{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:31:55Z","timestamp":1750221115017,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,3,14]],"date-time":"2019-03-14T00:00:00Z","timestamp":1552521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1527795"],"award-info":[{"award-number":["1527795"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,3,14]]},"DOI":"10.1145\/3314545.3314572","type":"proceedings-article","created":{"date-parts":[[2019,4,17]],"date-time":"2019-04-17T16:30:09Z","timestamp":1555518609000},"page":"68-77","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Gamification of Wearable Data Collection"],"prefix":"10.1145","author":[{"given":"Sraddhanjali","family":"Acharya","sequence":"first","affiliation":[{"name":"Texas Tech University, Lubbock, Texas, US"}]},{"given":"Richard","family":"Matovu","sequence":"additional","affiliation":[{"name":"Texas Tech University, Lubbock, Texas US"}]},{"given":"Abdul","family":"Serwadda","sequence":"additional","affiliation":[{"name":"Texas Tech University, Lubbock, Texas, US"}]},{"given":"Isaac","family":"Griswold-Steiner","sequence":"additional","affiliation":[{"name":"Texas Tech University, Lubbock, Texas, US"}]}],"member":"320","published-online":{"date-parts":[[2019,3,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Angulo J. and W\u00e4stlund E. 2011. Exploring touch-screen biometrics for user identification on smart phones. IFIP PrimeLife International Summer School on Privacy and Identity Management for Life (2011) 130--143.  Angulo J. and W\u00e4stlund E. 2011. Exploring touch-screen biometrics for user identification on smart phones. IFIP PrimeLife International Summer School on Privacy and Identity Management for Life (2011) 130--143.","DOI":"10.1007\/978-3-642-31668-5_10"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2420957"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028040.2028049"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2583008.2583016"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3264908"},{"key":"e_1_3_2_1_6_1","unstructured":"Dabrowski A. Kammerstetter M. Thamm E. Weippl E. and Kastner W. 2015. Leveraging competitive gamification for sustainable fun and profit in security education. 2015 USENIX Summit on Gaming Games and Gamification in Security Education (3GSE 15). (2015).  Dabrowski A. Kammerstetter M. Thamm E. Weippl E. and Kastner W. 2015. Leveraging competitive gamification for sustainable fun and profit in security education. 2015 USENIX Summit on Gaming Games and Gamification in Security Education (3GSE 15). (2015)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702296"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.32"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/BTAS.2017.8272701"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3159450.3159591"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2017.2761744"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3390\/rs8110905"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078861.3078870"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2016.7860521"},{"key":"e_1_3_2_1_15_1","volume-title":"International Symposium on","author":"Li Q.","year":"2016","unstructured":"Li , Q. , Cao , H. , Lu , Y. , Yan , H. and Li , T . 2016. Controlling Non-Touch Screens as Touch Screens Using Airpen, a Writing Tool with In-Air Gesturing Mode. System and Software Reliability (ISSSR) , International Symposium on ( 2016 ), 68--76. Li, Q., Cao, H., Lu, Y., Yan, H. and Li, T. 2016. Controlling Non-Touch Screens as Touch Screens Using Airpen, a Writing Tool with In-Air Gesturing Mode. System and Software Reliability (ISSSR), International Symposium on (2016), 68--76."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813668"},{"key":"e_1_3_2_1_17_1","volume-title":"IEEE INFOCOM 2018-IEEE Conference on Computer Communications","author":"Liu Y.","year":"2018","unstructured":"Liu , Y. and Li , Z . 2018. aleak: Privacy leakage through context-free wearable side-channel . IEEE INFOCOM 2018-IEEE Conference on Computer Communications ( 2018 ), 1232--1240. Liu, Y. and Li, Z. 2018. aleak: Privacy leakage through context-free wearable side-channel. IEEE INFOCOM 2018-IEEE Conference on Computer Communications (2018), 1232--1240."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3161196"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2802083.2808397"},{"key":"e_1_3_2_1_20_1","volume-title":"Workshop on Cognitive Engineering for Mobile GIS","author":"McKenzie G.","year":"2011","unstructured":"McKenzie , G. 2011 . Gamification and location-based services . Workshop on Cognitive Engineering for Mobile GIS (2011). McKenzie, G. 2011. Gamification and location-based services. Workshop on Cognitive Engineering for Mobile GIS (2011)."