{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:08:33Z","timestamp":1750219713788,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3617072.3617104","type":"proceedings-article","created":{"date-parts":[[2023,10,13]],"date-time":"2023-10-13T17:47:04Z","timestamp":1697219224000},"page":"86-96","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Better the Devil You Know: Using Lost-Smartphone Scenarios to Explore user Perceptions of Unauthorised Access"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8928-3961","authenticated-orcid":false,"given":"Matt","family":"Dixon","sequence":"first","affiliation":[{"name":"Pact Lab, Northumbria University, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1085-7115","authenticated-orcid":false,"given":"Elizabeth","family":"Sillence","sequence":"additional","affiliation":[{"name":"Pact Lab, Northumbria University, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8460-8838","authenticated-orcid":false,"given":"James","family":"Nicholson","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, Northumbria University, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6600-8414","authenticated-orcid":false,"given":"Lynne","family":"Coventry","sequence":"additional","affiliation":[{"name":"Division of Cybersecurity, Abertay University, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2818000.2818014"},{"key":"e_1_3_2_1_2_1","volume-title":"ACM International Conference Proceeding Series","author":"Aviv A.J.","year":"2017","unstructured":"[2] Aviv, A.J., Davin, J.T., Wolf, F. and Kuber, R. 2017. Towards baselines for shoulder surfing on mobile authentication. ACM International Conference Proceeding Series (2017), 486\u2013498."},{"key":"e_1_3_2_1_3_1","volume-title":"4th USENIX Workshop on Offensive Technologies, WOOT 2010","author":"Aviv A.J.","year":"2010","unstructured":"[3] Aviv, A.J., Gibson, K., Mossop, E., Blaze, M. and Smith, J.M. 2010. Smudge attacks on smartphone touch screens. 4th USENIX Workshop on Offensive Technologies, WOOT 2010 (2010)."},{"key":"e_1_3_2_1_4_1","volume-title":"Mobile HCI 2011 - 13th International Conference on Human-Computer Interaction with Mobile Devices and Services","author":"Ben-Asher N.","year":"2011","unstructured":"[4] Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A. and M\u00f6ller, S. 2011. On the need for different security methods on mobile phones. Mobile HCI 2011 - 13th International Conference on Human-Computer Interaction with Mobile Devices and Services (2011), 465\u2013473."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","unstructured":"[5] Bonneau J. Preibusch S. and Anderson R. 2012. A birthday present every eleven wallets? The security of customer-chosen banking PINs. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7397 LNCS (2012) 25\u201340. DOI:https:\/\/doi.org\/10.1007\/978-3-642-32946-3_3.","DOI":"10.1007\/978-3-642-32946-3_3"},{"key":"e_1_3_2_1_6_1","unstructured":"[6] Casimiro M. Segel J. Li L. Wang Y. and Cranor L.F. 2020. A Quest for Inspiration: How Users Create and Reuse PINs. WAY (2020)."},{"key":"e_1_3_2_1_7_1","unstructured":"[7] Cellebrite - Digital Intelligence For A Safer World: https:\/\/cellebrite.com\/en\/home\/. Accessed: 2023-01-24."},{"key":"e_1_3_2_1_8_1","volume-title":"SOUPS 2012 - Proceedings of the 8th Symposium on Usable Privacy and Security","author":"Chin E.","year":"2012","unstructured":"[8] Chin, E., Felt, A.P., Sekar, V. and Wagner, D. 2012. Measuring user confidence in smartphone security and privacy. SOUPS 2012 - Proceedings of the 8th Symposium on Usable Privacy and Security (2012)."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security","author":"Egelman S.","year":"2014","unstructured":"[9] Egelman, S., Jain, S., Portnoff, R.S., Liao, K., Consolvo, S. and Wagner, D. 2014. Are you ready to lock? Understanding user motivations for smartphone locking behaviors. Proceedings of the ACM Conference on Computer and Communications Security (2014), 750\u2013761."},{"key":"e_1_3_2_1_10_1","unstructured":"[10] Fulton K.R. Gelles R. Mckay A. Roberts R. Abdi Y. Mazurek M.L. Clara S. Fulton K.R. Gelles R. Mckay A. Roberts R. Abdi Y. and Mazurek M.L. 2019. The Effect of Entertainment Media on Mental Models of Computer Security This paper is included in the Proceedings of the The Effect of Entertainment Media on Mental Models of Computer Security. (2019)."},{"key":"e_1_3_2_1_11_1","unstructured":"[11] Gaetano J. 2018. Holm-Bonferroni sequential correction: An Excel Calculator (1.3)."},{"key":"e_1_3_2_1_12_1","unstructured":"[12] GrayKey Cell Phone Forensics Tool: https:\/\/www.grayshift.com\/graykey\/. Accessed: 2023-01-24."},{"key":"e_1_3_2_1_13_1","volume-title":"online banking use 2020","author":"Great Britain","year":"2020","unstructured":"[13] Great Britain: online banking use 2020: 2020. https:\/\/www.statista.com\/statistics\/286273\/internet-banking-penetration-in-great-britain\/. Accessed: 2022-05-09."