{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T02:55:12Z","timestamp":1769741712673,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":47,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T00:00:00Z","timestamp":1557878400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,15]]},"DOI":"10.1145\/3317549.3323412","type":"proceedings-article","created":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:52:21Z","timestamp":1558097541000},"page":"203-213","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Factors influencing users to use unsecured wi-fi networks"],"prefix":"10.1145","author":[{"given":"Nissy","family":"Sombatruang","sequence":"first","affiliation":[{"name":"University College London"}]},{"given":"Lucky","family":"Onwuzurike","sequence":"additional","affiliation":[{"name":"University College London"}]},{"given":"M. Angela","family":"Sasse","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum"}]},{"given":"Michelle","family":"Baddeley","sequence":"additional","affiliation":[{"name":"University of South Australia"}]}],"member":"320","published-online":{"date-parts":[[2019,5,15]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"8th {USENIX} Workshop on Free and Open Communications on the Internet ({FOCI} 18).","author":"Abu-Salma Ruba"},{"key":"e_1_3_2_1_2_1","unstructured":"Action Fraud. 2016. Is public Wi-Fi as safe as you think? www.actionfraud.police.uk\/news\/is-public-wi-fi-as-safe-as-you-think-jan16  Action Fraud. 2016. Is public Wi-Fi as safe as you think? www.actionfraud.police.uk\/news\/is-public-wi-fi-as-safe-as-you-think-jan16"},{"key":"e_1_3_2_1_3_1","unstructured":"Adhikari Supratim. 2018. Free public Wi-Fi a consumer security risk. www.theaustralian.com.au\/business\/technology\/free-public-wifi-a-consumer-security-risk\/news-story\/89482d2214873f9d3d2c19ddb013817f?nk=59fb9d61ba6176a68b04fde147c5600f-1521548822  Adhikari Supratim. 2018. Free public Wi-Fi a consumer security risk. www.theaustralian.com.au\/business\/technology\/free-public-wifi-a-consumer-security-risk\/news-story\/89482d2214873f9d3d2c19ddb013817f?nk=59fb9d61ba6176a68b04fde147c5600f-1521548822"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2007.4"},{"key":"e_1_3_2_1_5_1","unstructured":"Wi-Fi Alliance\u00ae. 2018. Wi-Fi Alliance\u00ae introduces Wi-Fi CERTIFIED WPA3<sup>\u2122<\/sup> security. https:\/\/www.wi-fi.org\/news-events\/newsroom\/wi-fi-alliance-introduces-wi-fi-certified-wpa3-security.  Wi-Fi Alliance\u00ae. 2018. Wi-Fi Alliance\u00ae introduces Wi-Fi CERTIFIED WPA3<sup>\u2122<\/sup> security. https:\/\/www.wi-fi.org\/news-events\/newsroom\/wi-fi-alliance-introduces-wi-fi-certified-wpa3-security."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/EIConRus.2017.7910505"},{"key":"e_1_3_2_1_7_1","unstructured":"Apple. 2018. Developer Guide and Sample Code. https:\/\/developer.apple.com\/library\/content\/documentation\/General\/Reference\/InfoPlistKeyReference\/Articles\/CocoaKeys.html#\/\/apple_ref\/doc\/uid\/TP40009251-SW35  Apple. 2018. Developer Guide and Sample Code. https:\/\/developer.apple.com\/library\/content\/documentation\/General\/Reference\/InfoPlistKeyReference\/Articles\/CocoaKeys.html#\/\/apple_ref\/doc\/uid\/TP40009251-SW35"},{"key":"e_1_3_2_1_8_1","first-page":"27","article-title":"Wi-fi hotspots: secure or ripe for fraud","volume":"5","author":"Brody Richard G","year":"2013","journal-title":"Journal of Forensic Investigative Accounting"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567086"},{"key":"e_1_3_2_1_10_1","unstructured":"Conway Richard. 2017. World Cup 2018: FA increases cyber security over hacking concerns. http:\/\/www.bbc.com\/sport\/football\/41230542  Conway Richard. 2017. World Cup 2018: FA increases cyber security over hacking concerns. http:\/\/www.bbc.com\/sport\/football\/41230542"},{"key":"e_1_3_2_1_11_1","unstructured":"EU General Data Protect in Regulation. 2018. GDPR Key Changes. https:\/\/www.eugdpr.org\/key-changes.html  EU General Data Protect in Regulation. 2018. GDPR Key Changes. https:\/\/www.eugdpr.org\/key-changes.html"},{"key":"e_1_3_2_1_12_1","unstructured":"European Commission. 2017. The end of roaming charges within the EU. http:\/\/ec.europa.eu\/commfrontoffice\/publicopinion\/index.cfm\/Survey\/getSurveyDetail\/instruments\/FLASH\/surveyKy\/2178  European Commission. 