{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:04:14Z","timestamp":1743087854536,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030224189"},{"type":"electronic","value":"9783030224196"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22419-6_7","type":"book-chapter","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T23:37:42Z","timestamp":1562715462000},"page":"84-92","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Impedances of Memorable Passphrase Design on Augmented Cognition"],"prefix":"10.1007","author":[{"given":"Lila A.","family":"Loos","sequence":"first","affiliation":[]},{"given":"Michael-Brian","family":"Ogawa","sequence":"additional","affiliation":[]},{"given":"Martha E.","family":"Crosby","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,20]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Al Abdulwahid, A., Clarke, N., Furnell, S., Stengel, I., Reich, C.: The current use of authentication technologies: an investigative review. In: 2015 International Conference on Cloud Computing (ICCC), pp. 1\u20138. IEEE, April 2015","DOI":"10.1109\/CLOUDCOMP.2015.7149658"},{"issue":"2","key":"7_CR2","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.chb.2009.10.014","volume":"26","author":"PD Antonenko","year":"2010","unstructured":"Antonenko, P.D., Niederhauser, D.S.: The influence of leads on cognitive load and learning in a hypertext environment. Comput. Hum. Behav. 26(2), 140\u2013150 (2010)","journal-title":"Comput. Hum. Behav."},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Berntson, G. G., Cacioppo, J. T., Tassinary, L.G. (eds.): Handbook of Psychophysiology. Cambridge University Press (2017)","DOI":"10.1017\/9781107415782"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Blanchard, N.K., Malaingre, C., Selker, T.: Improving security and usability of passphrases with guided word choice. In: Proceedings of the 34th Annual Computer Security Applications Conference, pp. 723\u2013732. ACM, December 2018","DOI":"10.1145\/3274694.3274734"},{"key":"7_CR5","unstructured":"Bonneau, J.: Guessing human-chosen secrets (No. UCAM-CL-TR-819). University of Cambridge, Computer Laboratory (2012)"},{"key":"7_CR6","unstructured":"Ekstrom, R.B., Dermen, D., Harman, H.H.: Manual for Kit of Factor-Referenced Cognitive Tests, vol. 102. Educational Testing Service, Princeton (1976)"},{"key":"7_CR7","unstructured":"Gao, X., Yang, Y., Liu, C., Mitropoulos, C., Lindqvist, J., Oulasvirta, A.: Forgetting of passwords: ecological theory and data. In: 27th {USENIX} Security Symposium ({USENIX} Security 18), pp. 221\u2013238 (2018)"},{"issue":"6","key":"7_CR8","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1016\/j.chb.2010.05.031","volume":"26","author":"N Hollender","year":"2010","unstructured":"Hollender, N., Hofmann, C., Deneke, M., Schmitz, B.: Integrating cognitive load theory and concepts of human\u2013computer interaction. Comput. Hum. Behav. 26(6), 1278\u20131288 (2010)","journal-title":"Comput. Hum. Behav."},{"key":"7_CR9","unstructured":"Jones, M.: Closing the Gap Between Memorable and Secure Passwords (2018)"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Joudaki, Z., Thorpe, J., Martin, M.V.: Reinforcing system-assigned passphrases through implicit learning. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, pp. 1533\u20131548. ACM, October 2018","DOI":"10.1145\/3243734.3243764"},{"issue":"1","key":"7_CR11","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/j.chb.2010.06.025","volume":"27","author":"PA Kirschner","year":"2011","unstructured":"Kirschner, P.A., Ayres, P., Chandler, P.: Contemporary cognitive load theory research: the good, the bad and the ugly. Comput. Hum. Behav. 27(1), 99\u2013105 (2011)","journal-title":"Comput. Hum. Behav."},{"key":"7_CR12","unstructured":"Labaree, R.V.: Research Guides: Organizing Your Social Sciences Research Paper: Types of Research Designs (2009)"},{"issue":"3","key":"7_CR13","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1177\/0963721410370295","volume":"19","author":"N Lavie","year":"2010","unstructured":"Lavie, N.: Attention, distraction, and cognitive control under load. Curr. Dir. Psychol. Sci. 19(3), 143\u2013148 (2010)","journal-title":"Curr. Dir. Psychol. Sci."},{"key":"7_CR14","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-319-91467-1_10","volume-title":"Augmented Cognition: Users and Contexts","author":"LA Loos","year":"2018","unstructured":"Loos, L.A., Crosby, M.E.: Cognition and predictors of password selection and usability. In: Schmorrow, Dylan D., Fidopiastis, Cali M. (eds.) AC 2018. LNCS (LNAI), vol. 10916, pp. 117\u2013132. