{"id":"https://openalex.org/W2109744978","doi":"https://doi.org/10.1145/1408664.1408666","title":"Improving text passwords through persuasion","display_name":"Improving text passwords through persuasion","publication_year":2008,"publication_date":"2008-07-23","ids":{"openalex":"https://openalex.org/W2109744978","doi":"https://doi.org/10.1145/1408664.1408666","mag":"2109744978"},"language":"en","primary_location":{"id":"doi:10.1145/1408664.1408666","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1408664.1408666","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th symposium on Usable privacy and security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088720987","display_name":"Alain Forget","orcid":null},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Alain Forget","raw_affiliation_strings":["Carleton University, Ottawa, Canada","Carleton University / Ottawa / Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Ottawa, Canada","institution_ids":["https://openalex.org/I67031392"]},{"raw_affiliation_string":"Carleton University / Ottawa / Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048641215","display_name":"Sonia Chiasson","orcid":"https://orcid.org/0000-0001-7314-2198"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Sonia Chiasson","raw_affiliation_strings":["Carleton University, Ottawa, Canada","Carleton University / Ottawa / Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Ottawa, Canada","institution_ids":["https://openalex.org/I67031392"]},{"raw_affiliation_string":"Carleton University / Ottawa / Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011846293","display_name":"Paul C. van Oorschot","orcid":"https://orcid.org/0000-0002-5038-5370"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"P. C. van Oorschot","raw_affiliation_strings":["Carleton University, Ottawa, Canada","Carleton University / Ottawa / Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Ottawa, Canada","institution_ids":["https://openalex.org/I67031392"]},{"raw_affiliation_string":"Carleton University / Ottawa / Canada","institution_ids":["https://openalex.org/I67031392"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010995209","display_name":"Robert Biddle","orcid":"https://orcid.org/0000-0001-5971-2705"},"institutions":[{"id":"https://openalex.org/I67031392","display_name":"Carleton University","ror":"https://ror.org/02qtvee93","country_code":"CA","type":"education","lineage":["https://openalex.org/I67031392"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"Robert Biddle","raw_affiliation_strings":["Carleton University, Ottawa, Canada","Carleton University / Ottawa / Canada"],"affiliations":[{"raw_affiliation_string":"Carleton University, Ottawa, Canada","institution_ids":["https://openalex.org/I67031392"]},{"raw_affiliation_string":"Carleton University / Ottawa / Canada","institution_ids":["https://openalex.org/I67031392"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5088720987"],"corresponding_institution_ids":["https://openalex.org/I67031392"],"apc_list":null,"apc_paid":null,"fwci":20.9939,"has_fulltext":false,"cited_by_count":166,"citation_normalized_percentile":{"value":0.99199127,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"12"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9934999942779541,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10803","display_name":"Innovative Human-Technology Interaction","score":0.9818000197410583,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.9698094129562378},{"id":"https://openalex.org/keywords/cognitive-password","display_name":"Cognitive password","score":0.7831031084060669},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7237535715103149},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.6829633116722107},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.6804665327072144},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6157022714614868},{"id":"https://openalex.org/keywords/persuasion","display_name":"Persuasion","score":0.577712893486023},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.47636792063713074},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.4314002990722656},{"id":"https://openalex.org/keywords/s/key","display_name":"S/KEY","score":0.4227105975151062},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.41178569197654724},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4007122814655304},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.21334341168403625},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.11347430944442749}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.9698094129562378},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.7831031084060669},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7237535715103149},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.6829633116722107},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.6804665327072144},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6157022714614868},{"id":"https://openalex.org/C2781310500","wikidata":"https://www.wikidata.org/wiki/Q1231428","display_name":"Persuasion","level":2,"score":0.577712893486023},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.47636792063713074},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.4314002990722656},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.4227105975151062},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.41178569197654724},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4007122814655304},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.21334341168403625},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.11347430944442749},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1145/1408664.1408666","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1408664.1408666","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 