{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T22:39:29Z","timestamp":1769726369245,"version":"3.49.0"},"reference-count":110,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2025,4,19]],"date-time":"2025-04-19T00:00:00Z","timestamp":1745020800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"crossref","award":["EXC 2092 CASA - 390781972"],"award-info":[{"award-number":["EXC 2092 CASA - 390781972"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"crossref"}]},{"name":"\u201cDigitalisierungsprofessuren f\u00fcr Niedersachsen\u201d"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput.-Hum. Interact."],"published-print":{"date-parts":[[2025,4,30]]},"abstract":"<jats:p>Smart home applications aim to increase convenience, yet often require authentication to protect sensitive data. This is non-trivial: effortful authentication contradicts intended convenience, the multitude of devices raises scalability issues, many devices lack suitable interfaces, and the presence of other inhabitants requires intentional and acceptable interactions. To address these issues, we explored new and creative authentication interactions with an interaction relabeling approach using everyday objects. We conducted six focus group workshops with 20 participants in a living room and a kitchen setting that resulted in a variety of creative authentication interactions with analogue and digital objects. Furthermore, participants created authentication interactions based on tasks that they have to or wish to perform anyway such as cleaning the kitchen\u2014thus primary tasks. This led us to explore the option to transform authentication from being an additional, secondary task toward using primary tasks further in an online study with 194 participants. Relevant implications in terms of acceptable authentication task characteristics, user perceptions, arising security challenges, and psychological habit research are discussed.<\/jats:p>","DOI":"10.1145\/3702318","type":"journal-article","created":{"date-parts":[[2024,11,1]],"date-time":"2024-11-01T10:08:37Z","timestamp":1730455717000},"page":"1-69","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Authenticate as You Go: From Exploring Smart Home Authentication with Daily Objects to Authenticating with Primary Tasks"],"prefix":"10.1145","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6873-8146","authenticated-orcid":false,"given":"Verena","family":"Zimmermann","sequence":"first","affiliation":[{"name":"ETH Zurich, Zurich, Switzerland"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-4034-0061","authenticated-orcid":false,"given":"Stina","family":"Sch\u00e4fer","sequence":"additional","affiliation":[{"name":"Leibniz University Hannover, Hannover, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5048-3723","authenticated-orcid":false,"given":"Markus","family":"D\u00fcrmuth","sequence":"additional","affiliation":[{"name":"Leibniz University Hannover, Hannover, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7129-9642","authenticated-orcid":false,"given":"Karola","family":"Marky","sequence":"additional","affiliation":[{"name":"Ruhr-University Bochum, Bochum, Germany"}]}],"member":"320","published-online":{"date-parts":[[2025,4,19]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/978-3-031-08645-8_15","volume-title":"Proceedings of the International Conference on Computers Helping People with Special Needs","author":"Ableitner Tobias","year":"2022","unstructured":"Tobias Ableitner, Fiona Heilemann, Andreas Schilling, Surjo Soekadar, and Gottfried Zimmermann. 2022. Hands-Free Interaction Methods for Smart Home Control with Google Glass. In Proceedings of the International Conference on Computers Helping People with Special Needs. Springer, Cham, Switzerland, 121\u2013129."},{"key":"e_1_3_2_3_2","first-page":"1141","volume-title":"Proceedings of the Human Factors and Ergonomics Society Annual Meeting","volume":"62","author":"Acemyan Claudia Ziegler","year":"2018","unstructured":"Claudia Ziegler Acemyan, Philip Kortum, Jeffrey Xiong, and Dan S. Wallach. 2018. 2FA Might Be Secure, But It\u2019s Not Usable: A Summative Usability Assessment of Google\u2019s Two-factor Authentication (2FA) Methods. In Proceedings of the Human Factors and Ergonomics Society Annual Meeting, Vol. 62, 1141\u20131145. DOI: 10.1177\/1541931218621262"},{"key":"e_1_3_2_4_2","first-page":"12","article-title":"Users Are Not the Enemy","volume":"42","author":"Adams Anne","year":"1999","unstructured":"Anne Adams and Martina Angela Sasse. 1999. Users Are Not the Enemy. Communications of the ACM 42, 12 (1999), 40\u201346.","journal-title":"Communications of the ACM"},{"key":"e_1_3_2_5_2","first-page":"12","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI \u201924)","author":"Alghythee Kenan Kamel A.","year":"2024","unstructured":"Kenan Kamel A. Alghythee, Adel Hrncic, Karthik Singh, Sumanth Kunisetty, Yaxing Yao, and Nikita Soni. 2024. Towards Understanding Family Privacy and Security Literacy Conversations at Home: Design Implications for Privacy Literacy Interfaces. In Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI \u201924). ACM, New York, NY, Article 983, 12 pages. DOI: 10.1145\/3613904.3641962"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3114152"},{"key":"e_1_3_2_7_2","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1007\/978-3-030-57404-8_10","volume-title":"International Symposium on Human Aspects of Information Security and Assurance","author":"Alkhamis Esra","year":"2020","unstructured":"Esra Alkhamis, Helen Petrie, and Karen Renaud. 2020. Kidsdoodlepass: An Exploratory Study of an Authentication Mechanism for Young Children. In International Symposium on Human Aspects of Information Security and Assurance. Springer, Cham, Switzerland, 123\u2013132."},{"key":"e_1_3_2_8_2","doi-asserted-by":"crossref","first-page":"1489","DOI":"10.1145\/2702123.2702336","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems","author":"Anderson Fraser","year":"2015","unstructured":"Fraser Anderson, Tovi Grossman, Daniel Wigdor, and George Fitzmaurice. 2015. Supporting Subtlety with Deceptive Devices and Illusory Interactions. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, New York, NY, 1489\u20131498."},{"key":"e_1_3_2_9_2","first-page":"1","volume-title":"Proceedings of the 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE \u201917)","author":"Ashibani Yosef","year":"2017","unstructured":"Yosef Ashibani, Dylan Kauling, and Qusay H. Mahmoud. 2017. A Context-Aware Authentication Framework for Smart Homes. In Proceedings of the 2017 IEEE 30th Canadian Conference on Electrical and Computer Engineering (CCECE \u201917). IEEE, New York, NY, 1\u20135."