1887
image of The influence of uppercase letter location on typing multiword passphrases
USD
Buy:$35.00 + Taxes

Abstract

Abstract

Organizational policies for passwords and passphrases require certain criteria, such as minimum length or uppercase letters, to be met, often resulting in a tradeoff between complexity and ease of typing. Uppercase letters, specifically, lead to slower and more error prone entries. Our present study examined their influence on the typing of three-word passphrases. We were interested in whether uppercase letter location, which should not influence passphrase security, would influence its typing. Passphrases with no uppercase letter were typed more accurately and quickly than passphrases with an uppercase letter. Importantly, passphrases with an uppercase letter in the second word were more likely to be typed incorrectly, and were typed more slowly when entered correctly. Our findings are consistent with the linguistic information of adjacent words influencing the output of the word being typed, where an altered second word interfered with the output of both the first and second words.

Loading

Article metrics loading...

/content/journals/10.1075/ml.24014.gow
2024-12-16
2025-01-20
Loading full text...

Full text loading...

References

  1. Bergstrom, J. R., Frisch, S. A., Hawkins, D. C., Hackenbracht, J., Greene, K. K., Theofanos, M. F., & Griepentrog, B.
    (2014) Development of a scale to assess the linguistic and phonological difficulty of passwords. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8528 LNCS, –. https://link.springer.com/chapter/10.1007/978-3-319-07308-8_13
    [Google Scholar]
  2. Burr, W. E., Dodson, D. F., Newton, E. M., Perlner, R. A., Polk, W. T., Gupta, S., & Nabbus, E. A.
    (2013) Electronic authentication guideline (pp. 800–63). National Institute of Standards and Technology. https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-63-2.pdf. 10.6028/NIST.SP.800‑63‑2
    https://doi.org/10.6028/NIST.SP.800-63-2 [Google Scholar]
  3. Chatterjee, R., Athalye, A., Akhawe, D., Juels, A., & Ristenpart, T.
    (2016) Password typos and how to correct them securely. 2016 IEEE Symposium on Security and Privacy (SP). 10.1109/SP.2016.53
    https://doi.org/10.1109/SP.2016.53 [Google Scholar]
  4. Feldman, L. B., Dale, R., & van Rij, J.
    (2019) Lexical and frequency effects on keystroke timing: challenges to a lexical search account from a type-to-copy task. Frontiers in Communication, . 10.3389/fcomm.2019.00017
    https://doi.org/10.3389/fcomm.2019.00017 [Google Scholar]
  5. Gagné, C. L., & Spalding, T. L.
    (2014) Adaptation effects in lexical processing. Suvremena Lingvistika (Contemporary Linguistics), (), –. https://hrcak.srce.hr/clanak/194020
    [Google Scholar]
  6. Gagné, C., Spalding, T. L., & Taikh, A.
    (2023) Impact of morphology on written word production. Linguistic Morphology in the Mind and Brain. (pp.–). Routledge. 10.4324/9781003159759‑7
    https://doi.org/10.4324/9781003159759-7 [Google Scholar]
  7. Gaw, S., & Felten, E. W.
    (2006) Password management strategies for online accounts. SOUPS‘06: Proceedings of the Second Symposium on Usable Privacy and Security, –. https://dl.acm.org/doi/10.1145/1143120.1143127. 10.1145/1143120.1143127
    https://doi.org/10.1145/1143120.1143127 [Google Scholar]
  8. Inhoff, A. W.
    (1991) Word frequency during copytyping. Journal of Experimental Psychology, (), –. 10.1037/0096‑1523.17.2.478
    https://doi.org/10.1037/0096-1523.17.2.478 [Google Scholar]
  9. Peirce, J. W., Gray, J. R., Simpson, S., MacAskill, M. R., Höchenberger, R., Sogo, H., Kastman, E., Lindeløv, J.
    (2019) PsychoPy2: experiments in behavior made easy. Behavior Research Methods. 10.3758/s13428‑018‑01193‑y
    https://doi.org/10.3758/s13428-018-01193-y [Google Scholar]
  10. Scaltritti, M., Arfé, B., Torrance, M., & Peressotti, F.
    (2016) Typing pictures: Linguistic processing cascades into finger movements. Cognition, , –. 10.1016/j.cognition.2016.07.006
    https://doi.org/10.1016/j.cognition.2016.07.006 [Google Scholar]
  11. Stanton, B. C., Greene, K. K.
    (2014) Character Strings, Memory and Passwords: What a Recall Study Can Tell Us. In: Tryfonas, T., Askoxylakis, I. (eds) Human Aspects of Information Security, Privacy, and Trust. Lecture Notes in Computer Science, vol 8533. Springer, Cham. 10.1007/978‑3‑319‑07620‑1_18
    https://doi.org/10.1007/978-3-319-07620-1_18 [Google Scholar]
  12. Taikh, A., Gagne, C., & Spalding, T. L.
    (2023) Accessing the semantic and lexical information of constituents while typing compounds. The Mental Lexicon, (), –. 10.1075/ml.21005.tai
    https://doi.org/10.1075/ml.21005.tai [Google Scholar]
  13. Tamborello, F. P., & Greene, K. K.
    (2015) Memory and motor processes of password entry error. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, (), –. 10.1177/1541931215591146
    https://doi.org/10.1177/1541931215591146 [Google Scholar]
  14. Weingarten, R., Nottbusch, G., & Will, U.
    (2004) Morphemes, syllables, and graphemes in written word production. Trends in Linguistics Studies and Monographs, , –. 10.1515/9783110894028.529
    https://doi.org/10.1515/9783110894028.529 [Google Scholar]
  15. Yamaguchi, M., & Logan, G. D.
    (2014) Pushing typists back on the learning curve: Revealing chunking in skilled typewriting. Journal of Experimental Psychology: Human Perception and Performance, (), –. 10.1037/a0033809
    https://doi.org/10.1037/a0033809 [Google Scholar]
  16. Zhang, J., Luo, X., Akkaladevi, S., & Ziegelmayer, J.
    (2009) Improving multiple-password recall: An empirical study. European Journal of Information System, (), –. 10.1057/ejis.2009.9
    https://doi.org/10.1057/ejis.2009.9 [Google Scholar]
/content/journals/10.1075/ml.24014.gow
Loading
/content/journals/10.1075/ml.24014.gow
Loading

Data & Media loading...

This is a required field
Please enter a valid email address
Approval was successful
Invalid data
An Error Occurred
Approval was partially successful, following selected items could not be processed due to error