2017. The end of roaming charges within the EU. http:\/\/ec.europa.eu\/commfrontoffice\/publicopinion\/index.cfm\/Survey\/getSurveyDetail\/instruments\/FLASH\/surveyKy\/2178"},{"key":"e_1_3_2_1_13_1","unstructured":"F-Secure. 2014. The F-Secure Wi-Fi Experiment. www.fsecureconsumer.files.wordpress.com\/2014\/09\/wi-fi_report_2014_f-secure.pdf  F-Secure. 2014. The F-Secure Wi-Fi Experiment. www.fsecureconsumer.files.wordpress.com\/2014\/09\/wi-fi_report_2014_f-secure.pdf"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2382196.2382205"},{"key":"e_1_3_2_1_15_1","unstructured":"Google. 2018. Security. https:\/\/source.android.com\/security\/  Google. 2018. Security. https:\/\/source.android.com\/security\/"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307658"},{"key":"e_1_3_2_1_17_1","unstructured":"iPass. 2018. Wi-Fi Growth Map. https:\/\/www.ipass.com\/wifi-growth-map  iPass. 2018. Wi-Fi Growth Map. https:\/\/www.ipass.com\/wifi-growth-map"},{"key":"e_1_3_2_1_18_1","first-page":"101","article-title":"Whacking, joyriding and war-driving: Roaming use of Wi-Fi and the law. Santa Clara Computer & High Tech","volume":"21","author":"Kern Benjamin D","year":"2004","journal-title":"LJ"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1519004"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Anandi Mani Sendhil Mullainathan Eldar Shafir and Jiaying Zhao. 2013. Poverty impedes cognitive function. Science 341 6149 (2013) 976--980.  Anandi Mani Sendhil Mullainathan Eldar Shafir and Jiaying Zhao. 2013. Poverty impedes cognitive function. Science 341 6149 (2013) 976--980.","DOI":"10.1126\/science.1238041"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"Ian McShane Mark A Gregory and Christopher Wilson. 2016. Practicing Safe Public Wi-Fi: Assessing and Managing Data-Security Risks. (2016).  Ian McShane Mark A Gregory and Christopher Wilson. 2016. Practicing Safe Public Wi-Fi: Assessing and Managing Data-Security Risks. (2016).","DOI":"10.2139\/ssrn.2895216"},{"key":"e_1_3_2_1_22_1","unstructured":"Microsoft. 2018. Encryption. www.microsoft.com\/en-us\/trustcenter\/security\/encryption  Microsoft. 2018. Encryption. www.microsoft.com\/en-us\/trustcenter\/security\/encryption"},{"key":"e_1_3_2_1_23_1","unstructured":"Miller A. Jen. 2016. The dangerous cost of free Wi-Fi. www.cio.com\/article\/3101859\/wi-fi\/the-dangerous-cost-of-free-wi-fi.html  Miller A. Jen. 2016. The dangerous cost of free Wi-Fi. www.cio.com\/article\/3101859\/wi-fi\/the-dangerous-cost-of-free-wi-fi.html"},{"key":"e_1_3_2_1_24_1","unstructured":"Ministry of Internal Affairs and Communications. 2016. Wireless-LAN Business Guidelines 2nd Edition. www.soumu.go.jp\/main_content\/000444788.pdf.  Ministry of Internal Affairs and Communications. 2016. Wireless-LAN Business Guidelines 2nd Edition. www.soumu.go.jp\/main_content\/000444788.pdf."},{"key":"e_1_3_2_1_25_1","unstructured":"Sendhil Mullainathan and Eldar Shafir. 2014. Scarcity: the true cost of not having enough. Penguin books.  Sendhil Mullainathan and Eldar Shafir. 2014. Scarcity: the true cost of not having enough. Penguin books."},{"key":"e_1_3_2_1_26_1","unstructured":"Munbodh Emma. 2017. Why you should never use public wi-fi for online banking - and 5 other common mistakes. www.mirror.co.uk\/money\/you-should-never-use-public-10918012  Munbodh Emma. 2017. Why you should never use public wi-fi for online banking - and 5 other common mistakes. www.mirror.co.uk\/money\/you-should-never-use-public-10918012"},{"key":"e_1_3_2_1_27_1","unstructured":"Munford Monty. 2013. Lazy WiFi providers offer data-free risks for terrorists and criminals. www.telegraph.co.uk\/technology\/internet-security\/10468317\/Lazy-WiFi-providers-offer- data-free-risks-for-terrorists-and-criminals.html  Munford Monty. 2013. Lazy WiFi providers offer data-free risks for terrorists and criminals. www.telegraph.co.uk\/technology\/internet-security\/10468317\/Lazy-WiFi-providers-offer- data-free-risks-for-terrorists-and-criminals.html"},{"key":"e_1_3_2_1_28_1","unstructured":"National Cyber Security Center. 2017. Keeping your smartphones (and tablets) safe. https:\/\/www.ncsc.gov.uk\/guidance\/keeping-your-smartphones-and-tablets-safe  National Cyber Security Center. 