},{"key":"e_1_3_2_10_2","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.ijcci.2018.06.003","article-title":"An Exploration of Graphical Password Authentication for Children","volume":"18","author":"Assal Hala","year":"2018","unstructured":"Hala Assal, Ahsan Imran, and Sonia Chiasson. 2018. An Exploration of Graphical Password Authentication for Children. International Journal of Child-Computer Interaction 18 (2018), 37\u201346.","journal-title":"International Journal of Child-Computer Interaction"},{"key":"e_1_3_2_11_2","unstructured":"Cambridge University Press & Assessment. 2014. Cambridge Dictionary. Retrieved 12 May 2024 from https:\/\/dictionary.cambridge.org\/de\/worterbuch\/englisch\/habit"},{"key":"e_1_3_2_12_2","unstructured":"Cambridge University Press & Assessment. 2014. Cambridge Dictionary. Retrieved 12 May 2024 from https:\/\/dictionary.cambridge.org\/de\/worterbuch\/englisch\/routine"},{"key":"e_1_3_2_13_2","unstructured":"American Psychological Association. 2023. Ethical Principles of Psychologists and Code of Conduct. Retrieved 26 August 2023 from https:\/\/www.apa.org\/ethics\/code"},{"key":"e_1_3_2_14_2","first-page":"1","volume-title":"USENIX Workshop on Offensive Technologies (WOOT \u201910)","author":"Aviv A. J.","year":"2010","unstructured":"A. J. Aviv, K. Gibson, E. Mossop, M. Blaze, and J. M. Smith. 2010. Smudge Attacks on Smartphone Touch Screens. In USENIX Workshop on Offensive Technologies (WOOT \u201910). USENIX, Berkeley, CA, 1\u201310."},{"key":"e_1_3_2_15_2","first-page":"159","volume-title":"Proceedings of the 14th International ACM SIG ACCESS Conference on Computers and Accessibility","author":"Azenkot Shiri","year":"2012","unstructured":"Shiri Azenkot, Kyle Rector, Richard Ladner, and Jacob Wobbrock. 2012. PassChords: Secure Multi-Touch Authentication for Blind People. In Proceedings of the 14th International ACM SIG ACCESS Conference on Computers and Accessibility. ACM, New York, NY, 159\u2013166."},{"key":"e_1_3_2_16_2","first-page":"78","article-title":"An Overview of Smart Home Environments: Architectures","volume":"78","author":"Badica Costin","year":"2013","unstructured":"Costin Badica, Marius Brezovan, and Amelia Badica. 2013. An Overview of Smart Home Environments: Architectures, Technologies and Applications. In Balkan Conference in Informatics (BCI\u00a0\u201913), Vol. 78, 78\u201385.","journal-title":"Balkan Conference in Informatics (BCI\u00a0\u201913)"},{"issue":"17","key":"e_1_3_2_17_2","doi-asserted-by":"crossref","first-page":"5967","DOI":"10.3390\/s21175967","article-title":"Security, Privacy, and Usability in Continuous Authentication: A Survey","volume":"21","author":"Baig Ahmed Fraz","year":"2021","unstructured":"Ahmed Fraz Baig and Sigurd Eskeland. 2021. Security, Privacy, and Usability in Continuous Authentication: A Survey. Sensors 21, 17 (2021), 5967.","journal-title":"Sensors"},{"key":"e_1_3_2_18_2","first-page":"4","article-title":"Graphical Passwords: Learning from the First Twelve Years","volume":"44","author":"Biddle Robert","year":"2012","unstructured":"Robert Biddle, Sonia Chiasson, and P. C. Van Oorschot. 2012. Graphical Passwords: Learning from the First Twelve Years. ACM Computing Surveys 44, 4, Article 19 (Sep. 2012), 41 pages.","journal-title":"ACM Computing Surveys"},{"key":"e_1_3_2_19_2","first-page":"553","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy","author":"Bonneau Joseph","year":"2012","unstructured":"Joseph Bonneau, Cormac Herley, Paul C. Van Oorschot, and Frank Stajano. 2012. The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, New York, NY, 553\u2013567. DOI: 10.1109\/SP.2012.44"},{"key":"e_1_3_2_20_2","unstructured":"DESIGNKIT by IDEO.ORG. 2022. How Might We. IDEO.ORG. Retrieved 22 August 2022 from https:\/\/www.designkit.org\/methods\/3"},{"issue":"4","key":"e_1_3_2_21_2","doi-asserted-by":"crossref","first-page":"980","DOI":"10.1037\/a0035661","article-title":"Intrinsic Motivation and Extrinsic Incentives Jointly Predict Performance: A 40-Year Meta-Analysis","volume":"140","author":"Cerasoli Christopher P.","year":"2014","unstructured":"Christopher P. Cerasoli, Jessica M. Nicklin, and Michael T. Ford. 2014. Intrinsic Motivation and Extrinsic Incentives Jointly Predict Performance: A 40-Year Meta-Analysis. Psychological Bulletin 140, 4 (2014), 980.","journal-title":"Psychological Bulletin"},{"key":"e_1_3_2_22_2","first-page":"16","volume-title":"Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (CHI \u201921)Article","volume":"555","author":"Chalhoub George","year":"2021","unstructured":"George Chalhoub, Martin J. Kraemer, Norbert Nthala, and Ivan Flechais. 2021. \u201cIt Did Not Give Me an Option to Decline\u201d: A Longitudinal Analysis of the User Experience of Security and Privacy in Smart Home Products. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (CHI \u201921). ACM, New York, NY, Article 555, 16 pages. DOI: 10.1145\/3411764.3445691"},{"key":"e_1_3_2_23_2","first-page":"22","volume-title":"Proceedings of the ACM on Human-Computer Interaction 6","author":"Chamunorwa Michael","year":"2022","unstructured":"Michael Chamunorwa, Miko\u0142aj P. Wozniak, Sarah V\u00f6ge, Heiko M\u00fcller, and Susanne C. J. Boll. 2022. Interacting with Rigid and Soft Surfaces for Smart-Home Control. Proceedings of the ACM on Human-Computer Interaction 6, MHCI, Article 211 (Sep. 2022), 22 pages. DOI: 10.1145\/3546746"},{"key":"e_1_3_2_24_2","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1007\/978-3-030-58703-1_13","volume-title":"National Cyber Summit (NCS) Research Track 2020","author":"Chhetri Chola","year":"2021","unstructured":"Chola Chhetri and Vivian Motti. 2021. Identifying Vulnerabilities in Security and Privacy of Smart Home Devices. In National Cyber Summit (NCS) Research Track 2020. Springer, Cham, Switzerland, 211\u2013231."},{"key":"e_1_3_2_25_2","first-page":"11","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI \u201918)","author":"Colnago Jessica","year":"2018","unstructured":"Jessica Colnago, Summer Devlin, Maggie Oates, Chelse Swoopes, Lujo Bauer, Lorrie Cranor, and Nicolas Christin. 