure of the human conceptual system. Cognitive science 4, 2","author":"Lakoff George","year":"1980","unstructured":"George Lakoff and Mark Johnson . 1980. The metaphorical structure of the human conceptual system. Cognitive science 4, 2 ( 1980 ), 195\u2013208. George Lakoff and Mark Johnson. 1980. The metaphorical structure of the human conceptual system. Cognitive science 4, 2 (1980), 195\u2013208."},{"key":"e_1_3_2_1_17_1","volume-title":"Metaphors we live by","author":"Lakoff George","unstructured":"George Lakoff and Mark Johnson . 2008. Metaphors we live by . University of Chicago press. George Lakoff and Mark Johnson. 2008. Metaphors we live by. University of Chicago press."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.962472"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187878"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516726"},{"key":"e_1_3_2_1_21_1","unstructured":"Don Norman. 2013. The design of everyday things: Revised and expanded edition. Basic books.  Don Norman. 2013. The design of everyday things: Revised and expanded edition. Basic books."},{"key":"e_1_3_2_1_22_1","volume-title":"Emotional design: People and things. Retrieved February 1","author":"Norman A","year":"2005","unstructured":"Donald\u00a0 A Norman . 2005. Emotional design: People and things. Retrieved February 1 ( 2005 ). Donald\u00a0A Norman. 2005. Emotional design: People and things. Retrieved February 1 (2005)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078829"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3530190.3534810"},{"key":"e_1_3_2_1_25_1","unstructured":"Martin Schrepp and J\u00f6rg Thomaschewski. 2019. Handbook for the modular extension of the User Experience Questionnaire. In Mensch & Computer.  Martin Schrepp and J\u00f6rg Thomaschewski. 2019. Handbook for the modular extension of the User Experience Questionnaire. In Mensch & Computer."},{"key":"e_1_3_2_1_26_1","volume-title":"Workshop on Technology and Consumer Protection (ConPro 18)","author":"Seng Sovantharith","year":"2018","unstructured":"Sovantharith Seng , Mahdi\u00a0Nasrullah Al-Ameen , and Matthew Wright . 2018 . Understanding users\u2019 decision of clicking on posts in Facebook with implications for phishing . In Workshop on Technology and Consumer Protection (ConPro 18) . Sovantharith Seng, Mahdi\u00a0Nasrullah Al-Ameen, and Matthew Wright. 2018. Understanding users\u2019 decision of clicking on posts in Facebook with implications for phishing. In Workshop on Technology and Consumer Protection (ConPro 18)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837113"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(17)30007-6"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-20488-4_9"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555132"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3026050"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/2362793.2362798"},{"key":"e_1_3_2_1_33_1","volume-title":"Observing Password Creation in the Lab. In Eleventh symposium on usable privacy and security (SOUPS","author":"Ur Blase","year":"2015","unstructured":"Blase Ur , Fumiko Noma , Jonathan Bees , Sean\u00a0 M Segreti , Richard Shay , Lujo Bauer , Nicolas Christin , and Lorrie\u00a0Faith Cranor . 2015 . \" I Added\u2019!\u2019at the End to Make It Secure \": Observing Password Creation in the Lab. In Eleventh symposium on usable privacy and security (SOUPS 2015). 123\u2013140. Blase Ur, Fumiko Noma, Jonathan Bees, Sean\u00a0M Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, and Lorrie\u00a0Faith Cranor. 2015. \" I Added\u2019!\u2019at the End to Make It Secure\": Observing Password Creation in the Lab. In Eleventh symposium on usable privacy and security (SOUPS 2015). 123\u2013140."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40477-1_28"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1509\/jmr.11.0368"},{"key":"e_1_3_2_1_36_1","unstructured":"Daniel\u00a0Lowe Wheeler. 2016. zxcvbn: Low-Budget Password Strength Estimation.. In USENIX security symposium. 157\u2013173.  Daniel\u00a0Lowe Wheeler. 2016. zxcvbn: Low-Budget Password Strength Estimation.. In USENIX security symposium. 157\u2013173."},{"key":"e_1_3_2_1_37_1","volume-title":"Password advice shouldn\u2019t be boring: Visualizing password guessing attacks. In 2013 APWG eCrime Researchers Summit","author":"Zhang-Kennedy Leah","unstructured":"Leah Zhang-Kennedy , Sonia Chiasson , and Robert Biddle . 2013. Password advice shouldn\u2019t be boring: Visualizing password guessing attacks. In 2013 APWG eCrime Researchers Summit . IEEE , 1\u201311. Leah Zhang-Kennedy, Sonia Chiasson, and Robert Biddle. 2013. Password advice shouldn\u2019t be boring: Visualizing password guessing attacks. In 2013 APWG eCrime Researchers Summit. IEEE, 1\u201311."},{"key":"e_1_3_2_1_38_1","volume-title":"Hybrid password meters for more secure passwords\u2013a comprehensive study of password meters including nudges and password information. Behaviour & Information Technology","author":"Zimmermann Verena","year":"2022","unstructured":"Verena Zimmermann , Karola Marky , and Karen Renaud . 2022. Hybrid password meters for more secure passwords\u2013a comprehensive study of password meters including nudges and password information. Behaviour & Information Technology ( 2022 ), 1\u201344. Verena Zimmermann, Karola Marky, and Karen Renaud. 2022. Hybrid password meters for more secure passwords\u2013a comprehensive study of password meters including nudges and password information. Behaviour & Information Technology (2022), 1\u201344."}],"event":{"name":"CSCW '23: Computer Supported Cooperative Work and Social Computing","location":"Minneapolis MN USA","acronym":"CSCW '23","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Computer Supported Cooperative Work and Social Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3584931.3606983","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3584931.3606983","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:08:47Z","timestamp":1750183727000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3584931.3606983"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,14]]},"references-count":38,"alternative-id":["10.1145\/3584931.3606983","10.1145\/3584931"],"URL":"https:\/\/doi.org\/10.1145\/3584931.3606983","relation":{},"subject":[],"published":{"date-parts":[[2023,10,14]]},"assertion":[{"value":"2023-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}