<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Personalizing Password Policies and Strength Feedback</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">R</forename><surname>Orji</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Ludwig-Maximilians-Universität München</orgName>
								<address>
									<settlement>Munich</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">M</forename><surname>Reisinger</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Ludwig-Maximilians-Universität München</orgName>
								<address>
									<settlement>Munich</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">M</forename><surname>Busch</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Ludwig-Maximilians-Universität München</orgName>
								<address>
									<settlement>Munich</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">A</forename><surname>Dijkstra</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Ludwig-Maximilians-Universität München</orgName>
								<address>
									<settlement>Munich</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">M</forename><surname>Kaptein</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Ludwig-Maximilians-Universität München</orgName>
								<address>
									<settlement>Munich</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">E</forename><surname>Mattheiss</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">Ludwig-Maximilians-Universität München</orgName>
								<address>
									<settlement>Munich</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<author role="corresp">
							<persName><forename type="first">Tobias</forename><surname>Seitz</surname></persName>
							<email>tobias.seitz@ifi.lmu.de</email>
							<affiliation key="aff0">
								<orgName type="institution">Ludwig-Maximilians-Universität München</orgName>
								<address>
									<settlement>Munich</settlement>
									<country key="DE">Germany</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Personalizing Password Policies and Strength Feedback</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">DEE3B9F1CA968E0CDB71601C80C7430A</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T06:44+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>usable security</term>
					<term>authentication, passwords</term>
					<term>personality</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>To make users pick stronger passwords, service providers utilize password policies and password creation feedback while the user types inside password fields. Those two techniques often fail to achieve this primary goal. In this position paper, we argue that a personalized version of polices and strength meters are worth investigating. Putting individuals into the center of attention rather than the tasks may improve the user experience of password-based authentication. We discuss the challenges and opportunities, and we outline how policies and password feedback can be tailored to specific users.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Although the death of passwords has been announced many times 1 , there is no clear roadmap to eliminate knowledge based authentication mechanism on the web: Passwords will be part of users' lives in the foreseeable future due to the lack of perfect alternatives. Since passwords bring numerous usability pitfalls, research in the domain of usable security has identified many aspects in users' attitudes and behaviors towards passwords. For instance, we know that users often choose weak passwords and re-use them across multiple websites <ref type="bibr" target="#b4">[5]</ref>. This boosts the usability, but lowers security because it becomes simple for attackers to take control over weakly protected online profiles.</p><p>To make users pick stronger passwords, websites often ask users to include digits, symbols, or other characteristics in their secrets. There is a wide range of such password composition policies and many of them fail to achieve their goal of stronger passwords <ref type="bibr" target="#b11">[12]</ref>. Some users try to get away with the simplest password that fulfills the requirements <ref type="bibr" target="#b7">[8]</ref>. Other users are very careful in following the rules and even go beyond the requirements <ref type="bibr" target="#b12">[13]</ref>. Current password policies do not account for these different user personalities. A website's password policy is the same for all users. However, such one- 1 For instance, https://www.infosecurity-magazine.com/webinars/death-ofpasswords/, http://www.gigya.com/resource/whitepaper/death-of-thepassword/, https://www.cnet.com/news/gates-predicts-death-of-thepassword/ fits-all approaches may not be the best solution to achieve better usability and security for individuals. We argue that a policy that respects the user's attitude towards password creation can be of merit for both users and the overall security of a service.</p><p>Besides enforcing password characteristics, there is also a softer approach in the form of persuasive feedback and password creation guidance. Most commonly, we encounter this type of interface design with password meters that rate the strength of a user's password as they type it. The effectiveness of password meters is well debated. For high-value accounts, Egelman et al. <ref type="bibr" target="#b3">[4]</ref> found that such feedback can slightly boost password strength. Additionally, they found that for lower value accounts, adding a password meter is without noteworthy effects, but they do not seem to harm the experience. Yet, here again, users face a one-fits-all solution, because the password meter is the same for all users.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">Opportunities Arising from Related Work</head><p>We build our argument at the intersection between usable security and persuasive technology. Persuading users and supporting behavior change regarding passwords was proposed in 2001 by Weirich and Sasse <ref type="bibr" target="#b15">[16]</ref>. Since then, much work has focused on trying to nudge users to alter their behavior, but only seldom do we encounter the concepts and proposals in day-to-day web browsing. The most prevalent examples are password meters and real time feedback, i.e. a list of requirements that is checked off during password entry. These mechanisms have been studied extensively ( <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b12">13,</ref><ref type="bibr" target="#b14">15]</ref>). The bottom line is that users welcome real-time feedback, but strength meters have a limited effect on password choice.