{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T13:25:40Z","timestamp":1752672340733,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,5,12]],"date-time":"2021-05-12T00:00:00Z","timestamp":1620777600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"University of Edinburgh and the University of Glasgow jointly funded PhD studentships"},{"name":"Royal Society of Edinburgh","award":["65040"],"award-info":[{"award-number":["65040"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,5,12]]},"DOI":"10.1145\/3490632.3490644","type":"proceedings-article","created":{"date-parts":[[2022,2,25]],"date-time":"2022-02-25T11:25:58Z","timestamp":1645788358000},"page":"35-42","source":"Crossref","is-referenced-by-count":8,"title":["Using Personal Data to Support Authentication: User Attitudes and Suitability"],"prefix":"10.1145","author":[{"given":"Jolie","family":"Bonner","sequence":"first","affiliation":[{"name":"University of Glasgow, United Kingdom"}]},{"given":"Joseph","family":"O'Hagan","sequence":"additional","affiliation":[{"name":"University of Glasgow, United Kingdom"}]},{"given":"Florian","family":"Mathis","sequence":"additional","affiliation":[{"name":"University of Glasgow, United Kingdom and University of Edinburgh, United Kingdom"}]},{"given":"Jamie","family":"Ferguson","sequence":"additional","affiliation":[{"name":"University of Glasgow, United Kingdom"}]},{"given":"Mohamed","family":"Khamis","sequence":"additional","affiliation":[{"name":"University of Glasgow, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,2,25]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Retrieved","author":"MS","year":"2021","unstructured":"2021. MS Office - If you\u2019re looking for Office, you\u2019re in the right place . Retrieved August 12, 2021 from https:\/\/www.microsoft.com\/en-ww\/microsoft-365\/microsoft-office 2021. MS Office - If you\u2019re looking for Office, you\u2019re in the right place. Retrieved August 12, 2021 from https:\/\/www.microsoft.com\/en-ww\/microsoft-365\/microsoft-office"},{"volume-title":"Netflix - How to create and edit profiles. Retrieved","year":"2021","key":"e_1_3_2_1_2_1","unstructured":"2021. Netflix - How to create and edit profiles. Retrieved August 12 2021 from https:\/\/help.netflix.com\/en\/node\/10421 2021. Netflix - How to create and edit profiles. Retrieved August 12 2021 from https:\/\/help.netflix.com\/en\/node\/10421"},{"volume-title":"Watch Movies Online. Retrieved","year":"2021","key":"e_1_3_2_1_3_1","unstructured":"2021. Netflix - Watch TV Shows Online , Watch Movies Online. Retrieved August 12, 2021 from https:\/\/www.netflix.com\/browse 2021. Netflix - Watch TV Shows Online, Watch Movies Online. Retrieved August 12, 2021 from https:\/\/www.netflix.com\/browse"},{"volume-title":"Netflix Tests Cracking Down on Password Sharing. Retrieved","year":"2021","key":"e_1_3_2_1_4_1","unstructured":"2021. Netflix Tests Cracking Down on Password Sharing. Retrieved October 04 2021 from https:\/\/www.hollywoodreporter.com\/tv\/tv-news\/netflix-password-sharing-4147786\/ 2021. Netflix Tests Cracking Down on Password Sharing. Retrieved October 04 2021 from https:\/\/www.hollywoodreporter.com\/tv\/tv-news\/netflix-password-sharing-4147786\/"},{"volume-title":"Netflix weighs up crackdown on password sharing. Retrieved","year":"2021","key":"e_1_3_2_1_5_1","unstructured":"2021. Netflix weighs up crackdown on password sharing. Retrieved October 04 2021 from https:\/\/www.theguardian.com\/media\/2021\/mar\/12\/netflix-weighs-up-crackdown-on-password-sharing 2021. Netflix weighs up crackdown on password sharing. Retrieved October 04 2021 from https:\/\/www.theguardian.com\/media\/2021\/mar\/12\/netflix-weighs-up-crackdown-on-password-sharing"},{"volume-title":"Spotify - Premium Family. Retrieved","year":"2021","key":"e_1_3_2_1_6_1","unstructured":"2021. Spotify - Premium Family. Retrieved October 04 2021 from https:\/\/www.spotify.com\/uk\/family\/ 2021. Spotify - Premium Family. Retrieved October 04 2021 from https:\/\/www.spotify.com\/uk\/family\/"},{"volume-title":"Uber Eats - What is Uber Eats?Retrieved","year":"2021","key":"e_1_3_2_1_7_1","unstructured":"2021. Uber Eats - What is Uber Eats?Retrieved August 12 2021 from