{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:04Z","timestamp":1750220884638,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":21,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,11,26]],"date-time":"2019-11-26T00:00:00Z","timestamp":1574726400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Bavarian State Ministry of Education, Science and the Arts"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,11,26]]},"DOI":"10.1145\/3365610.3365628","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T13:19:56Z","timestamp":1574687996000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Securing personal items in public space"],"prefix":"10.1145","author":[{"given":"Sarah","family":"Prange","sequence":"first","affiliation":[{"name":"LMU Munich, Munich, Germany"}]},{"given":"Lukas","family":"Mecke","sequence":"additional","affiliation":[{"name":"LMU Munich, Munich, Germany"}]},{"given":"Michael","family":"Stadler","sequence":"additional","affiliation":[{"name":"University of Applied Sciences, Munich, Germany"}]},{"given":"Maximilian","family":"Balluff","sequence":"additional","affiliation":[{"name":"University of Applied Sciences, Munich, Germany"}]},{"given":"Mohamed","family":"Khamis","sequence":"additional","affiliation":[{"name":"University of Glasgow, Glasgow, UK"}]},{"given":"Florian","family":"Alt","sequence":"additional","affiliation":[{"name":"Bundeswehr University, Munich, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,11,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025461"},{"key":"e_1_3_2_1_2_1","volume-title":"Proceedings of the 4th USENIX Conference on Offensive Technologies (WOOT'10)","author":"Aviv Adam J.","year":"1925","unstructured":"Adam J. Aviv , Katherine Gibson , Evan Mossop , Matt Blaze , and Jonathan M. Smith . 2010. Smudge Attacks on Smartphone Touch Screens . In Proceedings of the 4th USENIX Conference on Offensive Technologies (WOOT'10) . USENIX Association, Berkeley, CA, USA, 1--7. http:\/\/dl.acm.org\/citation.cfm?id= 1925 004.1925009 Adam J. Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan M. Smith. 2010. Smudge Attacks on Smartphone Touch Screens. In Proceedings of the 4th USENIX Conference on Offensive Technologies (WOOT'10). USENIX Association, Berkeley, CA, USA, 1--7. http:\/\/dl.acm.org\/citation.cfm?id=1925004.1925009"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858164"},{"volume-title":"Hot products: Understanding, anticipating and reducing demand for stolen goods","author":"Gemuseus Clarke Ronald Victor","key":"e_1_3_2_1_4_1","unstructured":"Ronald Victor Gemuseus Clarke and Barry Webb . 1999. Hot products: Understanding, anticipating and reducing demand for stolen goods . Vol. 112 . Home Office, Policing and Reducing Crime Unit, Research, Development and Statistics Directorate, London . Ronald Victor Gemuseus Clarke and Barry Webb. 1999. Hot products: Understanding, anticipating and reducing demand for stolen goods. Vol. 112. Home Office, Policing and Reducing Crime Unit, Research, Development and Statistics Directorate, London."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557097"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025636"},{"key":"e_1_3_2_1_7_1","volume-title":"The critical incident technique. Psychological bulletin 51, 4","author":"Flanagan John C","year":"1954","unstructured":"John C Flanagan . 1954. The critical incident technique. Psychological bulletin 51, 4 ( 1954 ), 327. John C Flanagan. 1954. The critical incident technique. Psychological bulletin 51, 4 (1954), 327."},{"key":"e_1_3_2_1_8_1","volume-title":"23rd USENIX Security Symposium (USENIX Security 14)","author":"Komanduri Saranga","year":"2014","unstructured":"Saranga Komanduri , Richard Shay , Lorrie Faith Cranor , Cormac Herley , and Stuart Schechter . 2014 . Telepathwords: Preventing Weak Passwords by Reading Users' Minds . In 23rd USENIX Security Symposium (USENIX Security 14) . USENIX Association, San Diego, CA, 591--606. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/komanduri Saranga Komanduri, Richard Shay, Lorrie Faith Cranor, Cormac Herley, and Stuart Schechter. 