2018. \u201cIt\u2019s Not Actually That Horrible\u201d: Exploring Adoption of Two-Factor Authentication at a University. In Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI \u201918). ACM, New York, NY, Article 456, 11 pages. DOI: 10.1145\/3173574.3174030"},{"key":"e_1_3_2_26_2","first-page":"1","volume-title":"Proceedings of the International Conference on Financial Cryptography and Data Security (FC \u201918)","author":"Das Sanchari","year":"2018","unstructured":"Sanchari Das, Andrew Dingman, and L. Jean Camp. 2018. Why Johnny Doesn\u2019t Use Two Factor a Two-Phase Usability Study of the Fido u2f Security Key. In Proceedings of the International Conference on Financial Cryptography and Data Security (FC \u201918). Springer, Cham, Switzerland, 1\u201320. DOI: 10.1007\/978-3-662-58387-6_9"},{"key":"e_1_3_2_27_2","first-page":"28","volume-title":"Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust (STAST \u201917)","author":"Das Sanchari","year":"2018","unstructured":"Sanchari Das, Gianpaolo Russo, Andrew C. Dingman, Jayati Dev, Olivia Kenny, and L. Jean Camp. 2018. A Qualitative Study on Usability and Acceptability of Yubico Security Key. In Proceedings of the 7th Workshop on Socio-Technical Aspects in Security and Trust (STAST \u201917). ACM, New York, NY, 28\u201339. DOI: 10.1145\/3167996.3167997"},{"key":"e_1_3_2_28_2","first-page":"166","volume-title":"Proceedings of the 13th International Symposium on Human Aspects of Information Security & Assurance (HAISA \u201919)","author":"Das Sanchari","year":"2019","unstructured":"Sanchari Das, Bingxing Wang, Zachary Tingle, and L. Jean Camp. 2019. Evaluating User Perception of Multi-Factor Authentication: A Systematic Review. In Proceedings of the 13th International Symposium on Human Aspects of Information Security & Assurance (HAISA \u201919). University of Plymouth, Plymouth, UK, 166\u2013178."},{"key":"e_1_3_2_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2983983"},{"key":"e_1_3_2_30_2","first-page":"1","article-title":"Is a Picture Really Worth a Thousand Words? Exploring the Feasibility of Graphical Authentication Systems","volume":"63","author":"Angeli Antonella De","year":"2005","unstructured":"Antonella De Angeli, Lynne Coventry, Graham Johnson, and Karen Renaud. 2005. Is a Picture Really Worth a Thousand Words? Exploring the Feasibility of Graphical Authentication Systems. International Journal of Human-Computer Studies 63, 1\u20132 (2005), 128\u2013152.","journal-title":"International Journal of Human-Computer Studies"},{"key":"e_1_3_2_31_2","first-page":"1","volume-title":"Symposium on Usable Security and Privacy (USEC\u00a0\u201914)","author":"Cristofaro Emiliano De","year":"2014","unstructured":"Emiliano De Cristofaro, Honglu Du, Julien Freudiger, and Greg Norcie. 2014. A Comparative Usability Study of Two-Factor Authentication. In Symposium on Usable Security and Privacy (USEC\u00a0\u201914). Internet Society, Reston, VA, 1\u201310."},{"key":"e_1_3_2_32_2","first-page":"1411","volume-title":"Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI \u201915)","author":"Luca Alexander De","year":"2015","unstructured":"Alexander De Luca, Alina Hang, Emanuel von Zezschwitz, and Heinrich Hussmann. 2015. I Feel Like I\u2019m Taking Selfies All Day! Towards Understanding Biometric Authentication on Smartphones. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems (CHI \u201915). ACM, New York, NY, 1411\u20131414."},{"key":"e_1_3_2_33_2","first-page":"6","volume-title":"Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems (CHI EA \u201921)","author":"Rodriguez Sarah Delgado","year":"2021","unstructured":"Sarah Delgado Rodriguez, Sarah Prange, Lukas Mecke, and Florian Alt. 2021. ActPad\u2013 A Smart Desk Platform to Enable User Interaction with IoT Devices. In Extended Abstracts of the 2021 CHI Conference on Human Factors in Computing Systems (CHI EA \u201921). ACM, New York, NY, Article 325, 6 pages. DOI: 10.1145\/3411763.3451825"},{"key":"e_1_3_2_34_2","first-page":"306","volume-title":"Proceedings of the 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing","author":"Derawi Mohammad Omar","year":"2010","unstructured":"Mohammad Omar Derawi, Claudia Nickel, Patrick Bours, and Christoph Busch. 2010. Unobtrusive User-Authentication on Mobile Phones Using Biometric Gait Recognition. In Proceedings of the 2010 6th International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, New York, NY, 306\u2013311."},{"key":"e_1_3_2_35_2","first-page":"66","volume-title":"Proceedings of the 3rd Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques (DIS \u201900)","author":"Djajadiningrat J. P.","year":"2000","unstructured":"J. P. Djajadiningrat, W. W. Gaver, and J. W. Fres. 2000. Interaction Relabelling and Extreme Characters: Methods for Exploring Aesthetic Interactions. In Proceedings of the 3rd Conference on Designing Interactive Systems: Processes, Practices, Methods, and Techniques (DIS \u201900). ACM, New York, NY, 66\u201371. DOI: 10.1145\/347642.347664"},{"key":"e_1_3_2_36_2","first-page":"184","volume-title":"Proceedings of the International Conference on Mobile Computing, Applications, and Services","author":"Draffin Benjamin","year":"2013","unstructured":"Benjamin Draffin, Jiang Zhu, and Joy Zhang. 2013. Keysens: Passive User Authentication through Micro-Behavior Modeling of Soft Keyboard Interaction. In Proceedings of the International Conference on Mobile Computing, Applications, and Services. Springer, Cham, Switzerland, 184\u2013201."},{"key":"e_1_3_2_37_2","first-page":"750","volume-title":"ACM Conference on Computer and Communications Security (CCS \u201914)","author":"Egelman S.","year":"2014","unstructured":"S. Egelman, S. Jain, R. S. Portnoff, K. Liao, S. Consolvo, and D. Wagner. 2014. Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors. In ACM Conference on Computer and Communications Security (CCS \u201914). ACM, New York, NY, 750\u2013761."},{"key":"e_1_3_2_38_2","first-page":"3171","volume-title":"Proceedings of the ACM Conference on Human Factors in Computing Systems","author":"Ens Barrett M.","year":"2014","unstructured":"Barrett M. Ens, Rory Finnegan, and Pourang P. Irani. 2014. The Personal Cockpit: A Spatial Interface for Effective Task Switching on Head-Worn Displays. In Proceedings of the ACM Conference on Human Factors in Computing Systems. ACM, New York, NY, 3171\u20133180."},{"key":"e_1_3_2_39_2","unstructured":"Cori Faklaris Laura Dabbish and Jason I. Hong. 2022. Do They Accept or Resist Cybersecurity Measures? Development and Validation of the 13-Item Security Attitude Inventory (SA-13). arXiv:2204.03114. Retrieved from https:\/\/arxiv.org\/abs\/2204.03114"},{"key":"e_1_3_2_40_2","first-page":"523","volume-title":"Proceedings of the 18th Symposium on Usable Privacy and Security (SOUPS \u201922)","author":"Farke Florian M.","year":"2022","unstructured":"Florian M. Farke, Leona Lassak, Jannis Pinter, and Markus D\u00fcrmuth. 