<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Personalizing Password Policies and Strength Feedback</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Tobias Seitz</string-name>
          <email>tobias.seitz@ifi.lmu.de</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Ludwig-Maximilians-Universität München</institution>
          ,
          <addr-line>Munich</addr-line>
          ,
          <country country="DE">Germany</country>
        </aff>
      </contrib-group>
      <fpage>64</fpage>
      <lpage>69</lpage>
      <abstract>
        <p>To make users pick stronger passwords, service providers utilize password policies and password creation feedback while the user types inside password fields. Those two techniques often fail to achieve this primary goal. In this position paper, we argue that a personalized version of polices and strength meters are worth investigating. Putting individuals into the center of attention rather than the tasks may improve the user experience of password-based authentication. We discuss the challenges and opportunities, and we outline how policies and password feedback can be tailored to specific users.</p>
      </abstract>
      <kwd-group>
        <kwd>usable security</kwd>
        <kwd>authentication</kwd>
        <kwd>passwords</kwd>
        <kwd>personality</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        Although the death of passwords has been announced many times1, there is no clear
roadmap to eliminate knowledge based authentication mechanism on the web:
Passwords will be part of users’ lives in the foreseeable future due to the lack of perfect
alternatives. Since passwords bring numerous usability pitfalls, research in the domain
of usable security has identified many aspects in users’ attitudes and behaviors towards
passwords. For instance, we know that users often choose weak passwords and re-use
them across multiple websites [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. This boosts the usability, but lowers security because
it becomes simple for attackers to take control over weakly protected online profiles.
      </p>
      <p>
        To make users pick stronger passwords, websites often ask users to include digits,
symbols, or other characteristics in their secrets. There is a wide range of such password
composition policies and many of them fail to achieve their goal of stronger passwords
[
        <xref ref-type="bibr" rid="ref12">12</xref>
        ]. Some users try to get away with the simplest password that fulfills the
requirements [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. Other users are very careful in following the rules and even go beyond the
requirements [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Current password policies do not account for these different user
personalities. A website’s password policy is the same for all users. However, such
one1 For instance,
https://www.infosecurity-magazine.com/webinars/death-ofpasswords/,
http://www.gigya.com/resource/whitepaper/death-of-thepassword/,
https://www.cnet.com/news/gates-predicts-death-of-thepassword/
fits-all approaches may not be the best solution to achieve better usability and security
for individuals. We argue that a policy that respects the user’s attitude towards
password creation can be of merit for both users and the overall security of a service.
      </p>
      <p>
        Besides enforcing password characteristics, there is also a softer approach in the
form of persuasive feedback and password creation guidance. Most commonly, we
encounter this type of interface design with password meters that rate the strength of a
user’s password as they type it. The effectiveness of password meters is well debated.
For high-value accounts, Egelman et al. [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ] found that such feedback can slightly boost
password strength. Additionally, they found that for lower value accounts, adding a
password meter is without noteworthy effects, but they do not seem to harm the
experience. Yet, here again, users face a one-fits-all solution, because the password meter is
the same for all users.
2
      </p>
    </sec>
    <sec id="sec-2">
      <title>Opportunities Arising from Related Work</title>
      <p>
        We build our argument at the intersection between usable security and persuasive
technology. Persuading users and supporting behavior change regarding passwords was
proposed in 2001 by Weirich and Sasse [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]. Since then, much work has focused on
trying to nudge users to alter their behavior, but only seldom do we encounter the
concepts and proposals in day-to-day web browsing. The most prevalent examples are
password meters and real time feedback, i.e. a list of requirements that is checked off
during password entry. These mechanisms have been studied extensively ([
        <xref ref-type="bibr" rid="ref13 ref15 ref2 ref4">2, 4, 13,
15</xref>
        ]). The bottom line is that users welcome real-time feedback, but strength meters
have a limited effect on password choice.
      </p>
      <p>
        A study by Ur et al. showed that users actually might not need such external feedback
to judge the strength of a password correctly [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ]. They found that users rated the
strength of passwords fairly accurately, but also that many study participants were
misled by characteristics like digits and common substitutions. This kind of misjudgment
and subpar strength feedback call for novel ideas.
