{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T20:58:15Z","timestamp":1760043495284},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319248578"},{"type":"electronic","value":"9783319248585"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-24858-5_17","type":"book-chapter","created":{"date-parts":[[2015,9,19]],"date-time":"2015-09-19T09:09:52Z","timestamp":1442653792000},"page":"265-273","source":"Crossref","is-referenced-by-count":10,"title":["A Socio-Technical Investigation into Smartphone Security"],"prefix":"10.1007","author":[{"given":"Melanie","family":"Volkamer","sequence":"first","affiliation":[]},{"given":"Karen","family":"Renaud","sequence":"additional","affiliation":[]},{"given":"Oksana","family":"Kulyk","sequence":"additional","affiliation":[]},{"given":"Sinem","family":"Emer\u00f6z","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,9]]},"reference":[{"issue":"3","key":"17_CR1","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.cose.2008.11.001","volume":"28","author":"RA Botha","year":"2009","unstructured":"Botha, R.A., Furnell, S.M., Clarke, N.L.: From desktop to mobile: examining the security experience. Comput. Secur. 28(3), 130\u2013137 (2009)","journal-title":"Comput. Secur."},{"issue":"2977","key":"17_CR2","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/S0262-4079(14)61354-3","volume":"223","author":"M Campbell","year":"2014","unstructured":"Campbell, M.: Phone invaders. New Sci. 223(2977), 32\u201335 (2014)","journal-title":"New Sci."},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1007\/978-3-319-11851-2_14","volume-title":"Security and Trust Management","author":"G Canova","year":"2014","unstructured":"Canova, G., Volkamer, M., Bergmann, C., Borza, R.: NoPhish: an anti-phishing education app. In: Mauw, S., Jensen, C.D. (eds.) STM 2014. LNCS, vol. 8743, pp. 188\u2013192. Springer, Heidelberg (2014)"},{"key":"17_CR4","unstructured":"Clark, S., Goodspeed, T., Metzger, P., Wasserman, Z., Xu, K., Blaze, M.: Why (special agent) johnny (still) can\u2019t encrypt: a security analysis of the APCO project 25 two-way radio system. In: USENIX Security Symposium (2011)"},{"issue":"1","key":"17_CR5","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1111\/j.1083-6101.2009.01494.x","volume":"15","author":"B Debatin","year":"2009","unstructured":"Debatin, B., Lovejoy, J.P., Horn, A.K., Hughes, B.N.: Facebook and online privacy: attitudes, behaviors, and unintended consequences. J. Comput. Mediat. Commun. 15(1), 83\u2013108 (2009)","journal-title":"J. Comput. Mediat. Commun."},{"key":"17_CR6","unstructured":"Bursztein, E.: Survey: most people don\u2019t lock their android phones - but should (2014). \n                      https:\/\/www.elie.net\/blog\/survey-most-people-dont-lock-their-android-phones-but-should"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Egelman, S., Wagner, D.: I\u2019ve got 99 problems, but vibration ain\u2019t one: a survey of smartphone users\u2019 concerns. In: 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices, pp. 33\u201344. ACM (2012)","DOI":"10.1145\/2381934.2381943"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1007\/978-3-319-07620-1_27","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"A Ferreira","year":"2014","unstructured":"Ferreira, A., Huynen, J.-L., Koenig, V., Lenzini, G.: Socio-technical security analysis of wireless hotspots. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 306\u2013317. Springer, Heidelberg (2014)"},{"issue":"1","key":"17_CR9","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1361-3723(07)70006-4","volume":"2007","author":"S Furnell","year":"2007","unstructured":"Furnell, S., Evangelatos, K.: Public awareness and perceptions of biometrics. Comput. Fraud Secur. 2007(1), 8\u201313 (2007)","journal-title":"Comput. Fraud Secur."},{"key":"17_CR10","doi-asserted-by":"crossref","unstructured":"Gaw, S., Felten, E.W., Fernandez-Kelly, P.: Secrecy, flagging, and paranoia: adoption criteria in encrypted email. In: SIGCHI Conference on Human Factors in Computing Systems, CHI 2006, pp. 591\u2013600 (2006)","DOI":"10.1145\/1124772.1124862"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-39077-7_13","volume-title":"Privacy Enhancing Technologies","author":"M Harbach","year":"2013","unstructured":"Harbach, M., Fahl, S., Rieger, M., Smith, M.: On the acceptance of privacy-preserving authentication technology: the curious case of national identity cards. In: De Cristofaro, E., Wright, M. (eds.) PETS 2013. LNCS, vol. 7981, pp. 245\u2013264. Springer, Heidelberg (2013)"},{"key":"17_CR12","unstructured":"Harbach, M., Hettig, M., Weber, S., Smith, M.: Using personal examples to improve risk communication for security & privacy decisions. In: 32nd Annual ACM Conference on Human Factors in Computing Systems, CHI 2014, pp. 2647\u20132656. ACM (2014). \n                      http:\/\/doi.acm.org\/10.1145\/2556288.2556978"},{"key":"17_CR13","unstructured":"Harbach, M., von Zezschwitz, E., Fichtner, A., De Luca, A., Smith, M.: It\u2019s a hard lock life: a field study of smartphone (un) locking behavior and risk perception. In: Symposium on Usable Privacy and Security (SOUPS) (2014)"},{"issue":"2","key":"17_CR14","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1016\/j.dss.2009.02.005","volume":"47","author":"T Herath","year":"2009","unstructured":"Herath, T., Rao, H.R.: Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness. Decis. Support Syst. 47(2), 154\u2013165 (2009)","journal-title":"Decis. Support Syst."