{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T21:23:10Z","timestamp":1648934590405},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2020,7,27]],"date-time":"2020-07-27T00:00:00Z","timestamp":1595808000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,7,27]],"date-time":"2020-07-27T00:00:00Z","timestamp":1595808000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2020,8]]},"DOI":"10.1007\/s11623-020-1318-9","type":"journal-article","created":{"date-parts":[[2020,7,27]],"date-time":"2020-07-27T10:02:48Z","timestamp":1595844168000},"page":"522-527","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Erstellung von effektiven Sensibilisierungsmaterialien zur Passwortsicherheit"],"prefix":"10.1007","volume":"44","author":[{"given":"Peter","family":"Mayer","sequence":"first","affiliation":[]},{"given":"Fabian","family":"Ballreich","sequence":"additional","affiliation":[]},{"given":"Reyhan","family":"D\u00fczg\u00fcn","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Schwarz","sequence":"additional","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,27]]},"reference":[{"key":"1318_CR1","unstructured":"Apple Inc. Face ID Security. Tech. rep., 2017."},{"key":"1318_CR2","unstructured":"Bada, M., and Sasse, A. Cyber Security Awareness Campaigns \u2013 Why do they fail to change behaviour? Tech. rep., July 2014."},{"key":"1318_CR3","unstructured":"Bock, C. Fujitsu and Microsoft focused on advancing security in the modern workplace, 2018."},{"key":"1318_CR4","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Bursztein, E., Caron, I., Jackson, R., and Williamson, M. Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google. In International Conference on World Wide Web (2015), pp. 141\u2013150.","DOI":"10.1145\/2736277.2741691"},{"key":"1318_CR5","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Herley, C., van Oorschot, P. C., and Stajano, F. The quest to replace passwords: A framework for comparative evaluation of web authentication schemes. In IEEE Symposium on Security and Privacy (2012), pp. 553\u2013567.","DOI":"10.1109\/SP.2012.44"},{"key":"1318_CR6","doi-asserted-by":"crossref","unstructured":"Bonneau, J., Just, M., and Matthews, G. What\u2019s in a Name? In International Conference on Financial Cryptography and Data Security (2010), pp. 98\u2013113.","DOI":"10.1007\/978-3-642-14577-3_10"},{"key":"1318_CR7","doi-asserted-by":"crossref","unstructured":"Bulgurcu, B., Cavusoglu, H., and Benbasat, I. Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly (2010).","DOI":"10.2307\/25750690"},{"key":"1318_CR8","unstructured":"Burnett, M. Today I Am Releasing Ten Million Passwords, Feb. 2015."},{"key":"1318_CR9","unstructured":"Cohen, J. Statistical power analysis for the behavioral sciences (2nd ed.). Academic Press (1988)."},{"issue":"4","key":"1318_CR10","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.istr.2010.05.002","volume":"14","author":"M Eminagaoglu","year":"2009","unstructured":"Eminagaoglu, M., U\u00e7ar, E., and Eren, S. The positive outcomes of information security awareness training in companies \u2013 A case study. Information Security Technical Report 14, 4 (Nov. 2009), 223\u2013229.","journal-title":"Information Security Technical Report"},{"key":"1318_CR11","unstructured":"Flor\u00eancio, D., Herley, C., and van Oorschot, P. C. An Administrator\u2019s Guide to Internet Password Research. In Large Installation System Administration Conference (2014), pp. 35\u201352."