{"id":"https://openalex.org/W2342315333","doi":"https://doi.org/10.1016/s1353-4858(16)30037-x","title":"Locking up passwords \u2013 for good","display_name":"Locking up passwords \u2013 for good","publication_year":2016,"publication_date":"2016-04-01","ids":{"openalex":"https://openalex.org/W2342315333","doi":"https://doi.org/10.1016/s1353-4858(16)30037-x","mag":"2342315333"},"language":"en","primary_location":{"id":"doi:10.1016/s1353-4858(16)30037-x","is_oa":false,"landing_page_url":"https://doi.org/10.1016/s1353-4858(16)30037-x","pdf_url":null,"source":{"id":"https://openalex.org/S2764863393","display_name":"Network Security","issn_l":"1353-4858","issn":["1353-4858","1872-9371"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Network Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5066403409","display_name":"Will Harwood","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Will Harwood","raw_affiliation_strings":["Silicon:SAFE"],"affiliations":[{"raw_affiliation_string":"Silicon:SAFE","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5066403409"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":1.327,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.85373749,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"2016","issue":"4","first_page":"10","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.8616999983787537,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.8616999983787537,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.8345999717712402,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.7214000225067139,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.8512330055236816},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.7866137027740479},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7164450883865356},{"id":"https://openalex.org/keywords/battle","display_name":"Battle","score":0.6781248450279236},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6003318428993225},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.4791935682296753},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.447469025850296},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.43150559067726135},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.3085366487503052},{"id":"https://openalex.org/keywords/history","display_name":"History","score":0.09804272651672363}],"concepts":[{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.8512330055236816},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.7866137027740479},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7164450883865356},{"id":"https://openalex.org/C2778627824","wikidata":"https://www.wikidata.org/wiki/Q178561","display_name":"Battle","level":2,"score":0.6781248450279236},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6003318428993225},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.4791935682296753},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.447469025850296},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.43150559067726135},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.3085366487503052},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.09804272651672363},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1016/s1353-4858(16)30037-x","is_oa":false,"landing_page_url":"https://doi.org/10.1016/s1353-4858(16)30037-x","pdf_url":null,"source":{"id":"https://openalex.org/S2764863393","display_name":"Network Security","issn_l":"1353-4858","issn":["1353-4858","1872-9371"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Network Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7799999713897705,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2011339062","https://openalex.org/W3042652091","https://openalex.org/W2109029025","https://openalex.org/W4256654297","https://openalex.org/W197818113","https://openalex.org/W3123950995","https://openalex.org/W2751243624","https://openalex.org/W2513387150","https://openalex.org/W1574707610","https://openalex.org/W1607060163"],"abstract_inverted_index":{"It's":[0],"clear":[1],"that":[2,7,95,130],"bulk":[3],"identity":[4,110],"thefts":[5,70,111],"\u2013":[6,20],"is,":[8],"the":[9,23,41,48,57,61,114,127,138,148,152,180,191],"mass":[10],"stealing":[11],"of":[12,27,40,50,118,126,177,198],"passwords":[13,97],"or":[14,68],"other":[15],"personally":[16],"identifiable":[17],"information":[18],"(PII)":[19],"are":[21,112,169],"among":[22,113],"most":[24,115],"harmful":[25,116],"types":[26,117],"cyber-attack":[28,119],"faced":[29,120],"by":[30,121],"businesses.":[31],"They're":[32],"a":[33,87,162,175,188],"huge":[34,66],"problem,":[35],"not":[36],"only":[37,149],"in":[38,166,187],"terms":[39],"damage":[42],"each":[43],"attack":[44],"causes,":[45],"but":[46],"also":[47],"volume":[49],"attacks":[51],"overall.":[52],"A":[53],"cursory":[54],"glance":[55],"over":[56],"business":[58],"headlines":[59],"for":[60,98],"past":[62],"few":[63],"years":[64],"announces":[65],"password":[67],"PII":[69],"from":[71,74,106],"organisations":[72],"ranging":[73],"Sony":[75],"PlayStation":[76],"to":[77,81,100,151,185],"eBay":[78],"and":[79,124,134,158,183],"Facebook":[80],"JP":[82],"Morgan.":[83],"We":[84],"were":[85],"barely":[86],"week":[88],"into":[89],"2016":[90],"when":[91],"it":[92],"was":[93],"revealed":[94],"email":[96],"up":[99],"320,000":[101],"users":[102],"had":[103],"been":[104],"stolen":[105],"Time":[107],"Warner.":[108],"Bulk":[109],"businesses":[122,168],"today":[123],"part":[125],"problem":[128],"is":[129,147,174],"businesses,":[131],"security":[132,159],"firms":[133],"cyber-criminals":[135],"all":[136],"share":[137],"same":[139],"playing":[140,171],"field.":[141],"Thinking":[142],"beyond":[143,190],"standard":[144],"computing":[145],"architectures":[146],"solution":[150],"ongoing":[153],"arms":[154],"race":[155],"between":[156],"hackers":[157],"vendors.":[160],"In":[161],"battle":[163],"against":[164],"cyber-criminality,":[165],"which":[167],"always":[170],"catch-up,":[172],"this":[173],"way":[176],"getting":[178],"on":[179],"front":[181],"foot":[182],"beginning":[184],"operate":[186],"world":[189],"attackers'":[192],"reach,":[193],"says":[194],"Dr":[195],"Will":[196],"Harwood":[197],"Silicon:SAFE.":[199]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
