{"id":"https://openalex.org/W3036595964","doi":"https://doi.org/10.1108/ics-07-2019-0077","title":"Constructing secure and memorable passwords","display_name":"Constructing secure and memorable passwords","publication_year":2020,"publication_date":"2020-06-22","ids":{"openalex":"https://openalex.org/W3036595964","doi":"https://doi.org/10.1108/ics-07-2019-0077","mag":"3036595964"},"language":"en","primary_location":{"id":"doi:10.1108/ics-07-2019-0077","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-07-2019-0077","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075035310","display_name":"Joakim K\u00e4vrestad","orcid":"https://orcid.org/0000-0003-2084-9119"},"institutions":[{"id":"https://openalex.org/I205158640","display_name":"University of Sk\u00f6vde","ror":"https://ror.org/051mrsz47","country_code":"SE","type":"education","lineage":["https://openalex.org/I205158640"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Joakim K\u00e4vrestad","raw_affiliation_strings":["School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden"],"affiliations":[{"raw_affiliation_string":"School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden","institution_ids":["https://openalex.org/I205158640"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5065389818","display_name":"Markus Lennartsson","orcid":null},"institutions":[{"id":"https://openalex.org/I205158640","display_name":"University of Sk\u00f6vde","ror":"https://ror.org/051mrsz47","country_code":"SE","type":"education","lineage":["https://openalex.org/I205158640"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Markus Lennartsson","raw_affiliation_strings":["School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden"],"affiliations":[{"raw_affiliation_string":"School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden","institution_ids":["https://openalex.org/I205158640"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054146081","display_name":"Marcus Birath","orcid":"https://orcid.org/0000-0001-5692-4008"},"institutions":[{"id":"https://openalex.org/I205158640","display_name":"University of Sk\u00f6vde","ror":"https://ror.org/051mrsz47","country_code":"SE","type":"education","lineage":["https://openalex.org/I205158640"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Marcus Birath","raw_affiliation_strings":["School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden"],"affiliations":[{"raw_affiliation_string":"School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden","institution_ids":["https://openalex.org/I205158640"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077553567","display_name":"Marcus Nohlberg","orcid":"https://orcid.org/0000-0001-5962-9995"},"institutions":[{"id":"https://openalex.org/I205158640","display_name":"University of Sk\u00f6vde","ror":"https://ror.org/051mrsz47","country_code":"SE","type":"education","lineage":["https://openalex.org/I205158640"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Marcus Nohlberg","raw_affiliation_strings":["School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden"],"affiliations":[{"raw_affiliation_string":"School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden","institution_ids":["https://openalex.org/I205158640"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5075035310"],"corresponding_institution_ids":["https://openalex.org/I205158640"],"apc_list":null,"apc_paid":null,"fwci":2.669,"has_fulltext":false,"cited_by_count":12,"citation_normalized_percentile":{"value":0.91958438,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":93,"max":97},"biblio":{"volume":"28","issue":"5","first_page":"701","last_page":"717"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13155","display_name":"Digital Communication and Language","score":0.9944999814033508,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12607","display_name":"Personal Information Management and User Behavior","score":0.9861000180244446,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.943229079246521},{"id":"https://openalex.org/keywords/cognitive-password","display_name":"Cognitive password","score":0.7032052278518677},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.6969413757324219},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6867435574531555},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6351733803749084},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5673688054084778},{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.5374420881271362},{"id":"https://openalex.org/keywords/dictionary-attack","display_name":"Dictionary attack","score":0.4863355755805969},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.4648403525352478},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.24623849987983704},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.1959443986415863},{"id":"https://openalex.org/keywords/qualitative-research","display_name":"Qualitative research","score":0.10425364971160889}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.943229079246521},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.7032052278518677},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.6969413757324219},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6867435574531555},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6351733803749084},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5673688054084778},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.5374420881271362},{"id":"https://openalex.org/C113328881","wikidata":"https://www.wikidata.org/wiki/Q599809","display_name":"Dictionary