{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,9]],"date-time":"2025-05-09T12:28:42Z","timestamp":1746793722139,"version":"3.40.3"},"publisher-location":"Cham","reference-count":59,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319680583"},{"type":"electronic","value":"9783319680590"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68059-0_1","type":"book-chapter","created":{"date-parts":[[2017,9,20]],"date-time":"2017-09-20T12:54:10Z","timestamp":1505912050000},"page":"3-22","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Coping with Accessibility Challenges for Security - A User Study with Blind Smartphone Users"],"prefix":"10.1007","author":[{"given":"Sylvan","family":"Lobo","sequence":"first","affiliation":[]},{"given":"Ulemba","family":"Hirom","sequence":"additional","affiliation":[]},{"given":"V. S.","family":"Shyama","sequence":"additional","affiliation":[]},{"given":"Mridul","family":"Basumatori","sequence":"additional","affiliation":[]},{"given":"Pankaj","family":"Doke","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,21]]},"reference":[{"key":"1_CR1","unstructured":"India Ericsson Mobility Report June 2016. https:\/\/www.ericsson.com\/assets\/local\/mobility-report\/documents\/2016\/india-ericsson-mobility-report-june-2016.pdf"},{"key":"1_CR2","doi-asserted-by":"publisher","first-page":"53","DOI":"10.3109\/01658107.2013.874448","volume":"38","author":"D Irvine","year":"2014","unstructured":"Irvine, D., Zemke, A., Pusateri, G., Gerlach, L., Chun, R., Jay, W.M.: Tablet and smartphone accessibility features in the low vision rehabilitation. Neuro-Ophthalmol. 38, 53 (2014)","journal-title":"Neuro-Ophthalmol."},{"key":"1_CR3","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.ergon.2016.07.002","volume":"55","author":"HK Kim","year":"2016","unstructured":"Kim, H.K., Han, S.H., Park, J., Park, J.: The interaction experiences of visually impaired people with assistive technology: a case study of smartphones. Int. J. Ind. Ergon. 55, 22\u201333 (2016)","journal-title":"Int. J. Ind. Ergon."},{"key":"1_CR4","doi-asserted-by":"publisher","first-page":"163","DOI":"10.3109\/08820538.2015.1045151","volume":"32","author":"JL Robinson","year":"2017","unstructured":"Robinson, J.L., Avery, V.B., Chun, R., Pusateri, G., Jay, W.M.: Usage of accessibility options for the iPhone and iPad in a visually impaired population. Semin. Ophthalmol. 32, 163\u2013171 (2017)","journal-title":"Semin. Ophthalmol."},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Abdolrahmani, A., Kuber, R., Hurst, A.: An empirical investigation of the situationally-induced impairments experienced by blind mobile device users. In: Proceedings of the 13th Web for All Conference, pp. 21:1\u201321:8. ACM, New York (2016)","DOI":"10.1145\/2899475.2899482"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Azenkot, S., Rector, K., Ladner, R., Wobbrock, J.: PassChords: secure multi-touch authentication for blind people. In: Proceedings of the 14th International ACM SIGACCESS Conference on Computers and Accessibility, pp. 159\u2013166. ACM, New York (2012)","DOI":"10.1145\/2384916.2384945"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Kane, S.K., Jayant, C., Wobbrock, J.O., Ladner, R.E.: Freedom to roam: a study of mobile device adoption and accessibility for people with visual and motor disabilities. In: Proceedings of the 11th International ACM SIGACCESS Conference on Computers and Accessibility, pp. 115\u2013122. ACM (2009)","DOI":"10.1145\/1639642.1639663"},{"key":"1_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/978-3-642-31534-3_89","volume-title":"Computers Helping People with Special Needs","author":"S Chiti","year":"2012","unstructured":"Chiti, S., Leporini, B.: Accessibility of android-based mobile devices: a prototype to investigate interaction with blind users. In: Miesenberger, K., Karshmer, A., Penaz, P., Zagler, W. (eds.) ICCHP 2012. LNCS, vol. 7383, pp. 607\u2013614. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-31534-3_89"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Leporini, B., Buzzi, M.C., Buzzi, M.: Interacting with mobile devices via VoiceOver: usability and accessibility issues. In: Proceedings of the 24th Australian Computer-Human Interaction Conference, pp. 339\u2013348. ACM (2012)","DOI":"10.1145\/2414536.2414591"},{"key":"1_CR10","unstructured":"WHO: Global Data on Visual Impairments (2010). http:\/\/www.who.int\/blindness\/GLOBALDATAFINALforweb.pdf"},{"key":"1_CR11","unstructured":"Office of the Registrar General & Census Commissioner, India: CENSUS OF INDIA 2011 DATA ON DISABILITY. http:\/\/www.languageinindia.com\/jan2014\/disabilityinindia2011data.pdf"},{"key":"1_CR12","unstructured":"IDA - India: Cataract Blindness Control Project. http:\/\/web.worldbank.org\/WBSITE\/EXTERNAL\/EXTABOUTUS\/IDA\/0,contentMDK:21917842~menuPK:4752068~pagePK:51236175~piPK:437394~theSitePK:73154,00.html"},{"key":"1_CR13","unstructured":"Key Definitions of Statistical Terms - American Foundation for the Blind. http:\/\/www.afb.org\/info\/blindness-statistics\/key-definitions-of-statistical-terms\/25"},{"key":"1_CR14","unstructured":"Data on Disability, Disabled Population by type of Disability, Age and Sex - C20 Table (India & States\/UTs - District Level). http:\/\/www.censusindia.gov.in\/2011census\/Disability_Data\/India\/C_20-India.xls"},{"key":"1_CR15","doi-asserted-by":"crossref","unstructured":"Chin, E., Felt, A.P., Sekar, V., Wagner, D.: Measuring user confidence in smartphone security and privacy. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, p. 1. ACM (2012)","DOI":"10.1145\/2335356.2335358"},{"key":"1_CR16","doi-asserted-by":"crossref","unstructured":"Egelman, S., Jain, S., Portnoff, R.S., Liao, K., Consolvo, S., Wagner, D.: Are you ready to lock? In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 750\u2013761. ACM Press (2014)","DOI":"10.1145\/2660267.2660273"},{"key":"1_CR17","first-page":"28","volume":"19","author":"FA Inan","year":"2016","unstructured":"Inan, F.A., Namin, A.S., Pogrund, R.L., Jones, K.S.: Internet use and cybersecurity concerns of individuals with visual impairments. J. Educ. Technol. Soc. 19, 28\u201340 (2016)","journal-title":"J. Educ. Technol. Soc."},{"key":"1_CR18","doi-asserted-by":"crossref","unstructured":"Karlson, A.K., Brush, A.J., Schechter, S.: Can i borrow your phone?: understanding concerns when sharing mobile phones. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1647\u20131650. ACM (2009)","DOI":"10.1145\/1518701.1518953"},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Muslukhov, I., Boshmaf, Y., Kuo, C., Lester, J., Beznosov, K.: Understanding users\u2019 requirements for data protection in smartphones. In: 2012 IEEE 28th International Conference on Data Engineering Workshops (ICDEW), pp. 228\u2013235. IEEE (2012)","DOI":"10.1109\/ICDEW.2012.83"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Muslukhov, I., Boshmaf, Y., Kuo, C., Lester, J., Beznosov, K.: Know your enemy: the risk of unauthorized access in smartphones by insiders. In: Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, pp. 271\u2013280. ACM (2013)","DOI":"10.1145\/2493190.2493223"},{"key":"1_CR21","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1016\/j.cose.2012.11.004","volume":"34","author":"A Mylonas","year":"2013","unstructured":"Mylonas, A., Kastania, A., Gritzalis, D.: Delegate the smartphone user? security awareness in smartphone platforms. Comput. Secur. 34, 47\u201366 (2013)","journal-title":"Comput. Secur."},{"key":"1_CR22","first-page":"9","volume":"2014","author":"F Tchakount\u00e9","year":"2014","unstructured":"Tchakount\u00e9, F., Dayang, P., Nlong, J., Check, N.: Understanding of the behaviour of android smartphone users in cameroon: application of the security. Open J. Inf. Secur. Appl. 2014, 9\u201320 (2014)","journal-title":"Open J. Inf. Secur. Appl."},{"key":"1_CR23","doi-asserted-by":"crossref","unstructured":"Ahmed, T., Hoyle, R., Connelly, K., Crandall, D., Kapadia, A.: Privacy concerns and behaviors of people with visual impairments. In: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp. 3523\u20133532. ACM (2015)","DOI":"10.1145\/2702123.2702334"},{"key":"1_CR24","first-page":"760","volume":"8","author":"A Ashraf","year":"2014","unstructured":"Ashraf, A., Raza, A.: Usability issues of smart phone applications: for visually challenged people. World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Inf. Eng. 8, 760\u2013767 (2014)","journal-title":"World Acad. Sci. Eng. Technol. Int. J. Comput. Electr. Autom. Control Inf. Eng."