2022. Exploring User Authentication with Windows Hello in a Small Business Environment. In Proceedings of the 18th Symposium on Usable Privacy and Security (SOUPS \u201922). USENIX, Berkeley, CA, 523\u2013540."},{"key":"e_1_3_2_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3473856.3474006"},{"issue":"6","key":"e_1_3_2_42_2","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1080\/10447318.2018.1456150","article-title":"A Personal Resource for Technology Interaction: Development and Validation of the Affinity for Technology Interaction (ATI) Scale","volume":"35","author":"Franke Thomas","year":"2019","unstructured":"Thomas Franke, Christiane Attig, and Daniel Wessel. 2019. A Personal Resource for Technology Interaction: Development and Validation of the Affinity for Technology Interaction (ATI) Scale. International Journal of Human\u2013Computer Interaction 35, 6 (2019), 456\u2013467.","journal-title":"International Journal of Human\u2013Computer Interaction"},{"key":"e_1_3_2_43_2","first-page":"339","volume-title":"Proceedings of the 17th Symposium on Usable Privacy and Security (SOUPS \u201921)","author":"Franz Anjuli","year":"2021","unstructured":"Anjuli Franz, Verena Zimmermann, Gregor Albrecht, Katrin Hartwig, Christian Reuter, Alexander Benlian, and Joachim Vogt. 2021. SoK: Still Plenty of Phish in the Sea\u2014A Taxonomy of User-Oriented Phishing Interventions and Avenues for Future Research. In Proceedings of the 17th Symposium on Usable Privacy and Security (SOUPS \u201921). Usenix, Berkeley, CA, 339\u2013358."},{"issue":"3","key":"e_1_3_2_44_2","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1080\/17437199.2015.1009844","article-title":"Defining and Measuring the Habit Impulse: Response to Commentaries","volume":"9","author":"Gardner Benjamin","year":"2015","unstructured":"Benjamin Gardner. 2015. Defining and Measuring the Habit Impulse: Response to Commentaries. Health Psychology Review 9, 3 (2015), 318\u2013322.","journal-title":"Health Psychology Review"},{"key":"e_1_3_2_45_2","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1109\/SP40000.2020.00047","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP \u201920)","author":"Lyastani S. Ghorbani","year":"2020","unstructured":"S. Ghorbani Lyastani, M. Schilling, M. Neumayr, M. Backes, and S. Bugiel. 2020. Is FIDO2 the Kingslayer of User Authentication? A Comparative Usability Study of FIDO2 Passwordless Authentication. In Proceedings of the IEEE Symposium on Security and Privacy (SP \u201920). IEEE, Piscataway, NJ, 268\u2013285."},{"key":"e_1_3_2_46_2","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/1719030.1719043","volume-title":"Proceedings of the 2009 Workshop on New Security Paradigms Workshop","author":"Gibson Marcia","year":"2009","unstructured":"Marcia Gibson, Karen Renaud, Marc Conrad, and Carsten Maple. 2009. Musipass: Authenticating Me Softly with \u201cMy\u201d Song. In Proceedings of the 2009 Workshop on New Security Paradigms Workshop. ACM, New York, NY, 85\u2013100."},{"key":"e_1_3_2_47_2","first-page":"1","volume-title":"Proceedings of the 2020 International Conference for Emerging Technology (INCET \u201920)","author":"Govindraj Varasiddhi Jayasuryaa","year":"2020","unstructured":"Varasiddhi Jayasuryaa Govindraj, P. V. Yashwanth, Srinidhi V. Bhat, and T. K. Ramesh. 2020. Smart Door Using Biometric NFC Band and OTP Based Methods. In Proceedings of the 2020 International Conference for Emerging Technology (INCET \u201920). IEEE, New York, NY, 1\u20134."},{"key":"e_1_3_2_48_2","volume-title":"Digital Identity Guidelines [Including Updates as of 12-01-2017]","author":"Grassi Paul A.","year":"2017","unstructured":"Paul A. Grassi, James L. Fenton, and Michael E. Garcia. 2017. Digital Identity Guidelines [Including Updates as of 12-01-2017]. Technical Report. NIST Special Publication 800-63-3."},{"key":"e_1_3_2_49_2","first-page":"235","volume-title":"Proceedings on Privacy Enhancing Technologies","volume":"2","author":"Gro\u00df Thomas","year":"2021","unstructured":"Thomas Gro\u00df. 2021. Validity and Reliability of the Scale Internet Users\u2019 Information Privacy Concerns (IUIPC). Proceedings on Privacy Enhancing Technologies 2 (2021), 235\u2013258."},{"key":"e_1_3_2_50_2","first-page":"3","article-title":"Smart Home Occupant Identification via Sensor Fusion across On-Object Devices","volume":"14","author":"Han Jun","year":"2018","unstructured":"Jun Han, Shijia Pan, Manal Kumar Sinha, Hae Young Noh, Pei Zhang, and Patrick Tague. 2018. Smart Home Occupant Identification via Sensor Fusion across On-Object Devices. ACM Transactions on Sensor Networks 14, 3\u20134 (2018), 1\u201322.","journal-title":"ACM Transactions on Sensor Networks"},{"key":"e_1_3_2_51_2","first-page":"255","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"He Weijia","year":"2018","unstructured":"Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus D\u00fcrmuth, Earlence Fernandes, and Blase Ur. 2018. Rethinking Access Control and Authentication for the Home Internet of Things. In 27th USENIX Security Symposium (USENIX Security 18). USENIX, Berkeley, CA, 255\u2013272."},{"key":"e_1_3_2_52_2","first-page":"255","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"He Weijia","year":"2018","unstructured":"Weijia He, Maximilian Golla, Roshni Padhi, Jordan Ofek, Markus D\u00fcrmuth, Earlence Fernandes, and Blase Ur. 2018. Rethinking Access Control and Authentication for the Home Internet of Things (IoT). In 27th USENIX Security Symposium (USENIX Security 18). USENIX, Baltimore, MD, 255\u2013272. Retrieved from https:\/\/www.usenix.org\/conference\/usenixsecurity18\/presentation\/he"},{"key":"e_1_3_2_53_2","first-page":"420","volume-title":"Proceedings of the 2020 International Conference on Intelligent Engineering and Management (ICIEM \u201920)","author":"Ibrahim Sameera","year":"2020","unstructured":"Sameera Ibrahim, Vinod Kumar Shukla, and Ruchika Bathla. 2020. Security Enhancement in Smart Home Management through Multimodal Biometric and Passcode. In Proceedings of the 2020 International Conference on Intelligent Engineering and Management (ICIEM \u201920). IEEE, New York, NY, 420\u2013424."},{"key":"e_1_3_2_54_2","volume-title":"Handbook of Biometrics","author":"Jain Anil K.","year":"2007","unstructured":"Anil K. Jain, Patrick Flynn, and Arun A. Ross. 2007. Handbook of Biometrics. Springer, New York, NY."},{"issue":"1","key":"e_1_3_2_55_2","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1109\/TCSVT.2003.818349","article-title":"An Introduction to Biometric Recognition","volume":"14","author":"Jain Anil K.","year":"2004","unstructured":"Anil K. Jain, Arun Ross, and Salil Prabhakar. 