{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T02:35:37Z","timestamp":1772937337629,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,29]],"date-time":"2022-09-29T00:00:00Z","timestamp":1664409600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["EP\/V008870\/1"],"award-info":[{"award-number":["EP\/V008870\/1"]}]},{"name":"PETRAS National Centre of Excellence for IoT Systems Cybersecurity","award":["EP\/S035362\/1"],"award-info":[{"award-number":["EP\/S035362\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,29]]},"DOI":"10.1145\/3549015.3554211","type":"proceedings-article","created":{"date-parts":[[2022,9,8]],"date-time":"2022-09-08T22:11:27Z","timestamp":1662675087000},"page":"85-97","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Shoulder Surfing through the Social Lens: A Longitudinal Investigation &amp; Insights from an Exploratory Diary Study"],"prefix":"10.1145","author":[{"given":"Habiba","family":"Farzand","sequence":"first","affiliation":[{"name":"University of Glasgow, United Kingdom"}]},{"given":"Karola","family":"Marky","sequence":"additional","affiliation":[{"name":"University of Glasgow, United Kingdom and Leibniz University Hannover, Germany"}]},{"given":"Mohamed","family":"Khamis","sequence":"additional","affiliation":[{"name":"University of Glasgow, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2022,9,29]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Using diaries for social research","author":"Alaszewski Andy","unstructured":"Andy Alaszewski. 2006. Using diaries for social research. Sage."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134600.3134609"},{"key":"e_1_3_2_1_3_1","first-page":"21","article-title":"PrivacyScout: Assessing Vulnerability to Shoulder Surfing on Mobile Devices","volume":"1","author":"B\u00e2ce Mihai","year":"2022","unstructured":"Mihai B\u00e2ce, Alia Saad, Mohamed Khamis, Stefan Schneegass, and Andreas Bulling. 2022. PrivacyScout: Assessing Vulnerability to Shoulder Surfing on Mobile Devices. Proceedings on Privacy Enhancing Technologies 1 (2022), 21.","journal-title":"Proceedings on Privacy Enhancing Technologies"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Rasekhar Bhagavatula Blase Ur Kevin Iacovino Su\u00a0Mon Kywe Lorrie\u00a0Faith Cranor and Marios Savvides. 2015. Biometric authentication on iphone and android: Usability perceptions and influences on adoption. (2015).","DOI":"10.14722\/usec.2015.23003"},{"key":"e_1_3_2_1_5_1","volume-title":"\u201cquick and dirty\u2019usability. Usability evaluation in industry 189, 3","author":"Brooke John","year":"1996","unstructured":"John Brooke. 1996. Sus: a \u201cquick and dirty\u2019usability. Usability evaluation in industry 189, 3 (1996)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2611009.2611028"},{"key":"e_1_3_2_1_7_1","unstructured":"Canva. 2022. Canva. https:\/\/www.canva.com"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3501970"},{"key":"e_1_3_2_1_9_1","volume-title":"What privacy is for. https:\/\/cdn.harvardlawreview.org\/wp-content\/uploads\/pdfs\/vol126_cohen.pdf Retrieved","author":"Cohen E","year":"2021","unstructured":"Julie\u00a0E Cohen. 2013. What privacy is for. https:\/\/cdn.harvardlawreview.org\/wp-content\/uploads\/pdfs\/vol126_cohen.pdf Retrieved Aug 17, 2021."},{"key":"e_1_3_2_1_10_1","volume-title":"Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation","author":"Culnan J","year":"1999","unstructured":"Mary\u00a0J Culnan and Pamela\u00a0K Armstrong. 1999. Information privacy concerns, procedural fairness, and impersonal trust: An empirical investigation. Organization science 10, 1 (1999), 104\u2013115."},{"key":"e_1_3_2_1_11_1","volume-title":"Detect faces with ML Kit on Android. https:\/\/developers.google.com\/ml-kit\/vision\/face-detection\/android Retrieved","author":"Developers Google","year":"2022","unstructured":"Google Developers. 2022. Detect faces with ML Kit on Android. https:\/\/developers.google.com\/ml-kit\/vision\/face-detection\/android Retrieved June 08, 2022."},{"key":"e_1_3_2_1_12_1","volume-title":"The Unidimensional Relationship Closeness Scale (URCS): Reliability and validity evidence for a new measure of relationship closeness.Psychological assessment 24, 3","author":"Dibble L","year":"2012","unstructured":"Jayson\u00a0L Dibble, Timothy\u00a0R Levine, and Hee\u00a0Sun Park. 2012. The Unidimensional Relationship Closeness Scale (URCS): Reliability and validity evidence for a new measure of relationship closeness.Psychological assessment 24, 3 (2012), 565."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025636"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851581.2892511"},{"key":"e_1_3_2_1_15_1","volume-title":"Adorned in Memes: Exploring the Adoption of Social Wearables in Nordic Student Culture. In CHI Conference on Human Factors in Computing Systems. 1\u201318","author":"Epp Felix\u00a0Anand","year":"2022","unstructured":"Felix\u00a0Anand Epp, Anna Kantosalo, Nehal Jain, Andr\u00e9s Lucero, and Elisa\u00a0D Mekler. 2022. Adorned in Memes: Exploring the Adoption of Social Wearables in Nordic Student Culture. In CHI Conference on Human Factors in Computing Systems. 1\u201318."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3473856.3474006"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the Eighteenth USENIX Conference on Usable Privacy and Security. USENIX Association, USA.","author":"Farzand Habiba","year":"2022","unstructured":"Habiba Farzand, Karola Marky, and Mohamed Khamis. 2022. \u201d I Hate When People Do This; There\u2019s a Lot of Sensitive Content for Me\u201d: A Typology of Perceived Privacy-Sensitive Content in Shoulder Surfing Scenarios. In Proceedings of the Eighteenth USENIX Conference on Usable Privacy and Security. USENIX Association, USA."