{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:08:34Z","timestamp":1750219714186,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T00:00:00Z","timestamp":1697414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,10,16]]},"DOI":"10.1145\/3617072.3617112","type":"proceedings-article","created":{"date-parts":[[2023,10,13]],"date-time":"2023-10-13T17:47:04Z","timestamp":1697219224000},"page":"97-111","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["\u201cIt's the one thing that makes my life tick\u201d: Security Perspectives of the Smartphone Era"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8928-3961","authenticated-orcid":false,"given":"Matt","family":"Dixon","sequence":"first","affiliation":[{"name":"Pact Lab, Northumbria University, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1085-7115","authenticated-orcid":false,"given":"Elizabeth","family":"Sillence","sequence":"additional","affiliation":[{"name":"Pact Lab, Northumbria University, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8460-8838","authenticated-orcid":false,"given":"James","family":"Nicholson","sequence":"additional","affiliation":[{"name":"Department of Computer and Information Science, Northumbria University, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6600-8414","authenticated-orcid":false,"given":"Lynne","family":"Coventry","sequence":"additional","affiliation":[{"name":"Division of Cybersecurity, Abertay University, United Kingdom"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2023,10,16]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Mobile phone prices soar over 20 years. uSwitch. (Jul","author":"Ali R.","year":"2020","unstructured":"Ali, R. 2020. Mobile phone prices soar over 20 years. uSwitch. (Jul. 2020). DOI:https:\/\/www.uswitch.com\/mobiles\/news\/2020\/07\/mobile-phone-prices-soar-over-20-years\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","unstructured":"Ali S. Osman T. Mannan M. and Youssef A. 2019. On Privacy Risks of Public WiFi Captive Portals. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 11737 LNCS (2019) 80\u201398. DOI:https:\/\/doi.org\/10.1007\/978-3-030-31500-9_6.","DOI":"10.1007\/978-3-030-31500-9_6"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0173284"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1080\/19393555.2018.1505008"},{"key":"e_1_3_2_1_5_1","volume-title":"From legitimate screen recording to file exfiltration within a year","author":"Android","year":"2023","unstructured":"Android app breaking bad: From legitimate screen recording to file exfiltration within a year: 2023. https:\/\/www.welivesecurity.com\/2023\/05\/23\/android-app-breaking-bad-legitimate-screen-recording-file-exfiltration\/. Accessed: 2023-06-02."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Arksey H. and Knight P.T. 1999. Interviewing for Social Scientists: An Introductory Resource with Examples.","DOI":"10.4135\/9781849209335"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.84.2.191"},{"key":"e_1_3_2_1_8_1","volume-title":"Mobile HCI 2011 - 13th International Conference on Human-Computer Interaction with Mobile Devices and Services","author":"Ben-Asher N.","year":"2011","unstructured":"Ben-Asher, N., Kirschnick, N., Sieger, H., Meyer, J., Ben-Oved, A. and M\u00f6ller, S. 2011. On the need for different security methods on mobile phones. Mobile HCI 2011 - 13th International Conference on Human-Computer Interaction with Mobile Devices and Services (2011), 465\u2013473."},{"key":"e_1_3_2_1_9_1","volume-title":"2012 Federated Conference on Computer Science and Information Systems, FedCSIS 2012","author":"Benenson Z.","year":"2012","unstructured":"Benenson, Z., Kroll-Peters, O. and Krupp, M. 2012. Attitudes to IT security when using a smartphone. 2012 Federated Conference on Computer Science and Information Systems, FedCSIS 2012 (2012), 1179\u20131183."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","unstructured":"Bonneau J. Preibusch S. and Anderson R. 2012. A birthday present every eleven wallets? The security of customer-chosen banking PINs. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7397 LNCS (2012) 25\u201340. DOI:https:\/\/doi.org\/10.1007\/978-3-642-32946-3_3.","DOI":"10.1007\/978-3-642-32946-3_3"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.101647"},{"key":"e_1_3_2_1_13_1","unstructured":"Casimiro M. Segel J. Li L. Wang Y. and Cranor L.F. 2020. A Quest for Inspiration: How Users Create and Reuse PINs. WAY (2020)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00061"},{"key":"e_1_3_2_1_15_1","volume-title":"SOUPS 2012 - Proceedings of the 8th Symposium on Usable Privacy and Security","author":"Chin E.","year":"2012","unstructured":"Chin, E., Felt, A.P., Sekar, V. and Wagner, D. 2012. Measuring user confidence in smartphone security and privacy. SOUPS 2012 - Proceedings of the 8th Symposium on Usable Privacy and Security (2012)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.CHB.2017.12.001"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702535"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3546730"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","unstructured":"Duman S. Onarlioglu K. Ulusoy A.O. Robertson W. and Kirda E. 2014. TrueClick: Automatically Distinguishing Trick Banners from Genuine Download Links. (2014). DOI:https:\/\/doi.org\/10.1145\/2664243.2664279.","DOI":"10.1145\/2664243.2664279"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security","author":"Egelman S.","year":"2014","unstructured":"Egelman, S., Jain, S., Portnoff, R.S., Liao, K., Consolvo, S. and Wagner, D. 2014. Are you ready to lock? Understanding user motivations for smartphone locking behaviors. Proceedings of the ACM Conference on Computer and Communications Security (2014), 750\u2013761."