{"id":"https://openalex.org/W3216382140","doi":"https://doi.org/10.1108/ics-07-2021-0093","title":"Usability of the login authentication process: passphrases and passwords","display_name":"Usability of the login authentication process: passphrases and passwords","publication_year":2021,"publication_date":"2021-11-28","ids":{"openalex":"https://openalex.org/W3216382140","doi":"https://doi.org/10.1108/ics-07-2021-0093","mag":"3216382140"},"language":"en","primary_location":{"id":"doi:10.1108/ics-07-2021-0093","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-07-2021-0093","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5018782277","display_name":"Bhaveer Bhana","orcid":null},"institutions":[{"id":"https://openalex.org/I203238179","display_name":"Rhodes University","ror":"https://ror.org/016sewp10","country_code":"ZA","type":"education","lineage":["https://openalex.org/I203238179"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Bhaveer Bhana","raw_affiliation_strings":["Department of Information Systems, Rhodes University, Grahamstown, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, Rhodes University, Grahamstown, South Africa","institution_ids":["https://openalex.org/I203238179"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5068156128","display_name":"Stephen Flowerday","orcid":"https://orcid.org/0000-0002-4591-3802"},"institutions":[{"id":"https://openalex.org/I203238179","display_name":"Rhodes University","ror":"https://ror.org/016sewp10","country_code":"ZA","type":"education","lineage":["https://openalex.org/I203238179"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Stephen Vincent Flowerday","raw_affiliation_strings":["Department of Information Systems, Rhodes University, Grahamstown, South Africa"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems, Rhodes University, Grahamstown, South Africa","institution_ids":["https://openalex.org/I203238179"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5018782277"],"corresponding_institution_ids":["https://openalex.org/I203238179"],"apc_list":null,"apc_paid":null,"fwci":2.4787,"has_fulltext":false,"cited_by_count":14,"citation_normalized_percentile":{"value":0.91119763,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"30","issue":"2","first_page":"280","last_page":"305"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13155","display_name":"Digital Communication and Language","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12607","display_name":"Personal Information Management and User Behavior","score":0.9817000031471252,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.8956832885742188},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.802869975566864},{"id":"https://openalex.org/keywords/cognitive-password","display_name":"Cognitive password","score":0.785750150680542},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7596898674964905},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.6981257200241089},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.6552978754043579},{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.628616452217102},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5953287482261658},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5079193711280823},{"id":"https://openalex.org/keywords/s/key","display_name":"S/KEY","score":0.5065542459487915},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.4653041958808899},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4107576608657837},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.37439727783203125},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.09219187498092651}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.8956832885742188},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.802869975566864},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.785750150680542},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7596898674964905},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.6981257200241089},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.6552978754043579},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.628616452217102},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5953287482261658},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5079193711280823},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.5065542459487915},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.4653041958808899},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4107576608657837},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.37439727783203125},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09219187498092651}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-07-2021-0093","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-07-2021-0093","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":74,"referenced_works":["https://openalex.org/W201982356","https://openalex.org/W1076385124","https://openalex.org/W1554853440","https://openalex.org/W1984314602","https://openalex.org/W1987516957","https://openalex.org/W2020861727","https://openalex.org/W2044399741","https://openalex.org/W2045011071","https://openalex.org/W2047917391","https://openalex.org/W2051674079","https://openalex.org/W2055147133","https://openalex.org/W2102750190","https://openalex.org/W2125491509","https://openalex.org/W2127171880","https://openalex.org/W2134598164","https://openalex.org/W2135452787","https://openalex.org/W2142919106","https://openalex.org/W2157245832","https://openalex.org/W2288444231","https://openalex.org/W2317870008","https://openalex.org/W2413416220","https://openalex.org/W2463456957","https://openalex.org/W2488850733","https://openalex.org/W2610222002","https://openalex.org/W2619307703","https://openalex.org/W2683619959","https://openalex.org/W2752742239","https://openalex.org/W2757310261","https://openalex.org/W2789986810","https://openalex.org/W2801041698","https://openalex.org/W2883053439","https://openalex.org/W2890502110","https://openalex.org/W2891820333","https://openalex.org/W2896384114","https://openalex.org/W2912315028","https://openalex.org/W2912333970","https://openalex.org/W2914643726","https://openalex.org/W2915018987","https://openalex.org/W