{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:07:11Z","timestamp":1742918831093,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_26","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"287-298","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Exploring the Adoption of Physical Security Controls in Smartphones"],"prefix":"10.1007","author":[{"given":"Nasser O.","family":"Alshammari","sequence":"first","affiliation":[]},{"given":"Alexios","family":"Mylonas","sequence":"additional","affiliation":[]},{"given":"Mohamed","family":"Sedky","sequence":"additional","affiliation":[]},{"given":"Justin","family":"Champion","sequence":"additional","affiliation":[]},{"given":"Carolin","family":"Bauer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"26_CR1","unstructured":"App Lock. \n                      http:\/\/www.domobile.com"},{"key":"26_CR2","unstructured":"iApp Lock. \n                      http:\/\/iapplock.thinkyeah.com\/"},{"key":"26_CR3","unstructured":"Apple: iOS Security Guide. Technical report, October 2014"},{"key":"26_CR4","unstructured":"London Smartphone Theft Drops. \n                      http:\/\/www.theguardian.com\/technology\/2015\/feb\/11\/london-smartphone-theft-drops-after-kill-switch-introduction-iphones\/"},{"key":"26_CR5","unstructured":"Phone Theft In America. \n                      https:\/\/www.lookout.com\/resources\/reports\/phone-theft-in-america\/"},{"key":"26_CR6","unstructured":"Sales of Smartphones Grew 20 Percent in Third Quarter of 2014. \n                      http:\/\/www.gartner.com\/newsroom\/id\/2944819"},{"key":"26_CR7","unstructured":"Spoofing Fingerprints. \n                      https:\/\/srlabs.de\/spoofing-fingerprints"},{"key":"26_CR8","unstructured":"Symantec Smartphone Honey Stick Project. \n                      http:\/\/www.symantec.com\/connect\/blogs\/introducing-symantec-smartphone-honey-stick-project"},{"key":"26_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/978-3-319-07620-1_11","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"P Andriotis","year":"2014","unstructured":"Andriotis, P., Tryfonas, T., Oikonomou, G.: Complexity metrics and user strength perceptions of the pattern-lock graphical authentication method. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 115\u2013126. Springer, Heidelberg (2014)"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Andriotis, P., Tryfonas, T., Oikonomou, G., Yildiz, C.: A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks - WiSec 2013, Association for Computing Machinery, pp. 1\u20136. ACM, New York (2013)","DOI":"10.1145\/2462096.2462098"},{"key":"26_CR11","first-page":"1","volume":"10","author":"AJ Aviv","year":"2010","unstructured":"Aviv, A.J., Gibson, K., Mossop, E., Blaze, M., Smith, J.M.: Smudge attacks on smartphone touch screens. WOOT 10, 1\u20137 (2010)","journal-title":"WOOT"},{"key":"26_CR12","unstructured":"Bonneau, J.: The science of guessing: analyzing an anonymized corpus of 70 million\npasswords. In: 2012 IEEE Symposium on Security and Privacy, pp. 538\u2013552. Institute\nof Electrical & Electronics Engineers (IEEE) (2012). \n                      http:\/\/ieeexplore.ieee.org\/xpls\/abs_all.jsp?arnumber=6234435"},{"key":"26_CR13","unstructured":"Botelho, B.A.P., Nakamura, E.T., Uto, N.: Implementation of tools for brute forcing touch inputted passwords. In: 2012 International Conference for Internet Technology and Secured Transactions, pp. 807\u2013808. IEEE, New Yok (2012)"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A.P., Sekar, V., Wagner, D.: Measuring user confidence in smartphone security and privacy. In: Proceedings of the Eighth Symposium on Usable Privacy and Security - SOUPS 2012. Association for Computing Machinery (ACM), New York (2012)","DOI":"10.1145\/2335356.2335358"},{"issue":"4","key":"26_CR15","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1145\/219282.219298","volume":"29","author":"Y