{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T13:43:28Z","timestamp":1762004608251,"version":"3.40.4"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319076195"},{"type":"electronic","value":"9783319076201"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07620-1_18","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T16:55:03Z","timestamp":1402419303000},"page":"195-206","source":"Crossref","is-referenced-by-count":7,"title":["Character Strings, Memory and Passwords: What a Recall Study Can Tell Us"],"prefix":"10.1007","author":[{"given":"Brian C.","family":"Stanton","sequence":"first","affiliation":[]},{"given":"Kristen K.","family":"Greene","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","first-page":"47","volume-title":"Recent Advances in Learning and Motivation","author":"A.D. Baddeley","year":"1974","unstructured":"Baddeley, A.D., Hitch, G.: Working memory. In: Bower, G. (ed.) Recent Advances in Learning and Motivation, vol.\u00a08, pp. 47\u201390. Academic Press, New York (1974)"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Chiasson, S., Forget, A., Stobert, E., Van Oorschot, P., Biddle, R.: Multiple password interference in text passwords and click-based graphical passwords. In: Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 500\u2013511 (2009)","DOI":"10.1145\/1653662.1653722"},{"key":"18_CR3","unstructured":"Choong, Y., Theofanos, M., Liu, H.: A Large-Scale Survey of Employees\u2019 Password Behaviors. Manuscript submitted for publication (2014) (manuscript in preparation)"},{"key":"18_CR4","first-page":"561","volume":"61","author":"J.E. Coover","year":"1923","unstructured":"Coover, J.E.: A method of teaching typewriting based upon a psychological analysis of expert typing. National Education Association\u00a061, 561\u2013567 (1923)","journal-title":"National Education Association"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Florencio, D., Herley, C.: A large-scale study of web password habits. In: WWW 2007, Banff, Canada. ACM Press (2007)","DOI":"10.1145\/1242572.1242661"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Forget, A., Biddle, R.: Memorability of persuasive passwords. In: CHI 2008 Extended Abstracts on Human Factors in Computing Systems, pp. 3759\u20133764 (2008)","DOI":"10.1145\/1358628.1358926"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Gehringer, E.F.: Choosing passwords: Security and human factors. In: International Symposium on Technology and Society (ISTAS 2002), pp. 369\u2013373 (2002)","DOI":"10.1109\/ISTAS.2002.1013839"},{"key":"18_CR8","unstructured":"Gentner, D.: Skilled finger movements in typing. Center for Information Processing, University of California, San Diego. CHIP Report 104 (1981)"},{"issue":"2","key":"18_CR9","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1037\/h0043158","volume":"63","author":"G.A. Miller","year":"1956","unstructured":"Miller, G.A.: The magical number seven, plus or minus two: Some limits on our capacity for processing information. Psychological Review\u00a063(2), 81\u201397 (1956), doi:10.1037\/h0043158","journal-title":"Psychological Review"},{"issue":"3","key":"18_CR10","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1037\/0096-3445.113.3.345","volume":"113","author":"T. Salthouse","year":"1984","unstructured":"Salthouse, T.: Effects of age and skill in typing. Journal of Experimental Psychology\u00a0113(3), 345\u2013371 (1984)","journal-title":"Journal of Experimental Psychology"},{"issue":"3","key":"18_CR11","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1037\/0033-2909.99.3.303","volume":"99","author":"T. Salthouse","year":"1986","unstructured":"Salthouse, T.: Perceptual, cognitive, and motoric aspects of transcription typing. Psychological Bulletin\u00a099(3), 303\u2013319 (1986)","journal-title":"Psychological Bulletin"},{"key":"18_CR12","unstructured":"United States Department of Commerce, National Institute of Standards and Technology (NIST), Password usage (FIPS PUB 112) (1985), http:\/\/www.itl.nist.gov\/fipspubs\/fip112.htm (retrieved)"},{"key":"18_CR13","unstructured":"United States Department of Homeland Security, United States Computer Emergency Readiness Team (US-CERT), Security tip (ST04-002): Choosing and protecting passwords (2009), http:\/\/www.us-cert.gov\/cas\/tips\/ST04-002.html (retrieved)"},{"key":"18_CR14","first-page":"241","volume-title":"The foundations of remembering: Essays in honor of Henry L. Roedgier III","author":"N. Unsworth","year":"2007","unstructured":"Unsworth, N., Engle, R.W.: The foundations of remembering: Essays in honor of Henry L. Roedgier III, pp. 241\u2013258. Psychology Press, New York (2007)"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Vu, K., Bhargav-Spantzel, A., Proctor, R.: Imposing password restrictions for multiple accounts: Impact on generation and recall of passwords. In: HFES 47th Annual Meeting, pp. 1331\u20131335 (2003)","DOI":"10.1177\/154193120304701103"},{"key":"18_CR16","unstructured":"Vu, K., Cook, J., Bhargav-Spantzel, A., Proctor, R.W.: Short- and long-term retention of passwords generated by first-letter and entire-word mnemonic methods. In: Proceedings of the 5th Annual Security Conference, Las Vegas, NV (2006)"},{"key":"18_CR17","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1016\/j.ijhcs.2007.03.007","volume":"65","author":"K. Vu","year":"2006","unstructured":"Vu, K., Proctor, R., Bhargav-Spantzel, A., Tai, B., Cook, J., Schultz, E.: Improving password security and memorability to protect personal and organizational information. International Journal of Human-Computer Studies\u00a065, 744\u2013757 (2006)","journal-title":"International Journal of Human-Computer Studies"},{"issue":"5","key":"18_CR18","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/MSP.2004.81","volume":"2","author":"J. Yan","year":"2004","unstructured":"Yan, J., Blackwell, A., Anderson, R., Grant, A.: Password memorability and security: Empirical results. IEEE Security & Privacy\u00a02(5), 25\u201331 (2004)","journal-title":"IEEE Security & Privacy"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07620-1_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T09:06:14Z","timestamp":1746263174000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07620-1_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076195","9783319076201"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07620-1_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}