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1177\/002224299906300205"},{"key":"e_1_3_2_1_23_1","unstructured":"Global email platform market share 2021: 2022. https:\/\/www.statista.com\/statistics\/709596\/most-used-e-mail-platform-by-market-share\/. Accessed: 2023-06-02."},{"key":"e_1_3_2_1_24_1","volume-title":"online banking use 2020","author":"Great Britain","year":"2020","unstructured":"Great Britain: online banking use 2020: 2020. https:\/\/www.statista.com\/statistics\/286273\/internet-banking-penetration-in-great-britain\/. Accessed: 2022-05-09."},{"key":"e_1_3_2_1_25_1","volume-title":"Conference on Human Factors in Computing Systems - Proceedings","author":"Harbach M.","year":"2016","unstructured":"Harbach, M., De Luca, A., Malkin, N. and Egelman, S. 2016. Keep on lockin\u2019 in the free world: A multi-national comparison of smartphone locking. Conference on Human Factors in Computing Systems - Proceedings (2016), 4823\u20134827."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the Tenth Symposium On Usable Privacy and Security.","author":"Harbach M.","year":"2016","unstructured":"Harbach, M., von Zezschwitz, E., Fichtner, A., Luca, A. De and Smith, M. 2016. It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception. SOUPS \u201914: Proceedings of the Tenth Symposium On Usable Privacy and Security. (2016), 213\u2013230."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/J.JID.2015.10.062"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","unstructured":"Imgraben J. Engelbrecht A. and Choo K.K.R. 2014. Always connected but are smart mobile users getting more security savvy? A survey of smart mobile device users. http:\/\/dx.doi.org\/10.1080\/0144929X.2014.934286. 33 12 (Dec. 2014) 1347\u20131360. DOI:https:\/\/doi.org\/10.1080\/0144929X.2014.934286.","DOI":"10.1080\/0144929X.2014.934286"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2015.06.003"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1186\/S12874-019-0867-9"},{"key":"e_1_3_2_1_31_1","volume-title":"Conference on Human Factors in Computing Systems - Proceedings","author":"De Luca A.","year":"2015","unstructured":"De Luca, A., Hang, A., Von Zezschwitz, E. and Hussmann, H. 2015. I feel like i'm taking selfies all day! towards understanding biometric authentication on smartphones. Conference on Human Factors in Computing Systems - Proceedings (2015), 1411\u20131414."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2014.11.001"},{"key":"e_1_3_2_1_33_1","volume-title":"Conference on Human Factors in Computing Systems - Proceedings","author":"Marques D.","year":"2019","unstructured":"Marques, D., Guerreiro, T., Carri\u00e7o, L., Beschastnikh, I. and Beznosov, K. 2019. Vulnerability & Blame: Making sense of unauthorized access to smartphones. Conference on Human Factors in Computing Systems - Proceedings (2019)."},{"key":"e_1_3_2_1_34_1","volume-title":"SOUPS 2016 - 12th Symposium on Usable Privacy and Security","author":"Marques D.","year":"2019","unstructured":"Marques, D., Muslukhov, I., Guerreiro, T., Beznosov, K. and Carri\u00e7o, L. 2019. Snooping on mobile phones: Prevalence and trends. SOUPS 2016 - 12th Symposium on Usable Privacy and Security (2019), 159\u2013174."},{"key":"e_1_3_2_1_35_1","volume-title":"Conference Proceedings - 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services: Expanding the Horizon of Mobile Interaction, MobileHCI 2020","author":"Mehrabi Koushki M.","year":"2020","unstructured":"Mehrabi Koushki, M., Obada-Obieh, B., Huh, J.H. and Beznosov, K. 2020. Is implicit authentication on smartphones really popular? On android users\u2019 perception of \u201csmart lock for android.\u201d Conference Proceedings - 22nd International Conference on Human-Computer Interaction with Mobile Devices and Services: Expanding the Horizon of Mobile Interaction, MobileHCI 2020 (2020), 17."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","unstructured":"Miller D. Abed Rabho L. Awondo P. de Vries M. Duque M. Garvey P. Haapio-Kirk L. Hawkins C. Otaegui A. Walton S. and Wang X. 2021. The Global Smartphone. The Global Smartphone. (May 2021). DOI:https:\/\/doi.org\/10.14324\/111.9781787359611.","DOI":"10.14324\/111.9781787359611"},{"key":"e_1_3_2_1_37_1","unstructured":"Mobile E-commerce is up and Poised for Further Growth: 2018. https:\/\/www.statista.com\/chart\/13139\/estimated-worldwide-mobile-e-commerce-sales\/. Accessed: 2022-05-09."