{"id":"https://openalex.org/W3109318518","doi":"https://doi.org/10.1145/3428361.3428397","title":"MoiPrivacy: Design and Evaluation of a Personal Password Meter","display_name":"MoiPrivacy: Design and Evaluation of a Personal Password Meter","publication_year":2020,"publication_date":"2020-11-22","ids":{"openalex":"https://openalex.org/W3109318518","doi":"https://doi.org/10.1145/3428361.3428397","mag":"3109318518"},"language":"en","primary_location":{"id":"doi:10.1145/3428361.3428397","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3428361.3428397","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3428361.3428397","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"19th International Conference on Mobile and Ubiquitous Multimedia","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3428361.3428397","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024785374","display_name":"Ankit Kariryaa","orcid":"https://orcid.org/0000-0001-9284-7847"},"institutions":[{"id":"https://openalex.org/I180437899","display_name":"University of Bremen","ror":"https://ror.org/04ers2y35","country_code":"DE","type":"education","lineage":["https://openalex.org/I180437899"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Ankit Kariryaa","raw_affiliation_strings":["University of Bremen, Germany"],"affiliations":[{"raw_affiliation_string":"University of Bremen, Germany","institution_ids":["https://openalex.org/I180437899"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5047275453","display_name":"Johannes Sch\u00f6ning","orcid":"https://orcid.org/0000-0002-8823-4607"},"institutions":[{"id":"https://openalex.org/I180437899","display_name":"University of Bremen","ror":"https://ror.org/04ers2y35","country_code":"DE","type":"education","lineage":["https://openalex.org/I180437899"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Johannes Sch\u00f6ning","raw_affiliation_strings":["University of Bremen, Germany"],"affiliations":[{"raw_affiliation_string":"University of Bremen, Germany","institution_ids":["https://openalex.org/I180437899"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5024785374"],"corresponding_institution_ids":["https://openalex.org/I180437899"],"apc_list":null,"apc_paid":null,"fwci":0.5554,"has_fulltext":true,"cited_by_count":5,"citation_normalized_percentile":{"value":0.77093385,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"201","last_page":"211"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11519","display_name":"Digital Mental Health Interventions","score":0.9768999814987183,"subfield":{"id":"https://openalex.org/subfields/3202","display_name":"Applied Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.9548243284225464},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.8247256278991699},{"id":"https://openalex.org/keywords/password-policy","display_name":"Password policy","score":0.7214931845664978},{"id":"https://openalex.org/keywords/personally-identifiable-information","display_name":"Personally identifiable information","score":0.71503746509552},{"id":"https://openalex.org/keywords/cognitive-password","display_name":"Cognitive password","score":0.7128783464431763},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6973245739936829},{"id":"https://openalex.org/keywords/password-cracking","display_name":"Password cracking","score":0.4916918873786926},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4788348972797394},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.47279733419418335},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.46795690059661865},{"id":"https://openalex.org/keywords/s/key","display_name":"S/KEY","score":0.4607014060020447},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.382463276386261}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.9548243284225464},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.8247256278991699},{"id":"https://openalex.org/C98705547","wikidata":"https://www.wikidata.org/wiki/Q3394687","display_name":"Password policy","level":4,"score":0.7214931845664978},{"id":"https://openalex.org/C169093310","wikidata":"https://www.wikidata.org/wiki/Q3702971","display_name":"Personally identifiable information","level":2,"score":0.71503746509552},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.7128783464431763},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6973245739936829},{"id":"https://openalex.org/C3847113","wikidata":"https://www.wikidata.org/wiki/Q2746524","display_name":"Password cracking","level":5,"score":0.4916918873786926},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4788348972797394},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.47279733419418335},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.46795690059661865},{"id":"https://openalex.org/C4957475","wikidata":"https://www.wikidata.org/wiki/Q242186","display_name":"S/KEY","level":3,"score":0.4607014060020447},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.382463276386261}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3428361.3428397","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3428361.3428397","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3428361.3428397","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"19th