{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T17:10:12Z","timestamp":1769793012890,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,25]],"date-time":"2018-11-25T00:00:00Z","timestamp":1543104000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001654","name":"Deutscher Akademischer Austauschdienst","doi-asserted-by":"publisher","award":["57404065"],"award-info":[{"award-number":["57404065"]}],"id":[{"id":"10.13039\/501100001654","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,25]]},"DOI":"10.1145\/3282894.3282919","type":"proceedings-article","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T13:18:16Z","timestamp":1544188696000},"page":"147-152","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Communicating Shoulder Surfing Attacks to Users"],"prefix":"10.1145","author":[{"given":"Alia","family":"Saad","sequence":"first","affiliation":[{"name":"German University in Cairo, Cairo, Egypt and University of Duisburg-Essen, Essen, Germany"}]},{"given":"Michael","family":"Chukwu","sequence":"additional","affiliation":[{"name":"University of Duisburg-Essen, Essen, Germany"}]},{"given":"Stefan","family":"Schneegass","sequence":"additional","affiliation":[{"name":"University of Duisburg-Essen, Essen, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,11,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025461"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557097"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1324892.1324932"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378063.1378122"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025636"},{"key":"e_1_3_2_1_6_1","volume-title":"Symposium on usable privacy and security (SOUPS). 213-230","author":"Harbach Marian","year":"2014","unstructured":"Marian Harbach , Emanuel Von Zezschwitz , Andreas Fichtner , Alexander De Luca , and Matthew Smith . 2014 . It's a hard lock life: A field study of smartphone (un) locking behavior and risk perception . In Symposium on usable privacy and security (SOUPS). 213-230 . Marian Harbach, Emanuel Von Zezschwitz, Andreas Fichtner, Alexander De Luca, and Matthew Smith. 2014. It's a hard lock life: A field study of smartphone (un) locking behavior and risk perception. In Symposium on usable privacy and security (SOUPS). 213-230."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702613.2725444"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892314"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152832.3152851"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3136755.3136809"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753489"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1968613.1968647"},{"key":"e_1_3_2_1_13_1","volume-title":"Symposium on Usable Privacy and Security (SOUPS). 207-219","author":"Krombholz Katharina","year":"2016","unstructured":"Katharina Krombholz , Thomas Hupperich , and Thorsten Holz . 2016 . Use the force: Evaluating force-sensitive authentication for mobile devices . In Symposium on Usable Privacy and Security (SOUPS). 207-219 . Katharina Krombholz, Thomas Hupperich, and Thorsten Holz. 2016. Use the force: Evaluating force-sensitive authentication for mobile devices. In Symposium on Usable Privacy and Security (SOUPS). 207-219."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2017.78"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280683"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2093498"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240758"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2725199"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501615"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3121357"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858152"},{"key":"e_1_3_2_1_22_1","unstructured":"Ben Shneiderman. 2010. Designing the user interface: strategies for effective human-computer interaction. Pearson Education India.  Ben Shneiderman. 2010. Designing the user interface: strategies for effective human-computer interaction. Pearson Education India."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702212"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133265.1133303"},{"key":"e_1_3_2_1_25_1","volume-title":"Ben Taylor, and Zheng Wang.","author":"Ye Guixin","year":"2017","unstructured":"Guixin Ye , Zhanyong Tang , Dingyi Fang , Xiaojiang Chen , Kwang In Kim , Ben Taylor, and Zheng Wang. 2017 . Cracking Android pattern lock in five attempts. (2017). Guixin Ye, Zhanyong Tang, Dingyi Fang, Xiaojiang Chen, Kwang In Kim, Ben Taylor, and Zheng Wang. 2017. Cracking Android pattern lock in five attempts. (2017)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230740"}],"event":{"name":"MUM 2018: 17th International Conference on Mobile and Ubiquitous Multimedia","location":"Cairo Egypt","acronym":"MUM 2018"},"container-title":["Proceedings of the 17th International Conference on Mobile and Ubiquitous Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3282894.3282919","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3282894.3282919","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:01:57Z","timestamp":1750208517000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3282894.3282919"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11,25]]},"references-count":26,"alternative-id":["10.1145\/3282894.3282919","10.1145\/3282894"],"URL":"https:\/\/doi.org\/10.1145\/3282894.3282919","relation":{},"subject":[],"published":{"date-parts":[[2018,11,25]]},"assertion":[{"value":"2018-11-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}