{"id":"https://openalex.org/W3001940180","doi":"https://doi.org/10.1108/ics-11-2019-0132","title":"Analyzing the usage of character groups and keyboard patterns in password creation","display_name":"Analyzing the usage of character groups and keyboard patterns in password creation","publication_year":2020,"publication_date":"2020-01-02","ids":{"openalex":"https://openalex.org/W3001940180","doi":"https://doi.org/10.1108/ics-11-2019-0132","mag":"3001940180"},"language":"en","primary_location":{"id":"doi:10.1108/ics-11-2019-0132","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-11-2019-0132","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5075035310","display_name":"Joakim K\u00e4vrestad","orcid":"https://orcid.org/0000-0003-2084-9119"},"institutions":[{"id":"https://openalex.org/I205158640","display_name":"University of Sk\u00f6vde","ror":"https://ror.org/051mrsz47","country_code":"SE","type":"education","lineage":["https://openalex.org/I205158640"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Joakim K\u00e4vrestad","raw_affiliation_strings":["School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden"],"affiliations":[{"raw_affiliation_string":"School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden","institution_ids":["https://openalex.org/I205158640"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5071120263","display_name":"Johan Zaxmy","orcid":null},"institutions":[{"id":"https://openalex.org/I205158640","display_name":"University of Sk\u00f6vde","ror":"https://ror.org/051mrsz47","country_code":"SE","type":"education","lineage":["https://openalex.org/I205158640"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Johan Zaxmy","raw_affiliation_strings":["School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden"],"affiliations":[{"raw_affiliation_string":"School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden","institution_ids":["https://openalex.org/I205158640"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5077553567","display_name":"Marcus Nohlberg","orcid":"https://orcid.org/0000-0001-5962-9995"},"institutions":[{"id":"https://openalex.org/I205158640","display_name":"University of Sk\u00f6vde","ror":"https://ror.org/051mrsz47","country_code":"SE","type":"education","lineage":["https://openalex.org/I205158640"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Marcus Nohlberg","raw_affiliation_strings":["School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden"],"affiliations":[{"raw_affiliation_string":"School of Informatics, University of Sk\u00f6vde, Sk\u00f6vde, Sweden","institution_ids":["https://openalex.org/I205158640"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5075035310"],"corresponding_institution_ids":["https://openalex.org/I205158640"],"apc_list":null,"apc_paid":null,"fwci":0.8007,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.78843058,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":95},"biblio":{"volume":"28","issue":"3","first_page":"347","last_page":"358"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.948561429977417},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7279646396636963},{"id":"https://openalex.org/keywords/password-cracking","display_name":"Password cracking","score":0.6828474402427673},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5660656094551086},{"id":"https://openalex.org/keywords/cognitive-password","display_name":"Cognitive password","score":0.5122060179710388},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.4924710690975189},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.45037946105003357},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3968013525009155},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3255854845046997},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.22563380002975464}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.948561429977417},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7279646396636963},{"id":"https://openalex.org/C3847113","wikidata":"https://www.wikidata.org/wiki/Q2746524","display_name":"Password