2004. An Introduction to Biometric Recognition. IEEE Transactions on Circuits and Systems for Video Technology 14, 1 (2004), 4\u201320.","journal-title":"IEEE Transactions on Circuits and Systems for Video Technology"},{"key":"e_1_3_2_56_2","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/3139937.3139941","volume-title":"Proceedings of the 2017 Workshop on Internet of Things Security and Privacy","author":"Jang William","year":"2017","unstructured":"William Jang, Adil Chhabra, and Aarathi Prasad. 2017. Enabling Multi-User Controls in Smart Home Devices. In Proceedings of the 2017 Workshop on Internet of Things Security and Privacy. ACM, New York, NY, 49\u201354."},{"issue":"1","key":"e_1_3_2_57_2","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/j.ijhcs.2006.08.005","article-title":"The Usability of Passphrases for Authentication: An Empirical Field Study","volume":"65","author":"Keith Mark","year":"2007","unstructured":"Mark Keith, Benjamin Shao, and Paul John Steinbart. 2007. The Usability of Passphrases for Authentication: An Empirical Field Study. International Journal of Human-Computer Studies 65, 1 (2007), 17\u201328.","journal-title":"International Journal of Human-Computer Studies"},{"key":"e_1_3_2_58_2","first-page":"11","article-title":"Continuous Authentication through Finger Gesture Interaction for Smart Homes Using WiFi","volume":"20","author":"Kong Hao","year":"2020","unstructured":"Hao Kong, Li Lu, Jiadi Yu, Yingying Chen, and Feilong Tang. 2020. Continuous Authentication through Finger Gesture Interaction for Smart Homes Using WiFi. IEEE Transactions on Mobile Computing 20, 11 (2020), 3148\u20133162.","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_2_59_2","first-page":"1","volume-title":"Proceedings of the Workshop on Usable Security(USEC \u201915)","author":"Krol Kat","year":"2015","unstructured":"Kat Krol, Eleni Philippou, Emiliano De Cristofaro, and M, Angela Sasse. 2015. \u201cThey Brought in the Horrible Key Ring Thing!\u201d Analysing the Usability of Two-Factor Authentication in UK Online Banking. In Proceedings of the Workshop on Usable Security(USEC \u201915). Internet Society, Reston, VA, 1\u201310. DOI: 10.14722\/usec.2015.23001"},{"key":"e_1_3_2_60_2","first-page":"91","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Lassak Leona","year":"2021","unstructured":"Leona Lassak, Annika Hildebrandt, Maximilian Golla, and Blase Ur. 2021. \u201cIt\u2019s Stored, Hopefully, on an Encrypted Server\u201d: Mitigating Users\u2019 Misconceptions about FIDO2 Biometric WebAuthn. In 30th USENIX Security Symposium (USENIX Security 21). USENIX, Berkeley, CA, 91\u2013108."},{"key":"e_1_3_2_61_2","first-page":"24","volume-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies","volume":"2","author":"Leung Ho-Man Colman","year":"2018","unstructured":"Ho-Man Colman Leung, Chi-Wing Fu, and Pheng-Ann Heng. 2018. TwistIn: Tangible Authentication of Smart Devices via Motion Co-Analysis with a Smartwatch. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 2, 2, Article 72 (Jul. 2018), 24 pages. DOI: 10.1145\/3214275"},{"key":"e_1_3_2_62_2","first-page":"1","volume-title":"Proceedings of the 2021 ACM Conference on Human Factors in Computing Systems","author":"Liebers Jonathan","year":"2021","unstructured":"Jonathan Liebers, Mark Abdelaziz, Lukas Mecke, Alia Saad, Jonas Auda, Uwe Gruenefeld, Florian Alt, and Stefan Schneegass. 2021. Understanding User Identification in Virtual Reality through Behavioral Biometrics and the Effect of Body Normalization. In Proceedings of the 2021 ACM Conference on Human Factors in Computing Systems. ACM, New York, NY, 1\u201311."},{"key":"e_1_3_2_63_2","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1145\/3568444.3570595","volume-title":"Proceedings of the 21st International Conference on Mobile and Ubiquitous Multimedia","author":"Liebers Jonathan","year":"2022","unstructured":"Jonathan Liebers, Nick Wittig, Simon Janzon, Pedram Golkar, Hakeem Moruf, Wilfried Forentin Wakeu Kontchipo, Uwe Gruenefeld, and Stefan Schneegass. 2022. Single-Sign-On in Smart Homes Using Continuous Authentication. In Proceedings of the 21st International Conference on Mobile and Ubiquitous Multimedia. ACM, New York, NY, 270\u2013272."},{"key":"e_1_3_2_64_2","first-page":"1","volume-title":"Proceedings of the 2023 ACM Conference on Human Factors in Computing Systems","author":"Liu Jiazhou","year":"2023","unstructured":"Jiazhou Liu, Barrett Ens, Arnaud Prouzeau, Jim Smiley, Isobel Kara Nixon, Sarah Goodwin, and Tim Dwyer. 2023. Datadancing: An Exploration of the Design Space for Visualisation View Management for 3D Surfaces and Spaces. In Proceedings of the 2023 ACM Conference on Human Factors in Computing Systems. ACM, New York, NY, 1\u201317."},{"issue":"4","key":"e_1_3_2_65_2","doi-asserted-by":"crossref","first-page":"336","DOI":"10.1287\/isre.1040.0032","article-title":"Internet Users\u2019 Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model","volume":"15","author":"Malhotra Naresh K.","year":"2004","unstructured":"Naresh K. Malhotra, Sung S. Kim, and James Agarwal. 2004. Internet Users\u2019 Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model. Information Systems Research 15, 4 (2004), 336\u2013355.","journal-title":"Information Systems Research"},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-016-0928-6"},{"key":"e_1_3_2_67_2","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1145\/3428361.3428464","volume-title":"Proceedings of the 19th International Conference on Mobile and Ubiquitous Multimedia (MUM \u201920)","author":"Marky Karola","year":"2020","unstructured":"Karola Marky, Sarah Prange, Florian Krell, Max M\u00fchlh\u00e4user, and Florian Alt. 2020. \u201cYou Just Can\u2019t Know about Everything\u201d: Privacy Perceptions of Smart Home Visitors. In Proceedings of the 19th International Conference on Mobile and Ubiquitous Multimedia (MUM \u201920). ACM, New York, NY, 83\u201395. DOI: 10.1145\/3428361.3428464"},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/3503514"},{"key":"e_1_3_2_69_2","first-page":"1","volume-title":"Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI \u201920)","author":"Marky Karola","year":"2020","unstructured":"Karola Marky, Martin Schmitz, Verena Zimmermann, Martin Herbers, Kai Kunze, and Max M\u00fchlh\u00e4user. 2020. 3D-Auth: Two-Factor Authentication with Personalized 3D-Printed Items. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI \u201920). ACM, New York, NY, 1\u201312. DOI: 10.1145\/3313831.3376189"},{"key":"e_1_3_2_70_2","first-page":"143","volume-title":"Qualitative Content Analysis: Theoretical Foundation, Basic Procedures and Software Solution","author":"Mayring Philipp","year":"2014","unstructured":"Philipp Mayring. 