{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,3]],"date-time":"2025-10-03T08:44:47Z","timestamp":1759481087094,"version":"3.41.0"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030773915"},{"type":"electronic","value":"9783030773922"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-77392-2_5","type":"book-chapter","created":{"date-parts":[[2021,7,2]],"date-time":"2021-07-02T23:06:05Z","timestamp":1625267165000},"page":"66-75","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Eye Gaze and Interaction Differences of Holistic Versus Analytic Users in Image-Recognition Human Interaction Proof Schemes"],"prefix":"10.1007","author":[{"given":"Pantelitsa","family":"Leonidou","sequence":"first","affiliation":[]},{"given":"Argyris","family":"Constantinides","sequence":"additional","affiliation":[]},{"given":"Marios","family":"Belk","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Fidas","sequence":"additional","affiliation":[]},{"given":"Andreas","family":"Pitsillides","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,3]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/966389.966390","volume":"47","author":"L von Ahn","year":"2004","unstructured":"von Ahn, L., Blum, M., Langford, J.: Telling humans and computers apart automatically. Commun. ACM 47, 56\u201360 (2004)","journal-title":"Commun. ACM"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Chellapilla, K., Larson, K., Simard, P., Czerwinski, M., 2005. Designing human friendly human interaction proofs (HIPs). In: ACM CHI 2005, pp. 711\u2013720. ACM (2005)","DOI":"10.1145\/1054972.1055070"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Golle, P.: Machine learning attacks against the Asirra CAPTCHA. In: ACM Conference on Computer and Communications Security (CCS 2008), pp. 535\u2013542. ACM (2008)","DOI":"10.1145\/1455770.1455838"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Bursztein, E., Martin, M., Mitchell, J.: Text-based CAPTCHA strengths and weaknesses. In: ACM Computer and Communications Security (CCS 2011), pp. 125\u2013138. ACM (2011)","DOI":"10.1145\/2046707.2046724"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Belk, M., Fidas, C., Germanakos, P., Samaras, G.: Do human cognitive differences in information processing affect preference and performance of captcha? J. Hum.-Comput. Stud. 84, 1\u201318 (2015)","DOI":"10.1016\/j.ijhcs.2015.07.002"},{"key":"5_CR6","unstructured":"reCAPTCHA. Online: https:\/\/www.google.com\/recaptcha\/about"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Constantinides, A., Pietron, A., Belk, M., Fidas, C., Han, T., Pitsillides, A.: A cross-cultural perspective for personalizing picture passwords. In: ACM User Modeling, Adaptation and Personalization (UMAP 2020), pp. 43\u201352. ACM (2020)","DOI":"10.1145\/3340631.3394859"},{"key":"5_CR8","doi-asserted-by":"publisher","unstructured":"Constantinides, A., Fidas, C., Belk, M., Pietron, A.M., Han, T., Pitsillides, A.: From hot-spots towards experience-spots: leveraging on users\u2019 sociocultural experiences to enhance security in cued-recall graphical authentication. Int. J. Hum.-Comput. Stud., 149 (2021). https:\/\/doi.org\/10.1016\/j.ijhcs.2021.102602","DOI":"10.1016\/j.ijhcs.2021.102602"},{"issue":"3","key":"5_CR9","doi-asserted-by":"publisher","first-page":"702","DOI":"10.1016\/j.cognition.2008.06.004","volume":"108","author":"J Davidoff","year":"2008","unstructured":"Davidoff, J., Fonteneau, E., Fagot, J.: Local and global processing: observations from a remote culture. Cognition 108(3), 702\u2013709 (2008)","journal-title":"Cognition"},{"key":"5_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/j.2333-8504.1975.tb01065.x","volume":"2","author":"HA Witkin","year":"1975","unstructured":"Witkin, H.A., Moore, C.A., Goodenough, D.R., Cox, P.W.: Field\u2013dependent and field\u2013independent cognitive styles and their educational implications. ETS Res. Bull. Series 2, 1\u201364 (1975)","journal-title":"ETS Res. Bull. Series"},{"key":"5_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-319-67687-6_19","volume-title":"Human-Computer Interaction \u2013 INTERACT 2017","author":"M Belk","year":"2017","unstructured":"Belk, M., Fidas, C., Katsini, C., Avouris, N., Samaras, G.: Effects of human cognitive differences on interaction and visual behavior in graphical user authentication. In: Bernhaupt, R., Dalvi, G., Joshi, A., K. Balkrishan, D., O\u2019Neill, J., Winckler, M. (eds.) INTERACT 2017. LNCS, vol. 10515, pp. 287\u2013296. