{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T22:47:33Z","timestamp":1770418053828,"version":"3.49.0"},"reference-count":81,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,3,1]],"date-time":"2022-03-01T00:00:00Z","timestamp":1646092800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,3]]},"DOI":"10.1109\/vr51125.2022.00049","type":"proceedings-article","created":{"date-parts":[[2022,4,20]],"date-time":"2022-04-20T19:36:48Z","timestamp":1650483408000},"page":"301-310","source":"Crossref","is-referenced-by-count":18,"title":["Can I Borrow Your ATM? Using Virtual Reality for (Simulated) In Situ Authentication Research"],"prefix":"10.1109","author":[{"given":"Florian","family":"Mathis","sequence":"first","affiliation":[{"name":"University of Glasgow"}]},{"given":"Kami","family":"Vaniea","sequence":"additional","affiliation":[{"name":"University of Edinburgh"}]},{"given":"Mohamed","family":"Khamis","sequence":"additional","affiliation":[{"name":"University of Glasgow"}]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/0030-5073(81)90015-5"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2021.3096494"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3152771.3152773"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1162\/105474601300343603"},{"key":"ref76","article-title":"Replication study: A cross-country field observation study of real world {PIN} usage at atms and in various electronic payment scenarios","author":"volkamer","year":"2018","journal-title":"Fourteenth Symposium on Usable Privacy and Security"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702212"},{"key":"ref74","doi-asserted-by":"crossref","DOI":"10.1162\/105474600566989","article-title":"Using presence questionnaires in reality","author":"usoh","year":"2000","journal-title":"Presence"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892314"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300737"},{"key":"ref38","article-title":"Usability and mobility; interactions on the move","author":"johnson","year":"0"},{"key":"ref78","article-title":"Revisited: Comparison of empirical methods to evaluate visualizations supporting crafting and assembly purposes","author":"wei\u00df","year":"2020","journal-title":"IEEE Trans-actions on Visualization and Computer Graphics"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/1133265.1133303"},{"key":"ref33","year":"2019","journal-title":"Free3d 3d atm model"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2018.1456150"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1186\/1743-0003-7-19"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1037\/h0061470"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/38.963458"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1017\/S0140525X0999152X"},{"key":"ref35","article-title":"Development of NASA-TLX (Task Load Index): Results of empirical and theoretical research","author":"hart","year":"0","journal-title":"Human Mental Workload"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785834"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3385378.3385385"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.3389\/frvir.2021.627333"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1111\/j.1744-6570.1991.tb02401.x"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3399715.3399823"},{"key":"ref28","author":"elkin","year":"2021","journal-title":"An aligned rank transform procedure for multifactor contrast tests"},{"key":"ref64","article-title":"Simulation of augmented reality systems in purely virtual environments","author":"ragan","year":"0","journal-title":"2009 IEEE Virtual Reality Conference"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025636"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011902718709"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.69"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501617"},{"key":"ref67","author":"sasse","year":"2005","journal-title":"Usable security Why do we need it? how do we get it?"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07308-8_23"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3340555.3353741"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466246"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3314111.3319837"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753490"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481330"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837131"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3462244.3481001"},{"key":"ref23","year":"0","journal-title":"Oculus integration sdk"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702249"},{"key":"ref25","article-title":"Gaze-contingent passwords at the atm","author":"dunphy","year":"2008","journal-title":"Communication by Gaze Interaction (COGAIN)"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/VRW52623.2021.00235"},{"key":"ref51","article-title":"Prototyping usable privacy and security systems: Insights from experts","author":"mathis","year":"2021","journal-title":"International Journal of Human&#x2013;Computer Interaction"},{"key":"ref59","year":"2021","journal-title":"Atm statistics"},{"key":"ref58","article-title":"Deception task design in developer password studies: Exploring a student sample","author":"naiakshina","year":"2018","journal-title":"Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018)"},{"key":"ref57","author":"morey","year":"2008","journal-title":"Confidence intervals from normalized data A correction to cousineau (2005)"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3282894.3282923"},{"key":"ref55","article-title":"A dose of reality: Overcoming usability challenges in vr head-mounted displays","author":"mcgill","year":"2015","journal-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems"},{"key":"ref54","article-title":"Remote xr studies: The golden future of hci research?","author":"mathis","year":"2021","journal-title":"Proceedings of the CHI 2021 Workshop on XR Remote Research"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3428121"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445478"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2384916.2384945"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1935701.1935815"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3078810.3078815"},{"key":"ref12","article-title":"Multiplexed input to protect against casual observers","author":"bianchi","year":"2014","journal-title":"Proceedings of HCI Korea"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1935701.1935740"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22950-3_9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1177\/001316447303300111"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4324\/9780203771587"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1016\/j.wneu.2018.12.090"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/0950-7051(93)90017-N"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3027063.3053221"},{"key":"ref19","article-title":"I feel like i&#x2019;m taking selfies all day! towards understanding biometric authentication on smartphones","author":"de luca","year":"2015","journal-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1978963"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3450614.3464468"},{"key":"ref3","year":"2021","journal-title":"Animated 3d characters"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3286978.3287028"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1515\/icom-2019-0019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818014"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1057\/s41300-016-0010-3"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39498-0_11"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664253"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2307671"},{"key":"ref45","article-title":"Towards robust experimental design for user studies in security and privacy","author":"krol","year":"2016","journal-title":"The LASER Workshop Learning from Authoritative Security Experiment Results"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376796"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/765891.766110"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/3287052"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3136755.3136809"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07620-1_7"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427240"}],"event":{"name":"2022 IEEE on Conference Virtual Reality and 3D User Interfaces (VR)","location":"Christchurch, New Zealand","start":{"date-parts":[[2022,3,12]]},"end":{"date-parts":[[2022,3,16]]}},"container-title":["2022 IEEE Conference on Virtual Reality and 3D User Interfaces (VR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9756663\/9756727\/09756785.pdf?arnumber=9756785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T21:02:39Z","timestamp":1655154159000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9756785\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3]]},"references-count":81,"URL":"https:\/\/doi.org\/10.1109\/vr51125.2022.00049","relation":{},"subject":[],"published":{"date-parts":[[2022,3]]}}}