cracking","level":5,"score":0.6828474402427673},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5660656094551086},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.5122060179710388},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.4924710690975189},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.45037946105003357},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3968013525009155},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3255854845046997},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.22563380002975464}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1108/ics-11-2019-0132","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-11-2019-0132","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6700000166893005,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W1466389411","https://openalex.org/W1485200701","https://openalex.org/W1531237901","https://openalex.org/W1551931061","https://openalex.org/W2000638898","https://openalex.org/W2022580268","https://openalex.org/W2033230180","https://openalex.org/W2083810592","https://openalex.org/W2097392047","https://openalex.org/W2133824719","https://openalex.org/W2141708418","https://openalex.org/W2250629766","https://openalex.org/W2394619600","https://openalex.org/W2421957586","https://openalex.org/W2476525859","https://openalex.org/W2488850733","https://openalex.org/W2533763009","https://openalex.org/W2581057531","https://openalex.org/W2761883818","https://openalex.org/W2769891191","https://openalex.org/W2893825319","https://openalex.org/W2913638659","https://openalex.org/W2970454902","https://openalex.org/W2979665961","https://openalex.org/W4236709124","https://openalex.org/W6721125374"],"related_works":["https://openalex.org/W2097945858","https://openalex.org/W3013108623","https://openalex.org/W2257115038","https://openalex.org/W4283835082","https://openalex.org/W4321600778","https://openalex.org/W1844709308","https://openalex.org/W2185274381","https://openalex.org/W2226831008","https://openalex.org/W2187195398","https://openalex.org/W4284891686"],"abstract_inverted_index":{"Purpose":[0],"Using":[1],"passwords":[2,27,82,100,120,208,248],"to":[3,21,62,65,71,83,108,136,142,181,203,216],"keep":[4],"account":[5,129],"and":[6,155,169,177,225,235],"data":[7,60,79,138,154,199],"safe":[8],"is":[9,20,50],"very":[10],"common":[11],"in":[12,38,42,101,145,173],"modern":[13],"computing.":[14],"The":[15,89,111,159],"purpose":[16],"of":[17,31,45,55,96,161,220],"this":[18,162],"paper":[19,69,214,239],"look":[22,72],"into":[23,73],"methods":[24],"for":[25],"cracking":[26,49],"as":[28,59,207],"a":[29,34,56,123,132],"means":[30],"increasing":[32],"security,":[33],"practice":[35],"commonly":[36],"used":[37,135,141],"penetration":[39],"testing.":[40],"Further,":[41,189,237],"the":[43,85,109,114,190,217,238],"discipline":[44],"digital":[46],"forensics,":[47],"password":[48,104,146,176,223],"often":[51],"an":[52,93,117],"essential":[53],"part":[54],"computer":[57],"examination":[58],"has":[61],"be":[63,66],"decrypted":[64],"analyzed.":[67],"This":[68,213],"seeks":[70],"how":[74],"users":[75,179,194],"that":[76,106,139,150,165,178,193,195,227,241],"actively":[77,151,196],"encrypt":[78,152,197],"construct":[80],"their":[81,153,198],"benefit":[84],"forensics":[86,242],"community.":[87],"Design/methodology/approach":[88],"study":[90,112,163,191],"began":[91],"with":[92,116],"automated":[94],"analysis":[95],"over":[97],"one":[98],"billion":[99],"22":[102],"different":[103],"databases":[105],"leaked":[107],"internet.":[110],"validated":[113],"result":[115,160],"experiment":[118],"were":[119],"created":[121],"on":[122,232],"local":[124],"website":[125],"was":[126,134,140],"analyzed":[127],"during":[128],"creation.":[130],"Further":[131],"survey":[133],"gather":[137],"identify":[143],"differences":[144],"behavior":[147,224],"between":[148],"user":[149],"other":[156,210],"users.":[157,211],"Findings":[158],"suggests":[164,192,226,240],"American":[166,233],"lowercase":[167],"letters":[168,234],"numbers":[170],"are":[171,200],"present":[172],"almost":[174],"every":[175],"seem":[180],"avoid":[182],"using":[183],"special":[184],"characters":[185],"if":[186],"they":[187],"can.":[188],"more":[201],"prone":[202],"use":[204],"keyboard":[205],"patterns":[206],"than":[209],"Originality/value":[212],"contributes":[215],"existing":[218],"body":[219],"knowledge":[221],"around":[222],"password-guessing":[228,251],"attacks":[229,252],"should":[230,244],"focus":[231],"numbers.":[236],"experts":[243],"consider":[245],"testing":[246],"patterns-based":[247],"when":[249],"performing":[250],"against":[253],"encrypted":[254],"data.":[255]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