Ding","year":"1995","unstructured":"Ding, Y., Horster, P.: Undetectable on-line password guessing attacks. SIGOPS Oper. Syst. Rev. 29(4), 77\u201386 (1995)","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"26_CR16","unstructured":"Harbach, M., von Zezschwitz, E., Fichtner, A., De Luca, A., Smith, M.: It\u2019s a hard lock life: a field study of smartphone (un) locking behavior and risk perception. In: Symposium on Usable Privacy and Security (SOUPS), pp. 9\u201311 (2014)"},{"key":"26_CR17","unstructured":"Kraus, L., Wechsung, I., M\u00f6ller, S.: A comparison of privacy and security knowledge and privacy concern as influencing factors for mobile protection behavior. In: Workshop on Privacy Personas and Segmentation (PPS) (2014)"},{"key":"26_CR18","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-642-40343-9_15","volume-title":"International Conference on Trust, Privacy & Security in Digital Business (LNCS)","author":"A Mylonas","year":"2013","unstructured":"Mylonas, A., Gritzalis, D., Tsoumas, B., Apostolopoulos, T.: A Qualitative metrics vector for the awareness of smartphone security users. In: Furnell, S., Lambrinoudakis, C., Lopez, J. (eds.) International Conference on Trust, Privacy & Security in Digital Business (LNCS), pp. 173\u2013184. Springer, Heidelberg (2013)"},{"key":"26_CR19","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.cose.2012.11.004","volume":"34","author":"A Mylonas","year":"2013","unstructured":"Mylonas, A., Kastania, A., Gritzalis, D.: Delegate the smartphone user? security awareness in smartphone platforms. Comput. Secur. 34, 47\u201366 (2013)","journal-title":"Comput. Secur."},{"key":"26_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/978-3-319-07076-6_2","volume-title":"Risk Assessment and Risk-Driven Testing","author":"A Mylonas","year":"2014","unstructured":"Mylonas, A., Theoharidou, M., Gritzalis, D.: Assessing privacy risks in android: a user-centric approach. In: Bauer, T., Gro\u00dfmann, J., Seehusen, F., St\u00f8len, K., Wendland, M.-F. (eds.) RISK 2013. LNCS, vol. 8418, pp. 21\u201337. Springer, Heidelberg (2014)"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Tari, F., Ozok, A.A., Holden, S.H.: A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. In: Proceedings of the Second Symposium on Usable Privacy and Security - SOUPS 2006, pp. 56\u201366. Association for Computing Machinery (ACM) (2006)","DOI":"10.1145\/1143120.1143128"},{"key":"26_CR22","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/978-3-642-30436-1_36","volume-title":"Information Security and Privacy Research","author":"M Theoharidou","year":"2012","unstructured":"Theoharidou, M., Mylonas, A., Gritzalis, D.: A risk assessment method for smartphones. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IFIP AICT, vol. 376, pp. 443\u2013456. Springer, Heidelberg (2012)"},{"key":"26_CR23","doi-asserted-by":"crossref","unstructured":"Uellenbeck, S., D\u00fcrmuth, M., Wolf, C., Holz, T.: Quantifying the security of graphical passwords. In: Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security - CCS 2013, pp. 161\u2013172. ACM (2013)","DOI":"10.1145\/2508859.2516700"},{"key":"26_CR24","doi-asserted-by":"crossref","unstructured":"Yu, X., Wang, Z., Sun, K., Zhu, W.T., Gao, N., Jing, J.: Remotely wiping sensitive data on stolen smartphones. In: Proceedings of the 9th ACM Symposium on Information Computer and Communications Security - ASIA CCS 2014, pp. 537\u2013542. ACM (2014)","DOI":"10.1145\/2590296.2590318"},{"key":"26_CR25","doi-asserted-by":"crossref","unstructured":"Zakaria, N.H., Griffiths, D., Brostoff, S., Yan, J.: Shoulder surfing defence for recall-based graphical passwords. In: Proceedings of the Seventh Symposium on Usable Privacy and Security - SOUPS 2011, ACM (2011)","DOI":"10.1145\/2078827.2078835"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:18:12Z","timestamp":1583507892000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}