<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.0 20040830//EN" "http://dtd.nlm.nih.gov/publishing/2.0/journalpublishing.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article" dtd-version="2.0">
    <front>
        <journal-meta>
            <journal-id journal-id-type="publisher-id">JMIR</journal-id>
            <journal-id journal-id-type="nlm-ta">J Med Internet Res</journal-id>
            <journal-title>Journal of Medical Internet Research</journal-title>
            <issn pub-type="epub">1438-8871</issn>
            <publisher>
                <publisher-name>Gunther Eysenbach</publisher-name>
                <publisher-loc>JMIR Publications Inc., Toronto, Canada</publisher-loc>
            </publisher>
        </journal-meta>
        <article-meta>
            <article-id pub-id-type="publisher-id">v14i1e10</article-id>
            <article-id pub-id-type="pmid">22233980</article-id>
            <article-id pub-id-type="doi">10.2196/jmir.1906</article-id>
            <article-categories>
                <subj-group subj-group-type="article-type">
                    <subject>Letter</subject>
                </subj-group>
            </article-categories>
            <title-group>
                <article-title>How to Create Memorizable and Strong Passwords</article-title>
            </title-group>
            <contrib-group>
                <contrib contrib-type="editor">
                    <name>
                        <surname>Eysenbach</surname>
                        <given-names>Gunther</given-names>
                    </name>
                </contrib>
            </contrib-group>
            <contrib-group>
                <contrib contrib-type="reviewer">
                    <name>
                        <surname>El Emam</surname>
                        <given-names>Khaled</given-names>
                    </name>
                </contrib>
            </contrib-group>
            <contrib-group>
                <contrib contrib-type="author" id="contrib1" corresp="yes">
                    <name name-style="western">
                        <surname>Cipresso</surname>
                        <given-names>Pietro</given-names>
                    </name>
                    <degrees>MSc, PhD</degrees>
                    <xref ref-type="aff" rid="aff1">1</xref>
                    <address>
                        <institution>Applied Technology for Neuro-Psychology Lab</institution>
                        <institution>IRCCS Istituto Auxologico Italiano</institution>
                        <addr-line>Via Pellizza da Volpedo 41</addr-line>
                        <addr-line>Milano, 20149</addr-line>
                        <country>Italy</country>
                        <phone>39 61911 ext 2892</phone>
                        <fax>39 619112892</fax>
                        <email>p.cipresso@auxologico.it</email>
                    </address>
                    <xref ref-type="aff" rid="aff2">2</xref>
                </contrib>
                <contrib contrib-type="author" id="contrib2">
                    <name name-style="western">
                        <surname>Gaggioli</surname>
                        <given-names>Andrea</given-names>
                    </name>
                    <degrees>MPsych, PhD</degrees>
                    <xref ref-type="aff" rid="aff1">1</xref>
                    <xref ref-type="aff" rid="aff2">2</xref>
                </contrib>
                <contrib contrib-type="author" id="contrib3">
                    <name name-style="western">
                        <surname>Serino</surname>
                        <given-names>Silvia</given-names>
                    </name>
                    <degrees>MPsych</degrees>
                    <xref ref-type="aff" rid="aff1">1</xref>
                    <xref ref-type="aff" rid="aff2">2</xref>
                </contrib>
                <contrib contrib-type="author" id="contrib4">
                    <name name-style="western">
                        <surname>Cipresso</surname>
                        <given-names>Sergio</given-names>
                    </name>
                    <xref ref-type="aff" rid="aff3">3</xref>
                </contrib>
                <contrib contrib-type="author" id="contrib5">
                    <name name-style="western">
                        <surname>Riva</surname>
                        <given-names>Giuseppe</given-names>
                    </name>
                    <degrees>MA, MPsych, PhD</degrees>
                    <xref ref-type="aff" rid="aff1">1</xref>
                    <xref ref-type="aff" rid="aff2">2</xref>
                </contrib>
            </contrib-group>
            <aff id="aff1" rid="aff1">
                <sup>1</sup>
                <institution>Applied Technology for Neuro-Psychology Lab</institution>
                <institution>IRCCS Istituto Auxologico Italiano</institution>
                <addr-line>Milano</addr-line>
                <country>Italy</country>
            </aff>
            <aff id="aff2" rid="aff2">
                <sup>2</sup>
                <institution>Psychology Department</institution>
                <institution>Catholic University of Milan</institution>
                <addr-line>Milano</addr-line>
                <country>Italy</country>
            </aff>
            <aff id="aff3" rid="aff3">
                <sup>3</sup>
                <institution>Freelancer</institution>
                <addr-line>Milan</addr-line>
                <country>Italy</country>
            </aff>
            <pub-date pub-type="collection">
                <season>Jan-Feb</season>
                <year>2012</year>
            </pub-date>
            <pub-date pub-type="epub">
                <day>10</day>
                <month>01</month>
                <year>2012</year>
            </pub-date>
            <volume>14</volume>
            <issue>1</issue>
            <elocation-id>e10</elocation-id>
            <!--history from ojs - api-xml-->
            <history>
                <date date-type="received">
                    <day>06</day>
                    <month>08</month>
                    <year>2011</year>
                </date>
                <date date-type="accepted">
                    <day>07</day>
                    <month>01</month>
                    <year>2012</year>
                </date>
            </history>