},{"issue":"1","key":"1318_CR12","first-page":"80","volume":"4","author":"E Fuller","year":"2011","unstructured":"Fuller, E., Rabin, J. M., and Harel, G. Intellectual Need and Problem-Free Activity in the Mathematics Classroom. International Journal for Studies in Mathematics Education 4, 1 (2011), 80\u2013114.","journal-title":"International Journal for Studies in Mathematics Education"},{"key":"1318_CR13","doi-asserted-by":"crossref","unstructured":"Grassi, P. A., Fenton, J. L., Newton, E. M., Perlner, R. A., Regenscheid, A. R., Burr, W. E., Richter, J. P., Lefkovitz, N. B., Danker, J. M., Choong, Y.-Y., Greene, K. K., and Theofanos, M. F. Digital Identity Guidelines: Authentication and Lifecycle Management. Tech. rep., June 2017.","DOI":"10.6028\/NIST.SP.800-63b"},{"key":"1318_CR14","unstructured":"Haeussinger, F., and Kranz, J. Antecedents of Employees\u2019 Information Security Awareness \u2013 Review, Synthesis, and Directions for Future Research. In European Conference on Information Systems (July 2017), pp. 1\u201320."},{"key":"1318_CR15","doi-asserted-by":"crossref","unstructured":"H\u00e4nsch, N., and Benenson, Z. Specifying IT Security Awareness. Database and Expert Systems Applications (DEXA), 2014 25th International Workshop on (2014), 326\u2013330.","DOI":"10.1109\/DEXA.2014.71"},{"key":"1318_CR16","doi-asserted-by":"crossref","unstructured":"Inglesant, P. G., and Sasse, M. A. The true cost of unusable password policies. In Conference on Human Factors in Computing Systems (2010), pp. 383\u2013392.","DOI":"10.1145\/1753326.1753384"},{"key":"1318_CR17","unstructured":"Ion, I., Reeder, R., and Consolvo, S. \u201c...no one can hack my mind\u201d: Comparing Expert and Non-Expert Security Practices. In Symposium on Usable Privacy and Security (2015), pp. 327\u2013346."},{"key":"1318_CR18","unstructured":"Kajtazi, M., and Bulgurcu, B. Information Security Policy Compliance: An Empirical Study on Escalation of Commitment. In Americas Conference on Information Systems (2013)."},{"issue":"12","key":"1318_CR19","doi-asserted-by":"publisher","first-page":"1049","DOI":"10.1108\/MRR-04-2013-0085","volume":"37","author":"B Lebek","year":"2014","unstructured":"Lebek, B., Uffen, J., Neumann, M., Hohler, B., and Breitner, M. H. Information security awareness and behavior: a theory-based literature review. Management Research Review 37, 12 (2014), 1049\u20131092.","journal-title":"Management Research Review"},{"key":"1318_CR20","unstructured":"Lin, C., and Kunnathur, A. S. Toward Developing a Theory of End User Information Security Competence. In Americas Conference on Information Systems (2013), pp. 1\u201310."},{"key":"1318_CR21","doi-asserted-by":"crossref","unstructured":"Murray, H., and Malone, D. Evaluating password advice. In Irish Signals and Systems Conference (2017).","DOI":"10.1109\/ISSC.2017.7983609"},{"key":"1318_CR22","doi-asserted-by":"crossref","unstructured":"Neumann, S., Reinheimer, B., and Volkamer, M. Don\u2019t Be Deceived: The Message Might Be Fake. In International Conference on Trust and Privacy in Digital Business (2017), pp. 199\u2013214.","DOI":"10.1007\/978-3-319-64483-7_13"},{"key":"1318_CR23","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1016\/j.cose.2015.10.002","volume":"56","author":"G \u00d6g\u00fct\u00e7\u00fc","year":"2016","unstructured":"\u00d6g\u00fct\u00e7\u00fc, G., Testik, \u00d6. M., and Chouseinoglou, O. Analysis of personal information security behavior and awareness. Computers & Security 56 (Feb. 2016), 83\u201393.","journal-title":"Computers & Security"},{"key":"1318_CR24","unstructured":"PCI Security Standards Council LLC. Payment Card Industry (PCI) Data Security Standard (Version 3.2), Apr. 2016."