https:\/\/help.uber.com\/ubereats\/article\/what-is-uber-eats-?nodeId=fbf73e2a-c21f-4a48-8333-c874ae195fd1 2021. Uber Eats - What is Uber Eats?Retrieved August 12 2021 from https:\/\/help.uber.com\/ubereats\/article\/what-is-uber-eats-?nodeId=fbf73e2a-c21f-4a48-8333-c874ae195fd1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijcci.2018.06.003"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2333112.2333114"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74835-9_24"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2021.102602"},{"key":"e_1_3_2_1_12_1","volume-title":"The construction of autobiographical memories in the self-memory system.Psychological review 107, 2","author":"Conway A","year":"2000","unstructured":"Martin\u00a0 A Conway and Christopher\u00a0 W Pleydell-Pearce . 2000. The construction of autobiographical memories in the self-memory system.Psychological review 107, 2 ( 2000 ), 261. Martin\u00a0A Conway and Christopher\u00a0W Pleydell-Pearce. 2000. The construction of autobiographical memories in the self-memory system.Psychological review 107, 2 (2000), 261."},{"volume-title":"Basics of qualitative research: techniques and procedures for developing grounded theory","author":"Strauss","key":"e_1_3_2_1_13_1","unstructured":"Strauss A.\u00a0L. Corbin J.\u00a0M.1998. Basics of qualitative research: techniques and procedures for developing grounded theory . SAGE Publications, Inc. Strauss A.\u00a0L. Corbin J.\u00a0M.1998. Basics of qualitative research: techniques and procedures for developing grounded theory. SAGE Publications, Inc."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23357"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493432.2493453"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.020"},{"volume-title":"Understanding Shoulder Surfing in the Wild: Stories from Users and Observers","author":"Eiband Malin","key":"e_1_3_2_1_17_1","unstructured":"Malin Eiband , Mohamed Khamis , Emanuel von Zezschwitz , Heinrich Hussmann , and Florian Alt . 2017. Understanding Shoulder Surfing in the Wild: Stories from Users and Observers . Association for Computing Machinery , New York, NY, USA , 4254\u20134265. https:\/\/doi.org\/10.1145\/3025453.3025636 Malin Eiband, Mohamed Khamis, Emanuel von Zezschwitz, Heinrich Hussmann, and Florian Alt. 2017. Understanding Shoulder Surfing in the Wild: Stories from Users and Observers. Association for Computing Machinery, New York, NY, USA, 4254\u20134265. https:\/\/doi.org\/10.1145\/3025453.3025636"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290607.3313052"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242661"},{"volume-title":"I Know What You Did Last Week! Do You? Dynamic Security Questions for Fallback Authentication on Smartphones","author":"Hang Alina","key":"e_1_3_2_1_20_1","unstructured":"Alina Hang , Alexander De\u00a0Luca , and Heinrich Hussmann . 2015. I Know What You Did Last Week! Do You? Dynamic Security Questions for Fallback Authentication on Smartphones . Association for Computing Machinery , New York, NY, USA , 1383\u20131392. https:\/\/doi.org\/10.1145\/2702123.2702131 Alina Hang, Alexander De\u00a0Luca, and Heinrich Hussmann. 2015. I Know What You Did Last Week! Do You? Dynamic Security Questions for Fallback Authentication on Smartphones. Association for Computing Machinery, New York, NY, USA, 1383\u20131392. https:\/\/doi.org\/10.1145\/2702123.2702131"},{"key":"e_1_3_2_1_21_1","volume-title":"Eleventh Symposium On Usable Privacy and Security ({SOUPS}","author":"Hang Alina","year":"2015","unstructured":"Alina Hang , Alexander De\u00a0Luca , Matthew Smith , Michael Richter , and Heinrich Hussmann . 2015 . Where have you been? using location-based security questions for fallback authentication . In Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015). 169\u2013183. Alina Hang, Alexander De\u00a0Luca, Matthew Smith, Michael Richter, and Heinrich Hussmann. 2015. Where have you been? using location-based security questions for fallback authentication. In Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015). 169\u2013183."