            <!--(c) the authors - correct author names and publication date here if necessary. Date in form ', dd.mm.yyyy' after jmir.org-->
            <copyright-statement>&#169;Pietro Cipresso, Andrea Gaggioli, Silvia Serino, Sergio Cipresso, Giuseppe Riva. Originally published in the Journal of Medical Internet Research (http://www.jmir.org), 10.01.2012. </copyright-statement>
            <copyright-year>2012</copyright-year>
            <license license-type="open-access" xlink:href="http://creativecommons.org/licenses/by/2.0/">
                <p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work, first published in the Journal of Medical Internet Research, is properly cited. The complete bibliographic information, a link to the original publication on http://www.jmir.org/, as well as this copyright and license information must be included.</p>
            </license>
            <self-uri xlink:href="http://www.jmir.org/2012/1/e10/" xlink:type="simple" />
            <kwd-group>
                <kwd>Privacy</kwd>
                <kwd>security</kwd>
                <kwd>passwords</kwd>
                <kwd>psychology</kwd>
            </kwd-group>
        </article-meta>
    </front>
    <body>
        <sec>
            <title>How to Create Memorizable and Strong Passwords</title>
            <p>In a recent JMIR article, El Emam, Moreau and Jonker highlight the importance of using strong passwords to protect personal health information in clinical trials [<xref ref-type="bibr" rid="ref1">1</xref>]. An important implication that was not fully discussed is the potential problem people may have to create passwords that are complex but at the same time easy to remember.</p>
            <p>To address this problem we propose the PsychoPass methord, a simple way to create strong passwords which are easy to remember. This method relies on mental practice and is not an hardware or a software to download. The idea is that a password can be created, memorized and recalled by just thinking of an <italic>action sequence</italic> instead of a word or string of characters. To be more specific, the method consists of the following steps (see <xref ref-type="fig" rid="figure1">Figure 1</xref> and <xref ref-type="fig" rid="figure2">2</xref>): (1) begin with a letter on the keyboard; (2) memorize a sequence of actions (something like &#8220;the key on the left, then the upper one, then the one on the right&#8221;, and so on); (3) memorize the sequence (not the letters used); (4) create as many passwords as you want by remembering only the first letter and the sequence. Using different types of sequences it is possible generate thousands of different passwords. Using sequences' combination is possible to create an infinite number of passwords. Moreover the created passwords will be a nonsense sequence of letters, numbers and symbols, resilient to any attack.</p>
            <p>Furthermore the password communication among colleagues maybe done just by using the first letter and on the base of a common knowledge of the sequence (e.g., sequence 3, letter j).</p>
            <p>El Emam and Colleagues state that more sophisticated collaboration tools are required to allow file sharing without password sharing, and provide several recommendations to implement these practices. We think that more awareness and new practices among users may represent the correct way to implement security beyond the technological issues. In particular, future research needs to focus on the processes that make technology a powerful tool for security.</p>
            <fig id="figure1" position="float">
                <label>Figure 1</label>
                <caption>
                    <p>The same sequence to generate different passwords (about 15 minutes to memorize the sequence).</p>
                </caption>
                <graphic xlink:href="jmir_v14i1e10_fig1.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
            </fig>
            <fig id="figure2" position="float">
                <label>Figure 2</label>
                <caption>
                    <p>Another sequence to generate other passwords (about 15 minutes to memorize the sequence).</p>
                </caption>
                <graphic xlink:href="jmir_v14i1e10_fig2.jpg" alt-version="no" mimetype="image" position="float" xlink:type="simple" />
            </fig>
        </sec>
    </body>
    <back>
        <app-group>
            <app id="app1">
                <title>Multimedia Appendix 1</title>
                <p>Movie demonstrating the method.</p>
                <media xlink:href="jmir_v14i1e10_app1.MOV" xlink:title="MOV File, 7MB" />
            </app>
        </app-group>
        <fn-group>
            <fn fn-type="conflict">
                <p>None declared.</p>
            </fn>
        </fn-group>
        <ref-list>
            <ref id="ref1">
                <label>1</label>
                <nlm-citation citation-type="journal">
                    <person-group person-group-type="author">
                        <name name-style="western">
                            <surname>El Emam</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Moreau</surname>
                            <given-names>K</given-names>
                        </name>
                        <name name-style="western">
                            <surname>Jonker</surname>
                            <given-names>E</given-names>
                        </name>
                    </person-group>
                    <article-title>How strong are passwords used to protect personal health information in clinical trials?</article-title>
                    <source>J Med Internet Res</source>
                    <year>2011</year>
                    <volume>13</volume>
                    <issue>1</issue>
                    <fpage>e18</fpage>
                    <comment>
                        <ext-link xmlns:xlink="http://www.w3.org/1999/xlink" xlink:type="simple" xlink:href="http://www.jmir.org/2011/1/e18/" />
                    </comment>
                    <pub-id pub-id-type="doi">10.2196/jmir.1335</pub-id>
                    <pub-id pub-id-type="medline">21317106</pub-id>
                    <pub-id pub-id-type="pii">v13i1e18</pub-id>
                    <pub-id pub-id-type="pmcid">PMC3221339</pub-id>
                </nlm-citation>
            </ref>
        </ref-list>
    </back>
</article>