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(11)70116-6"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0232076"},{"key":"e_1_3_2_1_20_1","volume-title":"10th Symposium On Usable Privacy and Security ({SOUPS}","author":"Harbach Marian","year":"2014","unstructured":"Marian Harbach, Emanuel Von\u00a0Zezschwitz, Andreas Fichtner, Alexander De\u00a0Luca, and Matthew Smith. 2014. It\u2019s a hard lock life: A field study of smartphone (un) locking behavior and risk perception. In 10th Symposium On Usable Privacy and Security ({SOUPS} 2014). 213\u2013230."},{"key":"e_1_3_2_1_21_1","volume-title":"IFIP International Summer School on Privacy and Identity Management","author":"H\u00f6lzl Michael","unstructured":"Michael H\u00f6lzl, Michael Roland, and Ren\u00e9 Mayrhofer. 2017. Real-world Identification for an Extensible and Privacy-preserving Mobile eID. In IFIP International Summer School on Privacy and Identity Management. Springer, 354\u2013370."},{"key":"e_1_3_2_1_22_1","volume-title":"Stop shoulder surfers with the HP EliteBook x360. https:\/\/www.linkedin.com\/posts\/activity-6544966289893408768-jLDf Retrieved","author":"HP.","year":"2021","unstructured":"HP. 2020. Stop shoulder surfers with the HP EliteBook x360. https:\/\/www.linkedin.com\/posts\/activity-6544966289893408768-jLDf Retrieved February 11, 2021."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1164820.1164851"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376840"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152832.3152851"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.3390\/mti2030045"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3531073.3531125"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Mohamed Khamis Karola Marky Andreas Bulling and Florian Alt. 2022. User-centred multimodal authentication: securing handheld mobile devices using gaze and touch input. Behaviour & Information Technology(2022) 1\u201323.","DOI":"10.1080\/0144929X.2022.2069597"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1215\/08992363-8090145"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.09.005"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/1099-0720(200101\/02)15:1<101::AID-ACP697>3.0.CO;2-7"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89350-9_6"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300819"},{"key":"e_1_3_2_1_34_1","volume-title":"Qualitative content analysis. A companion to qualitative research 1, 2","author":"Philipp Mayring","year":"2004","unstructured":"Philipp Mayring 2004. Qualitative content analysis. A companion to qualitative research 1, 2 (2004), 159\u2013176."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359174"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493223"},{"key":"e_1_3_2_1_37_1","volume-title":"Qualtrics - Leading Experience Management and Survey Software. https:\/\/www.qualtrics.com\/uk\/?rid=ip&prevsite=en&newsite=uk&geo=GB&geomatch=uk Retrieved","year":"2021","unstructured":"Qualtrics. 2021. Qualtrics - Leading Experience Management and Survey Software. https:\/\/www.qualtrics.com\/uk\/?rid=ip&prevsite=en&newsite=uk&geo=GB&geomatch=uk Retrieved February 11, 2021."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3519391.3519411"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338286.3340129"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/169059.169255"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3282894.3282919"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379157.3391422"},{"key":"e_1_3_2_1_43_1","volume-title":"Tendency to Shoulder Surf Smartphones Using 360-degree Videos in Virtual Reality.","author":"ALIA SAAD, JONATHAN LIEBERS, UWE GRUENEFELD, FLORIAN","year":"2021","unstructured":"ALIA SAAD, JONATHAN LIEBERS, UWE GRUENEFELD, FLORIAN ALT, and STEFAN SCHNEEGASS. 2021. Understanding Bystanders\u2019 Tendency to Shoulder Surf Smartphones Using 360-degree Videos in Virtual Reality. (2021)."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29387-1_5"},{"key":"e_1_3_2_1_45_1","volume-title":"Digital Emotion Regulation in Everyday Life. In CHI Conference on Human Factors in Computing Systems. 1\u201315","author":"Smith Wally","year":"2022","unstructured":"Wally Smith, Greg Wadley, Sarah Webber, Benjamin Tag, Vassilis Kostakos, Peter Koval, and James\u00a0J Gross. 2022. Digital Emotion Regulation in Everyday Life. In CHI Conference on Human Factors in Computing Systems. 1\u201315."},{"key":"e_1_3_2_1_46_1","volume-title":"Sensitive questions in surveys.Psychological bulletin 133, 5","author":"Tourangeau Roger","year":"2007","unstructured":"Roger Tourangeau and Ting Yan. 2007. Sensitive questions in surveys.Psychological bulletin 133, 5 (2007), 859."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858120"},{"key":"e_1_3_2_1_48_1","first-page":"166","article-title":"Privacy and freedom","volume":"25","author":"Westin F","year":"1968","unstructured":"Alan\u00a0F Westin. 1968. Privacy and freedom. Washington and Lee Law Review 25, 1 (1968), 166.","journal-title":"Washington and Lee Law Review"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.05.006"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858232"}],"event":{"name":"EuroUSEC 2022: 2022 European Symposium on Usable Security","location":"Karlsruhe Germany","acronym":"EuroUSEC 2022"},"container-title":["Proceedings of the 2022 European Symposium on Usable Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3549015.3554211","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3549015.3554211","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:50:54Z","timestamp":1750182654000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3549015.3554211"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,29]]},"references-count":50,"alternative-id":["10.1145\/3549015.3554211","10.1145\/3549015"],"URL":"https:\/\/doi.org\/10.1145\/3549015.3554211","relation":{},"subject":[],"published":{"date-parts":[[2022,9,29]]},"assertion":[{"value":"2022-09-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}