References (16)
References
Bergstrom, J. R., Frisch, S. A., Hawkins, D. C., Hackenbracht, J., Greene, K. K., Theofanos, M. F., & Griepentrog, B. (2014). Development of a scale to assess the linguistic and phonological difficulty of passwords. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8528 LNCS, 131–139. [URL]
Burr, W. E., Dodson, D. F., Newton, E. M., Perlner, R. A., Polk, W. T., Gupta, S., & Nabbus, E. A. (2013). Electronic authentication guideline (pp. 800–63). National Institute of Standards and Technology. [URL]. DOI logo
Chatterjee, R., Athalye, A., Akhawe, D., Juels, A., & Ristenpart, T. (2016). Password typos and how to correct them securely. 2016 IEEE Symposium on Security and Privacy (SP). DOI logoGoogle Scholar
Feldman, L. B., Dale, R., & van Rij, J. (2019). Lexical and frequency effects on keystroke timing: challenges to a lexical search account from a type-to-copy task. Frontiers in Communication, 4 1. DOI logoGoogle Scholar
Gagné, C. L., & Spalding, T. L. (2014). Adaptation effects in lexical processing. Suvremena Lingvistika (Contemporary Linguistics), 40 (78), 127–149. [URL]
Gagné, C., Spalding, T. L., & Taikh, A. (2023). Impact of morphology on written word production. Linguistic Morphology in the Mind and Brain. (pp.96–107). Routledge. DOI logoGoogle Scholar
Gaw, S., & Felten, E. W. (2006). Password management strategies for online accounts. SOUPS‘06: Proceedings of the Second Symposium on Usable Privacy and Security, 44–55. [URL]. DOI logo
Inhoff, A. W. (1991). Word frequency during copytyping. Journal of Experimental Psychology, 17 (2), 578–487. DOI logoGoogle Scholar
Peirce, J. W., Gray, J. R., Simpson, S., MacAskill, M. R., Höchenberger, R., Sogo, H., Kastman, E., Lindeløv, J. (2019). PsychoPy2: experiments in behavior made easy. Behavior Research Methods. DOI logoGoogle Scholar
Scaltritti, M., Arfé, B., Torrance, M., & Peressotti, F. (2016). Typing pictures: Linguistic processing cascades into finger movements. Cognition, 156 1, 16–29. DOI logoGoogle Scholar
Stanton, B. C., Greene, K. K. (2014). Character Strings, Memory and Passwords: What a Recall Study Can Tell Us. In: Tryfonas, T., Askoxylakis, I. (eds) Human Aspects of Information Security, Privacy, and Trust. Lecture Notes in Computer Science, vol 8533. Springer, Cham. DOI logoGoogle Scholar
Taikh, A., Gagne, C., & Spalding, T. L. (2023). Accessing the semantic and lexical information of constituents while typing compounds. The Mental Lexicon, 18 (2), 265–299. DOI logoGoogle Scholar
Tamborello, F. P., & Greene, K. K. (2015). Memory and motor processes of password entry error. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 59 (1), 672–676. DOI logoGoogle Scholar
Weingarten, R., Nottbusch, G., & Will, U. (2004). Morphemes, syllables, and graphemes in written word production. Trends in Linguistics Studies and Monographs, 157 1, 529–572. DOI logoGoogle Scholar
Yamaguchi, M., & Logan, G. D. (2014). Pushing typists back on the learning curve: Revealing chunking in skilled typewriting. Journal of Experimental Psychology: Human Perception and Performance, 40 (2), 592–612. DOI logoGoogle Scholar
Zhang, J., Luo, X., Akkaladevi, S., & Ziegelmayer, J. (2009). Improving multiple-password recall: An empirical study. European Journal of Information System, 18 (2), 165–176. DOI logoGoogle Scholar