      </p>
      <p>
        To approach this opportunity, a recent large scale survey suggests that there are two
common types of user personalities regarding passwords [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]: “Type A” users that have
a strong urge to stay in control of their digital footprint and “Type B” users that
convince themselves that their data is not valuable for attackers. The study finds that both
types of users do not believe to be at risk. The data can be seen as further evidence that
the risk of being attacked strongly depends on the user personality, as was already
suggested earlier [
        <xref ref-type="bibr" rid="ref16 ref19 ref7">7, 16, 19</xref>
        ]. Consequently, it is time to follow the proposal from the
persuasive authentication framework (PAF) to consider personalization as persuasion
principle [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ]. Forget et al. argue that a personalized system can help improve the users’
mental model of security.
      </p>
      <p>To the best of our knowledge, such personalized systems do not exist. We propose
to respect the user’s personality in the way password policies enforce and communicate
requirements. Ultimately, this is an opportunity make such mitigations more effective
in terms of supporting the user in picking an adequate secret.</p>
    </sec>
    <sec id="sec-3">
      <title>Critical Challenges</title>
      <p>
        There are a couple of major challenges of personalizing password policies and strength
feedback. First, before we can adapt user interfaces to individuals, an in-depth
assessment of their personality is required. There are a variety of widely approved personality
tests, e.g. the NEO-PI-R [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ], but they all expect active user involvement. Demanding
this kind of action seems unrealistic. Thus, an implicit assessment is mandatory, which
is already possible with an analysis of mobile phone usage data [
        <xref ref-type="bibr" rid="ref18">18</xref>
        ] or digital footprints
[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]. These current solutions are privacy invasive, so we need to adjust them to achieve
a more ethically reasonable level. Users may also want to fine-tune automatic
assessments, so the system needs to provide such means. Also, personality assessments could
be inaccurate, so users need to be able to reset the assessment.
      </p>
      <p>Second, when a user picks a password, a website does not have any information
about him or her, other than the manually provided user name, password, and perhaps
bits of personal information. If we aim to personalize this dialog between website and
user, there needs to be a way to exchange a personality profile between the two parties
in an unobtrusive, privacy-sensitive manner. To make sure the users stay in control of
their information the protocol needs to ask permission or at least read general settings
about with whom to share personality profiles. Intensive work is going to be needed to
carefully design systems that respect user preferences and eventually achieve broad
acceptance.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Research Agenda</title>
      <p>The challenges and opportunities deliver an actionable research agenda, which we
briefly illustrate with potential use cases and scenarios. Most of them require a
modification of web browsers, or capabilities that can already be added with browser
extensions.
4.1</p>
      <sec id="sec-4-1">
        <title>Personalized Password Policies</title>
        <p>
          Currently, password policies enforce the same rules on all users, i.e. length and
complexity requirements. Still, there are different policies that deliver similarly strong
passwords [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ]. As outlined above, we envision a new paradigm that modifies these rules
depending on the user’s personality characteristics. Such a personality profile can
consist of a score on each of the five dimensions of the Big-Five model [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ] to be minimally
privacy invasive. When the website recognizes a new user who scores high on
openness, it can switch to a policy that focuses on password length rather than complexity
classes, because these individuals are often very creative and constraints might be
counterproductive [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ]. On the contrary, policies can make highly conscientious people add
various character-classes. It is likely that these users will benefit from an explicit list of
requirements when they have to come up with a strong password, which can be
diligently checked off requirement by requirement. Ideally, such a dynamic personalized
policy would reduce the burden on users while achieving the same level of security.
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>Tailored Password Nudges</title>
        <p>
          So far, nudging during password selection is mostly done with password meters or
concrete suggestions. The Safari browser automatically pops-up password suggestions
when users register on new web sites. In our past work, we have studied the influence
of different password suggestions on self-selected passwords [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ]. The suggestions
were rejected by most participants, but the strength of self-selected passwords
significantly increased upon seeing a password suggestion. We believe that we can design
such mechanisms around personality traits to make password suggestions more
effective. Suggestions should therefore respect user preferences to become more powerful.
For instance, Safari could try different variations of password topologies to find out
which passwords are most attractive to the user and on which web sites. Additional
information on the user’s personality might help but is not mandatory in this scenario.
Again, such a personalized system can boost usability while adding to the overall
security. However, we have to ensure that attackers do not benefit from personality models,
which is a critical challenge.
