{"id":"https://openalex.org/W2042543421","doi":"https://doi.org/10.1145/2600176.2600210","title":"Exploring key-level analytics for computational modeling of typing behavior","display_name":"Exploring key-level analytics for computational modeling of typing behavior","publication_year":2014,"publication_date":"2014-04-08","ids":{"openalex":"https://openalex.org/W2042543421","doi":"https://doi.org/10.1145/2600176.2600210","mag":"2042543421"},"language":"en","primary_location":{"id":"doi:10.1145/2600176.2600210","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2600176.2600210","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 Symposium and Bootcamp on the Science of Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5102855735","display_name":"Arpan Chakraborty","orcid":"https://orcid.org/0000-0003-3424-8859"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Arpan Chakraborty","raw_affiliation_strings":["North Carolina State University","North Carolina State University,"],"affiliations":[{"raw_affiliation_string":"North Carolina State University","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University,","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103002916","display_name":"Brent Harrison","orcid":"https://orcid.org/0000-0003-4056-6888"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Brent Harrison","raw_affiliation_strings":["North Carolina State University","North Carolina State University,"],"affiliations":[{"raw_affiliation_string":"North Carolina State University","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University,","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5075535970","display_name":"Pu Yang","orcid":"https://orcid.org/0000-0003-2283-8835"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Pu Yang","raw_affiliation_strings":["North Carolina State University","North Carolina State University,"],"affiliations":[{"raw_affiliation_string":"North Carolina State University","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University,","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012351691","display_name":"David L. Roberts","orcid":"https://orcid.org/0000-0001-7872-4840"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"David Roberts","raw_affiliation_strings":["North Carolina State University","North Carolina State University,"],"affiliations":[{"raw_affiliation_string":"North Carolina State University","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University,","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056937629","display_name":"Robert St. Amant","orcid":"https://orcid.org/0000-0003-1417-9278"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Robert St. Amant","raw_affiliation_strings":["North Carolina State University","North Carolina State University,"],"affiliations":[{"raw_affiliation_string":"North Carolina State University","institution_ids":["https://openalex.org/I137902535"]},{"raw_affiliation_string":"North Carolina State University,","institution_ids":["https://openalex.org/I137902535"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5102855735"],"corresponding_institution_ids":["https://openalex.org/I137902535"],"apc_list":null,"apc_paid":null,"fwci":0.8137,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.83708786,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12607","display_name":"Personal Information Management and User Behavior","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12607","display_name":"Personal Information Management and User Behavior","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10470","display_name":"Usability and User Interface Design","score":0.9930999875068665,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10789","display_name":"Interactive and Immersive Displays","score":0.9818000197410583,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.8995863795280457},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7724956274032593},{"id":"https://openalex.org/keywords/typing","display_name":"Typing","score":0.7681954503059387},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.6581113338470459},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5952242016792297},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.5285904407501221},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5099261999130249},{"id":"https://openalex.org/keywords/situational-ethics","display_name":"Situational ethics","score":0.4540988504886627},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.4067121744155884},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.40638267993927},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.3441489338874817},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.2696380019187927},{"id":"https://openalex.org/keywords/speech-recognition","display_name":"Speech recognition","score":0.24085339903831482},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.11005601286888123},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.09776636958122253}],"concepts":[{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.8995863795280457},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7724956274032593},{"id":"https://openalex.org/C2781209916","wikidata":"https://www.wikidata.org/wiki/Q3215756","display_name":"Typing","level":2,"score":0.7681954503059387},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.6581113338470459},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5952242016792297},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.5285904407501221},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5099261999130249},{"id":"https://openalex.org/C9114305","wikidata":"https://www.wikidata.org/wiki/Q1428317","display_name":"Situational ethics","level":2,"score":0.4540988504886627},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.4067121744155884},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.40638267993927},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.3441489338874817},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.2696380019187927},{"id":"https://openalex.org/C28490314","wikidata":"https://www.wikidata.org/wiki/Q189436","display_name":"Speech recognition","level":1,"score":0.24085339903831482},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.11005601286888123},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.09776636958122253},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2600176.2600210","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2600176.2600210","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2014 Symposium and Bootcamp on the Science of Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Industry, innovation and infrastructure","score":0.6499999761581421,"id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306084","display_name":"U.S. Department of Energy","ror":"https://ror.org/01bj3aw27"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W1993921327","https://openalex.org/W2034225924","https://openalex.org/W2050787672","https://openalex.org/W2072336172","https://openalex.org/W2081794397","https://openalex.org/W2083314113","https://openalex.org/W2105686707"],"related_works":["https://openalex.org/W1466352809","https://openalex.org/W3176169626","https://openalex.org/W2496611875","https://openalex.org/W2066653138","https://openalex.org/W2983735090","https://openalex.org/W4212984397","https://openalex.org/W2313381668","https://openalex.org/W2081276048","https://openalex.org/W2096938337","https://openalex.org/W2887588695"],"abstract_inverted_index":{"Typing":[0],"is":[1],"a":[2,10,39,48],"human":[3],"activity":[4],"that":[5,96,100],"can":[6,28],"be":[7,29],"affected":[8],"by":[9],"number":[11,58],"of":[12,25,59,94],"situational":[13],"and":[14,57,69,77],"task-specific":[15],"factors.":[16],"Changes":[17],"in":[18,51],"typing":[19,49,82],"behavior":[20],"resulting":[21],"from":[22,86],"the":[23,91,98],"manipulation":[24],"such":[26],"factors":[27,103],"predictably":[30],"observed":[31],"through":[32],"key-level":[33],"input":[34],"analytics.":[35],"Here":[36],"we":[37],"present":[38],"study":[40],"designed":[41],"to":[42,89],"explore":[43],"these":[44],"relationships.":[45],"Participants":[46],"play":[47],"game":[50,87],"which":[52],"letter":[53],"composition,":[54],"word":[55],"length":[56],"words":[60],"appearing":[61],"together":[62],"are":[63,84],"varied":[64],"across":[65],"levels.":[66],"Inter-keystroke":[67],"timings":[68],"other":[70],"higher":[71],"order":[72],"statistics":[73],"(such":[74],"as":[75,79,81],"bursts":[76],"pauses),":[78],"well":[80],"strategies,":[83],"analyzed":[85],"logs":[88],"find":[90],"best":[92],"set":[93],"metrics":[95],"quantify":[97],"effect":[99],"different":[101],"experimental":[102],"have":[104],"on":[105],"observable":[106],"metrics.":[107]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