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307666"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872427.2883084"},{"key":"e_1_3_2_1_23_1","unstructured":"Odoba\u0161i\u0107 D. Medak D. and Miler M. 2013. Gamification of geographic data collection. (2013).  Odoba\u0161i\u0107 D. Medak D. and Miler M. 2013. Gamification of geographic data collection. (2013)."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162095"},{"key":"e_1_3_2_1_25_1","volume-title":"Networked Sensing Systems (INSS), 2010 Seventh International Conference on","author":"Roggen D.","year":"2010","unstructured":"Roggen , D. , Calatroni , A. , Rossi , M. , Holleczek , T. , F\u00f6rster , K. , Tr\u00f6ster , G. , Lukowicz , P. , Bannach , D. , Pirkl , G. , Ferscha , A. and others 2010. Collecting complex activity datasets in highly rich networked sensor environments . Networked Sensing Systems (INSS), 2010 Seventh International Conference on ( 2010 ), 233--240. Roggen, D., Calatroni, A., Rossi, M., Holleczek, T., F\u00f6rster, K., Tr\u00f6ster, G., Lukowicz, P., Bannach, D., Pirkl, G., Ferscha, A. and others 2010. Collecting complex activity datasets in highly rich networked sensor environments. Networked Sensing Systems (INSS), 2010 Seventh International Conference on (2010), 233--240."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/WIFS.2015.7368569"},{"key":"e_1_3_2_1_27_1","volume-title":"2016 USENIX Workshop on Advances in Security Education (ASE 16)","author":"Schreuders Z.C.","year":"2016","unstructured":"Schreuders , Z.C. and Butterfield , E.M . 2016. Gamification for teaching and learning computer security in higher education . 2016 USENIX Workshop on Advances in Security Education (ASE 16) ( 2016 ). Schreuders, Z.C. and Butterfield, E.M. 2016. Gamification for teaching and learning computer security in higher education. 2016 USENIX Workshop on Advances in Security Education (ASE 16) (2016)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2898353"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2017.97"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3130969"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2789168.2790121"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858466"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699343.2699350"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2185448.2185465"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2807442.2807480"},{"key":"e_1_3_2_1_36_1","unstructured":"Google Play. https:\/\/play.google.com\/store\/apps\/details?id=com.bigduckgames.flow  Google Play. https:\/\/play.google.com\/store\/apps\/details?id=com.bigduckgames.flow"},{"key":"e_1_3_2_1_37_1","unstructured":"Intent | Android Developers. https:\/\/developer.android.com\/reference\/android\/content\/Intent#ACTION_USER_UNLOCKED  Intent | Android Developers. https:\/\/developer.android.com\/reference\/android\/content\/Intent#ACTION_USER_UNLOCKED"},{"key":"e_1_3_2_1_38_1","unstructured":"LG W150: Watch Urbane - Sleek Stylish Smartwatch | LG USA. https:\/\/www.lg.com\/us\/smart-watches\/lg-W150-lg-watch-urbane  LG W150: Watch Urbane - Sleek Stylish Smartwatch | LG USA. https:\/\/www.lg.com\/us\/smart-watches\/lg-W150-lg-watch-urbane"},{"key":"e_1_3_2_1_39_1","unstructured":"Samsung Galaxy S8 and S8+ - The Official Samsung Galaxy Site. https:\/\/www.samsung.com\/global\/galaxy\/galaxy-s8\/  Samsung Galaxy S8 and S8+ - The Official Samsung Galaxy Site. https:\/\/www.samsung.com\/global\/galaxy\/galaxy-s8\/"},{"key":"e_1_3_2_1_40_1","unstructured":"Trickytricks. http:\/\/mytrickytricks.blogspot.com\/2013\/07\/commonlockpattern.html  Trickytricks. http:\/\/mytrickytricks.blogspot.com\/2013\/07\/commonlockpattern.html"}],"event":{"name":"ICCDA 2019: 2019 The 3rd International Conference on Compute and Data Analysis","acronym":"ICCDA 2019","location":"Kahului HI USA"},"container-title":["Proceedings of the 2019 3rd International Conference on Compute and Data Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314545.3314572","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314545.3314572","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314545.3314572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:03Z","timestamp":1750208523000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314545.3314572"}},"subtitle":["A Tool for both Friend and Foe"],"short-title":[],"issued":{"date-parts":[[2019,3,14]]},"references-count":40,"alternative-id":["10.1145\/3314545.3314572","10.1145\/3314545"],"URL":"https:\/\/doi.org\/10.1145\/3314545.3314572","relation":{},"subject":[],"published":{"date-parts":[[2019,3,14]]},"assertion":[{"value":"2019-03-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}