4.3
        </p>
      </sec>
      <sec id="sec-4-3">
        <title>Feedback Based on Re-Use Patterns</title>
        <p>
          Finally, to better cope with authentication overhead, users re-use their passwords many
times [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. We could use this kind of behavior to create prediction models for future
registrations. The models might predict which password is going to be used on the web
page for which the user creates an account. In this opportune moment, a personalized
system can detect anomalies and intervene if another password from the portfolio might
be a better fit for the website at hand. For instance, if a user tries to sign-up to PayPal
using the same password as with their email account, the system can discourage this
without blocking the action. Such an approach is designed around the individual user
and their preferred re-use strategy. Infrequent suggestions like this could make better
options more salient.
5
        </p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusion</title>
      <p>At the moment, the challenges to tailor security mitigations to specific users seem big.
We do not know how users will react to such personalized systems in security contexts.
However, since users will have to deal with passwords for the foreseeable future, we
believe the challenges are worth taking and they can be approached in small steps. It
will take careful design and long-term evaluation to have browser vendors consider
implementing personalized security mitigations. The first small step is to mock-up the
interaction and evaluate concepts in Wizard-of-Oz studies to obtain a better
understanding of user reactions and attitudes towards personalized policies and feedback.
All links were last followed on February 09, 2017.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Costa</surname>
          </string-name>
          , P.T.,
          <string-name>
            <surname>McCrae</surname>
            ,
            <given-names>R.R.</given-names>
          </string-name>
          :
          <article-title>Revised NEO personality inventory (NEO PI-R) and NEO five factor inventory (NEO FFI): Professional manual</article-title>
          .
          <source>Psychological Assessment Resources</source>
          <volume>3</volume>
          ,
          <issue>101</issue>
          (
          <year>1992</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>de Carné de Carnavalet</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mannan</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>A Large-Scale Evaluation of High-Impact Password Strength Meters</article-title>
          .
          <source>ACM Transactions on Information and System Security</source>
          <volume>18</volume>
          (
          <issue>1</issue>
          ),
          <fpage>1</fpage>
          -
          <lpage>31</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>De Montjoye</surname>
            ,
            <given-names>Y.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Quoidbach</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Robic</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pentland</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Predicting personality using novel mobile phone-based metrics</article-title>
          .
          <source>Lecture Notes in Computer Science 7812 LNCS</source>
          ,
          <fpage>48</fpage>
          -
          <lpage>55</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Egelman</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sotirakopoulos</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Muslukhov</surname>
            ,
            <given-names>I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Beznosov</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Herley</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Does My Password Go Up to Eleven?: The Impact of Password Meters on Password Selection</article-title>
          .
          <source>In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '13)</source>
          . pp.
          <fpage>2379</fpage>
          -
          <lpage>2388</lpage>
          (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Florêncio</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Herley</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>A Large-Scale Study of Web Password Habits</article-title>
          .
          <source>In: Proceedings of the 16th international conference on World Wide Web (WWW '07)</source>
          . pp.
          <fpage>657</fpage>
          -
          <lpage>665</lpage>
          . ACM (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Forget</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chiasson</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Biddle</surname>
          </string-name>
          , R.:
          <article-title>Persuasion as Education for Computer Security</article-title>
          . In: Proceedings of E-Learn: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education. pp.
          <fpage>822</fpage>
          -
          <lpage>829</lpage>
          .
          <article-title>Association for the Advancement of Computing in Education (AACE), Chesapeake</article-title>
          ,
          <string-name>
            <surname>VA</surname>
          </string-name>
          (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Herley</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Pieters</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          :
          <article-title>"If You Were Attacked, You'd Be Sorry": Counterfactuals as Security Arguments</article-title>
          .
          <source>Proceedings of the 2015 New Security Paradigms Workshop</source>
          pp.
          <fpage>112</fpage>
          -
          <lpage>123</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Inglesant</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sasse</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          :
          <article-title>The True Cost of Unusable Password Policies: Password Use in the Wild</article-title>
          .
          <source>In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '10)</source>
          . pp.
          <fpage>383</fpage>
          -
          <lpage>392</lpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9. LastPass:
          <article-title>The Password Paradox and why our Personalities will get us Hacked</article-title>
          .
