{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:47:19Z","timestamp":1757620039617,"version":"3.44.0"},"publisher-location":"Cham","reference-count":84,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783032050045"},{"type":"electronic","value":"9783032050052"}],"license":[{"start":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T00:00:00Z","timestamp":1757376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T00:00:00Z","timestamp":1757376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-05005-2_3","type":"book-chapter","created":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T04:39:57Z","timestamp":1757306397000},"page":"46-68","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Investigating Natural Shoulder Surfing Behavior in the Wild: A Research Space and Case Study"],"prefix":"10.1007","author":[{"given":"Yasmeen","family":"Abdrabou","sequence":"first","affiliation":[]},{"given":"Rivu","family":"Radiah","sequence":"additional","affiliation":[]},{"given":"Alessia","family":"Fischer","sequence":"additional","affiliation":[]},{"given":"Alia","family":"Saad","sequence":"additional","affiliation":[]},{"given":"Habiba","family":"Farzand","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Knierim","sequence":"additional","affiliation":[]},{"given":"Florian","family":"Alt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,9]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","unstructured":"Abdrabou, Y., Khamis, M., Eisa, R.M., Ismael, S., Elmougy, A.: Engage: resisting shoulder surfing using novel gaze gestures authentication. In: Proc. MUM\u201917. ACM, New York (2018). https:\/\/doi.org\/10.1145\/3282894.3289741","DOI":"10.1145\/3282894.3289741"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Abdrabou, Y., Khamis, M., Eisa, R.M., Ismail, S., Elmougy, A.: Just gaze and wave: Exploring the use of gaze and gestures for shoulder-surfing resilient authentication. In: Proc. ETRA\u201919. ACM, New York (2019)","DOI":"10.1145\/3314111.3319837"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Abdrabou, Y., Omelina, T., Dietz, F., Khamis, M., Alt, F., Hassib, M.: Where do you look when unlocking your phone? a field study of gaze behaviour during smartphone unlock. In: CHI EA\u201924. ACM, New York (2024)","DOI":"10.1145\/3613905.3651094"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Abdrabou, Y., et al.: Understanding shoulder surfer behavior using virtual reality. In: Proc. VRW\u201922 (2022)","DOI":"10.1145\/3531073.3531106"},{"key":"3_CR5","doi-asserted-by":"publisher","unstructured":"Abdrabou, Y., et al.: Understanding shoulder surfer behavior and attack patterns using virtual reality. In: Proc. AVI\u201922. ACM, New York (2022). https:\/\/doi.org\/10.1145\/3531073.3531106","DOI":"10.1145\/3531073.3531106"},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Adar, E., Tan, D.S., Teevan, J.: Benevolent deception in human computer interaction. In: Proc. CHI\u201913. ACM, New York (2013)","DOI":"10.1145\/2470654.2466246"},{"key":"3_CR7","doi-asserted-by":"publisher","unstructured":"Ali, M.E., Anwar, A., Ahmed, I., Hashem, T., Kulik, L., Tanin, E.: Protecting mobile users from visual privacy attacks. In: Adj. Proc. UbiComp\u201914. ACM, New York (2014). https:\/\/doi.org\/10.1145\/2638728.2638788","DOI":"10.1145\/2638728.2638788"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Alt, F., Schneega\u00df, S., Schmidt, A., M\u00fcller, J., Memarovic, N.: How to evaluate public displays. In: Proc. PerDis \u201912. ACM, New York (2012)","DOI":"10.1145\/2307798.2307815"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Aviv, A.J., Davin, J.T., Wolf, F., Kuber, R.: Towards baselines for shoulder surfing on mobile authentication. In: Proc. ACSAC\u201917. ACM, New York (2017)","DOI":"10.1145\/3134600.3134609"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Aviv, A.J., Wolf, F., Kuber, R.: Comparing video based shoulder surfing with live simulation. In: Proc. ACSAC\u201918. ACM, New York (2018)","DOI":"10.1145\/3274694.3274702"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"B\u00e2ce, M., Saad, A., Khamis, M., Schneegass, S., Bulling, A.: Privacyscout: assessing vulnerability to shoulder surfing on mobile devices. In: Proc. PETs\u201922 (2022)","DOI":"10.56553\/popets-2022-0090"},{"key":"3_CR12","doi-asserted-by":"publisher","unstructured":"van Berkel, N., Ferreira, D., Kostakos, V.: The experience sampling method on mobile devices. ACM CSUR 50(6) (2017). https:\/\/doi.org\/10.1145\/3123988","DOI":"10.1145\/3123988"},{"key":"3_CR13","unstructured":"Bianchi, A., Oakley, I.: Multiplexed input to protect against casual observers. In: Proc. HCIK\u201915. Hanbit Media, Inc., Seoul, KOR (2014)"},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Bianchi, A., Oakley, I., Kwon, D.S.: Spinlock: A single-cue haptic and audio pin input technique for authentication. In: Haptic and Audio Interaction Design. Springer, Heidelberg (2011)","DOI":"10.1007\/978-3-642-22950-3_9"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Bianchi, A., Oakley, I., Kwon, D.S.: Counting clicks and beeps: Exploring numerosity based haptic and audio PIN entry. Interacting Comput. 24(5), July 2012","DOI":"10.1016\/j.intcom.2012.06.005"},{"issue":"1","key":"3_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10207-024-00956-3","volume":"24","author":"F Binbeshr","year":"2025","unstructured":"Binbeshr, F., Siong, K.C., Yee, L., Imam, M., Al-Saggaf, A.A., Abudaqa, A.A.: A systematic review of graphical password methods resistant to shoulder-surfing attacks. Intl. J. Inf. Secur. 24(1), 1\u201322 (2025)","journal-title":"Intl. J. Inf. Secur."},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Bostan, H., Bostan, A.: Shoulder surfing resistant graphical password schema: Randomized pass points (rpp). Multimed. Tools Appl. 82(28) (2023)","DOI":"10.1007\/s11042-023-15227-x"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Bos\u030cnjak, L., Brumen, B.: Shoulder surfing: From an experimental study to a comparative framework. IJHCS 130, 1\u201320 (2019)","DOI":"10.1016\/j.ijhcs.2019.04.003"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Bos\u030cnjak, L., Brumen, B.: Shoulder surfing experiments: A systematic literature review. Comput. Secur. 99, 102023 (2020)","DOI":"10.1016\/j.cose.2020.102023"},{"key":"3_CR20","doi-asserted-by":"publisher","unstructured":"Brudy, F., Ledo, D., Greenberg, S., Butz, A.: Is anyone looking? mitigating shoulder surfing on public displays through awareness and protection. In: Proc. PerDis\u201914. ACM, New York (2014). https:\/\/doi.org\/10.1145\/2611009.2611028","DOI":"10.1145\/2611009.2611028"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Bulling, A., Alt, F., Schmidt, A.: Increasing the security of gaze-based cued-recall graphical passwords using saliency masks. In: Proc. CHI \u201912. ACM, NY (2012)","DOI":"10.1145\/2207676.2208712"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Cheng, S., Wang, J., Sheng, D., Chen, Y.: Identification with your mind: a hybrid bci-based authentication approach for anti-shoulder-surfing attacks using eeg and eye movement data. IEEE Trans. Instrumentation Measur. 