2014. Telepathwords: Preventing Weak Passwords by Reading Users' Minds. In 23rd USENIX Security Symposium (USENIX Security 14). USENIX Association, San Diego, CA, 591--606. https:\/\/www.usenix.org\/conference\/usenixsecurity14\/technical-sessions\/presentation\/komanduri"},{"volume-title":"The unresponsive bystander: Why doesn't he help? Appleton-Century-Crofts","author":"Latan\u00e9 Bibb","key":"e_1_3_2_1_9_1","unstructured":"Bibb Latan\u00e9 and John M Darley . 1970. The unresponsive bystander: Why doesn't he help? Appleton-Century-Crofts , New York . Bibb Latan\u00e9 and John M Darley. 1970. The unresponsive bystander: Why doesn't he help? Appleton-Century-Crofts, New York."},{"key":"e_1_3_2_1_10_1","first-page":"337","article-title":"Theft detection system and method","volume":"4","author":"Lemelson Jerome H","year":"1982","unstructured":"Jerome H Lemelson . 1982 . Theft detection system and method . US Patent 4 , 337 ,462. Jerome H Lemelson. 1982. Theft detection system and method. US Patent 4,337,462.","journal-title":"US Patent"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188633"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2003.819611"},{"key":"e_1_3_2_1_13_1","volume-title":"The self-report method. Handbook of research methods in personality psychology 1","author":"Paulhus Delroy L","year":"2007","unstructured":"Delroy L Paulhus and Simine Vazire . 2007. The self-report method. Handbook of research methods in personality psychology 1 ( 2007 ), 224--239. Delroy L Paulhus and Simine Vazire. 2007. The self-report method. Handbook of research methods in personality psychology 1 (2007), 224--239."},{"key":"e_1_3_2_1_14_1","first-page":"177","article-title":"Auto theft detection system","volume":"4","author":"Reagan William R","year":"1979","unstructured":"William R Reagan . 1979 . Auto theft detection system . US Patent 4 , 177 ,466. William R Reagan. 1979. Auto theft detection system. US Patent 4,177,466.","journal-title":"US Patent"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0097-8493(99)00120-X"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2632048.2636090"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1057\/sj.2008.17"},{"key":"e_1_3_2_1_18_1","volume-title":"Sensitive questions in surveys. Psychological bulletin 133, 5","author":"Tourangeau Roger","year":"2007","unstructured":"Roger Tourangeau and Ting Yan . 2007. Sensitive questions in surveys. Psychological bulletin 133, 5 ( 2007 ), 859. Roger Tourangeau and Ting Yan. 2007. Sensitive questions in surveys. Psychological bulletin 133, 5 (2007), 859."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3026050"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702212"},{"key":"e_1_3_2_1_21_1","first-page":"218","article-title":"Acceleration-based theft detection system for portable electronic devices","volume":"7","author":"Wehrenberg Paul J","year":"2007","unstructured":"Paul J Wehrenberg . 2007 . Acceleration-based theft detection system for portable electronic devices . US Patent 7 , 218 ,226. Paul J Wehrenberg. 2007. Acceleration-based theft detection system for portable electronic devices. US Patent 7,218,226.","journal-title":"US Patent"}],"event":{"name":"MUM 2019: 18th International Conference on Mobile and Ubiquitous Multimedia","acronym":"MUM 2019","location":"Pisa Italy"},"container-title":["Proceedings of the 18th International Conference on Mobile and Ubiquitous Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3365610.3365628","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3365610.3365628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:20Z","timestamp":1750203860000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3365610.3365628"}},"subtitle":["stories of attacks and threats"],"short-title":[],"issued":{"date-parts":[[2019,11,26]]},"references-count":21,"alternative-id":["10.1145\/3365610.3365628","10.1145\/3365610"],"URL":"https:\/\/doi.org\/10.1145\/3365610.3365628","relation":{},"subject":[],"published":{"date-parts":[[2019,11,26]]},"assertion":[{"value":"2019-11-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}