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1408664.1408670"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1037\/e578132012-008"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300916"},{"key":"e_1_3_2_1_25_1","volume-title":"International Journal of Human\u2013Computer Interaction","author":"Mathis Florian","year":"2021","unstructured":"Florian Mathis , Kami Vaniea , and Mohamed Khamis . 2021. Prototyping Usable Privacy and Security Systems: Insights from Experts . International Journal of Human\u2013Computer Interaction ( 2021 ), 1\u201323. https:\/\/doi.org\/10.1080\/10447318.2021.1949134 Florian Mathis, Kami Vaniea, and Mohamed Khamis. 2021. Prototyping Usable Privacy and Security Systems: Insights from Experts. International Journal of Human\u2013Computer Interaction (2021), 1\u201323. https:\/\/doi.org\/10.1080\/10447318.2021.1949134"},{"key":"e_1_3_2_1_26_1","first-page":"2833","article-title":"Password security: What users know and what they actually do","volume":"8","author":"Riley Shannon","year":"2006","unstructured":"Shannon Riley . 2006 . Password security: What users know and what they actually do . Usability News 8 , 1 (2006), 2833 \u2013 2836 . Shannon Riley. 2006. Password security: What users know and what they actually do. Usability News 8, 1 (2006), 2833\u20132836.","journal-title":"Usability News"},{"key":"e_1_3_2_1_27_1","unstructured":"Tobias Seitz. 2018. Supporting users in password authentication with persuasive design. Tobias Seitz.  Tobias Seitz. 2018. Supporting users in password authentication with persuasive design. Tobias Seitz."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152771.3152773"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1098-1063(1998)8:3<205::AID-HIPO3>3.0.CO;2-I"},{"key":"e_1_3_2_1_30_1","volume-title":"10th Symposium On Usable Privacy and Security ({SOUPS}","author":"Stobert Elizabeth","year":"2014","unstructured":"Elizabeth Stobert and Robert Biddle . 2014 . The password life cycle: user behaviour in managing passwords . In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 243\u2013255. Elizabeth Stobert and Robert Biddle. 2014. The password life cycle: user behaviour in managing passwords. In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 243\u2013255."},{"key":"e_1_3_2_1_31_1","volume-title":"What is episodic memory?Current directions in psychological science 2, 3","author":"Tulving Endel","year":"1993","unstructured":"Endel Tulving . 1993. What is episodic memory?Current directions in psychological science 2, 3 ( 1993 ), 67\u201370. Endel Tulving. 1993. What is episodic memory?Current directions in psychological science 2, 3 (1993), 67\u201370."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858546"},{"key":"e_1_3_2_1_33_1","volume-title":"Observing Password Creation in the Lab. In Eleventh Symposium On Usable Privacy and Security(SOUPS). 123\u2013140","author":"Ur Blase","year":"2015","unstructured":"Blase Ur , Fumiko Noma , Jonathan Bees , Sean\u00a0 M Segreti , Richard Shay , Lujo Bauer , Nicolas Christin , and Lorrie\u00a0Faith Cranor . 2015 . \u201d I Added\u2019!\u2019at the End to Make It Secure \u201d: Observing Password Creation in the Lab. In Eleventh Symposium On Usable Privacy and Security(SOUPS). 123\u2013140 . Blase Ur, Fumiko Noma, Jonathan Bees, Sean\u00a0M Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, and Lorrie\u00a0Faith Cranor. 2015. \u201dI Added\u2019!\u2019at the End to Make It Secure\u201d: Observing Password Creation in the Lab. In Eleventh Symposium On Usable Privacy and Security(SOUPS). 123\u2013140."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073002"}],"event":{"name":"MUM 2021: 20th International Conference on Mobile and Ubiquitous Multimedia","acronym":"MUM 2021","location":"Leuven Belgium"},"container-title":["20th International Conference on Mobile and Ubiquitous Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3490632.3490644","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3490632.3490644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:30:29Z","timestamp":1750188629000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3490632.3490644"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,5,12]]},"references-count":34,"alternative-id":["10.1145\/3490632.3490644","10.1145\/3490632"],"URL":"https:\/\/doi.org\/10.1145\/3490632.3490644","relation":{},"subject":[],"published":{"date-parts":[[2021,5,12]]}}}