{"id":"https://openalex.org/W2084404804","doi":"https://doi.org/10.4018/jsse.2013070101","title":"Assessing the Value of Formal Control Mechanisms on Strong Password Selection","display_name":"Assessing the Value of Formal Control Mechanisms on Strong Password Selection","publication_year":2013,"publication_date":"2013-07-01","ids":{"openalex":"https://openalex.org/W2084404804","doi":"https://doi.org/10.4018/jsse.2013070101","mag":"2084404804"},"language":"en","primary_location":{"id":"doi:10.4018/jsse.2013070101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jsse.2013070101","pdf_url":null,"source":{"id":"https://openalex.org/S43656255","display_name":"International Journal of Secure Software Engineering","issn_l":"1947-3036","issn":["1947-3036","1947-3044"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Secure Software Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5112718961","display_name":"Jeff Crawford","orcid":null},"institutions":[{"id":"https://openalex.org/I192487284","display_name":"Lipscomb University","ror":"https://ror.org/02gdc3814","country_code":"US","type":"education","lineage":["https://openalex.org/I192487284"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Jeff Crawford","raw_affiliation_strings":["School of Computing & Informatics, Lipscomb University, Nashville, TN, USA"],"affiliations":[{"raw_affiliation_string":"School of Computing & Informatics, Lipscomb University, Nashville, TN, USA","institution_ids":["https://openalex.org/I192487284"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5112718961"],"corresponding_institution_ids":["https://openalex.org/I192487284"],"apc_list":null,"apc_paid":null,"fwci":0.809,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.82885835,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"4","issue":"3","first_page":"1","last_page":"17"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9861999750137329,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.9687074422836304},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7006165981292725},{"id":"https://openalex.org/keywords/password-strength","display_name":"Password strength","score":0.6850957870483398},{"id":"https://openalex.org/keywords/cognitive-password","display_name":"Cognitive password","score":0.6269257068634033},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.5969768166542053},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5617067217826843},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.4962523579597473},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.48808372020721436},{"id":"https://openalex.org/keywords/principal","display_name":"Principal (computer security)","score":0.46499955654144287},{"id":"https://openalex.org/keywords/agency","display_name":"Agency (philosophy)","score":0.4537492096424103},{"id":"https://openalex.org/keywords/order","display_name":"Order (exchange)","score":0.4121391475200653},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3861022889614105},{"id":"https://openalex.org/keywords/one-time-password","display_name":"One-time password","score":0.2853589355945587},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.23170319199562073},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.1692112386226654},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.15352335572242737}],"concepts":[{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.9687074422836304},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7006165981292725},{"id":"https://openalex.org/C70530487","wikidata":"https://www.wikidata.org/wiki/Q1990841","display_name":"Password strength","level":4,"score":0.6850957870483398},{"id":"https://openalex.org/C23875713","wikidata":"https://www.wikidata.org/wiki/Q5141232","display_name":"Cognitive password","level":5,"score":0.6269257068634033},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.5969768166542053},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5617067217826843},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.4962523579597473},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.48808372020721436},{"id":"https://openalex.org/C144559511","wikidata":"https://www.wikidata.org/wiki/Q2986279","display_name":"Principal (computer security)","level":2,"score":0.46499955654144287},{"id":"https://openalex.org/C108170787","wikidata":"https://www.wikidata.org/wiki/Q3951828","display_name":"Agency (philosophy)","level":2,"score":0.4537492096424103},{"id":"https://openalex.org/C182306322","wikidata":"https://www.wikidata.org/wiki/Q1779371","display_name":"Order (exchange)","level":2,"score":0.4121391475200653},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3861022889614105},{"id":"https://openalex.org/C89479133","wikidata":"https://www.wikidata.org/wiki/Q1137840","display_name":"One-time