2915667672","https://openalex.org/W2920079783","https://openalex.org/W2931153881","https://openalex.org/W2943291842","https://openalex.org/W2945753518","https://openalex.org/W2958587321","https://openalex.org/W2967612824","https://openalex.org/W2969748787","https://openalex.org/W2980251450","https://openalex.org/W2983595807","https://openalex.org/W2996193861","https://openalex.org/W3008796358","https://openalex.org/W3017068954","https://openalex.org/W3027766697","https://openalex.org/W3033179496","https://openalex.org/W3045013146","https://openalex.org/W3085478534","https://openalex.org/W3092922850","https://openalex.org/W3128209738","https://openalex.org/W3171900500","https://openalex.org/W3195856402","https://openalex.org/W4247857566","https://openalex.org/W4400992758","https://openalex.org/W6608332658","https://openalex.org/W6631296731","https://openalex.org/W6653977535","https://openalex.org/W6659960172","https://openalex.org/W6663060489","https://openalex.org/W6679949415","https://openalex.org/W6681893127","https://openalex.org/W6713260194","https://openalex.org/W6727994366","https://openalex.org/W6739058471","https://openalex.org/W6754253042","https://openalex.org/W6783174337","https://openalex.org/W7065810578"],"related_works":["https://openalex.org/W2969720675","https://openalex.org/W2916013051","https://openalex.org/W2385370155","https://openalex.org/W4221040820","https://openalex.org/W1844709308","https://openalex.org/W3125785768","https://openalex.org/W2359085393","https://openalex.org/W2611520932","https://openalex.org/W3166758572","https://openalex.org/W2047210152"],"abstract_inverted_index":{"Purpose":[0],"The":[1,21,38],"average":[2],"employee":[3],"spends":[4],"a":[5,46,61,100,104,261,273,401],"total":[6],"of":[7,35,40,50,64,265,290,385,400,404,407],"18.6":[8],"h":[9],"every":[10],"two":[11],"months":[12],"on":[13,224,245,335],"password-related":[14],"activities,":[15],"including":[16],"password":[17,32,47,211],"retries":[18],"and":[19,56,131,140,168,185,195,227,234,253,284,301,309,317,340,352,389,424],"resets.":[20],"problem":[22],"is":[23,43,67,98],"caused":[24],"by":[25,91,149],"the":[26,31,75,94,119,138,169,193,239,304,336,341,346,350,353,364,376,379,398],"user":[27,76,95,105,201,225,228,246,377,380,433],"forgetting":[28],"or":[29],"mistyping":[30],"(usually":[33],"because":[34],"character":[36],"switching).":[37],"source":[39],"this":[41,114,145],"issue":[42],"that":[44,117,128,241],"while":[45],"containing":[48],"combinations":[49],"lowercase":[51],"characters,":[52,54],"uppercase":[53],"digits":[55],"special":[57],"characters":[58],"(LUDS)":[59],"offers":[60],"reasonable":[62],"level":[63,171],"security,":[65,161,251,386],"it":[66],"complex":[68,408],"to":[69,107,112,132,137,159,164,173,187,199,208,221,250,298,311,345,414,426],"type":[70,403],"and/or":[71,292,331],"memorise,":[72],"which":[73,281],"prolongs":[74],"authentication":[77,96,226,247,381,434],"process.":[78],"This":[79,109,393],"results":[80,300],"in":[81,236,269,329,383,417],"much":[82],"time":[83],"being":[84],"spent":[85],"for":[86,102,275],"no":[87],"benefit":[88],"(as":[89],"perceived":[90],"users),":[92],"as":[93,152],"process":[97,382],"merely":[99],"prerequisite":[101],"whatever":[103],"intends":[106],"accomplish.":[108],"study":[110,146,324],"aims":[111,395],"address":[113,192],"issue,":[115],"passphrases":[116,186,190,235,373,430],"exclude":[118],"LUDS":[120],"guidelines":[121],"are":[122],"proposed.":[123],"Design/methodology/approach":[124],"To":[125],"discover":[126],"constructs":[127,179,240],"create":[129],"security":[130,194,285,330],"investigate":[133],"usability":[134,196,283],"concerns":[135],"relating":[136],"memory":[139,166,252,387],"typing":[141,175,390],"issues":[142,167,197,248,388],"concerning":[143],"passphrases,":[144],"was":[147,157,206,219,258,295,315,320,333,343,357,361,369],"guided":[148],"three":[150,178],"theories":[151],"follows:":[153],"Shannon\u2019s":[154],"entropy":[155],"theory":[156,163],"used":[158,220,297],"assess":[160,174],"chunking":[162],"analyse":[165],"keystroke":[170],"model":[172],"issues.":[176,391],"These":[177],"were":[180,306],"then":[181],"evaluated":[182],"against":[183],"passwords":[184,233],"determine":[188,427],"whether":[189,428],"better":[191,374,435],"related":[198,249],"text-based":[200],"authentication.":[202],"A":[203,215,322],"content":[204,310,342,356],"analysis":[205],"performed":[207,334],"identify":[209],"common":[210],"compositions":[212],"currently":[213],"used.":[214],"login":[216,337],"assessment":[217,338],"experiment":[218],"collect":[222],"data":[223,257],"\u2013":[229],"system":[230],"interaction":[231,256],"with":[232,238,287,419],"line":[237],"have":[242],"an":[243],"impact":[244],"typing.":[254],"User\u2013system":[255],"collected":[259],"from":[260,363],"purposeful":[262],"sample":[263],"size":[264],"112":[266],"participants,":[267],"logging":[268],"at":[270,396],"least":[271],"once":[272],"day":[274],"10":[276,326],"days.":[277],"An":[278],"expert":[279,354],"review,":[280],"comprised":[282],"experts":[286,305,347],"specific":[288,402],"years":[289],"industry":[291],"academic":[293],"experience,":[294],"also":[296],"validate":[299],"conclusions.":[302],"All":[303],"given":[307,344],"questions":[308],"ensure":[312],"sufficient":[313],"context":[314],"provided":[316],"relevant":[318],"feedback":[319,360],"obtained.":[321],"pilot":[323,365],"involving":[325],"participants":[327],"(experts":[328],"usability)":[332],"website":[339,351],"beforehand.":[348],"Both":[349],"review":[355],"refined":[358],"after":[359],"received":[362],"study.":[366],"Findings":[367],"It":[368],"concluded":[370],"that,":[371],"overall,":[372],"support":[375,432],"during":[378],"terms":[384],"Originality/value":[392],"research":[394],"promoting":[397],"use":[399],"passphrase":[405],"instead":[406],"passwords.":[409,437],"Three":[410],"core":[411],"aspects":[412],"need":[413],"be":[415],"assessed":[416],"conjunction":[418],"each":[420],"other":[421],"(security,":[422],"memorisation":[423],"typing)":[425],"user-friendly":[429],"can":[431],"than":[436]},"counts_by_year":[{"year":2025,"cited_by_count":5},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