2014. Qualitative Content Analysis: Theoretical Foundation, Basic Procedures and Software Solution. Social Science Open Access Repository (SSOAR), Klagenfurt. 143 pages."},{"issue":"2","key":"e_1_3_2_71_2","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1177\/237946152100700207","article-title":"Habits to Save Our Habitat: Using the Psychology of Habits to Promote Sustainability","volume":"7","author":"Mazar Asaf","year":"2021","unstructured":"Asaf Mazar, Geoffrey Tomaino, Ziv Carmon, and Wendy Wood. 2021. Habits to Save Our Habitat: Using the Psychology of Habits to Promote Sustainability. Behavioral Science & Policy 7, 2 (2021), 75\u201389.","journal-title":"Behavioral Science & Policy"},{"key":"e_1_3_2_72_2","doi-asserted-by":"publisher","DOI":"10.1145\/2212776.2223842"},{"issue":"2","key":"e_1_3_2_73_2","doi-asserted-by":"crossref","first-page":"492","DOI":"10.1016\/j.jesp.2011.10.011","article-title":"How Do Habits Guide Behavior? Perceived and Actual Triggers of Habits in Daily Life","volume":"48","author":"Neal David T.","year":"2012","unstructured":"David T. Neal, Wendy Wood, Jennifer S. Labrecque, and Phillippa Lally. 2012. How Do Habits Guide Behavior? Perceived and Actual Triggers of Habits in Daily Life. Journal of Experimental Social Psychology 48, 2 (2012), 492\u2013498.","journal-title":"Journal of Experimental Social Psychology"},{"key":"e_1_3_2_74_2","first-page":"21","volume-title":"Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (CHI \u201923)","author":"Ortloff Anna-Marie","year":"2023","unstructured":"Anna-Marie Ortloff, Matthias Fassl, Alexander Ponticello, Florin Martius, Anne Mertens, Katharina Krombholz, and Matthew Smith. 2023. Different Researchers, Different Results? Analyzing the Influence of Researcher Experience and Data Type During Qualitative Analysis of an Interview and Survey Study on Security Advice. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (CHI \u201923). ACM, New York, NY, Article 864, 21 pages. DOI: 10.1145\/3544548.3580766"},{"key":"e_1_3_2_75_2","doi-asserted-by":"crossref","first-page":"100162","DOI":"10.1016\/j.smhl.2020.100162","article-title":"GaitCode: Gait-Based Continuous Authentication Using Multimodal Learning and Wearable Sensors","volume":"19","author":"Papavasileiou Ioannis","year":"2021","unstructured":"Ioannis Papavasileiou, Zhi Qiao, Chenyu Zhang, Wenlong Zhang, Jinbo Bi, and Song Han. 2021. GaitCode: Gait-Based Continuous Authentication Using Multimodal Learning and Wearable Sensors. Smart Health 19 (2021), 100162.","journal-title":"Smart Health"},{"key":"e_1_3_2_76_2","first-page":"475","volume-title":"Proceedings of the 17th Symposium on Usable Privacy and Security (SOUPS \u201921)","author":"Ponticello Alexander","year":"2021","unstructured":"Alexander Ponticello, Matthias Fassl, and Katharina Krombholz. 2021. Exploring Authentication for Security-Sensitive Tasks on Smart Home Voice Assistants. In Proceedings of the 17th Symposium on Usable Privacy and Security (SOUPS \u201921). USENIX, Berkeley, CA, 475\u2013492. Retrieved from https:\/\/www.usenix.org\/conference\/soups2021\/presentation\/ponticello"},{"key":"e_1_3_2_77_2","first-page":"7","volume-title":"Extended Abstracts of the 2022 CHI Conference on Human Factors in Computing Systems (CHI EA \u201922)","author":"Prange Sarah","year":"2022","unstructured":"Sarah Prange, Sarah Delgado Rodriguez, Timo Doeding, and Florian Alt. 2022. \u201cWhere Did You First Meet the Owner?\u201d \u2013 Exploring Usable Authentication for Smart Home Visitors. In Extended Abstracts of the 2022 CHI Conference on Human Factors in Computing Systems (CHI EA \u201922). ACM, New York, NY, Article 415, 7 pages. DOI: 10.1145\/3491101.3519777"},{"key":"e_1_3_2_78_2","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1145\/3473856.3473878","volume-title":"Proceedings of Mensch Und Computer 2021 (MuC \u201921)","author":"Prange Sarah","year":"2021","unstructured":"Sarah Prange, Ceenu George, and Florian Alt. 2021. Design Considerations for Usable Authentication in Smart Homes. In Proceedings of Mensch Und Computer 2021 (MuC \u201921). ACM, New York, NY, 311\u2013324. DOI: 10.1145\/3473856.3473878"},{"key":"e_1_3_2_79_2","first-page":"154","volume-title":"Proceedings of the IEEE European Symposium on Security and Privacy Workshops","author":"Prange Sarah","year":"2019","unstructured":"Sarah Prange, Emanuel von Zezschwitz, and Florian Alt. 2019. Vision: Exploring Challenges and Opportunities for Usable Authentication in the Smart Home. In Proceedings of the IEEE European Symposium on Security and Privacy Workshops. IEEE, New York, NY, 154\u2013158."},{"key":"e_1_3_2_80_2","first-page":"176","volume-title":"HCI for Cybersecurity, Privacy and Trust (HCI-CPT \u201919), Held as Part of the 21st HCI International Conference (HCII \u201919)","author":"Prasad Aarathi","year":"2019","unstructured":"Aarathi Prasad, Ruben Ruiz, and Timothy Stablein. 2019. Understanding Parents\u2019 Concerns with Smart Device Usage in the Home. In HCI for Cybersecurity, Privacy and Trust (HCI-CPT \u201919), Held as Part of the 21st HCI International Conference (HCII \u201919). Springer, Cham, Switzerland, 176\u2013190."},{"key":"e_1_3_2_81_2","first-page":"1","volume-title":"Workshop: Who Are You?! Adventures in Authentication","author":"Quermann Nils","year":"2018","unstructured":"Nils Quermann, Marian Harbach, and Markus Durmuth. 2018. The State of User Authentication in the Wild. In Workshop: Who Are You?! Adventures in Authentication. USENIX, Berkeley, CA, 1\u20135."},{"key":"e_1_3_2_82_2","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/2750858.2804263","volume-title":"Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing","author":"Ranjan Juhi","year":"2015","unstructured":"Juhi Ranjan and Kamin Whitehouse. 2015. Object Hallmarks: Identifying Object Users Using Wearable Wrist Sensors. In Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, New York, NY, 51\u201361."},{"key":"e_1_3_2_83_2","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1145\/3543758.3543765","volume-title":"Proceedings of Mensch und Computer 2022","author":"Renz Andreas","year":"2022","unstructured":"Andreas Renz, Matthias Baldauf, Edith Maier, and Florian Alt. 2022. Alexa, It\u2019S Me! An Online Survey on the User Experience of Smart Speaker Authentication. In Proceedings of Mensch und Computer 2022. ACM, New York, NY, 14\u201324."