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-91467-1_10"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Mavilidi, M.F., Zhong, L.: Exploring the development and research focus of cognitive load theory, as described by its founders: interviewing John Sweller, Fred Paas, and Jeroen van Merri\u00ebnboer. Educ. Psychol. Rev. 1\u201310 (2019)","DOI":"10.1007\/s10648-019-09463-7"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Naim, M., Katkov, M., Tsodyks, M.: Fundamental Law of Memory Recall. bioRxiv, 510750 (2019)","DOI":"10.1101\/510750"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Nielsen, G., Vedel, M., Jensen, C.D.: Improving usability of passphrase authentication. In: 2014 Twelfth Annual International Conference on Privacy, Security and Trust, pp. 189\u2013198. IEEE, July 2014","DOI":"10.1109\/PST.2014.6890939"},{"issue":"2","key":"7_CR18","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1080\/09658211.2018.1497661","volume":"27","author":"D Norris","year":"2019","unstructured":"Norris, D., Hall, J., Butterfield, S., Page, M.P.: The effect of processing load on loss of information from short-term memory. Memory 27(2), 192\u2013197 (2019)","journal-title":"Memory"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Oviatt, S.: Human-centered design meets cognitive load theory: designing interfaces that help people think. In: Proceedings of the 14th ACM international conference on Multimedia, pp. 871\u2013880. ACM, October 2006","DOI":"10.1145\/1180639.1180831"},{"issue":"1","key":"7_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1207\/S15326985EP3801_1","volume":"38","author":"F Paas","year":"2003","unstructured":"Paas, F., Renkl, A., Sweller, J.: Cognitive load theory and instructional design: recent developments. Educ. Psychol. 38(1), 1\u20134 (2003)","journal-title":"Educ. Psychol."},{"key":"7_CR21","unstructured":"Pilson, C.S.: Tightly-Held and Ephemeral Psychometrics: Password and Passphrase Authentication Utilizing User-Supplied Constructs of Self. arXiv preprint arXiv:1509.01662 (2015)"},{"issue":"1","key":"7_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1037\/h0092976","volume":"80","author":"JB Rotter","year":"1966","unstructured":"Rotter, J.B.: Generalized expectancies for internal versus external control of reinforcement. Psychol. Monogr. Gen. Appl. 80(1), 1 (1966)","journal-title":"Psychol. Monogr. Gen. Appl."},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Shay, R., et al.: Correct horse battery staple: exploring the usability of system-assigned passphrases. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, p. 7. ACM, July 2012","DOI":"10.1145\/2335356.2335366"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Sweller, J.: Cognitive Load Theory. In: Psychology of Learning and Motivation, vol. 55, pp. 37\u201376. Academic Press (2011)","DOI":"10.1016\/B978-0-12-387691-1.00002-8"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Sweller, J., van Merri\u00ebnboer, J.J., Paas, F.: Cognitive architecture and instructional design: 20 years later. Educ. Psychol. Rev. 1\u201332 (2019)","DOI":"10.1007\/s10648-019-09465-5"},{"issue":"4","key":"7_CR26","doi-asserted-by":"publisher","first-page":"951","DOI":"10.1007\/s10459-016-9725-2","volume":"22","author":"A Szulewski","year":"2017","unstructured":"Szulewski, A., Gegenfurtner, A., Howes, D.W., Sivilotti, M.L., van Merri\u00ebnboer, J.J.: Measuring physician cognitive load: validity evidence for a physiologic and a psychometric tool. Adv. Health Sci. Educ. 22(4), 951\u2013968 (2017)","journal-title":"Adv. Health Sci. Educ."},{"issue":"1","key":"7_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1471-2288-10-1","volume":"10","author":"L Thabane","year":"2010","unstructured":"Thabane, L., et al.: A tutorial on pilot studies: the what, why and how. BMC Med. Res. Methodol. 10(1), 1 (2010)","journal-title":"BMC Med. Res. Methodol."},{"key":"7_CR28","doi-asserted-by":"publisher","first-page":"33","DOI":"10.7748\/ns.16.40.33.s1","volume":"16","author":"ER Van Teijlingen","year":"2002","unstructured":"Van Teijlingen, E.R., Hundley, V.: The importance of pilot studies. Nurs. Stand. 16, 33\u201336 (2002)","journal-title":"Nurs. Stand."},{"key":"7_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3758\/s13421-018-0891-8","volume":"47","author":"G Ward","year":"2019","unstructured":"Ward, G., Tan, L.: Control processes in short-term storage: retrieval strategies in immediate recall depend upon the number of words to be recalled. Mem. Cogn. 47, 1\u201325 (2019)","journal-title":"Mem. Cogn."},{"key":"7_CR30","unstructured":"Woo, S.S., Mirkovic, J.: Memorablity and security of different passphrase generation methods.\u00a0\uc815\ubcf4\ubcf4\ud638\ud559\ud68c\uc9c0,\u00a028(1), 29\u201335 (2018)"},{"key":"7_CR31","unstructured":"Zhang, X., Clark, J.: Matrix Passwords: A Proposed Methodology of Password Authentication (2012)"},{"issue":"2","key":"7_CR32","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1057\/ejis.2009.9","volume":"18","author":"J Zhang","year":"2009","unstructured":"Zhang, J., Luo, X., Akkaladevi, S., Ziegelmayer, J.: Improving multiple-password recall: an empirical study. Eur. J. Inf. Syst. 18(2), 165\u2013176 (2009)","journal-title":"Eur. J. Inf. Syst."}],"container-title":["Lecture Notes in Computer Science","Augmented Cognition"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22419-6_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T11:10:51Z","timestamp":1710241851000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22419-6_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030224189","9783030224196"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22419-6_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"20 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, FL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2019.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}