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67687-6_19"},{"issue":"3","key":"5_CR12","doi-asserted-by":"publisher","first-page":"920","DOI":"10.1016\/j.chb.2011.12.012","volume":"28","author":"J Hong","year":"2012","unstructured":"Hong, J., Hwang, M., Tam, K., Lai, Y., Liu, L.: Effects of cognitive style on digital jigsaw puzzle performance: a GridWare analysis. Comput. Hum. Behav. 28(3), 920\u2013928 (2012)","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"5_CR13","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/s11423-008-9093-6","volume":"58","author":"KA Rittschof","year":"2010","unstructured":"Rittschof, K.A.: Field dependence-independence as visuospatial and executive functioning in working memory: implications for instructional systems design and research. Educ. Technol. Res. Dev. 58(1), 99\u2013114 (2010)","journal-title":"Educ. Technol. Res. Dev."},{"issue":"6","key":"5_CR14","doi-asserted-by":"publisher","first-page":"1355","DOI":"10.1016\/j.chb.2009.05.010","volume":"25","author":"C Angeli","year":"2009","unstructured":"Angeli, C., Valanides, N., Kirschner, P.: Field dependence-independence and instructional-design effects on learners\u2019 performance with a computer-modeling tool. Comput. Hum. Behav. 25(6), 1355\u20131366 (2009)","journal-title":"Comput. Hum. Behav."},{"key":"5_CR15","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/j.chb.2017.06.042","volume":"76","author":"M Belk","year":"2017","unstructured":"Belk, M., Fidas, C., Germanakos, P., Samaras, G.: The interplay between humans, technology and user authentication: a cognitive processing perspective. Comput. Hum. Behav. 76, 184\u2013200 (2017)","journal-title":"Comput. Hum. Behav."},{"key":"5_CR16","unstructured":"GP3 Eye Tracker. Online. https:\/\/www.gazept.com"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Constantinides, A., Belk, M., Fidas, C., Pitsillides, A.: On the accuracy of eye gaze-driven classifiers for predicting image content familiarity in graphical passwords. In: ACM UMAP 2019, pp. 201\u2013205. ACM (2019)","DOI":"10.1145\/3320435.3320474"},{"key":"5_CR18","volume-title":"A Manual for the Embedded Figures Test","author":"HA Witkin","year":"1971","unstructured":"Witkin, H.A., Oltman, P., Raskin, E., Karp, S.: A Manual for the Embedded Figures Test. Consulting Psychologists Press, Palo Alto, CA (1971)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Alt, F., Schneegass, S., Shirazi, A.S., Hassib, M., Bulling, A.: Graphical passwords in the wild: understanding how users choose pictures and passwords in image-based authentication schemes. In: ACM MobileHCI 2015, pp. 316\u2013322 (2015)","DOI":"10.1145\/2785830.2785882"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Dunphy, P., Yan, J.: Do background images improve draw a secret graphical passwords? In: ACM Computer and Communications Security, pp. 36\u201347. ACM (2007)","DOI":"10.1145\/1315245.1315252"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Ahn, G., Hu, H.: Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation. Journal of ACM Transactions on Information and System Security (TISSEC) 17, 4, Article 14, 37 pages (2015)","DOI":"10.1145\/2701423"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Wiedenbeck, S., Waters, J., Birget, J.C., Brodskiy, A., Memon, N.: Authentication using graphical passwords: Effects of tolerance and image choice. In: ACM Symposium on Usable privacy and security, pp. 1\u201312. ACM (2005)","DOI":"10.1145\/1073001.1073002"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Katsini, C., Fidas, C., Raptis, G. E., Belk, M., Samaras, G., Avouris, N.: Influences of human cognition and visual behavior on password strength during picture password composition. In: CHI 2018, p. 87. ACM (2018)","DOI":"10.1145\/3173574.3173661"},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Fidas, C., Voyiatzis, A., Avouris, N.: On the necessity of user-friendly CAPTCHA. In: ACM CHI 2011, pp. 2623\u20132626. ACM (2011)","DOI":"10.1145\/1978942.1979325"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Belk, M., Germanakos, P., Fidas, C., Holzinger, A., Samaras, G.: Towards the personalization of CAPTCHA mechanisms based on individual differences in cognitive processing. Springer Human Factors in Computing and Informatics (SouthCHI 2013), Springer-Verlag, pp. 409\u2013426 (2013)","DOI":"10.1007\/978-3-642-39062-3_26"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Belk, M., Fidas, C., Germanakos, P., Samaras, G.: Do cognitive styles of users affect preference and performance related to CAPTCHA challenges? In: CHI 2012 Extended Abstracts on Human Factors in Computing Systems (CHI EA 2012), pp. 1487\u20131492. ACM (2012)","DOI":"10.1145\/2212776.2223660"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Elson, J., Douceur, J., Howell, J., Saul, J.: Asirra: a CAPTCHA that Exploits interest-aligned manual image categorization. In: Proceedings of the International Conference on Computer and Communications Security (CCS 2007), pp. 366\u2013374. ACM (2007)","DOI":"10.1145\/1315245.1315291"},{"key":"5_CR28","first-page":"71","volume":"27","author":"M Belk","year":"2013","unstructured":"Belk, M., Germanakos, P., Fidas, C., Spanoudis, G., Samaras, G.: Studying the Effect of Human Cognition on Text and Image Recognition CAPTCHA Mechanisms. HCI 27, 71\u201379 (2013)","journal-title":"HCI"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Vikram, S., Fan, Y., Gu, G.: SEMAGE: a new image-based two-factor CAPTCHA. In: ACM Conference on Computer Security Applications (CCS 2011), pp. 237\u2013246. ACM (2011)","DOI":"10.1145\/2076732.2076766"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Fidas, C., Hussmann, H., Belk, M., Samaras, G.: IHIP: towards a user centric individual human interaction proof framework. In: CHI \u201815 Extended Abstracts on Human Factors in Computing Systems (CHI EA \u201815), pp. 2235\u20132240. ACM (2015)","DOI":"10.1145\/2702613.2732748"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Gossweiler, R., Kamvar, M., Baluja, S.: What\u2019s up CAPTCHA?: a CAPTCHA based on image orientation. In: ACM World Wide Web (WWW 2009), pp. 841\u2013850. ACM (2009)","DOI":"10.1145\/1526709.1526822"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Tanthavech, N., Nimkoompai, A.: CAPTCHA: Impact of website security on user experience. In: Proceedings of the 2019 4th International Conference on Intelligent Information Technology (ICIIT 2019), pp. 37\u201341. ACM (2019)","DOI":"10.1145\/3321454.3321459"},{"key":"5_CR33","doi-asserted-by":"crossref","unstructured":"Sim, T., Nejati, H., Chua, J.: Face recognition CAPTCHA made difficult. In: Proceedings of the 23rd International Conference on World Wide Web (WWW 2014 Companion), pp. 379\u2013380. ACM (2014)","DOI":"10.1145\/2567948.2577321"},{"key":"5_CR34","doi-asserted-by":"crossref","unstructured":"Shishkin, A., Bezzubtseva, A., Fedorova, V., Drutsa, A., Gusev, G.: Text recognition using anonymous CAPTCHA answers. In: ACM Web Search and Data Mining (WSDM 2020), pp. 537\u2013545. ACM (2020)","DOI":"10.1145\/3336191.3371795"},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"Lazar, J., et al.: The SoundsRight CAPTCHA: an improved approach to audio human interaction proofs for blind users. In: ACM Conference on Human Factors in Computing Systems (CHI 2012), pp. 2267\u20132276. ACM (2012)","DOI":"10.1145\/2207676.2208385"},{"key":"5_CR36","unstructured":"Jiang, N., Tian, F.: A novel gesture-based CAPTCHA design for smart devices. In: BCS Human Computer Interaction Conference (BCS-HCI \u201813). BCS Learning & Development Ltd., Swindon, GBR, Article 49, pp. 1\u20135 (2013)"}],"container-title":["Lecture Notes in Computer Science","HCI for Cybersecurity, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-77392-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:09:10Z","timestamp":1751494150000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-77392-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030773915","9783030773922"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-77392-2_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"3 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HCII","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 July 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"hcii2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2021.hci.international\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}