},{"key":"e_1_3_2_84_2","doi-asserted-by":"publisher","DOI":"10.18420\/muc2018-mci-0253"},{"key":"e_1_3_2_85_2","first-page":"7","volume-title":"USENIX Symposium on Usable Privacy and Security (SOUPS \u201922)","author":"Rodriguez Sarah Delgado","year":"2022","unstructured":"Sarah Delgado Rodriguez, Lukas Mecke, and Florian Alt. 2022. SenseHandle: Investigating Human-Door Interaction Behaviour for Authentication in the Physical World. In USENIX Symposium on Usable Privacy and Security (SOUPS \u201922). USENIX, Berkely, CA, 7\u20139."},{"key":"e_1_3_2_86_2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/EuroSP.2016.13","volume-title":"Proceedings of the 2016 IEEE European Symposium on Security and Privacy (EuroS & P \u201916)","author":"Ronen Eyal","year":"2016","unstructured":"Eyal Ronen and Adi Shamir. 2016. Extended Functionality Attacks on IoT Devices: The Case of Smart Lights. In Proceedings of the 2016 IEEE European Symposium on Security and Privacy (EuroS & P \u201916). IEEE, New York, NY, 3\u201312. DOI: 10.1109\/EuroSP.2016.13"},{"key":"e_1_3_2_87_2","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2017.2691658"},{"key":"e_1_3_2_88_2","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1145\/2984511.2984580","volume-title":"Proceedings of the 29th Annual Symposium on User Interface Software and Technology","author":"Ruoti Scott","year":"2016","unstructured":"Scott Ruoti, Jeff Andersen, Travis Hendershot, Daniel Zappala, and Kent Seamons. 2016. Private Webmail 2.0: Simple and Easy-To-Use Secure Email. In Proceedings of the 29th Annual Symposium on User Interface Software and Technology. ACM, New York, NY, 461\u2013472."},{"key":"e_1_3_2_89_2","first-page":"1","volume-title":"Proceedings of the 2023 ACM Conference on Human Factors in Computing Systems","author":"Saad Alia","year":"2023","unstructured":"Alia Saad, Kian Izadi, Anam Ahmad Khan, Pascal Knierim, Stefan Schneegass, Florian Alt, and Yomna Abdelrahman. 2023. HotFoot: Foot-Based User Identification Using Thermal Imaging. In Proceedings of the 2023 ACM Conference on Human Factors in Computing Systems. ACM, New York, NY, 1\u201313."},{"key":"e_1_3_2_90_2","volume-title":"Trust and Crime in Information Societies","author":"Sasse Martina Angela","year":"2005","unstructured":"Martina Angela Sasse. 2005. Usability and Trust in Information Systems. In Trust and Crime in Information Societies. R. Mansell and B. Collins (Eds.), Edward Elgar, Cheltenham, UK."},{"key":"e_1_3_2_91_2","first-page":"248","volume-title":"Proceedings of the European Symposium on Research in Computer Security","author":"Sasse M. Angela","year":"2022","unstructured":"M. Angela Sasse, Jonas Hielscher, Jennifer Friedauer, and Annalina Buckmann. 2022. Rebooting IT Security Awareness\u2013How Organisations Can Encourage and Sustain Secure Behaviours. In Proceedings of the European Symposium on Research in Computer Security. Springer, Cham, Switzerland, 248\u2013265."},{"key":"e_1_3_2_92_2","first-page":"1","volume-title":"Proceedings of the 8th Symposium on Usable Privacy and Security","author":"Shay Richard","year":"2012","unstructured":"Richard Shay, Patrick Gage Kelley, Saranga Komanduri, Michelle L. Mazurek, Blase Ur, Timothy Vidas, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. 2012. Correct Horse Battery Staple: Exploring the Usability of System-Assigned Passphrases. In Proceedings of the 8th Symposium on Usable Privacy and Security. USENIX, Berkeley, CA, 1\u201320."},{"key":"e_1_3_2_93_2","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1049\/cp:19950480","volume-title":"European Convention on Security and Detection","author":"Shepherd S. J.","year":"1995","unstructured":"S. J. Shepherd. 1995. Continuous Authentication by Analysis of Keyboard Typing Characteristics. In European Convention on Security and Detection. IET, London, UK, 111\u2013114."},{"key":"e_1_3_2_94_2","first-page":"243","volume-title":"Proceedings of the Symposium on Usable Privacy and Security (SOUPS \u201914)","author":"Stobert Elizabeth","year":"2014","unstructured":"Elizabeth Stobert and Robert Biddle. 2014. The Password Life Cycle: User Behaviour in Managing Passwords. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS \u201914). USENIX Association, Berkeley, CA, 243\u2013255."},{"key":"e_1_3_2_95_2","doi-asserted-by":"crossref","first-page":"1971","DOI":"10.1145\/3319535.3363220","volume-title":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","author":"Tiefenau Christian","year":"2019","unstructured":"Christian Tiefenau, Emanuel von Zezschwitz, Maximilian H\u00e4ring, Katharina Krombholz, and Matthew Smith. 2019. A Usability Evaluation of Let\u2019s Encrypt and Certbot: Usable Security Done Right. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, New York, NY, 1971\u20131988."},{"key":"e_1_3_2_96_2","first-page":"245","volume-title":"Nineteenth Symposium on Usable Privacy and Security (SOUPS \u201923)","author":"Turner Mark","year":"2023","unstructured":"Mark Turner, Martin Schmitz, Morgan Masichi Bierey, Mohamed Khamis, and Karola Marky. 2023. Tangible 2FA \u2013An In-the-Wild Investigation of User-Defined Tangibles for Two-Factor Authentication. In Nineteenth Symposium on Usable Privacy and Security (SOUPS \u201923). USENIX, Berkeley, CA, 245\u2013261."},{"key":"e_1_3_2_97_2","first-page":"161","volume-title":"ACM Conference on Computer and Communications Security (CCS \u201913)","author":"Uellenbeck S.","year":"2013","unstructured":"S. Uellenbeck, M. Duermuth, C. Wolf, and T. Holz. 2013. Quantifying the Security of Graphical Passwords: The Case of Android Unlock Patterns. In ACM Conference on Computer and Communications Security (CCS \u201913). ACM, New York, NY, 161\u2013172."},{"key":"e_1_3_2_98_2","first-page":"209","article-title":"The Current State of Access Control for Smart Devices in Homes","volume":"29","author":"Ur Blase","year":"2013","unstructured":"Blase Ur, Jaeyeon Jung, and Stuart Schechter. 2013. The Current State of Access Control for Smart Devices in Homes. In Workshop on Home Usable Privacy and Security (HUPS \u201913), Vol. 29, 209\u2013218.","journal-title":"Workshop on Home Usable Privacy and Security (HUPS \u201913)"},{"key":"e_1_3_2_99_2","first-page":"129","volume-title":"Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing","author":"Ur Blase","year":"2014","unstructured":"Blase Ur, Jaeyeon Jung, and Stuart Schechter. 2014. Intruders versus Intrusiveness: Teens\u2019 and Parents\u2019 Perspectives on Home-Entryway Surveillance. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing. ACM, New York, NY, 129\u2013139."