          <source>Tech. rep. (</source>
          <year>2016</year>
          ), http://prod.cdata.app.sprinklr.com/DAM/434/LastPass_
          <fpage>ExecutiveSummary44b1d9ef</fpage>
          -209a
          <string-name>
            <surname>-</surname>
          </string-name>
          400a
          <string-name>
            <surname>-</surname>
          </string-name>
          865d
          <string-name>
            <surname>-</surname>
          </string-name>
          d0462920ca5b-
          <fpage>1914739482</fpage>
          .pdf
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>McCrae</surname>
            ,
            <given-names>R.R.</given-names>
          </string-name>
          :
          <article-title>Creativity, divergent thinking, and openness to experience</article-title>
          .
          <source>Journal of Personality and Social Psychology</source>
          <volume>52</volume>
          (
          <issue>6</issue>
          ),
          <fpage>1258</fpage>
          -
          <lpage>1265</lpage>
          (
          <year>1987</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Seitz</surname>
          </string-name>
          , T.,
          <string-name>
            <surname>von Zezschwitz</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Meitner</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hussmann</surname>
          </string-name>
          , H.:
          <article-title>Influencing Self-Selected Passwords through Suggestions and the Decoy Effect</article-title>
          .
          <source>In: Proceedings of the 1st European Workshop on Usable Security. Internet Society</source>
          , Darmstadt (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Shay</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Durity</surname>
            ,
            <given-names>A.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Segreti</surname>
            ,
            <given-names>S.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ur</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bauer</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Christin</surname>
          </string-name>
          , N.:
          <article-title>Designing Password Policies for Strength and Usability</article-title>
          .
          <source>ACM Transactions on Information and System Security</source>
          <volume>18</volume>
          (
          <issue>4</issue>
          ),
          <volume>13</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          :
          <fpage>34</fpage>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Shay</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ur</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bauer</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Christin</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cranor</surname>
            ,
            <given-names>L.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Forget</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Komanduri</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mazurek</surname>
            ,
            <given-names>M.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Melicher</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Segreti</surname>
            ,
            <given-names>S.M.:</given-names>
          </string-name>
          <article-title>A Spoonful of Sugar? The Impact of Guidance and Feedback on Password-Creation Behavior</article-title>
          .
          <source>In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '15)</source>
          . pp.
          <fpage>2903</fpage>
          -
          <lpage>2912</lpage>
          . ACM (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Ur</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bees</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Segreti</surname>
            ,
            <given-names>S.M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bauer</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Christin</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cranor</surname>
            ,
            <given-names>L.F.</given-names>
          </string-name>
          :
          <source>Do Users' Perceptions of Password Security Match Reality? In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16)</source>
          . pp.
          <fpage>3748</fpage>
          -
          <lpage>3760</lpage>
          . ACM (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Ur</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kelley</surname>
            ,
            <given-names>P.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Komanduri</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maass</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mazurek</surname>
            ,
            <given-names>M.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Passaro</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shay</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Vidas</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bauer</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Christin</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Cranor</surname>
            ,
            <given-names>L.F.</given-names>
          </string-name>
          :
          <article-title>How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation</article-title>
          .
          <source>In: Security'12 Proceedings of the 21st USENIX conference on Security symposium</source>
          . pp.
          <fpage>5</fpage>
          -
          <lpage>16</lpage>
          (
          <year>2012</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Weirich</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sasse</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          :
          <article-title>Pretty Good Persuasion: A First Step towards Effective Password</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <article-title>Security in the Real World</article-title>
          .
          <source>In: Proceedings of the 2001Workshop on New Security Paradigms (NSPW '01)</source>
          . pp.
          <fpage>137</fpage>
          -
          <lpage>143</lpage>
          . ACM, New York, NY, USA (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Youyou</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kosinski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stillwell</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Computer-based personality judgments are more accurate than those made by humans</article-title>
          .
          <source>Proceedings of the National Academy of Sciences</source>
          <volume>112</volume>
          (
          <issue>4</issue>
          ),
          <fpage>1036</fpage>
          -
          <lpage>1040</lpage>
          (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Zakaria</surname>
            ,
            <given-names>N.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Katuk</surname>
          </string-name>
          , N.:
          <article-title>Towards designing effective security messages: Persuasive password guidelines</article-title>
          .
          <source>In: Proceedings of the International Conference on Research and Innovation in Information Systems</source>
          , ICRIIS. pp.
          <fpage>129</fpage>
          -
          <lpage>134</lpage>
          . IEEE Computer Society (
          <year>2013</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>