72 (2023)","DOI":"10.1109\/TIM.2023.3241081"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Chignell, M.H., Quan-Haase, A., Gwizdka, J.: The privacy attitudes questionnaire (paq): initial development and validation. In: Proc. Human Factors and Ergonomics Society Annual Meeting, vol.\u00a047. SAGE Publications (2003)","DOI":"10.1037\/e576962012-002"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Corbett, M., David-John, B., Shang, J., Ji, B.: Shouldar: Detecting shoulder surfing attacks using multimodal eye tracking and ar. Proc. ACM IMWUT 8(3), September 2024","DOI":"10.1145\/3678573"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"De\u00a0Luca, A., Denzel, M., Hussmann, H.: Look into my eyes! can you guess my password? In: Proc. SOUPS\u201909. ACM, New York (2009)","DOI":"10.1145\/1572532.1572542"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"De\u00a0Luca, A., et al.: Back-of-device authentication on smartphones. In: Proc. CHI\u201913. ACM, New York (2013)","DOI":"10.1145\/2470654.2481330"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Duchowski, A.: Eye tracking methodology: Theory and practice. Springer (2017)","DOI":"10.1007\/978-3-319-57883-5"},{"key":"3_CR28","doi-asserted-by":"crossref","unstructured":"Eiband, M., Khamis, M., Von\u00a0Zezschwitz, E., Hussmann, H., Alt, F.: Understanding shoulder surfing in the wild: stories from users and observers. In: Proc. CHI\u201917. ACM, New York (2017)","DOI":"10.1145\/3025453.3025636"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Eiband, M., von Zezschwitz, E., Buschek, D., Hu\u00dfmann, H.: My scrawl hides it all: protecting text messages against shoulder surfing with handwritten fonts. In: CHI EA\u201916. ACM, New York (2016)","DOI":"10.1145\/2851581.2892511"},{"key":"3_CR30","doi-asserted-by":"crossref","unstructured":"Fan, J., Shen, X.: New progress in the paradigm of elicited deception: application of hci in deception detection. In: Proc. ICISE-IE\u201921\u2019. IEEE (2021)","DOI":"10.1109\/ICISE-IE53922.2021.00345"},{"key":"3_CR31","doi-asserted-by":"crossref","unstructured":"Farzand, H., Bhardwaj, K., Marky, K., Khamis, M.: The interplay between personal relationships & shoulder surfing mitigation. In: MuC\u201921. ACM, NY (2021)","DOI":"10.1145\/3473856.3474006"},{"key":"3_CR32","unstructured":"Farzand, H., Marky, K., Khamis, M.: I hate when people do this; there\u2019sa lot of sensitive content for me\": a typology of perceived privacy-sensitive content in shoulder surfing scenarios. In: Proc. SOUPS\u201922 (2022)"},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Farzand, H., Marky, K., Khamis, M.: Shoulder surfing through the social lens: a longitudinal investigation & insights from an exploratory diary study. In: Proc. EuroUSEC\u201922 (2022)","DOI":"10.1145\/3549015.3554211"},{"key":"3_CR34","doi-asserted-by":"crossref","unstructured":"Farzand, H., Marky, K., Khamis, M.: Out-of-device privacy unveiled: designing and validating the out-of-device privacy scale (odps). In: Proc. CHI\u201924. ACM, New York (2024)","DOI":"10.1145\/3613904.3642623"},{"key":"3_CR35","doi-asserted-by":"crossref","unstructured":"Forget, A., Chiasson, S., Biddle, R.: Shoulder-surfing resistance with eye-gaze entry in cued-recall graphical passwords. In: Proc. CHI\u201910. ACM, NY (2010)","DOI":"10.1145\/1753326.1753491"},{"key":"3_CR36","doi-asserted-by":"crossref","unstructured":"George, C., Khamis, M., von Zezschwitz, E., Burger, M., Schmidt, H., Alt, F., Hussmann, H.: Seamless and secure vr: adapting and evaluating established authentication systems for virtual reality. In: Proc. USEC\u201917. NDSS (2017)","DOI":"10.14722\/usec.2017.23028"},{"key":"3_CR37","unstructured":"Harbach, M., Von\u00a0Zezschwitz, E., Fichtner, A., De\u00a0Luca, A., Smith, M.: $$\\{$$It\u2019s$$\\}$$ a hard lock life: a field study of smartphone (un) locking behavior and risk perception. In: Proc. SOUPS\u201914 (2014)"},{"key":"3_CR38","doi-asserted-by":"crossref","unstructured":"Henze, N., Rukzio, E., Boll, S.: 100,000,000 taps: Analysis and improvement of touch performance in the large. In: Proc. MobileHCI\u201911. ACM, NY (2011)","DOI":"10.1145\/2037373.2037395"},{"key":"3_CR39","unstructured":"Jermyn, I., Mayer, A., Monrose, F., Reiter, M., Rubin, A.: The design and analysis of graphical passwords. In: Proc. Security\u201999. USENIX, Berkeley (1999)"},{"key":"3_CR40","doi-asserted-by":"crossref","unstructured":"Katsini, C., Abdrabou, Y., Raptis, G.E., Khamis, M., Alt, F.: The role of eye gaze in security and privacy applications: survey and future hci research directions. In: Proc. CHI\u201920. ACM, New York (2020)","DOI":"10.1145\/3313831.3376840"},{"key":"3_CR41","doi-asserted-by":"crossref","unstructured":"Khamis, M., Alt, F., Hassib, M., von Zezschwitz, E., Hasholzner, R., Bulling, A.: Gazetouchpass: multimodal authentication using gaze and touch on mobile devices. In: CHI EA\u201916. ACM, New York (2016)","DOI":"10.1145\/2851581.2892314"},{"key":"3_CR42","doi-asserted-by":"crossref","unstructured":"Khamis, M., Baier, A., Henze, N., Alt, F., Bulling, A.: Understanding face and eye visibility in front-facing cameras of smartphones used in the wild. In: Proc. CHI\u201918. ACM, New York (2018)","DOI":"10.1145\/3173574.3173854"},{"key":"3_CR43","doi-asserted-by":"crossref","unstructured":"Khamis, M., Bandelow, L., Schick, S., Casadevall, D., Bulling, A., Alt, F.: They are all after you: investigating the viability of a threat model that involves multiple shoulder surfers. In: Proc. MUM\u201917. ACM, New York (2017)","DOI":"10.1145\/3152832.3152851"},{"key":"3_CR44","doi-asserted-by":"crossref","unstructured":"Khamis, M., Eiband, M., Z\u00fcrn, M., Hussmann, H.: Eyespot: Leveraging gaze to protect private text content on mobile devices from shoulder surfing. MTI (2018)","DOI":"10.3390\/mti2030045"},{"key":"3_CR45","doi-asserted-by":"crossref","unstructured":"Khamis, M., Hassib, M., Zezschwitz, E.v., Bulling, A., Alt, F.: GazeTouchPIN: protecting sensitive data on mobile devices using secure multimodal authentication. In: Proc. ICMI\u201917. ACM, New York (2017)","DOI":"10.1145\/3136755.3136809"},{"key":"3_CR46","doi-asserted-by":"crossref","unstructured":"Khan, H., Hengartner, U., Vogel, D.: Evaluating attack and defense strategies for smartphone pin shoulder surfing. In: Proc. CHI\u201918. ACM, NY (2018)","DOI":"10.1145\/3173574.3173738"},{"key":"3_CR47","volume-title":"What Does Your Gaze Reveal About You?","author":"JL Kr\u00f6ger","year":"2020","unstructured":"Kr\u00f6ger, J.L., Lutz, O.H.M., M\u00fcller, F.: What Does Your Gaze Reveal About You? On the Privacy Implications of Eye Tracking. Springer Intl. Publishing, Cham (2020)"},{"key":"3_CR48","doi-asserted-by":"crossref","unstructured":"K\u00fchn, R., Korzetz, M., Schlegel, T.: User strategies for mobile device-based interactions to prevent shoulder surfing. In: Proc. MUM\u201919. ACM, NY (2019)","DOI":"10.1145\/3365610.3368412"},{"key":"3_CR49","doi-asserted-by":"crossref","unstructured":"Kumar, M., Garfinkel, T., Boneh, D., Winograd, T.: Reducing shoulder-surfing by using gaze-based password entry. In: Proc. SOUPS\u201907. ACM, NY (2007)","DOI":"10.1145\/1280680.1280683"},{"key":"3_CR50","doi-asserted-by":"crossref","unstructured":"Land, M., Tatler, B.: Looking and acting: vision and eye movements in natural