},{"key":"17_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1007\/978-3-642-34638-5_6","volume-title":"Financial Cryptography and Data Security","author":"PG Kelley","year":"2012","unstructured":"Kelley, P.G., Consolvo, S., Cranor, L.F., Jung, J., Sadeh, N., Wetherall, D.: A conundrum of permissions: installing applications on an android smartphone. In: Blyth, J., Dietrich, S., Camp, L.J. (eds.) FC 2012. LNCS, vol. 7398, pp. 68\u201379. Springer, Heidelberg (2012)"},{"key":"17_CR16","unstructured":"Lazou, A., Weir, G.R.: Perceived risk and sensitive data on mobile devices. In: Cyberforensics, pp. 183\u2013196. University of Strathclyde (2011)"},{"key":"17_CR17","unstructured":"Lin, J., Amini, S., Hong, J.I., Sadeh, N., Lindqvist, J., Zhang, J.: Expectation and purpose: understanding users\u2019 mental models of mobile app privacy through crowdsourcing. In: ACM Conference on Ubiquitous Computing, UbiComp 2012, pp. 501\u2013510. ACM (2012). \n                      http:\/\/doi.acm.org\/10.1145\/2370216.2370290"},{"issue":"1","key":"17_CR18","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/6294.899930","volume":"3","author":"S Liu","year":"2001","unstructured":"Liu, S., Silverman, M.: A practical guide to biometric security technology. IT Prof. 3(1), 27\u201332 (2001)","journal-title":"IT Prof."},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Muslukhov, I., Boshmaf, Y., Kuo, C., Lester, J., Beznosov, K.: Understanding users\u2019 requirements for data protection in smartphones. In: Data Engineering Workshops (ICDEW), pp. 228\u2013235. IEEE (2012)","DOI":"10.1109\/ICDEW.2012.83"},{"key":"17_CR20","unstructured":"Mylonas, A.: Security and privacy in the smartphones ecosystem. Technical report. AUEB-CIS\/REV-0313, Athens University of Economics and Business (2013)"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Ophoff, J., Robinson, M.: Exploring end-user smartphone security awareness within a South African context. In: Information Security for South Africa (ISSA 2014), pp. 1\u20137. IEEE (2014)","DOI":"10.1109\/ISSA.2014.6950500"},{"issue":"23","key":"17_CR22","first-page":"19133","volume":"9","author":"D Pramod","year":"2014","unstructured":"Pramod, D., Raman, R.: A study on the user perception and awareness of smartphone security. Int. J. Appl. Eng. Res. ISSN 9(23), 19133\u201319144 (2014)","journal-title":"Int. J. Appl. Eng. Res. ISSN"},{"key":"17_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1007\/978-3-319-08506-7_13","volume-title":"Privacy Enhancing Technologies","author":"K Renaud","year":"2014","unstructured":"Renaud, K., Volkamer, M., Renkema-Padmos, A.: Why doesn\u2019t jane protect her privacy? In: De Cristofaro, E., Murdoch, S.J. (eds.) PETS 2014. LNCS, vol. 8555, pp. 244\u2013262. Springer, Heidelberg (2014)"},{"key":"17_CR24","unstructured":"Sasse, M.A., Flechais, I.: Usable security: what is it? how do we get it?. In: Security and usability: designing secure systems that people can use. pp. 13\u201330. O\u2019Reilly Books (2005)"},{"issue":"3","key":"17_CR25","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1109\/MSECP.2003.1203228","volume":"1","author":"SW Smith","year":"2003","unstructured":"Smith, S.W.: Humans in the loop: human-computer interaction and security. IEEE Secur. Priv. 1(3), 75\u201379 (2003)","journal-title":"IEEE Secur. Priv."},{"key":"17_CR26","first-page":"745","volume":"44","author":"DJ Solove","year":"2007","unstructured":"Solove, D.J.: \u201cI\u2019ve got nothing to hide\u201d and other misunderstandings of privacy. San Diego law Rev. 44, 745 (2007)","journal-title":"San Diego law Rev."},{"key":"17_CR27","doi-asserted-by":"crossref","unstructured":"Wash, R.: Folk models of home computer security. In: Proceedings of the Sixth Symposium on Usable Privacy and Security, p. 11. ACM, Redmond, WA (2010)","DOI":"10.1145\/1837110.1837125"},{"key":"17_CR28","unstructured":"Whitten, A., Tygar, J.D.: Why Johnny can\u2019t encrypt: a usability evaluation of PGP 5.0. In: 8th USENIX Security Symposium, SSYM 1999, vol. 8, pp. 169\u2013184 (1999)"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-24858-5_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T20:37:38Z","timestamp":1559248658000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-24858-5_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319248578","9783319248585"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-24858-5_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}