{"id":"https://openalex.org/W2951929390","doi":"https://doi.org/10.1108/ics-06-2018-0077","title":"Understanding passwords \u2013 a taxonomy of password creation strategies","display_name":"Understanding passwords \u2013 a taxonomy of password creation strategies","publication_year":2019,"publication_date":"2019-06-11","ids":{"openalex":"https://openalex.org/W2951929390","doi":"https://doi.org/10.1108/ics-06-2018-0077","mag":"2951929390"},"language":"en","primary_location":{"id":"doi:10.1108/ics-06-2018-0077","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-06-2018-0077","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075035310","display_name":"Joakim K\u00e4vrestad","orcid":"https://orcid.org/0000-0003-2084-9119"},"institutions":[{"id":"https://openalex.org/I205158640","display_name":"University of Sk\u00f6vde","ror":"https://ror.org/051mrsz47","country_code":"SE","type":"education","lineage":["https://openalex.org/I205158640"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Joakim K\u00e4vrestad","raw_affiliation_strings":["School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden"],"affiliations":[{"raw_affiliation_string":"School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden","institution_ids":["https://openalex.org/I205158640"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101828691","display_name":"Fredrik Eriksson","orcid":"https://orcid.org/0009-0007-0038-3143"},"institutions":[{"id":"https://openalex.org/I205158640","display_name":"University of Sk\u00f6vde","ror":"https://ror.org/051mrsz47","country_code":"SE","type":"education","lineage":["https://openalex.org/I205158640"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Fredrik Eriksson","raw_affiliation_strings":["School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden"],"affiliations":[{"raw_affiliation_string":"School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden","institution_ids":["https://openalex.org/I205158640"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077553567","display_name":"Marcus Nohlberg","orcid":"https://orcid.org/0000-0001-5962-9995"},"institutions":[{"id":"https://openalex.org/I205158640","display_name":"University of Sk\u00f6vde","ror":"https://ror.org/051mrsz47","country_code":"SE","type":"education","lineage":["https://openalex.org/I205158640"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Marcus Nohlberg","raw_affiliation_strings":["School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden"],"affiliations":[{"raw_affiliation_string":"School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden","institution_ids":["https://openalex.org/I205158640"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5075035310"],"corresponding_institution_ids":["https://openalex.org/I205158640"],"apc_list":null,"apc_paid":null,"fwci":1.6958,"has_fulltext":false,"cited_by_count":9,"citation_normalized_percentile":{"value":0.88066159,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"27","issue":"3","first_page":"453","last_page":"467"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.989300012588501,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":0.9860000014305115,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.9349761605262756},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.719046413898468},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.6173340082168579},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5335785746574402},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5186476111412048},{"id":"https://openalex.org/keywords/cognitive-password","display_name":"Cognitive password","score":0.4888097941875458},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.48288655281066895},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3543796241283417},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.2691563367843628},{"id":"https://openalex.org/keywords/qualitative-research","display_name":"Qualitative research","score":0.18224510550498962}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.9349761605262756},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.719046413898468},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.6173340082168579},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5335785746574402},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5186476111412048},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.4888097941875458},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.48288655281066895},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3543796241283417},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.2691563367843628},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.18224510550498962},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-06-2018-0077","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-06-2018-0077","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4","score":0.4699999988079071}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W189966446","https://openalex.org/W2000638898","https://openalex.org/W2018692488","https://openalex.org/W2019459522","https://openalex.org/W2033230180","https://openalex.org/W2059951390","https://openalex.org/W2073342447","https://openalex.org/W2083810592","https://openalex.org/W2086553822","https://openalex.org/W2097392047","https://openalex.org/W2121386924","https://openalex.org/W2124686424","https://openalex.org/W2133824719","https://openalex.org/W2149929743","https://openalex.org/W2156350103","https://openalex.org/W2171920515","https://openalex.org/W2250629766","https://openalex.org/W2417837167","https://openalex.org/W2421957586","https://openalex.org/W2488850733","https://openalex.org/W2521009787","https://openalex.org/W2534419286","https://openalex.org/W2548490076","https://openalex.org/W2752441314","https://openalex.org/W2756665806","https://openalex.org/W2793573497","https://openalex.org/W2893825319"],"related_works":["https://openalex.org/W2183044514","https://openalex.org/W2596869006","https://openalex.org/W2115218409","https://openalex.org/W2969720675","https://openalex.org/W2048203748","https://openalex.org/W1987516957","https://openalex.org/W165936246","https://openalex.org/W2090949570","https://openalex.org/W2936467198","https://openalex.org/W4385828295"],"abstract_inverted_index":{"Purpose":[0],"Using":[1],"authentication":[2,20],"to":[3,10,56,63,82,143,231],"secure":[4],"data":[5],"and":[6,36,44,124,217],"accounts":[7],"has":[8],"grown":[9],"be":[11,178,210,222],"a":[12,65,76,91,96,112,153,161,170,213,240],"natural":[13],"part":[14],"of":[15,32,67,75,114,149,155,185],"computing.":[16],"Even":[17],"if":[18],"several":[19],"methods":[21],"are":[22,39],"in":[23,72,90,189,239],"existence,":[24],"using":[25,51],"passwords":[26,38,50,133],"remains":[27],"the":[28,73,103,122,127,144,165,186,190,207,233],"most":[29,234],"common":[30],"type":[31],"authentication.":[33],"As":[34,205],"long":[35],"complex":[37],"encouraged":[40],"by":[41,111,224,243],"research":[42,216],"studies":[43],"practitioners":[45,225],"alike,":[46],"computer":[47],"users":[48],"design":[49],"strategies":[52,71,80,158,166,238],"that":[53,140,163,169],"enable":[54],"them":[55],"remember":[57],"their":[58],"passwords.":[59,84],"This":[60],"paper":[61],"aims":[62],"present":[64],"taxonomy":[66,154],"those":[68],"password":[69,138,156,171,176,202,236],"creation":[70,157,203,237],"form":[74],"model":[77,107,128,162,208],"describing":[78],"various":[79],"used":[81,211,223,235],"create":[83],"Design/methodology/approach":[85],"The":[86,106,147],"study":[87,151,198],"was":[88,108,129],"conducted":[89],"three-step":[92],"process":[93],"beginning":[94],"with":[95,118],"short":[97],"survey":[98],"among":[99],"forensic":[100,119,244],"experts":[101,245],"within":[102],"Swedish":[104],"police.":[105],"then":[109],"developed":[110],"series":[113],"iterative":[115],"semi-structured":[116],"interviews":[117],"experts.":[120],"In":[121],"third":[123],"final":[125],"step,":[126],"validated":[130],"on":[131],"5,000":[132],"gathered":[134],"from":[135],"50":[136],"different":[137],"databases":[139],"have":[141],"leaked":[142],"internet.":[145],"Findings":[146],"result":[148],"this":[150,197],"is":[152],"presented":[159],"as":[160,167,180,212],"describes":[164],"properties":[168,187],"can":[172,177,209,220],"hold.":[173],"Any":[174],"given":[175],"classified":[179],"holding":[181],"one":[182],"or":[183,242],"more":[184],"outlined":[188],"model.":[191],"Originality/value":[192],"On":[193],"an":[194],"abstract":[195],"level,":[196],"provides":[199],"insight":[200],"into":[201],"strategies.":[204],"such,":[206],"tool":[214],"for":[215,227],"education.":[218],"It":[219],"also":[221],"in,":[226],"instance,":[228],"penetration":[229],"testing":[230],"map":[232],"domain":[241],"when":[246],"designing":[247],"dictionary":[248],"attacks.":[249]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2020,"cited_by_count":3}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