</p><p>A study by Ur et al. showed that users actually might not need such external feedback to judge the strength of a password correctly <ref type="bibr" target="#b13">[14]</ref>. They found that users rated the strength of passwords fairly accurately, but also that many study participants were misled by characteristics like digits and common substitutions. This kind of misjudgment and subpar strength feedback call for novel ideas.</p><p>To approach this opportunity, a recent large scale survey suggests that there are two common types of user personalities regarding passwords <ref type="bibr" target="#b8">[9]</ref>: "Type A" users that have a strong urge to stay in control of their digital footprint and "Type B" users that convince themselves that their data is not valuable for attackers. The study finds that both types of users do not believe to be at risk. The data can be seen as further evidence that the risk of being attacked strongly depends on the user personality, as was already suggested earlier <ref type="bibr" target="#b6">[7,</ref><ref type="bibr" target="#b15">16,</ref><ref type="bibr" target="#b17">19</ref>]. Consequently, it is time to follow the proposal from the persuasive authentication framework (PAF) to consider personalization as persuasion principle <ref type="bibr" target="#b5">[6]</ref>. Forget et al. argue that a personalized system can help improve the users' mental model of security.</p><p>To the best of our knowledge, such personalized systems do not exist. We propose to respect the user's personality in the way password policies enforce and communicate requirements. Ultimately, this is an opportunity make such mitigations more effective in terms of supporting the user in picking an adequate secret.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3">Critical Challenges</head><p>There are a couple of major challenges of personalizing password policies and strength feedback. First, before we can adapt user interfaces to individuals, an in-depth assessment of their personality is required. There are a variety of widely approved personality tests, e.g. the NEO-PI-R <ref type="bibr" target="#b0">[1]</ref>, but they all expect active user involvement. Demanding this kind of action seems unrealistic. Thus, an implicit assessment is mandatory, which is already possible with an analysis of mobile phone usage data <ref type="bibr" target="#b16">[18]</ref> or digital footprints <ref type="bibr" target="#b2">[3]</ref>. These current solutions are privacy invasive, so we need to adjust them to achieve a more ethically reasonable level. Users may also want to fine-tune automatic assessments, so the system needs to provide such means. Also, personality assessments could be inaccurate, so users need to be able to reset the assessment. Second, when a user picks a password, a website does not have any information about him or her, other than the manually provided user name, password, and perhaps bits of personal information. If we aim to personalize this dialog between website and user, there needs to be a way to exchange a personality profile between the two parties in an unobtrusive, privacy-sensitive manner. To make sure the users stay in control of their information the protocol needs to ask permission or at least read general settings about with whom to share personality profiles. Intensive work is going to be needed to carefully design systems that respect user preferences and eventually achieve broad acceptance.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Research Agenda</head><p>The challenges and opportunities deliver an actionable research agenda, which we briefly illustrate with potential use cases and scenarios. Most of them require a modification of web browsers, or capabilities that can already be added with browser extensions.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1">Personalized Password Policies</head><p>Currently, password policies enforce the same rules on all users, i.e. length and complexity requirements. Still, there are different policies that deliver similarly strong passwords <ref type="bibr" target="#b11">[12]</ref>. As outlined above, we envision a new paradigm that modifies these rules depending on the user's personality characteristics. Such a personality profile can consist of a score on each of the five dimensions of the Big-Five model <ref type="bibr" target="#b0">[1]</ref> to be minimally privacy invasive. When the website recognizes a new user who scores high on openness, it can switch to a policy that focuses on password length rather than complexity classes, because these individuals are often very creative and constraints might be counterproductive <ref type="bibr" target="#b9">[10]</ref>. On the contrary, policies can make highly conscientious people add various character-classes. It is likely that these users will benefit from an explicit list of requirements when they have to come up with a strong password, which can be diligently checked off requirement by requirement. Ideally, such a dynamic personalized policy would reduce the burden on users while achieving the same level of security.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2">Tailored Password Nudges</head><p>So far, nudging during password selection is mostly done with password meters or concrete suggestions. The Safari browser automatically pops-up password suggestions when users register on new web sites. In our past work, we have studied the influence of different password suggestions on self-selected passwords <ref type="bibr" target="#b10">[11]</ref>. The suggestions were rejected by most participants, but the strength of self-selected passwords significantly increased upon seeing a password suggestion. We believe that we can design such mechanisms around personality traits to make password suggestions more effective. Suggestions should therefore respect user preferences to become more powerful.</p><p>For instance, Safari could try different variations of password topologies to find out which passwords are most attractive to the user and on which web sites. Additional information on the user's personality might help but is not mandatory in this scenario. Again, such a personalized system can boost usability while adding to the overall security. However, we have to ensure that attackers do not benefit from personality models, which is a critical challenge.