behaviour. Oxford University Press (2009)","DOI":"10.1093\/acprof:oso\/9780198570943.001.0001"},{"key":"3_CR51","doi-asserted-by":"crossref","unstructured":"Lebreton, P., Hupont, I., M\u00e4ki, T., Skodras, E., Hirth, M.: Eye tracker in the wild: studying the delta between what is said and measured in a crowdsourcing experiment. In: Proc. 4th Intl. Workshop on Crowdsourcing for Multimedia (2015)","DOI":"10.1145\/2810188.2810192"},{"key":"3_CR52","doi-asserted-by":"crossref","unstructured":"Luo, W., Lan, B., Wan, X., Liu, Z., Zeng, Y., Ma, J.: Feel vibration: Challenge-response mobile authentication with covert channel. In: Proc. ICCT\u201920 (2020)","DOI":"10.1109\/ICCT50939.2020.9295824"},{"key":"3_CR53","doi-asserted-by":"crossref","unstructured":"Marques, D., Guerreiro, T., Carri\u00e7o, L., Beschastnikh, I., Beznosov, K.: Vulnerability & blame: Making sense of unauthorized access to smartphones. In: Proc. CHI\u201919. ACM, New York (2019)","DOI":"10.1145\/3290605.3300819"},{"key":"3_CR54","unstructured":"Marques, D., Muslukhov, I., Guerreiro, T., Carri\u00e7o, L., Beznosov, K.: Snooping on mobile phones: prevalence and trends. In: Proc. SOUPS\u201916. USENIX Association, Denver, CO, June 2016"},{"issue":"4","key":"3_CR55","doi-asserted-by":"publisher","first-page":"710","DOI":"10.1007\/s10015-023-00890-y","volume":"28","author":"R Masuzawa","year":"2023","unstructured":"Masuzawa, R., Aburada, K., Yamaba, H., Katayama, T., Okazaki, N.: Development of keypads which use colors or shapes to prevent shoulder surfing. Artif. Life Robot. 28(4), 710\u2013717 (2023)","journal-title":"Artif. Life Robot."},{"key":"3_CR56","doi-asserted-by":"crossref","unstructured":"Mathis, F., O\u2019Hagan, J., Khamis, M., Vaniea, K.: Virtual reality observations: using virtual reality to augment lab-based shoulder surfing research. In: IEEE Conference on Virtual Reality and 3D User Interfaces (2021)","DOI":"10.1109\/VR51125.2022.00048"},{"key":"3_CR57","doi-asserted-by":"crossref","unstructured":"Mathis, F., O\u2019Hagan, J., Vaniea, K., Khamis, M.: Stay home! conducting remote usability evaluations of novel real-world authentication systems using virtual reality. In: Proc. AVI\u201922. ACM, New York (2022)","DOI":"10.1145\/3531073.3531087"},{"key":"3_CR58","doi-asserted-by":"crossref","unstructured":"Mathis, F., O\u2019Hagan, J., Khamis, M., Vaniea, K.: Virtual reality observations: Using vr to augment lab-based shoulder surfing research. In: IEEE VR\u201922 (2022)","DOI":"10.1109\/VR51125.2022.00048"},{"key":"3_CR59","doi-asserted-by":"crossref","unstructured":"Mathis, F., Vaniea, K., Khamis, M.: Can i borrow your atm? using virtual reality for (simulated) in situ authentication research. In: IEEE VR\u201922 (2022)","DOI":"10.1109\/VR51125.2022.00049"},{"key":"3_CR60","doi-asserted-by":"crossref","unstructured":"Mathis, F., Williamson, J., Vaniea, K., Khamis, M.: Rubikauth: fast and secure authentication in virtual reality. In: CHI EA\u201920. ACM, New York (2020)","DOI":"10.1145\/3334480.3382827"},{"key":"3_CR61","doi-asserted-by":"crossref","unstructured":"M\u00fcller, J., Walter, R., Bailly, G., Nischt, M., Alt, F.: Looking glass: A field study on noticing interactivity of a shop window. In: Proc. CHI\u201912. ACM, NY (2012)","DOI":"10.1145\/2212776.2212488"},{"key":"3_CR62","doi-asserted-by":"publisher","unstructured":"Muslukhov, I., Boshmaf, Y., Kuo, C., Lester, J., Beznosov, K.: Know your enemy: the risk of unauthorized access in smartphones by insiders. In: Proc. MobileHCI\u201913. ACM, New York (2013). https:\/\/doi.org\/10.1145\/2493190.2493223","DOI":"10.1145\/2493190.2493223"},{"issue":"1","key":"3_CR63","doi-asserted-by":"publisher","DOI":"10.2196\/22488","volume":"9","author":"W Peng","year":"2021","unstructured":"Peng, W., Li, L., Kononova, A., Cotten, S., Kamp, K., Bowen, M., et al.: Habit formation in wearable activity tracker use among older adults: qualitative study. JMIR Mhealth Uhealth 9(1), e22488 (2021)","journal-title":"JMIR Mhealth Uhealth"},{"key":"3_CR64","doi-asserted-by":"crossref","unstructured":"Pires, D., et\u00a0al.: Effect of wearing a novel electronic wearable device on hand hygiene compliance among health care workers: a stepped-wedge cluster randomized clinical trial. JAMA Network Open 4(2) (2021)","DOI":"10.1001\/jamanetworkopen.2020.35331"},{"key":"3_CR65","doi-asserted-by":"crossref","unstructured":"Ragozin, K., Pai, Y.S., Augereau, O., Kise, K., Kerdels, J., Kunze, K.: Private reader: Using eye tracking to improve reading privacy in public spaces. In: Proc. MobileHCI\u201919. ACM, New York (2019)","DOI":"10.1145\/3338286.3340129"},{"key":"3_CR66","doi-asserted-by":"crossref","unstructured":"Rajanna, V., Malla, A.H., Bhagat, R.A., Hammond, T.: Dygazepass: A gaze gesture-based dynamic authentication system to counter shoulder surfing and video analysis attacks. In: Proc. ISBA\u201918\u2019 (2018)","DOI":"10.1109\/ISBA.2018.8311458"},{"key":"3_CR67","doi-asserted-by":"crossref","unstructured":"Rajanna, V., Polsley, S., Taele, P., Hammond, T.: A gaze gesture-based user authentication system to counter shoulder-surfing attacks. In: CHI EA \u201917. ACM, New York (2017)","DOI":"10.1145\/3027063.3053070"},{"key":"3_CR68","unstructured":"Redmon, J., Farhadi, A.: Yolov3: an incremental improvement. arXiv (2018)"},{"key":"3_CR69","doi-asserted-by":"crossref","unstructured":"Riyadh, H., Bhardwaj, D., Dabrowski, A., Krombholz, K.: Usable authentication in virtual reality: exploring the usability of pins and gestures. In: Intl. Conf. on Applied Cryptography and Network Security. Springer (2024)","DOI":"10.1007\/978-3-031-54776-8_16"},{"key":"3_CR70","doi-asserted-by":"crossref","unstructured":"Saad, A., Chukwu, M., Schneegass, S.: Communicating shoulder surfing attacks to users. In: Proc. MUM\u201917. ACM, New York (2018)","DOI":"10.1145\/3282894.3282919"},{"key":"3_CR71","doi-asserted-by":"crossref","unstructured":"Saad, A., Elkafrawy, D.H., Abdennadher, S., Schneegass, S.: Are they actually looking? identifying smartphones shoulder surfing through gaze estimation. In: Adj. Proc. ETRA \u201920. ACM, New York (2020)","DOI":"10.1145\/3379157.3391422"},{"key":"3_CR72","doi-asserted-by":"crossref","unstructured":"Saad, A., Liebers, J., Gruenefeld, U., Alt, F., Schneegass, S.: Understanding bystanders\u2019 tendency to shoulder surf smartphones using 360-degree videos in virtual reality. In: Proc. MobileHCI\u201921. ACM, New York (2021)","DOI":"10.1145\/3447526.3472058"},{"key":"3_CR73","doi-asserted-by":"crossref","unstructured":"Saad, A., Liebers, J., Schneegass, S., Gruenefeld, U.: \u201cThey see me scrollin\u201d-lessons learned from investigating shoulder surfing behavior and attack mitigation strategies. In: Human Factors in Privacy Research, pp. 199\u2013218. Springer (2023)","DOI":"10.1007\/978-3-031-28643-8_10"},{"key":"3_CR74","doi-asserted-by":"crossref","unstructured":"Salvucci, D.D., Goldberg, J.H.: Identifying fixations and saccades in eye-tracking protocols. In: Proc. ETRA\u201900. ACM, New York (2000)","DOI":"10.1145\/355017.355028"},{"key":"3_CR75","doi-asserted-by":"publisher","DOI":"10.1145\/3546742","volume-title":"An investigation of shoulder surfing attacks on touch-based unlock events","author":"S Schneega\u00df","year":"2022","unstructured":"Schneega\u00df, S., Saad, A., Heger, R., Delgado, S., Poguntke, R., Alt, F.: An investigation of shoulder surfing attacks on touch-based unlock events. Proc, ACM HCI (2022)"},{"key":"3_CR76","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.jrp.2017.02.004","volume":"68","author":"CJ Soto","year":"2017","unstructured":"Soto, C.J., John, O.P.: Short and extra-short forms of the big five inventory-2: The bfi-2-s and bfi-2-xs. J. Res. Pers. 68, 69\u201381 (2017)","journal-title":"J. Res. Pers."