2017. Keeping your smartphones (and tablets) safe. https:\/\/www.ncsc.gov.uk\/guidance\/keeping-your-smartphones-and-tablets-safe"},{"key":"e_1_3_2_1_29_1","unstructured":"Norton Team. 2016. Public Wi-Fi security? Here's why you should use a VPN. https:\/\/uk.norton.com\/norton-blog\/2016\/10\/public_wi-fi_securit.html  Norton Team. 2016. Public Wi-Fi security? Here's why you should use a VPN. https:\/\/uk.norton.com\/norton-blog\/2016\/10\/public_wi-fi_securit.html"},{"key":"e_1_3_2_1_30_1","unstructured":"Ofcom. 2017. Adults' media use and attitudes - report 2017. https:\/\/www.ofcom.org.uk\/___data\/assets\/pdf_file\/...\/adults-media-use-attitudes-2017.pdf  Ofcom. 2017. Adults' media use and attitudes - report 2017. https:\/\/www.ofcom.org.uk\/___data\/assets\/pdf_file\/...\/adults-media-use-attitudes-2017.pdf"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766498.2766522"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08506-7_13"},{"key":"e_1_3_2_1_33_1","volume-title":"Republican National Convention delegates unknowingly use fake Wi-Fi networks. https:\/\/blog.avast.com\/republican-national-convention-delegates-unknowingly-use-fake-wi-fi-networks","year":"2016"},{"key":"e_1_3_2_1_34_1","volume-title":"Third International Conference on Social Eco-Informatics. 217--228","author":"Seigneur Jean-Marc","year":"2013"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1222426"},{"key":"e_1_3_2_1_36_1","unstructured":"Shaw Nicholas. 2016. How Safe Is It To Connect To Public Wi-Fi Networks? www.huffingtonpost.co.uk\/nicholas-shaw\/how-safe-is-it-to-connect_1_b_12468328.html  Shaw Nicholas. 2016. How Safe Is It To Connect To Public Wi-Fi Networks? www.huffingtonpost.co.uk\/nicholas-shaw\/how-safe-is-it-to-connect_1_b_12468328.html"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5815\/ijcnis.2013.07.02"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/PST.2018.8514208"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3046055.3046058"},{"key":"e_1_3_2_1_40_1","article-title":"Economic decision-making in poverty depletes behavioral control","volume":"11","author":"Spears Dean","year":"2011","journal-title":"The BE Journal of Economic Analysis & Policy"},{"key":"e_1_3_2_1_41_1","unstructured":"Sulleyman Aatif. 2017. Coffee shop Wi-Fi 'most dangerous' of all warns security report. www.independent.co.uk\/life-style\/gadgets-and-tech\/news\/wifi-hotpots-coffee-shop-dangerous-security-risk-report-a7750091.html  Sulleyman Aatif. 2017. Coffee shop Wi-Fi 'most dangerous' of all warns security report. www.independent.co.uk\/life-style\/gadgets-and-tech\/news\/wifi-hotpots-coffee-shop-dangerous-security-risk-report-a7750091.html"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13446-3_3"},{"key":"e_1_3_2_1_43_1","unstructured":"Symantec. 2017. Norton Wi-Fi Risk Report. www.symantec.com\/content\/dam\/symantec\/docs\/reports\/2017-norton-wifi-risk-report-global-results-summary-en.pdf  Symantec. 2017. Norton Wi-Fi Risk Report. www.symantec.com\/content\/dam\/symantec\/docs\/reports\/2017-norton-wifi-risk-report-global-results-summary-en.pdf"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_22"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858303"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Kathleen D Vohs. 2013. The poor's poor mental power. Science 341 6149 (2013) 969--970.  Kathleen D Vohs. 2013. The poor's poor mental power. Science 341 6149 (2013) 969--970.","DOI":"10.1126\/science.1244172"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/NGMAST.2008.26"}],"event":{"name":"WiSec '19: 12th ACM Conference on Security and Privacy in Wireless and Mobile Networks","location":"Miami Florida","acronym":"WiSec '19","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing"]},"container-title":["Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3323412","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3317549.3323412","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:18Z","timestamp":1750276878000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3317549.3323412"}},"subtitle":["evidence in the wild"],"short-title":[],"issued":{"date-parts":[[2019,5,15]]},"references-count":47,"alternative-id":["10.1145\/3317549.3323412","10.1145\/3317549"],"URL":"https:\/\/doi.org\/10.1145\/3317549.3323412","relation":{},"subject":[],"published":{"date-parts":[[2019,5,15]]},"assertion":[{"value":"2019-05-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}