Cover not available

Article published In: Words in the World
Edited by Laura Teddiman, Lori Buchanan and Hamad Al-Azary
[The Mental Lexicon 19:1] 2024
► pp. 161169

References (16)
References
Bergstrom, J. R., Frisch, S. A., Hawkins, D. C., Hackenbracht, J., Greene, K. K., Theofanos, M. F., & Griepentrog, B. (2014). Development of a scale to assess the linguistic and phonological difficulty of passwords. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8528 LNCS, 131–139. [URL]
Burr, W. E., Dodson, D. F., Newton, E. M., Perlner, R. A., Polk, W. T., Gupta, S., & Nabbus, E. A. (2013). Electronic authentication guideline (pp. 800–63). National Institute of Standards and Technology. [URL].
Chatterjee, R., Athalye, A., Akhawe, D., Juels, A., & Ristenpart, T. (2016). Password typos and how to correct them securely. 2016 IEEE Symposium on Security and Privacy (SP). Google Scholar logo with link to Google Scholar
Feldman, L. B., Dale, R., & van Rij, J. (2019). Lexical and frequency effects on keystroke timing: challenges to a lexical search account from a type-to-copy task. Frontiers in Communication, 41. Google Scholar logo with link to Google Scholar
Gagné, C. L., & Spalding, T. L. (2014). Adaptation effects in lexical processing. Suvremena Lingvistika (Contemporary Linguistics), 40(78), 127–149. [URL]
Gagné, C., Spalding, T. L., & Taikh, A. (2023). Impact of morphology on written word production. Linguistic Morphology in the Mind and Brain. (pp.96–107). Routledge. Google Scholar logo with link to Google Scholar
Gaw, S., & Felten, E. W. (2006). Password management strategies for online accounts. SOUPS‘06: Proceedings of the Second Symposium on Usable Privacy and Security, 44–55. [URL].
Inhoff, A. W. (1991). Word frequency during copytyping. Journal of Experimental Psychology, 17(2), 578–487. Google Scholar logo with link to Google Scholar
Peirce, J. W., Gray, J. R., Simpson, S., MacAskill, M. R., Höchenberger, R., Sogo, H., Kastman, E., Lindeløv, J. (2019). PsychoPy2: experiments in behavior made easy. Behavior Research Methods. Google Scholar logo with link to Google Scholar
Scaltritti, M., Arfé, B., Torrance, M., & Peressotti, F. (2016). Typing pictures: Linguistic processing cascades into finger movements. Cognition, 1561, 16–29. Google Scholar logo with link to Google Scholar
Stanton, B. C., Greene, K. K. (2014). Character Strings, Memory and Passwords: What a Recall Study Can Tell Us. In: Tryfonas, T., Askoxylakis, I. (eds) Human Aspects of Information Security, Privacy, and Trust. Lecture Notes in Computer Science, vol 8533. Springer, Cham. Google Scholar logo with link to Google Scholar
Taikh, A., Gagne, C., & Spalding, T. L. (2023). Accessing the semantic and lexical information of constituents while typing compounds. The Mental Lexicon, 18(2), 265–299. Google Scholar logo with link to Google Scholar
Tamborello, F. P., & Greene, K. K. (2015). Memory and motor processes of password entry error. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 59(1), 672–676. Google Scholar logo with link to Google Scholar
Weingarten, R., Nottbusch, G., & Will, U. (2004). Morphemes, syllables, and graphemes in written word production. Trends in Linguistics Studies and Monographs, 1571, 529–572. Google Scholar logo with link to Google Scholar
Yamaguchi, M., & Logan, G. D. (2014). Pushing typists back on the learning curve: Revealing chunking in skilled typewriting. Journal of Experimental Psychology: Human Perception and Performance, 40(2), 592–612. Google Scholar logo with link to Google Scholar
Zhang, J., Luo, X., Akkaladevi, S., & Ziegelmayer, J. (2009). Improving multiple-password recall: An empirical study. European Journal of Information System, 18(2), 165–176. Google Scholar logo with link to Google Scholar
Mobile Menu Logo with link to supplementary files background Layer 1 prag Twitter_Logo_Blue