password","level":3,"score":0.2853589355945587},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.23170319199562073},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.1692112386226654},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.15352335572242737},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C10138342","wikidata":"https://www.wikidata.org/wiki/Q43015","display_name":"Finance","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.4018/jsse.2013070101","is_oa":false,"landing_page_url":"https://doi.org/10.4018/jsse.2013070101","pdf_url":null,"source":{"id":"https://openalex.org/S43656255","display_name":"International Journal of Secure Software Engineering","issn_l":"1947-3036","issn":["1947-3036","1947-3044"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320424","host_organization_name":"IGI Global","host_organization_lineage":["https://openalex.org/P4310320424"],"host_organization_lineage_names":["IGI Global"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Secure Software Engineering","raw_type":"journal-article"},{"id":"pmh:oai:RePEc:igg:jsse00:v:4:y:2013:i:3:p:1-17","is_oa":false,"landing_page_url":"http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/jsse.2013070101","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","score":0.5299999713897705,"id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W167165287","https://openalex.org/W1548573590","https://openalex.org/W1555249425","https://openalex.org/W1602619638","https://openalex.org/W1780467660","https://openalex.org/W1969641949","https://openalex.org/W2003206277","https://openalex.org/W2003422651","https://openalex.org/W2004207896","https://openalex.org/W2010902645","https://openalex.org/W2036389121","https://openalex.org/W2045591401","https://openalex.org/W2047917391","https://openalex.org/W2052940668","https://openalex.org/W2054901972","https://openalex.org/W2058718434","https://openalex.org/W2070014147","https://openalex.org/W2079414640","https://openalex.org/W2095299437","https://openalex.org/W2095916595","https://openalex.org/W2098158490","https://openalex.org/W2099641816","https://openalex.org/W2099647042","https://openalex.org/W2100142573","https://openalex.org/W2100379340","https://openalex.org/W2105992541","https://openalex.org/W2106096361","https://openalex.org/W2108750986","https://openalex.org/W2119681300","https://openalex.org/W2120314896","https://openalex.org/W2152127344","https://openalex.org/W2159510087","https://openalex.org/W2170483619","https://openalex.org/W2171920515","https://openalex.org/W2495985999","https://openalex.org/W2752617332","https://openalex.org/W3144052228"],"related_works":["https://openalex.org/W2969720675","https://openalex.org/W1982158666","https://openalex.org/W78975431","https://openalex.org/W4214849386","https://openalex.org/W143386018","https://openalex.org/W2911945468","https://openalex.org/W2936467198","https://openalex.org/W2021087413","https://openalex.org/W1959666775","https://openalex.org/W2100492959"],"abstract_inverted_index":{"Applications":[0],"often":[1],"use":[2,67],"behavior":[3,96],"control":[4,77,112],"mechanisms":[5],"in":[6,58,71,116],"order":[7],"to":[8,21,28,33,46,63,119],"ensure":[9],"that":[10,81,95],"individuals":[11,20],"create":[12],"sufficiently":[13],"strong":[14,35,142],"passwords.":[15,145],"Behavior":[16],"controls,":[17],"which":[18],"force":[19],"utilize":[22],"specific":[23],"password":[24,36,60,86,92],"characteristics,":[25],"are":[26,114],"assumed":[27],"be":[29],"the":[30,53,59,85,128],"best":[31],"mechanism":[32],"encourage":[34],"creation.":[37],"However,":[38],"an":[39,108],"over":[40],"reliance":[41],"on":[42],"them":[43],"could":[44],"lead":[45],"counterproductive":[47],"security":[48],"behaviors.":[49],"This":[50],"study":[51],"examines":[52],"efficacy":[54],"of":[55,130,140],"formal":[56,135],"controls":[57,82,97,136],"creation":[61,87],"process":[62,88],"determine":[64],"if":[65],"their":[66,117],"does":[68],"indeed":[69,90],"result":[70],"meaningfully":[72],"stronger":[73,102],"passwords":[74,103],"than":[75,104],"informal":[76,105,133],"techniques.":[78],"Findings":[79,126],"demonstrate":[80],"used":[83],"during":[84],"do":[89,98],"shape":[91],"strength,":[93],"but":[94],"not":[99],"produce":[100],"significantly":[101],"controls.":[106],"Using":[107],"Agency":[109],"Theory":[110],"perspective,":[111],"techniques":[113],"considered":[115],"ability":[118],"align":[120],"principal-agent":[121],"goal":[122],"and":[123,134,143],"risk":[124],"perceptions.":[125],"illustrate":[127],"importance":[129],"using":[131],"both":[132],"as":[137],"a":[138],"means":[139],"creating":[141],"effective":[144]},"counts_by_year":[{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