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3">Feedback Based on Re-Use Patterns</head><p>Finally, to better cope with authentication overhead, users re-use their passwords many times <ref type="bibr" target="#b4">[5]</ref>. We could use this kind of behavior to create prediction models for future registrations. The models might predict which password is going to be used on the web page for which the user creates an account. In this opportune moment, a personalized system can detect anomalies and intervene if another password from the portfolio might be a better fit for the website at hand. For instance, if a user tries to sign-up to PayPal using the same password as with their email account, the system can discourage this without blocking the action. Such an approach is designed around the individual user and their preferred re-use strategy. Infrequent suggestions like this could make better options more salient.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5">Conclusion</head><p>At the moment, the challenges to tailor security mitigations to specific users seem big. We do not know how users will react to such personalized systems in security contexts. However, since users will have to deal with passwords for the foreseeable future, we believe the challenges are worth taking and they can be approached in small steps. It will take careful design and long-term evaluation to have browser vendors consider implementing personalized security mitigations. The first small step is to mock-up the interaction and evaluate concepts in Wizard-of-Oz studies to obtain a better understanding of user reactions and attitudes towards personalized policies and feedback.</p></div>		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Revised NEO personality inventory (NEO PI-R) and NEO five factor inventory (NEO FFI): Professional manual</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">T</forename><surname>Costa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">R</forename><surname>Mccrae</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Psychological Assessment Resources</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page">101</biblScope>
			<date type="published" when="1992">1992</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A Large-Scale Evaluation of High-Impact Password Strength Meters</title>
		<author>
			<persName><forename type="first">X</forename><surname>De Carné De Carnavalet</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Mannan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Transactions on Information and System Security</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="1" to="31" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Predicting personality using novel mobile phone-based metrics</title>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">A</forename><surname>De Montjoye</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Quoidbach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Robic</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Pentland</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">LNCS</title>
		<imprint>
			<biblScope unit="volume">7812</biblScope>
			<biblScope unit="page" from="48" to="55" />
			<date type="published" when="2013">2013</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Does My Password Go Up to Eleven?: The Impact of Password Meters on Password Selection</title>
		<author>
			<persName><forename type="first">S</forename><surname>Egelman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Sotirakopoulos</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Muslukhov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Beznosov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Herley</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI &apos;13)</title>
				<meeting>the SIGCHI Conference on Human Factors in Computing Systems (CHI &apos;13)</meeting>
		<imprint>
			<date type="published" when="2013">2013</date>
			<biblScope unit="page" from="2379" to="2388" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">A Large-Scale Study of Web Password Habits</title>
		<author>
			<persName><forename type="first">D</forename><surname>Florêncio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Herley</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 16th international conference on World Wide Web (WWW &apos;07)</title>
				<meeting>the 16th international conference on World Wide Web (WWW &apos;07)</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="657" to="665" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Persuasion as Education for Computer Security</title>
		<author>
			<persName><forename type="first">A</forename><surname>Forget</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Chiasson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Biddle</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of E-Learn: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education</title>
				<meeting>E-Learn: World Conference on E-Learning in Corporate, Government, Healthcare, and Higher Education<address><addrLine>Chesapeake, VA</addrLine></address></meeting>
		<imprint>
			<publisher>Association for the Advancement of Computing in Education (AACE)</publisher>
			<date type="published" when="2007">2007</date>
			<biblScope unit="page" from="822" to="829" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">If You Were Attacked, You&apos;d Be Sorry&quot;: Counterfactuals as Security Arguments</title>
		<author>
			<persName><forename type="first">C</forename><surname>Herley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Pieters</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2015 New Security Paradigms Workshop</title>
				<meeting>the 2015 New Security Paradigms Workshop</meeting>
		<imprint>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="112" to="123" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">The True Cost of Unusable Password Policies: Password Use in the Wild</title>
		<author>
			<persName><forename type="first">P</forename><surname>Inglesant</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Sasse</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI &apos;10)</title>
				<meeting>the SIGCHI Conference on Human Factors in Computing Systems (CHI &apos;10)</meeting>
		<imprint>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="383" to="392" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<title level="m" type="main">The Password Paradox and why our Personalities will get us Hacked</title>
		<ptr target="http://prod.cdata.app.sprinklr.com/DAM/434/LastPass_ExecutiveSummary-44b1d9ef-209a-400a-865d-d0462920ca5b-1914739482.pdf" />
		<imprint>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
	<note type="report_type">Tech. rep</note>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Creativity, divergent thinking, and openness to experience</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">R</forename><surname>Mccrae</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Personality and Social Psychology</title>