},{"key":"3_CR77","unstructured":"Tang, B.J., Shin, K.G.: Eye-Shield: Real-Time protection of mobile device screen information from shoulder surfing. In: Proc. USENIX Security\u201923 (2023)"},{"key":"3_CR78","doi-asserted-by":"crossref","unstructured":"Varma, M., Watson, S., Chan, L., Peiris, R.: Vibroauth: Authentication with haptics based non-visual, rearranged keypads to mitigate shoulder surfing attacks. In: HCI for Cybersecurity, Privacy and Trust. Springer Intl. Publishing, Cham (2022)","DOI":"10.1007\/978-3-031-05563-8_19"},{"key":"3_CR79","doi-asserted-by":"crossref","unstructured":"Wiese, O., Roth, V.: See you next time: a model for modern shoulder surfers. In: Proc. MobileHCI\u201916. ACM, New York (2016)","DOI":"10.1145\/2935334.2935388"},{"key":"3_CR80","doi-asserted-by":"crossref","unstructured":"Zakaria, N.H., Griffiths, D., Brostoff, S., Yan, J.: Shoulder surfing defence for recall-based graphical passwords. In: Proc. SOUPS\u201911. ACM, New York (2011)","DOI":"10.1145\/2078827.2078835"},{"key":"3_CR81","doi-asserted-by":"publisher","unstructured":"von Zezschwitz, E., Ebbinghaus, S., Hussmann, H., De\u00a0Luca, A.: You can\u2019t watch this! privacy-respectful photo browsing on smartphones. In: Proc. CHI\u201916. ACM, New York (2016). https:\/\/doi.org\/10.1145\/2858036.2858120","DOI":"10.1145\/2858036.2858120"},{"key":"3_CR82","doi-asserted-by":"crossref","unstructured":"Zhou, H., Ferreira, V., Alves, T., Hawkey, K., Reilly, D.: Somebody is peeking! a proximity and privacy aware tablet interface. In: CHI EA\u201915. ACM, NY (2015)","DOI":"10.1145\/2702613.2732726"},{"key":"3_CR83","doi-asserted-by":"crossref","unstructured":"Zhou, H., et al.: Enhancing mobile content privacy with proxemics aware notifications and protection. In: Proc. CHI\u201916. ACM, New York (2016)","DOI":"10.1145\/2858036.2858232"},{"key":"3_CR84","doi-asserted-by":"crossref","unstructured":"Zurita, B., Bosque, S., Fuertes, W., Macas, M.: Social engineering shoulder surfing attacks (ssas): A literature review. lessons, challenges, and future directions. In: Intl. Conf. on Advanced Research in Technologies, Information, Innovation and Sustainability. Springer (2023)","DOI":"10.1007\/978-3-031-48855-9_17"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-05005-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T04:40:47Z","timestamp":1757306447000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-05005-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,9]]},"ISBN":["9783032050045","9783032050052"],"references-count":84,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-05005-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025,9,9]]},"assertion":[{"value":"9 September 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTERACT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Belo Horizonte","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brazil","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"interact2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifip-tc13.org\/interact2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}