{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:31:59Z","timestamp":1776115919180,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,2]],"date-time":"2017-05-02T00:00:00Z","timestamp":1493683200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,2]]},"DOI":"10.1145\/3025453.3025636","type":"proceedings-article","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T12:34:28Z","timestamp":1493814868000},"page":"4254-4265","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":140,"title":["Understanding Shoulder Surfing in the Wild"],"prefix":"10.1145","author":[{"given":"Malin","family":"Eiband","sequence":"first","affiliation":[{"name":"LMU Munich, Munich, Germany"}]},{"given":"Mohamed","family":"Khamis","sequence":"additional","affiliation":[{"name":"LMU Munich, Munich, Germany"}]},{"given":"Emanuel","family":"von Zezschwitz","sequence":"additional","affiliation":[{"name":"LMU Munich, Munich, Bavaria, Germany"}]},{"given":"Heinrich","family":"Hussmann","sequence":"additional","affiliation":[{"name":"LMU Munich, Munich, Germany"}]},{"given":"Florian","family":"Alt","sequence":"additional","affiliation":[{"name":"LMU Munich, Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2017,5,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/322796.322806"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2638728.2638788"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785882"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935701.1935740"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2037373.2037383"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2628363.2628377"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2611009.2611028"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208712"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/0895-4356(93)90018-V"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1177\/001316446002000104"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557097"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753490"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1192\/bjp.143.5.487"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892511"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/0895-4356(90)90158-L"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0061470"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00594ED1V01Y201408SPT011"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785834"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.20982\/tqmp.08.1.p023"},{"key":"e_1_3_2_1_20_1","volume-title":"Symposium On Usable Privacy and Security (SOUPS 2014","author":"Harbach Marian","year":"2014","unstructured":"Marian Harbach , Emanuel von Zezschwitz , Andreas Fichtner , Alexander De Luca , and Matthew Smith . 2014 . It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception . In Symposium On Usable Privacy and Security (SOUPS 2014 ). USENIX Association, Menlo Park, CA, 213--230. https:\/\/www.usenix.org\/conference\/soups 2014\/proceedings\/presentation\/harbach Marian Harbach, Emanuel von Zezschwitz, Andreas Fichtner, Alexander De Luca, and Matthew Smith. 2014. It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception. In Symposium On Usable Privacy and Security (SOUPS 2014). USENIX Association, Menlo Park, CA, 213--230. https:\/\/www.usenix.org\/conference\/soups2014\/proceedings\/presentation\/harbach"},{"key":"e_1_3_2_1_21_1","unstructured":"Brian Honan. 2012. Visual Data Security White Paper. (2012).  Brian Honan. 2012. Visual Data Security White Paper. (2012)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702183"},{"key":"e_1_3_2_1_23_1","unstructured":"Ponemon Institute. 2016. Global Visual Hacking Experimental Study: Analysis. (2016). multimedia.3m.com\/mws\/media\/1254232O\/ global-visual-hacking-experiment-study-summary. pdf  Ponemon Institute. 2016. Global Visual Hacking Experimental Study: Analysis. (2016). multimedia.3m.com\/mws\/media\/1254232O\/ global-visual-hacking-experiment-study-summary. pdf"},{"key":"e_1_3_2_1_24_1","unstructured":"Iron Mountain. 2013. Protecting sensitive company information from the commuter snoopers. (2013). http:\/\/www.ironmountain.co.uk\/Company\/Company-News\/News-Categories\/Press-Releases\/2013\/October\/8.aspx  Iron Mountain. 2013. Protecting sensitive company information from the commuter snoopers. (2013). http:\/\/www.ironmountain.co.uk\/Company\/Company-News\/News-Categories\/Press-Releases\/2013\/October\/8.aspx"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518953"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892314"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.2307\/2529310"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCE.2013.6490252"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2009.06.002"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559206.2581240"},{"key":"e_1_3_2_1_31_1","volume-title":"Snooping on Mobile Phones: Prevalence and Trends. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016","author":"Marques Diogo","year":"2016","unstructured":"Diogo Marques , Ildar Muslukhov , Tiago Guerreiro , Lu\u00eds Carri\u00e7o , and Konstantin Beznosov . 2016 . Snooping on Mobile Phones: Prevalence and Trends. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016 ). USENIX Association, Denver, CO, 159--174. https:\/\/www.usenix.org\/conference\/soups 2016\/technical-sessions\/presentation\/marques Diogo Marques, Ildar Muslukhov, Tiago Guerreiro, Lu\u00eds Carri\u00e7o, and Konstantin Beznosov. 2016. Snooping on Mobile Phones: Prevalence and Trends. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, Denver, CO, 159--174. https:\/\/www.usenix.org\/conference\/soups2016\/technical-sessions\/presentation\/marques"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493223"},{"key":"e_1_3_2_1_33_1","volume-title":"Paulhus and Vazire Simine","author":"Delroy","year":"2009","unstructured":"Delroy L. Paulhus and Vazire Simine . 2009 . The Self-report Method. In Handbook of Research Methods in Personality Psychology, Richard W. Robins, R. Chris Fraley, and Robert F. Krueger (Eds.). Guilford Press , 224--239. Delroy L. Paulhus and Vazire Simine. 2009. The Self-report Method. In Handbook of Research Methods in Personality Psychology, Richard W. Robins, R. Chris Fraley, and Robert F. Krueger (Eds.). Guilford Press, 224--239."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030116"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357085"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2406367.2406384"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84882-301-3_5"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2636090"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the 17th Australia Conference on Computer-Human Interaction (OZCHI '05)","author":"Tan Desney S.","year":"2005","unstructured":"Desney S. Tan , Pedram Keyani , and Mary Czerwinski . 2005 . Spy-resistant Keyboard: More Secure Password Entry on Public Touch Screen Displays . In Proceedings of the 17th Australia Conference on Computer-Human Interaction (OZCHI '05) . Computer-Human Interaction Special Interest Group (CHISIG) of Australia, Narrabundah, Australia, 1--10. http:\/\/dl.acm.org\/citation.cfm?id=1108368.1108393 Desney S. Tan, Pedram Keyani, and Mary Czerwinski. 2005. Spy-resistant Keyboard: More Secure Password Entry on Public Touch Screen Displays. In Proceedings of the 17th Australia Conference on Computer-Human Interaction (OZCHI '05). Computer-Human Interaction Special Interest Group (CHISIG) of Australia, Narrabundah, Australia, 1--10. http:\/\/dl.acm.org\/citation.cfm?id=1108368.1108393"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1125451.1125711"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.133.5.859"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.37"},{"key":"e_1_3_2_1_44_1","volume-title":"Proceedings of the Chi Sparks 2014 Conference: HCI Research, Innovation, and Implementation","author":"van Eekelen Wouter","unstructured":"Wouter van Eekelen , John van den Elst, and Vassilis-Javed Khan. 2014. Dynamic Layering Graphical Elements For Graphical Password Schemes . In Proceedings of the Chi Sparks 2014 Conference: HCI Research, Innovation, and Implementation . The Hague University of Applied Sciences, The Hague, The Netherlands, 65--73. Wouter van Eekelen, John van den Elst, and Vassilis-Javed Khan. 2014. Dynamic Layering Graphical Elements For Graphical Password Schemes. In Proceedings of the Chi Sparks 2014 Conference: HCI Research, Innovation, and Implementation. The Hague University of Applied Sciences, The Hague, The Netherlands, 65--73."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702212"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702202"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858120"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2016-0022"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133265.1133303"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2015.23007"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702316"},{"key":"e_1_3_2_1_52_1","first-page":"242","article-title":"The Critical Incident Technique: An Innovative Qualitative Method of Research","volume":"20","author":"Woolsey Lorette K.","year":"1986","unstructured":"Lorette K. Woolsey . 1986 . The Critical Incident Technique: An Innovative Qualitative Method of Research . Canadian Journal of Counselling 20 , 4 (1986), 242 -- 254 . Lorette K. Woolsey. 1986. The Critical Incident Technique: An Innovative Qualitative Method of Research. Canadian Journal of Counselling 20, 4 (1986), 242--254.","journal-title":"Canadian Journal of Counselling"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516709"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2732726"}],"event":{"name":"CHI '17: CHI Conference on Human Factors in Computing Systems","location":"Denver Colorado USA","acronym":"CHI '17","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025636","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3025453.3025636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:03:34Z","timestamp":1750215814000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3025453.3025636"}},"subtitle":["Stories from Users and Observers"],"short-title":[],"issued":{"date-parts":[[2017,5,2]]},"references-count":53,"alternative-id":["10.1145\/3025453.3025636","10.1145\/3025453"],"URL":"https:\/\/doi.org\/10.1145\/3025453.3025636","relation":{},"subject":[],"published":{"date-parts":[[2017,5,2]]},"assertion":[{"value":"2017-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}