{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T13:52:42Z","timestamp":1770990762251,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,7,13]],"date-time":"2015-07-13T00:00:00Z","timestamp":1436745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Natural Sciences and Engineering Research Council of Canada (NSERC)"},{"name":"SurfNet"},{"name":"ISSNet"},{"name":"NSERC"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,7,13]]},"DOI":"10.1145\/2783446.2783583","type":"proceedings-article","created":{"date-parts":[[2015,7,10]],"date-time":"2015-07-10T14:10:55Z","timestamp":1436537455000},"page":"126-135","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Heuristics for the evaluation of captchas on smartphones"],"prefix":"10.1145","author":[{"given":"Gerardo","family":"Reynaga","sequence":"first","affiliation":[{"name":"Carleton University, Ottawa, ON, Canada"}]},{"given":"Sonia","family":"Chiasson","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, ON, Canada"}]},{"given":"Paul C.","family":"van Oorschot","sequence":"additional","affiliation":[{"name":"Carleton University, Ottawa, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2015,7,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/587078.587093"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851600.1851641"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133265.1133291"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518983"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1899503.1899507"},{"key":"e_1_3_2_1_6_1","first-page":"57","volume-title":"Thematic analysis","author":"Braun V.","year":"2012"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409240.1409257"},{"key":"e_1_3_2_1_8_1","volume-title":"The end is nigh: Generic solving of text-based captchas","author":"Bursztein E.","year":"2014"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2011.14"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2010.31"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/47.503271"},{"key":"e_1_3_2_1_12_1","unstructured":"L. Cerejo. The elements of the mobile user experience. http:\/\/mobile.smashingmagazine.com\/2012\/07\/12\/elements-mobile-user-experience\/ 2012.  L. Cerejo. The elements of the mobile user experience. http:\/\/mobile.smashingmagazine.com\/2012\/07\/12\/elements-mobile-user-experience\/ 2012."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966989.1968203"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1358628.1358654"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367619"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.102"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455838"},{"key":"e_1_3_2_1_18_1","volume-title":"reCaptcha: Stop Spam","year":"2013"},{"key":"e_1_3_2_1_19_1","volume-title":"Adapting the locales framework for heuristic evaluation of groupware. Australasian Jnl of Information Syst., 7(2)","author":"Greenberg S.","year":"2000"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327590IJHC1304_03"},{"key":"e_1_3_2_1_21_1","volume-title":"Mobile user experience","author":"Hiltunen M.","year":"2002"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2006.10.001"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078837"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/645739.666743"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1152215.1152218"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327590ijhc1803_2"},{"key":"e_1_3_2_1_27_1","unstructured":"J. L. Lentz. User interface design for the mobile web. http:\/\/www.ibm.com\/developerworks\/web\/library\/wa-interface\/index.html 2011. Last visited: October 2014.  J. L. Lentz. User interface design for the mobile web. http:\/\/www.ibm.com\/developerworks\/web\/library\/wa-interface\/index.html 2011. Last visited: October 2014."},{"key":"e_1_3_2_1_28_1","first-page":"1385","volume-title":"WCEMHT","author":"Liao C.-J.","year":"2013"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1409240.1409265"},{"key":"e_1_3_2_1_30_1","article-title":"Text entry for mobile computing: Models and methods, theory and practice","author":"MacKenzie I.","year":"2002","journal-title":"Int. J. HCI, 17(2--3):147--198"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642642"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702127"},{"key":"e_1_3_2_1_33_1","volume-title":"http:\/\/research.microsoft.com\/en-us\/um\/redmond\/projects\/asirra\/","year":"2011"},{"key":"e_1_3_2_1_34_1","unstructured":"J. Nielsen. Ten usability heuristics. http:\/\/www.nngroup.com\/articles\/ten-usability-heuristics\/ 2012. Last visited: Jun 2014.  