},{"key":"e_1_3_2_100_2","first-page":"123","volume-title":"Proceedings of the Symposium on Usable Privacy and Security (SOUPS \u201915)","author":"Ur Blase","year":"2015","unstructured":"Blase Ur, Fumiko Noma, Jonathan Bees, Sean M. Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. 2015. \u201cI Added\u2019!\u2019at the End to Make It Secure\u201d: Observing Password Creation in the Lab. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS \u201915). USENIX Association, Berkeley, CA, 123\u2013140."},{"key":"e_1_3_2_101_2","first-page":"100","volume-title":"Computers & Security","author":"Volkamer Melanie","year":"2017","unstructured":"Melanie Volkamer, Karen Renaud, Benjamin Reinheimer, and Alexandra Kunz. 2017. User Experiences of Torpedo: Tooltip-Powered Phishing Email Detection. Computers & Security 71 (2017), 100\u2013113."},{"key":"e_1_3_2_102_2","first-page":"175","volume-title":"Proceedings of the Symposium on Usable Privacy and Security (SOUPS \u201916)","author":"Wash Rick","year":"2016","unstructured":"Rick Wash, Emilee Rader, Ruthie Berman, and Zac Wellmer. 2016. Understanding Password Choices: How Frequently Entered Passwords Are Re-used Across Websites. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS \u201916). USENIX Association, Berkeley, CA, 175\u2013188."},{"key":"e_1_3_2_103_2","first-page":"212","volume-title":"Proceedings of the Annual Computer Security Applications Conference (ACSAC \u201917)","author":"Weidman Jake","year":"2017","unstructured":"Jake Weidman and Jens Grossklags. 2017. I Like It, But I Hate It: Employee Perceptions Towards an Institutional Transition to BYOD Second-Factor Authentication. In Proceedings of the Annual Computer Security Applications Conference (ACSAC \u201917). ACM, New York, NY, 212\u2013224. DOI: 10.1145\/3134600.3134629"},{"issue":"4","key":"e_1_3_2_104_2","doi-asserted-by":"crossref","first-page":"579","DOI":"10.1016\/j.jcps.2009.08.003","article-title":"The Habitual Consumer","volume":"19","author":"Wood Wendy","year":"2009","unstructured":"Wendy Wood and David T. Neal. 2009. The Habitual Consumer. Journal of Consumer Psychology 19, 4 (2009), 579\u2013592.","journal-title":"Journal of Consumer Psychology"},{"key":"e_1_3_2_105_2","first-page":"25","volume-title":"Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies","volume":"6","author":"Wu Chuxiong","year":"2022","unstructured":"Chuxiong Wu, Xiaopeng Li, Fei Zuo, Lannan Luo, Xiaojiang Du, Jia Di, and Qiang Zeng. 2022. Use It-No Need to Shake It! Accurate Implicit Authentication for Everyday Objects with Smart Sensing. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies 6, 3, Article 146 (Sep. 2022), 25 pages. DOI: 10.1145\/3550322"},{"key":"e_1_3_2_106_2","first-page":"2371","volume-title":"Proceedings of the 2013 IEEE International Conference on Acoustics, Speech and Signal Processing","author":"Wu Jonathan","year":"2013","unstructured":"Jonathan Wu, Janusz Konrad, and Prakash Ishwar. 2013. Dynamic Time Warping for Gesture-Based User Identification and Authentication with Kinect. In Proceedings of the 2013 IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE, New York, NY, 2371\u20132375."},{"key":"e_1_3_2_107_2","first-page":"159","volume-title":"28th USENIX Security Symposium (USENIX Security 19)","author":"Zeng Eric","year":"2019","unstructured":"Eric Zeng and Franziska Roesner. 2019. Understanding and Improving Security and Privacy in Multi-User Smart Homes: A Design Exploration and In-Home User Study. In 28th USENIX Security Symposium (USENIX Security 19). USENIX Association, Berkeley, CA, 159\u2013176."},{"key":"e_1_3_2_108_2","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1109\/FGR.2006.2","volume-title":"Proceedings of the 7th International Conference on Automatic Face and Gesture Recognition (FGR \u201906)","author":"Zhao Guoying","year":"2006","unstructured":"Guoying Zhao, Guoyi Liu, Hua Li, and Matti Pietikainen. 2006. 3D Gait Recognition Using Multiple Cameras. In Proceedings of the 7th International Conference on Automatic Face and Gesture Recognition (FGR \u201906). IEEE, New York, NY, 529\u2013534."},{"key":"e_1_3_2_109_2","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1016\/j.ijhcs.2019.08.006","article-title":"The Password Is Dead, Long Live the Password\u2013A Laboratory Study on User Perceptions of Authentication Schemes","volume":"133","author":"Zimmermann Verena","year":"2020","unstructured":"Verena Zimmermann and Nina Gerber. 2020. The Password Is Dead, Long Live the Password\u2013A Laboratory Study on User Perceptions of Authentication Schemes. International Journal of Human-Computer Studies 133 (2020), 26\u201344.","journal-title":"International Journal of Human-Computer Studies"},{"issue":"3","key":"e_1_3_2_110_2","doi-asserted-by":"crossref","first-page":"197","DOI":"10.1515\/icom-2019-0015","article-title":"Assessing Users\u2019 Privacy and Security Concerns of Smart Home Technologies","volume":"18","author":"Zimmermann Verena","year":"2019","unstructured":"Verena Zimmermann, Paul Gerber, Karola Marky, Leon B\u00f6ck, and Florian Kirchbuchner. 2019. Assessing Users\u2019 Privacy and Security Concerns of Smart Home Technologies. i-com 18, 3 (2019), 197\u2013216.","journal-title":"i-com"},{"issue":"1","key":"e_1_3_2_111_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3429888","article-title":"The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions","volume":"28","author":"Zimmermann Verena","year":"2021","unstructured":"Verena Zimmermann and Karen Renaud. 2021. The Nudge Puzzle: Matching Nudge Interventions to Cybersecurity Decisions. ACM Transactions on Computer-Human Interaction 28, 1 (2021), 1\u201345.","journal-title":"ACM Transactions on Computer-Human Interaction"}],"container-title":["ACM Transactions on Computer-Human Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3702318","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3702318","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:08Z","timestamp":1750295888000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3702318"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,19]]},"references-count":110,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2025,4,30]]}},"alternative-id":["10.1145\/3702318"],"URL":"https:\/\/doi.org\/10.1145\/3702318","relation":{},"ISSN":["1073-0516","1557-7325"],"issn-type":[{"value":"1073-0516","type":"print"},{"value":"1557-7325","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,19]]},"assertion":[{"value":"2023-09-18","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-14","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-04-19","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}