attack","level":3,"score":0.4863355755805969},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.4648403525352478},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.24623849987983704},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.1959443986415863},{"id":"https://openalex.org/C190248442","wikidata":"https://www.wikidata.org/wiki/Q839486","display_name":"Qualitative research","level":2,"score":0.10425364971160889},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-07-2019-0077","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-07-2019-0077","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.4300000071525574,"display_name":"Quality Education"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":51,"referenced_works":["https://openalex.org/W81679603","https://openalex.org/W193080959","https://openalex.org/W1466389411","https://openalex.org/W1485200701","https://openalex.org/W1548498615","https://openalex.org/W1654587182","https://openalex.org/W1958839065","https://openalex.org/W1965578501","https://openalex.org/W1969020117","https://openalex.org/W1971881814","https://openalex.org/W1972383986","https://openalex.org/W1975675278","https://openalex.org/W1979290264","https://openalex.org/W2000803416","https://openalex.org/W2011805132","https://openalex.org/W2022580268","https://openalex.org/W2030959655","https://openalex.org/W2032726917","https://openalex.org/W2033128885","https://openalex.org/W2033230180","https://openalex.org/W2044936748","https://openalex.org/W2055147133","https://openalex.org/W2077984681","https://openalex.org/W2097267243","https://openalex.org/W2100142573","https://openalex.org/W2112767991","https://openalex.org/W2118328848","https://openalex.org/W2121386924","https://openalex.org/W2122761220","https://openalex.org/W2146270836","https://openalex.org/W2171058675","https://openalex.org/W2346878720","https://openalex.org/W2394619600","https://openalex.org/W2404167293","https://openalex.org/W2417837167","https://openalex.org/W2480799719","https://openalex.org/W2506660467","https://openalex.org/W2534939643","https://openalex.org/W2551260274","https://openalex.org/W2683619959","https://openalex.org/W2751688886","https://openalex.org/W2752441314","https://openalex.org/W2761883818","https://openalex.org/W2769891191","https://openalex.org/W2795675112","https://openalex.org/W2890206858","https://openalex.org/W2906786547","https://openalex.org/W2913638659","https://openalex.org/W2951929390","https://openalex.org/W2959133744","https://openalex.org/W4247362850"],"related_works":["https://openalex.org/W2301158923","https://openalex.org/W2146270836","https://openalex.org/W2181639618","https://openalex.org/W4200254105","https://openalex.org/W4239831152","https://openalex.org/W4319158737","https://openalex.org/W2344655371","https://openalex.org/W3131491961","https://openalex.org/W2159224061","https://openalex.org/W1509098419"],"abstract_inverted_index":{"Purpose":[0],"Using":[1,108],"authentication":[2,20],"to":[3,10,56,63,91,106,127,139,167,171,191,195,206,216],"secure":[4,220],"data":[5],"and":[6,36,44,77,137,169,182,193,210,219],"accounts":[7],"has":[8],"grown":[9],"be":[11,198,203],"a":[12,85,140,179],"natural":[13],"part":[14],"of":[15,32,71,101,147],"computing.":[16],"Even":[17],"if":[18],"several":[19],"methods":[21],"are":[22,39,74,104,165,189],"in":[23],"existence,":[24],"using":[25,51,152],"passwords":[26,38,50,72,102,132,160,163,177,187],"remain":[27],"the":[28,69,99,117,129],"most":[29],"common":[30],"type":[31],"authentication.":[33],"As":[34],"long":[35],"complex":[37],"encouraged":[40],"by":[41],"research":[42],"studies":[43],"practitioners":[45],"alike,":[46],"computer":[47],"users":[48,215],"design":[49],"strategies":[52,65,96,136],"that":[53,66,73,88,97,103,151,164,188,213],"enable":[54],"them":[55],"remember":[57,168,192],"their":[58],"passwords.":[59,221],"This":[60,174],"paper":[61,175],"aims":[62],"find":[64],"allow":[67],"for":[68,116,131],"generation":[70],"both":[75],"memorable":[76],"computationally":[78],"secure.":[79],"Design/methodology/approach":[80],"The":[81,121,145,200],"study":[82,149],"began":[83],"with":[84,134,154],"literature":[86],"review":[87],"was":[89],"used":[90,126,205],"identify":[92],"cognitive":[93],"password":[94,208],"creation":[95,100,119],"facilitate":[98],"easy":[105,166,190],"remember.":[107],"an":[109],"action-based":[110],"approach,":[111],"attack":[112,122],"models":[113,123],"were":[114,124],"created":[115,133],"resulting":[118],"strategies.":[120],"then":[125],"calculate":[128],"entropy":[130],"different":[135],"related":[138],"theoretical":[141],"cracking":[142],"time.":[143],"Findings":[144],"result":[146],"this":[148],"suggests":[150],"phrases":[153],"four":[155],"or":[156],"more":[157],"words":[158],"as":[159],"will":[161],"generate":[162],"hard":[170,194],"attack.":[172],"Originality/value":[173],"considers":[176],"from":[178],"socio-technical":[180],"approach":[181],"provides":[183],"insight":[184],"into":[185],"how":[186],"crack":[196],"can":[197,202],"generated.":[199],"results":[201],"directly":[204],"create":[207,217],"guidelines":[209],"training":[211],"material":[212],"enables":[214],"usable":[218]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