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the Tenth Symposium On Usable Privacy and Security.","author":"Harbach M.","year":"2016","unstructured":"[14] Harbach, M., von Zezschwitz, E., Fichtner, A., Luca, A. De and Smith, M. 2016. It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception. SOUPS \u201914: Proceedings of the Tenth Symposium On Usable Privacy and Security. (2016), 213\u2013230."},{"key":"e_1_3_2_1_15_1","volume-title":"Conference on Human Factors in Computing Systems - Proceedings","author":"De Luca A.","year":"2015","unstructured":"[15] De Luca, A., Hang, A., Von Zezschwitz, E. and Hussmann, H. 2015. I feel like i'm taking selfies all day! towards understanding biometric authentication on smartphones. Conference on Human Factors in Computing Systems - Proceedings (2015), 1411\u20131414."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00100"},{"key":"e_1_3_2_1_17_1","volume-title":"Conference on Human Factors in Computing Systems - Proceedings","author":"Marques D.","year":"2019","unstructured":"[17] Marques, D., Guerreiro, T., Carri\u00e7o, L., Beschastnikh, I. and Beznosov, K. 2019. Vulnerability & Blame: Making sense of unauthorized access to smartphones. Conference on Human Factors in Computing Systems - Proceedings (2019)."},{"key":"e_1_3_2_1_18_1","volume-title":"SOUPS 2016 - 12th Symposium on Usable Privacy and Security","author":"Marques D.","year":"2019","unstructured":"[18] Marques, D., Muslukhov, I., Guerreiro, T., Beznosov, K. and Carri\u00e7o, L. 2019. Snooping on mobile phones: Prevalence and trends. SOUPS 2016 - 12th Symposium on Usable Privacy and Security (2019), 159\u2013174."},{"key":"e_1_3_2_1_19_1","unstructured":"[19] Mobile E-commerce is up and Poised for Further Growth: 2018. https:\/\/www.statista.com\/chart\/13139\/estimated-worldwide-mobile-e-commerce-sales\/. Accessed: 2022-05-09."},{"key":"e_1_3_2_1_20_1","volume-title":"Digits. Proceedings of the 31st USENIX Security Symposium, Security 2022","author":"Munyendo C.W.","year":"2022","unstructured":"[20] Munyendo, C.W., Markert, P., Nisenoff, A., Grant, M., Korkes, E., Ur, B. and Aviv, A.J. 2022. \u201cThe Same PIN, Just Longer\u201d: On the (In)Security of Upgrading PINs from 4 to 6 Digits. Proceedings of the 31st USENIX Security Symposium, Security 2022 (2022), 4023\u20134040."},{"key":"e_1_3_2_1_21_1","volume-title":"MobileHCI 2013 - Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services","author":"Muslukhov I.","year":"2013","unstructured":"[21] Muslukhov, I., Boshmaf, Y., Kuo, C., Lester, J. and Beznosov, K. 2013. Know your enemy: The risk of unauthorized access in smartphones by insiders. MobileHCI 2013 - Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services (2013), 271\u2013280."},{"key":"e_1_3_2_1_22_1","volume-title":"The Communications Market Report","author":"Ofcom","year":"2015","unstructured":"[22] Ofcom 2015. The Communications Market Report (2015)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.52651\/sam.a.2022.1.29-36"},{"key":"e_1_3_2_1_24_1","unstructured":"[24] Rogers R. and Prentice-Dunn S. 1997. Protection motivation theory. Handbook of health behavior research 1: Personal and social determinants. (1997) 113\u2013132."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546742"},{"key":"e_1_3_2_1_26_1","unstructured":"[26] Set up Touch ID on iPhone: https:\/\/support.apple.com\/en-gb\/guide\/iphone\/iph672384a0b\/ios. Accessed: 2023-06-05."},{"key":"e_1_3_2_1_27_1","unstructured":"[27] Setting up the Biometrics and Security: 2022. https:\/\/www.samsung.com\/au\/support\/mobile-devices\/setup-biometrics-and-security\/. Accessed: 2023-06-07."},{"key":"e_1_3_2_1_28_1","unstructured":"[28] Smart phone thefts rose to 3.1 million in 2013: 2014. https:\/\/www.consumerreports.org\/cro\/news\/2014\/04\/smart-phone-thefts-rose-to-3-1-million-last-year\/index.htm. Accessed: 2022-06-20."},{"key":"e_1_3_2_1_29_1","unstructured":"[29] Taylor B.Y.K. and Silver L. 2019. Smartphone Ownership Is Growing Rapidly Around the World but Not Always Equally."},{"key":"e_1_3_2_1_30_1","unstructured":"[30] Thielman S. 2016. Apple v the FBI: what's the beef how did we get here and what's at stake? . The Guardian."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.07.003"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2015.03.002"},{"volume-title":"The symantec smartphone honey stick project","author":"Wright S.","key":"e_1_3_2_1_33_1","unstructured":"[33] Wright, S. 2012. The symantec smartphone honey stick project. Symantec Corporation, Mar."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077801220947172"}],"event":{"name":"EuroUSEC 2023: The 2023 European Symposium on Usable Security","acronym":"EuroUSEC 2023","location":"Copenhagen Denmark"},"container-title":["Proceedings of the 2023 European Symposium on Usable Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617072.3617104","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3617072.3617104","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:07Z","timestamp":1750178167000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617072.3617104"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":34,"alternative-id":["10.1145\/3617072.3617104","10.1145\/3617072"],"URL":"https:\/\/doi.org\/10.1145\/3617072.3617104","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}