},{"key":"1318_CR25","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/j.cose.2015.05.012","volume":"53","author":"NS Safa","year":"2015","unstructured":"Safa, N. S., Sookhak, M., von Solms, R., Furnell, S., Ghani, N. A., and Herawan, T. Information security conscious care behaviour formation in organizations. Computers & Security 53 (2015), 65\u201378.","journal-title":"Computers & Security"},{"key":"1318_CR26","unstructured":"Stobert, E., and Biddle, R. The Password Life Cycle: User Behaviour in Managing Passwords. In Symposium on Usable Privacy and Security (2014), pp. 243\u2013255."},{"key":"1318_CR27","doi-asserted-by":"crossref","unstructured":"Stobert, E., and Biddle, R. Expert Password Management. In International Conference on Passwords (2015), pp. 3\u201320.","DOI":"10.1007\/978-3-319-29938-9_1"},{"key":"1318_CR28","doi-asserted-by":"crossref","unstructured":"Stockhardt, S., Reinheimer, B., Volkamer, M., Mayer, P., Kunz, A., Rack, P., and Lehmann, D. Teaching Phishing-Security: Which Way is Best? In ICT Systems Security and Privacy Protection. 2016, pp. 135\u2013149.","DOI":"10.1007\/978-3-319-33630-5_10"},{"key":"1318_CR29","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.cose.2015.04.006","volume":"52","author":"A Tsohou","year":"2015","unstructured":"Tsohou, A., Karyda, M., and Kokolakis, S. Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs. Computers & Security 52 (July 2015), 128\u2013141.","journal-title":"Computers & Security"},{"key":"1318_CR30","unstructured":"Ur, B., Noma, F., Bees, J., Segreti, S. M., Shay, R., Bauer, L., Christin, N., and Cranor, L. F. \u201cAdded\u2019!\u2019at the End to Make It Secure\u201d: Observing Password Creation in the Lab. In Symposium on Usable Privacy and Security (2015), pp. 123\u2013140."},{"key":"1318_CR31","unstructured":"Verizon. 2016 Data Breach Investigations Report. Tech. rep., 2016."},{"key":"1318_CR32","unstructured":"Verizon. 2017 Data Breach Investigations Report. Tech. rep., 2017."},{"key":"1318_CR33","doi-asserted-by":"crossref","unstructured":"Volkamer, M., Renaud, K., Reinheimer, B. M., Rack, P., Ghiglieri, M., Mayer, P., Kunz, A., and Gerber, N. Phishing detection: Developing and evaluating a five minutes security awareness video [in press]. In Proceedings of the 15th International Conference on Trust, Privacy and Security in Digital Business \u2013 TrustBus 2018, Regensburg, 5.-6. September 2018 (2018).","DOI":"10.1007\/978-3-319-98385-1_9"},{"key":"1318_CR34","doi-asserted-by":"crossref","unstructured":"Wilson, M., and Hash, J. Building an Information Technology Security Awareness and Training Program. Tech. Rep. 800-50, National Institute of Standards and Technology, Oct. 2003.","DOI":"10.6028\/NIST.SP.800-50"},{"key":"1318_CR35","doi-asserted-by":"crossref","unstructured":"Zhang-Kennedy, L., Chiasson, S., and Biddle, R. Password advice shouldn\u2019t be boring: Visualizing password guessing attacks. In eCrime Researchers Summit (2013).","DOI":"10.1109\/eCRS.2013.6805770"},{"key":"1318_CR36","doi-asserted-by":"crossref","unstructured":"Zhang-Kennedy, L., Chiasson, S., and van Oorschot, P. Revisiting Password Rules: Facilitating Human Management of Passwords. In APWG Symposium on Electronic Crime Research (2016).","DOI":"10.1109\/ECRIME.2016.7487945"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-020-1318-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11623-020-1318-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-020-1318-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,27]],"date-time":"2021-07-27T00:16:19Z","timestamp":1627344979000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11623-020-1318-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,27]]},"references-count":36,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2020,8]]}},"alternative-id":["1318"],"URL":"https:\/\/doi.org\/10.1007\/s11623-020-1318-9","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,27]]},"assertion":[{"value":"27 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}