		<imprint>
			<biblScope unit="volume">52</biblScope>
			<biblScope unit="issue">6</biblScope>
			<biblScope unit="page" from="1258" to="1265" />
			<date type="published" when="1987">1987</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Influencing Self-Selected Passwords through Suggestions and the Decoy Effect</title>
		<author>
			<persName><forename type="first">T</forename><surname>Seitz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Von Zezschwitz</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Meitner</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Hussmann</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 1st European Workshop on Usable Security</title>
				<meeting>the 1st European Workshop on Usable Security<address><addrLine>Darmstadt</addrLine></address></meeting>
		<imprint>
			<publisher>Internet Society</publisher>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Designing Password Policies for Strength and Usability</title>
		<author>
			<persName><forename type="first">R</forename><surname>Shay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">L</forename><surname>Durity</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">M</forename><surname>Segreti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Ur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Bauer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Christin</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">ACM Transactions on Information and System Security</title>
		<imprint>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page">34</biblScope>
			<date type="published" when="2016">2016</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">A Spoonful of Sugar? The Impact of Guidance and Feedback on Password-Creation Behavior</title>
		<author>
			<persName><forename type="first">R</forename><surname>Shay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Ur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Bauer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Christin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">F</forename><surname>Cranor</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Forget</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Komanduri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">L</forename><surname>Mazurek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Melicher</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">M</forename><surname>Segreti</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI &apos;15)</title>
				<meeting>the SIGCHI Conference on Human Factors in Computing Systems (CHI &apos;15)</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="2903" to="2912" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Do Users&apos; Perceptions of Password Security Match Reality?</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Bees</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">M</forename><surname>Segreti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Bauer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Christin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">F</forename><surname>Cranor</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI &apos;16)</title>
				<meeting>the 2016 CHI Conference on Human Factors in Computing Systems (CHI &apos;16)</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="3748" to="3760" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation</title>
		<author>
			<persName><forename type="first">B</forename><surname>Ur</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">G</forename><surname>Kelley</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Komanduri</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Lee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Maass</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">L</forename><surname>Mazurek</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Passaro</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Shay</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Vidas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Bauer</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Christin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">F</forename><surname>Cranor</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Security&apos;12 Proceedings of the 21st USENIX conference on Security symposium</title>
				<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="5" to="16" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Pretty Good Persuasion: A First Step towards Effective Password 17. Security in the Real World</title>
		<author>
			<persName><forename type="first">D</forename><surname>Weirich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">A</forename><surname>Sasse</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2001Workshop on New Security Paradigms (NSPW &apos;01)</title>
				<meeting>the 2001Workshop on New Security Paradigms (NSPW &apos;01)<address><addrLine>New York, NY, USA</addrLine></address></meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2001">2001</date>
			<biblScope unit="page" from="137" to="143" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Computer-based personality judgments are more accurate than those made by humans</title>
		<author>
			<persName><forename type="first">W</forename><surname>Youyou</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Kosinski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Stillwell</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Proceedings of the National Academy of Sciences</title>
		<imprint>
			<biblScope unit="volume">112</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="1036" to="1040" />
			<date type="published" when="2015">2015</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">Towards designing effective security messages: Persuasive password guidelines</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">H</forename><surname>Zakaria</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Katuk</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the International Conference on Research and Innovation in Information Systems, ICRIIS</title>
				<meeting>the International Conference on Research and Innovation in Information Systems, ICRIIS</meeting>
		<imprint>
			<publisher>IEEE Computer Society</publisher>
			<date type="published" when="2013-02-09">2013. February 09, 2017</date>
			<biblScope unit="page" from="129" to="134" />
		</imprint>
	</monogr>
	<note>All links were last followed</note>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
