[{"year":"2013","citation":{"ama":"Fahl S, Harbach M, Acar Y, Smith M. On the ecological validity of a password study. In: <i>Proceedings of the Ninth Symposium on Usable Privacy and Security</i>. ACM; 2013. doi:<a href=\"https://doi.org/10.1145/2501604.2501617\">10.1145/2501604.2501617</a>","ieee":"S. Fahl, M. Harbach, Y. Acar, and M. Smith, “On the ecological validity of a password study,” 2013, doi: <a href=\"https://doi.org/10.1145/2501604.2501617\">10.1145/2501604.2501617</a>.","chicago":"Fahl, Sascha, Marian Harbach, Yasemin Acar, and Matthew Smith. “On the Ecological Validity of a Password Study.” In <i>Proceedings of the Ninth Symposium on Usable Privacy and Security</i>. ACM, 2013. <a href=\"https://doi.org/10.1145/2501604.2501617\">https://doi.org/10.1145/2501604.2501617</a>.","bibtex":"@inproceedings{Fahl_Harbach_Acar_Smith_2013, title={On the ecological validity of a password study}, DOI={<a href=\"https://doi.org/10.1145/2501604.2501617\">10.1145/2501604.2501617</a>}, booktitle={Proceedings of the Ninth Symposium on Usable Privacy and Security}, publisher={ACM}, author={Fahl, Sascha and Harbach, Marian and Acar, Yasemin and Smith, Matthew}, year={2013} }","mla":"Fahl, Sascha, et al. “On the Ecological Validity of a Password Study.” <i>Proceedings of the Ninth Symposium on Usable Privacy and Security</i>, ACM, 2013, doi:<a href=\"https://doi.org/10.1145/2501604.2501617\">10.1145/2501604.2501617</a>.","short":"S. Fahl, M. Harbach, Y. Acar, M. Smith, in: Proceedings of the Ninth Symposium on Usable Privacy and Security, ACM, 2013.","apa":"Fahl, S., Harbach, M., Acar, Y., &#38; Smith, M. (2013). On the ecological validity of a password study. <i>Proceedings of the Ninth Symposium on Usable Privacy and Security</i>. <a href=\"https://doi.org/10.1145/2501604.2501617\">https://doi.org/10.1145/2501604.2501617</a>"},"publication_status":"published","title":"On the ecological validity of a password study","doi":"10.1145/2501604.2501617","date_updated":"2024-06-05T13:17:57Z","publisher":"ACM","date_created":"2023-09-22T11:49:19Z","author":[{"full_name":"Fahl, Sascha","last_name":"Fahl","first_name":"Sascha"},{"full_name":"Harbach, Marian","last_name":"Harbach","first_name":"Marian"},{"first_name":"Yasemin","last_name":"Acar","full_name":"Acar, Yasemin","id":"94636"},{"full_name":"Smith, Matthew","last_name":"Smith","first_name":"Matthew"}],"status":"public","type":"conference","publication":"Proceedings of the Ninth Symposium on Usable Privacy and Security","language":[{"iso":"eng"}],"extern":"1","_id":"47161","user_id":"14931","department":[{"_id":"34"},{"_id":"858"}]}]