4th symposium on Usable privacy and security","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.140.6173","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.6173","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://cups.cs.cmu.edu/soups/2008/proceedings/p1Forget.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.216.3349","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.216.3349","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.scs.carleton.ca/~paulv/papers/Forget_SOUPS2008.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5099999904632568,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1485033854","https://openalex.org/W1485200701","https://openalex.org/W1600402038","https://openalex.org/W1607915502","https://openalex.org/W2014580322","https://openalex.org/W2023219597","https://openalex.org/W2030993695","https://openalex.org/W2037202491","https://openalex.org/W2047917391","https://openalex.org/W2079145130","https://openalex.org/W2082303535","https://openalex.org/W2088974767","https://openalex.org/W2100142573","https://openalex.org/W2100783932","https://openalex.org/W2103944192","https://openalex.org/W2106247215","https://openalex.org/W2121386924","https://openalex.org/W2129768690","https://openalex.org/W2131589410","https://openalex.org/W2135432543","https://openalex.org/W2148725298","https://openalex.org/W2171058675","https://openalex.org/W2171920515","https://openalex.org/W2277106797","https://openalex.org/W2350778671","https://openalex.org/W3094202663","https://openalex.org/W4298423176","https://openalex.org/W6628932435","https://openalex.org/W6739058471"],"related_works":["https://openalex.org/W2969720675","https://openalex.org/W2359085393","https://openalex.org/W4221040820","https://openalex.org/W2385370155","https://openalex.org/W2916013051","https://openalex.org/W3125785768","https://openalex.org/W2021087413","https://openalex.org/W2596766976","https://openalex.org/W1844709308","https://openalex.org/W4321347403"],"abstract_inverted_index":{"Password":[0],"restriction":[1],"policies":[2],"and":[3,83],"advice":[4],"on":[5,12],"creating":[6,47],"secure":[7,20,49],"passwords":[8,21,50,139,145],"have":[9,27],"limited":[10],"effects":[11],"password":[13,35,58,167],"strength.":[14],"Influencing":[15],"users":[16,45,55],"to":[17,43,78,146,163],"create":[18],"more":[19,48],"remains":[22],"an":[23,100],"open":[24],"problem.":[25],"We":[26,122],"developed":[28],"Persuasive":[29,40],"Text":[30],"Passwords":[31],"(PTP),":[32],"a":[33,57,89,130,153,161],"text":[34],"creation":[36],"system":[37],"which":[38],"leverages":[39],"Technology":[41],"principles":[42],"influence":[44],"in":[46,166],"without":[51],"sacrificing":[52],"usability.":[53],"After":[54],"choose":[56,142],"during":[59],"creation,":[60],"PTP":[61,106,113],"improves":[62],"its":[63],"security":[64,118,168],"by":[65,170],"placing":[66],"randomly-chosen":[67,82],"characters":[68,85,135],"at":[69],"random":[70,134],"positions":[71],"into":[72,137],"the":[73,112,117,149,164],"password.":[74],"Users":[75],"may":[76],"shuffle":[77],"be":[79],"presented":[80],"with":[81],"positioned":[84],"until":[86],"they":[87,91],"find":[88],"combination":[90],"feel":[92],"is":[93],"memorable.":[94],"In":[95],"this":[96,156],"paper,":[97],"we":[98],"present":[99],"83-participant":[101],"user":[102],"study":[103],"testing":[104],"four":[105],"variations.":[107],"Our":[108],"results":[109],"show":[110],"that":[111,125],"variations":[114],"significantly":[115],"improved":[116],"of":[119,133,155],"users'":[120],"passwords.":[121],"also":[123],"found":[124],"those":[126],"participants":[127],"who":[128],"had":[129],"high":[131],"number":[132],"placed":[136],"their":[138],"would":[140],"deliberately":[141],"weaker":[143],"pre-improvement":[144],"compensate":[147],"for":[148],"memory":[150],"load.":[151],"As":[152],"consequence":[154],"compensatory":[157],"behaviour,":[158],"there":[159],"was":[160],"limit":[162],"gain":[165],"achieved":[169],"PTP.":[171]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":7},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":12},{"year":2019,"cited_by_count":14},{"year":2018,"cited_by_count":6},{"year":2017,"cited_by_count":15},{"year":2016,"cited_by_count":15},{"year":2015,"cited_by_count":18},{"year":2014,"cited_by_count":17},{"year":2013,"cited_by_count":17},{"year":2012,"cited_by_count":6}],"updated_date":"2026-04-14T08:04:32.555800","created_date":"2025-10-10T00:00:00"}