},{"key":"1_CR25","unstructured":"Dosono, B., Hayes, J., Wang, Y.: \u201cI\u2019m Stuck!\u201d: a contextual inquiry of people with visual impairments in authentication. In: Eleventh Symposium on Usable Privacy and Security (SOUPS 2015), pp. 151\u2013168 (2015)"},{"key":"1_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-28073-3_1","volume-title":"Distributed computing and internet technology","author":"N Asokan","year":"2012","unstructured":"Asokan, N., Kuo, C.: Usable Mobile Security. In: Ramanujam, R., Ramaswamy, S. (eds.) ICDCIT 2012. LNCS, vol. 7154, pp. 1\u20136. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-28073-3_1"},{"key":"1_CR27","doi-asserted-by":"crossref","unstructured":"Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A., M\u00f6ller, S.: On the need for different security methods on mobile phones. In: Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services, pp. 465\u2013473. ACM (2011)","DOI":"10.1145\/2037373.2037442"},{"key":"1_CR28","unstructured":"Jakobsson, M.: Why mobile security is not like traditional security (2011)"},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Felt, A.P., Ha, E., Egelman, S., Haney, A., Chin, E., Wagner, D.: Android permissions: user attention, comprehension, and behavior. In: Proceedings of the Eighth Symposium on Usable Privacy and Security, pp. 3:1\u20133:14. ACM, New York (2012)","DOI":"10.1145\/2335356.2335360"},{"key":"1_CR30","unstructured":"Chen, J., Paik, M., McCabe, K.: Exploring internet security perceptions and practices in urban ghana. In: SOUPS, pp. 129\u2013142 (2014)"},{"key":"1_CR31","doi-asserted-by":"publisher","first-page":"e0173284","DOI":"10.1371\/journal.pone.0173284","volume":"12","author":"M Alsaleh","year":"2017","unstructured":"Alsaleh, M., Alomar, N., Alarifi, A.: Smartphone users: Understanding how security mechanisms are perceived and new persuasive methods. PLoS ONE 12, e0173284 (2017)","journal-title":"PLoS ONE"},{"key":"1_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1007\/978-3-319-20901-2_13","volume-title":"Human-Computer Interaction: Design and Evaluation","author":"N Bevan","year":"2015","unstructured":"Bevan, N., Carter, J., Harker, S.: ISO 9241-11 revised: what have we learnt about usability Since 1998? In: Kurosu, M. (ed.) HCI 2015. LNCS, vol. 9169, pp. 143\u2013151. Springer, Cham (2015). doi:10.1007\/978-3-319-20901-2_13"},{"key":"1_CR33","unstructured":"ISO\/DIS 9241-11.2(en), Ergonomics of human-system interaction \u2014 Part 11: Usability: Definitions and concepts. https:\/\/www.iso.org\/obp\/ui\/#iso:std:iso:9241:-11:dis:ed-2:v2:en"},{"key":"1_CR34","unstructured":"10 Heuristics for User Interface Design: Article by Jakob Nielsen. https:\/\/www.nngroup.com\/articles\/ten-usability-heuristics\/"},{"key":"1_CR35","unstructured":"Joshi, A.: Usability goals setting tool. In: 4th Workshop on Software and Usability Engineering Cross-Pollination: Usability Evaluation of Advanced Interfaces, Uppsala (2009)"},{"key":"1_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1007\/978-3-642-23774-4_26","volume-title":"Human-Computer Interaction \u2013 INTERACT 2011","author":"A Joshi","year":"2011","unstructured":"Joshi, A., Sarda, N.L.: Do teams achieve usability goals? evaluating goal achievement with usability goals setting tool. In: Campos, P., Graham, N., Jorge, J., Nunes, N., Palanque, P., Winckler, M. (eds.) INTERACT 2011. LNCS, vol. 6946, pp. 313\u2013330. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-23774-4_26"},{"key":"1_CR37","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1109\/PROC.1975.9939","volume":"63","author":"JH Saltzer","year":"1975","unstructured":"Saltzer, J.H., Schroeder, M.D.: The protection of information in computer systems. Proc. IEEE 63, 1278\u20131308 (1975)","journal-title":"Proc. IEEE"},{"key":"1_CR38","unstructured":"Whitten, A.: Making security usable (2004). http:\/\/reports-archive.adm.cs.cmu.edu\/anon\/anon\/usr\/ftp\/usr0\/ftp\/2004\/CMU-CS-04-135.pdf"},{"key":"1_CR39","unstructured":"Whitten, A., Tygar, J.D.: Why johnny can\u2019t encrypt: a usability evaluation of PGP 5.0. In: Proceedings of the 8th Conference on USENIX Security Symposium, vol. 8 (1999)"},{"key":"1_CR40","volume-title":"Contextual Design: Defining Customer-Centered Systems","author":"H Beyer","year":"1998","unstructured":"Beyer, H., Holtzblatt, K.: Contextual Design: Defining Customer-Centered Systems. Morgan Kaufmann Publishers Inc., San Francisco (1998)"},{"key":"1_CR41","unstructured":"Genco, E., Kelley, R., Vernon, C., Aviv, A.J.: Alternative keyboard layouts for improved password entry and creation on mobile devices. Presented at the Eleventh Symposium on Usable Privacy and Security"},{"key":"1_CR42","doi-asserted-by":"crossref","unstructured":"von Zezschwitz, E., De Luca, A., Hussmann, H.: Honey, I shrunk the keys: influences of mobile devices on password composition and authentication performance. In: Proceedings of the 8th Nordic Conference on Human-Computer Interaction: Fun, Fast, Foundational, pp. 461\u2013470. ACM (2014)","DOI":"10.1145\/2639189.2639218"},{"key":"1_CR43","doi-asserted-by":"crossref","unstructured":"Harbach, M., De Luca, A., Egelman, S.: The anatomy of smartphone unlocking: a field study of android lock screens. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 4806\u20134817. ACM Press (2016)","DOI":"10.1145\/2858036.2858267"},{"key":"1_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1007\/978-3-642-40483-2_45","volume-title":"Human-Computer Interaction \u2013 INTERACT 2013","author":"MC Buzzi","year":"2013","unstructured":"Buzzi, M.C., Buzzi, M., Leporini, B., Paratore, M.T.: Vibro-tactile enrichment improves blind user interaction with mobile touchscreens. In: Kotz\u00e9, P., Marsden, G., Lindgaard, G., Wesson, J., Winckler, M. (eds.) INTERACT 2013. LNCS, vol. 8117, pp. 641\u2013648. Springer, Heidelberg (2013). doi:10.1007\/978-3-642-40483-2_45"},{"key":"1_CR45","doi-asserted-by":"crossref","unstructured":"Buzzi, M.C., Buzzi, M., Donini, F., Leporini, B., Paratore, M.T.: Haptic reference cues to support the exploration of touchscreen mobile devices by blind users. In: Proceedings of the Biannual Conference of the Italian Chapter of SIGCHI, pp. 28:1\u201328:8. ACM, New York (2013)","DOI":"10.1145\/2499149.2499156"},{"key":"1_CR46","doi-asserted-by":"crossref","unstructured":"Andriotis, P., Tryfonas, T., Oikonomou, G., Yildiz, C.: A pilot study on the security of pattern screen-lock methods and soft side channel attacks. In: Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, pp. 1\u20136. ACM (2013)","DOI":"10.1145\/2462096.2462098"},{"key":"1_CR47","doi-asserted-by":"crossref","unstructured":"Loge, M., Duermuth, M., Rostad, L.: On user choice for android unlock patterns. In: Proceedings of 1st European Workshop on Usable Security (EuroUSEC) 2016 (2016)","DOI":"10.14722\/eurousec.2016.23001"},{"key":"1_CR48","doi-asserted-by":"crossref","unstructured":"von Zezschwitz, E., Dunphy, P., De Luca, A.: Patterns in the wild: a field study of the usability of pattern and pin-based authentication on mobile devices. In: Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, p. 261. ACM Press (2013)","DOI":"10.1145\/2493190.2493231"},{"key":"1_CR49","doi-asserted-by":"crossref","unstructured":"Singh, S., Cabraal, A., Demosthenous, C., Astbrink, G., Furlong, M.: Password sharing: implications for security design based on social practice. