{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:52Z","timestamp":1750220932058,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,6]],"date-time":"2019-06-06T00:00:00Z","timestamp":1559779200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100007601","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["826278"],"award-info":[{"award-number":["826278"]}],"id":[{"id":"10.13039\/501100007601","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100013293","name":"Active and Assisted Living programme","doi-asserted-by":"publisher","award":["AAL-2016-089, AAL-2016-069"],"award-info":[{"award-number":["AAL-2016-089, AAL-2016-069"]}],"id":[{"id":"10.13039\/100013293","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,6]]},"DOI":"10.1145\/3314183.3324966","type":"proceedings-article","created":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T15:39:51Z","timestamp":1560353991000},"page":"199-202","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["On the Personalization of Image Content in Graphical Passwords based on Users' Sociocultural Experiences"],"prefix":"10.1145","author":[{"given":"Argyris","family":"Constantinides","sequence":"first","affiliation":[{"name":"University of Cyprus &amp; CiTARD Services Ltd., Nicosia, Cyprus"}]},{"given":"Christos","family":"Fidas","sequence":"additional","affiliation":[{"name":"University of Patras, Patras, Greece"}]},{"given":"Marios","family":"Belk","sequence":"additional","affiliation":[{"name":"University of Central Lancashire (CY Campus) &amp; University of Cyprus, Larnaka &amp; Nicosia, Cyprus"}]},{"given":"Andreas","family":"Pitsillides","sequence":"additional","affiliation":[{"name":"University of Cyprus, Nicosia, Cyprus"}]}],"member":"320","published-online":{"date-parts":[[2019,6,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493213"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493231"},{"volume-title":"Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS '10)","author":"Dunphy Paul","key":"e_1_3_2_1_3_1","unstructured":"Paul Dunphy , Andreas P. Heiner , and N. Asokan . 2010. A closer look at recognition-based graphical passwords on mobile devices . In Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS '10) . ACM, New York, NY, USA, Article 3, 12 pages. Paul Dunphy, Andreas P. Heiner, and N. Asokan. 2010. A closer look at recognition-based graphical passwords on mobile devices. In Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS '10). ACM, New York, NY, USA, Article 3, 12 pages."},{"key":"e_1_3_2_1_4_1","volume-title":"Article 19 (September","author":"Biddle Robert","year":"2012","unstructured":"Robert Biddle , Sonia Chiasson , and P.C. Van Oorschot . 2012. Graphical passwords: Learning from the first twelve years. ACM Comput. Surv. 44, 4 , Article 19 (September 2012 ), 41 pages. Robert Biddle, Sonia Chiasson, and P.C. Van Oorschot. 2012. Graphical passwords: Learning from the first twelve years. ACM Comput. Surv. 44, 4, Article 19 (September 2012), 41 pages."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208712"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2011216.2011218"},{"volume-title":"Proceedings of the 16th USENIX Security Symposium (SS '07)","author":"Thorpe Julie","key":"e_1_3_2_1_7_1","unstructured":"Julie Thorpe , and Paul C . van Oorschot. 2007. Human-seeded attacks and exploiting hot-spots in graphical passwords . In Proceedings of the 16th USENIX Security Symposium (SS '07) . USENIX Association, Berkeley, CA, USA, Article 8, 16 pages. Julie Thorpe, and Paul C. van Oorschot. 2007. Human-seeded attacks and exploiting hot-spots in graphical passwords. In Proceedings of the 16th USENIX Security Symposium (SS '07). USENIX Association, Berkeley, CA, USA, Article 8, 16 pages."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2008.04.001"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106426.3106488"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2010.2053706"},{"key":"e_1_3_2_1_11_1","volume-title":"2008 Annual Computer Security Applications Conference (ACSAC) (pp. 111--120)","author":"Oorschot Van","year":"2008","unstructured":"Salehi-Abari, A., Thorpe, J., & Van Oorschot , P. C. ( 2008 , December). On purely automated attacks and click-based graphical passwords . In 2008 Annual Computer Security Applications Conference (ACSAC) (pp. 111--120) . IEEE. Salehi-Abari, A., Thorpe, J., & Van Oorschot, P. C. (2008, December). On purely automated attacks and click-based graphical passwords. In 2008 Annual Computer Security Applications Conference (ACSAC) (pp. 111--120). IEEE."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1056808.1057036"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1979742.1979945"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/HCI2008.12"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.010"},{"key":"e_1_3_2_1_16_1","unstructured":"Johnson J.J. Seixeiro S. Pace Z. van der Bogert G. Gilmour S. Siebens L. Tubbs K.. 2014. Picture Gesture Authentication. Retrieved from https:\/\/www.google.com\/patents\/US8910253  Johnson J.J. Seixeiro S. Pace Z. van der Bogert G. Gilmour S. Siebens L. Tubbs K.. 2014. Picture Gesture Authentication. Retrieved from https:\/\/www.google.com\/patents\/US8910253"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240683"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173661"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2017.06.042"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209219.3209254"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236112.3236150"},{"key":"e_1_3_2_1_22_1","volume-title":"On the Accuracy of Eye Gaze-driven Classifiers for Predicting Image Content Familiarity in Graphical Passwords. ACM SIGCHI User Modeling, Adaptation and Personalization (UMAP","author":"Constantinides Argyris","year":"2019","unstructured":"Argyris Constantinides , Marios Belk , Christos Fidas , and Andreas Pitsillides . 2019. On the Accuracy of Eye Gaze-driven Classifiers for Predicting Image Content Familiarity in Graphical Passwords. ACM SIGCHI User Modeling, Adaptation and Personalization (UMAP 2019 ), ACM Press ( to appear) Argyris Constantinides, Marios Belk, Christos Fidas, and Andreas Pitsillides. 2019. On the Accuracy of Eye Gaze-driven Classifiers for Predicting Image Content Familiarity in Graphical Passwords. ACM SIGCHI User Modeling, Adaptation and Personalization (UMAP 2019), ACM Press (to appear)"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/2354409.2355041"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1519556.1519901"}],"event":{"name":"UMAP '19: 27th Conference on User Modeling, Adaptation and Personalization","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Larnaca Cyprus","acronym":"UMAP '19"},"container-title":["Adjunct Publication of the 27th Conference on User Modeling, Adaptation and Personalization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314183.3324966","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314183.3324966","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:22Z","timestamp":1750204402000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314183.3324966"}},"subtitle":["New Challenges and Opportunities"],"short-title":[],"issued":{"date-parts":[[2019,6,6]]},"references-count":24,"alternative-id":["10.1145\/3314183.3324966","10.1145\/3314183"],"URL":"https:\/\/doi.org\/10.1145\/3314183.3324966","relation":{},"subject":[],"published":{"date-parts":[[2019,6,6]]},"assertion":[{"value":"2019-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}