{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T16:04:25Z","timestamp":1751558665300,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030223502"},{"type":"electronic","value":"9783030223519"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22351-9_32","type":"book-chapter","created":{"date-parts":[[2019,7,9]],"date-time":"2019-07-09T23:33:30Z","timestamp":1562715210000},"page":"471-481","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Measuring Network User Trust via Mouse Behavior Characteristics Under Different Emotions"],"prefix":"10.1007","author":[{"given":"Biao","family":"Wang","sequence":"first","affiliation":[]},{"given":"Shiquan","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Shuping","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Qian","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Fangfei","family":"Yan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,12]]},"reference":[{"key":"32_CR1","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.cose.2014.03.005","volume":"43","author":"KO Bailey","year":"2014","unstructured":"Bailey, K.O., Okolica, J.S., Peterson, G.L.: User identification and authentication using multi-modal behavioral biometrics. Comput. Secur. 43, 77\u201389 (2014)","journal-title":"Comput. Secur."},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Monrose, F., Rubin, A.: Authentication via keystroke dynamics. In: ACM Conference on Computer & Communications Security (1997)","DOI":"10.1145\/266420.266434"},{"issue":"16","key":"32_CR3","doi-asserted-by":"publisher","first-page":"2936","DOI":"10.1016\/j.physa.2011.03.040","volume":"390","author":"A Chmiel","year":"2011","unstructured":"Chmiel, A., Sobkowicz, P., Sienkiewicz, J., Paltoglou, G., Buckley, K., Thelwall, M., et al.: Negative emotions boost user activity at bbc forum. Phys. Stat. Mech. Appl. 390(16), 2936\u20132944 (2011)","journal-title":"Phys. Stat. Mech. Appl."},{"key":"32_CR4","unstructured":"Maehr, W.: eMotion: Estimation of User\u2019s Emotional State by Mouse Motions. Elsevier (2008)"},{"key":"32_CR5","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/j.ins.2014.08.070","volume":"308","author":"P Kang","year":"2015","unstructured":"Kang, P., Cho, S.: Keystroke dynamics-based user authentication using long and free text strings from various input devices. Inf. Sci. 308, 72\u201393 (2015)","journal-title":"Inf. Sci."},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Gamboa, H., Fred, A.L.N., Jain, A.K.: Webbiometrics: User Verification Via Web Interaction. Biometrics Symposium (2008)","DOI":"10.1109\/BCC.2007.4430552"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Bours, P., Fullu, C.J.A.: Login system using mouse dynamics. In: International Conference on Intelligent Information Hiding & Multimedia Signal Processing (2009)","DOI":"10.1109\/IIH-MSP.2009.77"},{"key":"32_CR8","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.ins.2014.12.045","volume":"304","author":"S Mondal","year":"2015","unstructured":"Mondal, S., Bours, P.: A computational approach to the continuous authentication biometric system. Inf. Sci. 304, 28\u201353 (2015)","journal-title":"Inf. Sci."},{"key":"32_CR9","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1016\/j.ins.2012.02.066","volume":"201","author":"C Feher","year":"2012","unstructured":"Feher, C., Elovici, Y., Moskovitch, R., Rokach, L., Schclar, A.: User identity verification via mouse dynamics. Inf. Sci. 201, 19\u201336 (2012)","journal-title":"Inf. Sci."},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Jorgensen, Z., Yu, T.: On mouse dynamics as a behavioral biometric for authentication. In: [ACM Press the 6th ACM Symposium - Hong Kong, China (2011.03.22\u20132011.03.24)] Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security - ASIACCS 2011, p. 476 (2011)","DOI":"10.1145\/1966913.1966983"},{"issue":"3","key":"32_CR11","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1023\/B:MOEM.0000040153.26156.ed","volume":"28","author":"MG Calvo","year":"2004","unstructured":"Calvo, M.G., Lang, P.J.: Gaze patterns when looking at emotional pictures: motivationally biased attention. Motiv. Emot. 28(3), 221\u2013243 (2004)","journal-title":"Motiv. Emot."},{"issue":"1","key":"32_CR12","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/79.911197","volume":"18","author":"R Cowie","year":"2001","unstructured":"Cowie, R., Douglas-Cowie, E., Tsapatsoulis, N., Votsis, G., Kollias, S., Fellenz, W., et al.: Emotion recognition in human-computer interaction. IEEE Signal Process. Mag. 18(1), 32\u201380 (2001)","journal-title":"IEEE Signal Process. Mag."},{"issue":"12","key":"32_CR13","doi-asserted-by":"publisher","first-page":"1269","DOI":"10.1007\/s00371-012-0768-y","volume":"29","author":"M Rashid","year":"2013","unstructured":"Rashid, M.: Human emotion recognition from videos using spatio-temporal and audio features. Visual Comput. 29(12), 1269\u20131275 (2013)","journal-title":"Visual Comput."},{"issue":"2","key":"32_CR14","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.joi.2009.01.003","volume":"3","author":"R Prabowo","year":"2009","unstructured":"Prabowo, R., Thelwall, M.: Sentiment analysis: a combined approach. J. Inform. 3(2), 143\u2013157 (2009)","journal-title":"J. Inform."},{"issue":"4","key":"32_CR15","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1140\/epjb\/e2010-00279-x","volume":"77","author":"M Mitrovi","year":"2010","unstructured":"Mitrovi, M., Paltoglou, G., Tadi, B.: Networks and emotion-driven user communities at popular blogs. Eur. Phys. J. B 77(4), 597\u2013609 (2010)","journal-title":"Eur. Phys. J. B"},{"key":"32_CR16","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1007\/978-981-10-7245-1_58","volume-title":"Intelligent Computing and Information and Communication","author":"TS Saini","year":"2018","unstructured":"Saini, T.S., Bedekar, M.: Inferring user emotions from keyboard and mouse. In: Bhalla, S., Bhateja, V., Chandavale, A.A., Hiwale, A.S., Satapathy, S.C. (eds.) Intelligent Computing and Information and Communication. AISC, vol. 673, pp. 591\u2013601. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-10-7245-1_58"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22351-9_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,19]],"date-time":"2023-07-19T00:28:27Z","timestamp":1689726507000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22351-9_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030223502","9783030223519"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22351-9_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"12 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Orlando, FL","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2019.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}