International Conference on Mobile and Ubiquitous Multimedia","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3428361.3428397","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3428361.3428397","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3428361.3428397","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"19th International Conference on Mobile and Ubiquitous Multimedia","raw_type":"proceedings-article"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/10","score":0.6899999976158142,"display_name":"Reduced inequalities"}],"awards":[{"id":"https://openalex.org/G352791218","display_name":null,"funder_award_id":"(BMBF)","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"},{"id":"https://openalex.org/G4838704522","display_name":null,"funder_award_id":"in part","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"},{"id":"https://openalex.org/G6955755495","display_name":null,"funder_award_id":"Germany","funder_id":"https://openalex.org/F4320321114","funder_display_name":"Bundesministerium f\u00fcr Bildung und Forschung"}],"funders":[{"id":"https://openalex.org/F4320320882","display_name":"Volkswagen Foundation","ror":"https://ror.org/03bsmfz84"},{"id":"https://openalex.org/F4320321114","display_name":"Bundesministerium f\u00fcr Bildung und Forschung","ror":"https://ror.org/04pz7b180"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3109318518.pdf","grobid_xml":"https://content.openalex.org/works/W3109318518.grobid-xml"},"referenced_works_count":34,"referenced_works":["https://openalex.org/W167157979","https://openalex.org/W1463944966","https://openalex.org/W1546147126","https://openalex.org/W1896566150","https://openalex.org/W1931604409","https://openalex.org/W1987516957","https://openalex.org/W2019578814","https://openalex.org/W2023306951","https://openalex.org/W2050296478","https://openalex.org/W2066345778","https://openalex.org/W2097267243","https://openalex.org/W2100783932","https://openalex.org/W2111397260","https://openalex.org/W2113266120","https://openalex.org/W2124555616","https://openalex.org/W2134080857","https://openalex.org/W2135359429","https://openalex.org/W2163006719","https://openalex.org/W2194119288","https://openalex.org/W2255227334","https://openalex.org/W2394541201","https://openalex.org/W2404876390","https://openalex.org/W2463456957","https://openalex.org/W2488850733","https://openalex.org/W2490171383","https://openalex.org/W2528123348","https://openalex.org/W2586068743","https://openalex.org/W2610414453","https://openalex.org/W2740676202","https://openalex.org/W2752441314","https://openalex.org/W2766961112","https://openalex.org/W2904291081","https://openalex.org/W2965512201","https://openalex.org/W3103145119"],"related_works":["https://openalex.org/W3131491961","https://openalex.org/W1844709308","https://openalex.org/W2257115038","https://openalex.org/W4283835082","https://openalex.org/W2097945858","https://openalex.org/W4321600778","https://openalex.org/W2379660606","https://openalex.org/W2079990687","https://openalex.org/W2945948711","https://openalex.org/W4284891686"],"abstract_inverted_index":{"Passwords":[0],"commonly":[1],"contain":[2],"personal":[3,27,60,77,114],"information.":[4],"However,":[5],"there":[6],"is":[7],"limited":[8],"awareness":[9],"about":[10],"its":[11],"detrimental":[12],"effect":[13],"on":[14],"the":[15,44,64,74,100,111],"user\u2019s":[16,59],"online":[17,84],"security.":[18],"Current":[19],"password":[20,37,46,65],"meters":[21],"do":[22,70],"not":[23],"take":[24],"into":[25],"account":[26],"information":[28,78,115],"and,":[29],"therefore,":[30],"their":[31],"users":[32],"are":[33],"susceptible":[34],"to":[35],"targeted":[36],"guessing.":[38],"In":[39],"this":[40],"paper,":[41],"we":[42,72],"present":[43],"MoiPrivacy":[45,101,108],"meter,":[47],"that":[48,107],"extends":[49],"a":[50,58,91],"neural":[51],"network-":[52],"and":[53,56,67],"heuristic-based":[54],"approach":[55],"considers":[57],"information,":[61],"while":[62],"calculating":[63],"strength":[66],"feedback.":[68],"To":[69],"so,":[71],"analyzed":[73],"type":[75],"of":[76,113],"used":[79],"in":[80,116],"passwords":[81],"through":[82],"an":[83],"survey":[85],"(n":[86,95],"=":[87,96],"62).":[88],"We":[89],"conducted":[90],"second":[92],"user":[93],"study":[94],"49)":[97],"for":[98],"evaluating":[99],"browser":[102],"extension.":[103],"Our":[104],"results":[105],"show":[106],"significantly":[109],"limits":[110],"inclusion":[112],"passwords.":[117]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2026-03-11T14:59:36.786465","created_date":"2025-10-10T00:00:00"}