J. Nielsen. Ten usability heuristics. http:\/\/www.nngroup.com\/articles\/ten-usability-heuristics\/ 2012. Last visited: Jun 2014."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/97243.97281"},{"key":"e_1_3_2_1_36_1","volume-title":"http:\/\/www.nielsen.com\/us\/en\/newswire\/2013\/the-asian-mobile-consumer-decoded0.html","year":"2013"},{"key":"e_1_3_2_1_37_1","volume-title":"Last visited","year":"2014"},{"key":"e_1_3_2_1_38_1","unstructured":"NuCaptcha. White paper: Nucaptcha and traditional captcha. http:\/\/www.nucaptcha.com\/resources\/whitepapers 2014. Last visited: Feb 2015.  NuCaptcha. White paper: Nucaptcha and traditional captcha. http:\/\/www.nucaptcha.com\/resources\/whitepapers 2014. Last visited: Feb 2015."},{"key":"e_1_3_2_1_39_1","unstructured":"C. Pew Research. Mobile Technology Fact Sheet. http:\/\/www.pewinternet.org\/fact-sheets\/mobile-technology-fact-sheet\/ 2014. Last visited: Feb 2015.  C. Pew Research. Mobile Technology Fact Sheet. http:\/\/www.pewinternet.org\/fact-sheets\/mobile-technology-fact-sheet\/ 2014. Last visited: Feb 2015."},{"key":"e_1_3_2_1_40_1","first-page":"49","article-title":"Heuristic evaluation and mobile usability: Bridging the realism gap","volume":"3160","author":"Po S.","year":"2004","journal-title":"LNCS"},{"key":"e_1_3_2_1_41_1","first-page":"427","volume-title":"SECRYPT","author":"Reynaga G.","year":"2013"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2015.23006"},{"key":"e_1_3_2_1_43_1","volume-title":"Interaction Design: beyond human-computer interaction","author":"Rogers Y.","year":"2011","edition":"3"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00530-003-0122-3"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-009-0171-2"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481295"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378063.1378094"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/634067.634352"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2004.05.001"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJART.2010.035830"},{"key":"e_1_3_2_1_51_1","unstructured":"Vappic. 4d captcha. http:\/\/www.vappic.com\/moreplease 2012. Last visited: Jun 2014.  Vappic. 4d captcha. http:\/\/www.vappic.com\/moreplease 2012. Last visited: Jun 2014."},{"key":"e_1_3_2_1_52_1","unstructured":"W3C. Localization vs. internationalization. http:\/\/www.w3.org\/International\/questions\/qa-i18n 2012. Last visited: Oct 2014.  W3C. Localization vs. internationalization. http:\/\/www.w3.org\/International\/questions\/qa-i18n 2012. Last visited: Oct 2014."},{"key":"e_1_3_2_1_53_1","volume-title":"http:\/\/www.w3.org\/TR\/mobile-bp\/","author":"C.","year":"2012"},{"issue":"5","key":"e_1_3_2_1_54_1","first-page":"480","article-title":"Security analysis and related usability of motion-based captchas: Decoding codewords in motion","volume":"11","author":"Xu Y.","year":"2014","journal-title":"IEEE TDSC"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2007.47"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408671"},{"key":"e_1_3_2_1_57_1","first-page":"1641","volume-title":"Improving intrusion detection systems through heuristic evaluation","author":"Zhou A.","year":"2004"}],"event":{"name":"British HCI 2015: 2015 British Human Computer Interaction Conference","location":"Lincoln Lincolnshire United Kingdom","acronym":"British HCI 2015"},"container-title":["Proceedings of the 2015 British HCI Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2783446.2783583","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2783446.2783583","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:07:14Z","timestamp":1750223234000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2783446.2783583"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7,13]]},"references-count":57,"alternative-id":["10.1145\/2783446.2783583","10.1145\/2783446"],"URL":"https:\/\/doi.org\/10.1145\/2783446.2783583","relation":{},"subject":[],"published":{"date-parts":[[2015,7,13]]},"assertion":[{"value":"2015-07-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}