},{"key":"e_1_3_2_1_38_1","volume-title":"Digits. Proceedings of the 31st USENIX Security Symposium, Security 2022","author":"Munyendo C.W.","year":"2022","unstructured":"Munyendo, C.W., Markert, P., Nisenoff, A., Grant, M., Korkes, E., Ur, B. and Aviv, A.J. 2022. \u201cThe Same PIN, Just Longer\u201d: On the (In)Security of Upgrading PINs from 4 to 6 Digits. Proceedings of the 31st USENIX Security Symposium, Security 2022 (2022), 4023\u20134040."},{"key":"e_1_3_2_1_39_1","volume-title":"MobileHCI 2013 - Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services","author":"Muslukhov I.","year":"2013","unstructured":"Muslukhov, I., Boshmaf, Y., Kuo, C., Lester, J. and Beznosov, K. 2013. Know your enemy: The risk of unauthorized access in smartphones by insiders. MobileHCI 2013 - Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services (2013), 271\u2013280."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2012.11.004"},{"key":"e_1_3_2_1_41_1","volume-title":"The Communications Market Report","author":"Ofcom","year":"2015","unstructured":"Ofcom 2015. The Communications Market Report (2015)."},{"key":"e_1_3_2_1_42_1","volume-title":"Mobile Technology and Home Broadband","author":"Perrin A.","year":"2021","unstructured":"Perrin, A. 2021. Mobile Technology and Home Broadband 2021."},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 13th Symposium on Usable Privacy and Security, SOUPS 2017","author":"Ramokapane K.M.","year":"2019","unstructured":"Ramokapane, K.M., Rashid, A. and Such, J.M. 2019. \u201cI feel stupid I can't delete...\u201d: A study of users\u2019 cloud deletion practices and coping strategies. Proceedings of the 13th Symposium on Usable Privacy and Security, SOUPS 2017 (2019), 241\u2013256."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Reinfelder L. Benenson Z. and Gassmann F. 2014. Differences between Android and iPhone users in their security and privacy awareness. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2014) 156\u2013167.","DOI":"10.1007\/978-3-319-09770-1_14"},{"key":"e_1_3_2_1_45_1","unstructured":"Rogers R. and Prentice-Dunn S. 1997. Protection motivation theory. Handbook of health behavior research 1: Personal and social determinants. (1997) 113\u2013132."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2691658"},{"key":"e_1_3_2_1_47_1","volume-title":"MOBILE DEVICES MONITOR \u2013 Q2","author":"Sing Waila H.","year":"2022","unstructured":"Sing Waila, H. 2022. MOBILE DEVICES MONITOR \u2013 Q2 2022."},{"key":"e_1_3_2_1_48_1","volume-title":"The Inheritance of Fingerprint Patterns. Am J Hum Genet. 28","author":"Slatis H.M.","year":"1976","unstructured":"Slatis, H.M., Bat-miriam Katznelson, M. and Bonne-tamir, B. 1976. The Inheritance of Fingerprint Patterns. Am J Hum Genet. 28, (1976), 280\u2013289."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1108\/MAJ-07-2017-1596"},{"key":"e_1_3_2_1_50_1","unstructured":"Statista Consumer Market Insights 2022. Global: average smartphone price 2013-2027."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10639-020-10330-0"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1108\/JEIM-03-2020-0088"},{"key":"e_1_3_2_1_53_1","unstructured":"Taylor B.Y.K. and Silver L. 2019. Smartphone Ownership Is Growing Rapidly Around the World but Not Always Equally."},{"key":"e_1_3_2_1_54_1","volume-title":"as cybercriminals sharpen their distribution strategies","author":"The","year":"2019","unstructured":"The number of mobile malware attacks doubles in 2018, as cybercriminals sharpen their distribution strategies: 2019. https:\/\/www.kaspersky.com\/about\/press-releases\/2019_the-number-of-mobile-malware-attacks-doubles-in-2018-as-cybercriminals-sharpen-their-distribution-strategies. Accessed: 2021-04-09."},{"key":"e_1_3_2_1_55_1","unstructured":"The Pegasus project: 2021. https:\/\/www.theguardian.com\/news\/series\/pegasus-project. Accessed: 2023-06-02."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.07.003"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1177\/2050157917708329"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077286.3077563"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","unstructured":"Weickert T.D. Joinson A. and Craggs B. 2023. Is cybersecurity research missing a trick? Integrating insights from the psychology of habit into research and practice. Computers and Security. 128 (May 2023). DOI:https:\/\/doi.org\/10.1016\/J.COSE.2023.103130.","DOI":"10.1016\/J.COSE.2023.103130"}],"event":{"name":"EuroUSEC 2023: The 2023 European Symposium on Usable Security","acronym":"EuroUSEC 2023","location":"Copenhagen Denmark"},"container-title":["Proceedings of the 2023 European Symposium on Usable Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617072.3617112","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3617072.3617112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:07Z","timestamp":1750178167000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3617072.3617112"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,16]]},"references-count":59,"alternative-id":["10.1145\/3617072.3617112","10.1145\/3617072"],"URL":"https:\/\/doi.org\/10.1145\/3617072.3617112","relation":{},"subject":[],"published":{"date-parts":[[2023,10,16]]},"assertion":[{"value":"2023-10-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}