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 895\u2013904. ACM, New York (2007)","DOI":"10.1145\/1240624.1240759"},{"key":"1_CR50","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-319-52503-7_17","volume-title":"Intelligent Human Computer Interaction","author":"P Doke","year":"2017","unstructured":"Doke, P., Lobo, S., Joshi, A., Aggarwal, N., Paul, V., Mevada, V., KR, A.: A user study about security practices of less-literate smartphone users. In: Basu, A., Das, S., Horain, P., Bhattacharya, S. (eds.) IHCI 2016. LNCS, vol. 10127, pp. 209\u2013216. Springer, Cham (2017). doi:10.1007\/978-3-319-52503-7_17"},{"key":"1_CR51","doi-asserted-by":"crossref","unstructured":"Boult, T.E., Scheirer, W.J., Woodworth, R.: Revocable fingerprint biotokens: accuracy and security analysis. In: 2007 IEEE Conference on Computer Vision and Pattern Recognition, pp. 1\u20138 (2007)","DOI":"10.1109\/CVPR.2007.383110"},{"key":"1_CR52","unstructured":"Azenkot, S., Wobbrock, J.O., Prasain, S., Ladner, R.E.: Input finger detection for nonvisual touch screen text entry in Perkinput. In: Proceedings of Graphics Interface 2012, pp. 121\u2013129. Canadian Information Processing Society (2012)"},{"key":"1_CR53","doi-asserted-by":"crossref","unstructured":"Buzzi, M.C., Buzzi, M., Leporini, B., Senette, C.: Playing with geometry: a multimodal android app for blind children. In: Proceedings of the 11th Biannual Conference on Italian SIGCHI Chapter, pp. 134\u2013137. ACM (2015)","DOI":"10.1145\/2808435.2808458"},{"key":"1_CR54","doi-asserted-by":"crossref","unstructured":"Buzzi, M.C., Buzzi, M., Leporini, B., Trujillo, A.: Designing a text entry multimodal keypad for blind users of touchscreen mobile phones. In: Proceedings of the 16th International ACM SIGACCESS Conference on Computers and Accessibility, pp. 131\u2013136. ACM (2014)","DOI":"10.1145\/2661334.2661354"},{"key":"1_CR55","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MMUL.2008.88","volume":"15","author":"T Guerreiro","year":"2008","unstructured":"Guerreiro, T., Nicolau, H., Jorge, J.A.: From tapping to touching: making touch screens accessible to blind users. IEEE Multimed. 15, 48\u201350 (2008)","journal-title":"IEEE Multimed."},{"key":"1_CR56","doi-asserted-by":"crossref","unstructured":"Kane, S.K., Bigham, J.P., Wobbrock, J.O.: Slide rule: making mobile touch screens accessible to blind people using multi-touch interaction techniques. In: Proceedings of the 10th International ACM SIGACCESS Conference on Computers and Accessibility, pp. 73\u201380. ACM, New York (2008)","DOI":"10.1145\/1414471.1414487"},{"key":"1_CR57","doi-asserted-by":"crossref","unstructured":"Kane, S.K., Morris, M.R., Perkins, A.Z., Wigdor, D., Ladner, R.E., Wobbrock, J.O.: Access overlays: improving non-visual access to large touch screens for blind users. In: Proceedings of the 24th Annual ACM Symposium on User Interface Software and Technology, pp. 273\u2013282. ACM, New York (2011)","DOI":"10.1145\/2047196.2047232"},{"key":"1_CR58","doi-asserted-by":"crossref","unstructured":"Murphy, E., Bates, E., Fitzpatrick, D.: Designing auditory cues to enhance spoken mathematics for visually impaired users. In: Proceedings of the 12th International ACM SIGACCESS Conference on Computers and Accessibility, pp. 75\u201382. ACM (2010)","DOI":"10.1145\/1878803.1878819"},{"key":"1_CR59","doi-asserted-by":"crossref","unstructured":"Pitt, I.J., Edwards, A.D.: Improving the usability of speech-based interfaces for blind users. In: Proceedings of the Second Annual ACM Conference on Assistive Technologies, pp. 124\u2013130. ACM (1996)","DOI":"10.1145\/228347.228367"}],"container-title":["Lecture Notes in Computer Science","Human-Computer Interaction \u2013 INTERACT 2017"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68059-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,20]],"date-time":"2021-09-20T00:18:39Z","timestamp":1632097119000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-68059-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319680583","9783319680590"],"references-count":59,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68059-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"21 September 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INTERACT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP Conference on Human-Computer Interaction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bombay","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 September 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"interact2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}