{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T12:10:26Z","timestamp":1764418226802,"version":"3.46.0"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["390781972"],"award-info":[{"award-number":["390781972"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100014013","name":"UK Research and Innovation","doi-asserted-by":"publisher","award":["EP\/Z000068\/1"],"award-info":[{"award-number":["EP\/Z000068\/1"]}],"id":[{"id":"10.13039\/100014013","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1145\/3771882.3771900","type":"proceedings-article","created":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T11:54:07Z","timestamp":1764417247000},"page":"209-221","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["\"What you think is private is no longer\" - Investigating the Aftermath of Shoulder Surfing on Smartphones in Everyday Life through the Eyes of the Victims"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2961-3500","authenticated-orcid":false,"given":"Habiba","family":"Farzand","sequence":"first","affiliation":[{"name":"University of Bristol, Bristol, United Kingdom and University of Glasgow, Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6519-318X","authenticated-orcid":false,"given":"Shaun","family":"Macdonald","sequence":"additional","affiliation":[{"name":"University of Glasgow, Glasgow, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7129-9642","authenticated-orcid":false,"given":"Karola","family":"Marky","sequence":"additional","affiliation":[{"name":"Ruhr University Bochum, Bochum, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7051-5200","authenticated-orcid":false,"given":"Mohamed","family":"Khamis","sequence":"additional","affiliation":[{"name":"University of Glasgow, Glasgow, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2025,11,30]]},"reference":[{"key":"e_1_3_3_1_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025461"},{"key":"e_1_3_3_1_3_2","doi-asserted-by":"publisher","DOI":"10.1109\/VRW55335.2022.00139"},{"key":"e_1_3_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/3531073.3531106"},{"key":"e_1_3_3_1_5_2","doi-asserted-by":"crossref","unstructured":"Yusuf Albayram Mohammad Maifi\u00a0Hasan Khan and Michael Fagan. 2017. A study on designing video tutorials for promoting security features: A case study in the context of two-factor authentication (2fa). International Journal of Human\u2013Computer Interaction 33 11 (2017) 927\u2013942.","DOI":"10.1080\/10447318.2017.1306765"},{"key":"e_1_3_3_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785882"},{"key":"e_1_3_3_1_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3546155.3546706"},{"key":"e_1_3_3_1_8_2","doi-asserted-by":"crossref","unstructured":"Rasekhar Bhagavatula Blase Ur Kevin Iacovino Su\u00a0Mon Kywe Lorrie\u00a0Faith Cranor and Marios Savvides. 2015. Biometric authentication on iphone and android: Usability perceptions and influences on adoption. (2015).","DOI":"10.14722\/usec.2015.23003"},{"key":"e_1_3_3_1_9_2","doi-asserted-by":"publisher","DOI":"10.1145\/1943403.1943449"},{"key":"e_1_3_3_1_10_2","first-page":"433","volume-title":"29th USENIX security symposium (USENIX security 20)","author":"Bouwman Xander","year":"2020","unstructured":"Xander Bouwman, Harm Griffioen, Jelle Egbers, Christian Doerr, Bram Klievink, and Michel Van\u00a0Eeten. 2020. A different cup of { TI} ? the added value of commercial threat intelligence. In 29th USENIX security symposium (USENIX security 20). 433\u2013450."},{"key":"e_1_3_3_1_11_2","doi-asserted-by":"crossref","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3 2 (2006) 77\u2013101.","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_3_1_12_2","unstructured":"Virginia Braun and Victoria Clarke. 2013. Successful qualitative research: A practical guide for beginners. (2013)."},{"key":"e_1_3_3_1_13_2","doi-asserted-by":"publisher","DOI":"10.1145\/2611009.2611028"},{"key":"e_1_3_3_1_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/2207676.2208712"},{"key":"e_1_3_3_1_15_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858498"},{"key":"e_1_3_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1145\/3052973.3052989"},{"key":"e_1_3_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3580777"},{"volume-title":"The zzzzivil servant who fell asleep on the train with laptop secrets in full view","year":"2008","key":"e_1_3_3_1_18_2","unstructured":"DailyMail. 2008. The zzzzivil servant who fell asleep on the train with laptop secrets in full view. Retrieved August 8, 2024 from https:\/\/www.dailymail.co.uk\/news\/article-1082375\/The-zzzzivil-servant-fell-asleep-train-laptop-secrets-view.html"},{"key":"e_1_3_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/CIC50333.2020.00027"},{"key":"e_1_3_3_1_20_2","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557097"},{"key":"e_1_3_3_1_21_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642863"},{"key":"e_1_3_3_1_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025636"},{"key":"e_1_3_3_1_23_2","doi-asserted-by":"crossref","unstructured":"Habiba Farzand Melvin Abraham Stephen Brewster Mohamed Khamis and Karola Marky. 2024. A Systematic Deconstruction of Human-Centric Privacy & Security Threats on Mobile Phones. International Journal of Human\u2013Computer Interaction (2024).","DOI":"10.1080\/10447318.2024.2361519"},{"key":"e_1_3_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3473856.3474006"},{"key":"e_1_3_3_1_25_2","unstructured":"Habiba Farzand Karola Marky and Mohamed Khamis. 2022. \" I Hate When People Do This; There\u2019s a Lot of Sensitive Content for Me\": A Typology of Perceived Privacy-Sensitive Content in Shoulder Surfing Scenarios. (2022)."},{"key":"e_1_3_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.1145\/3549015.3554211"},{"key":"e_1_3_3_1_27_2","unstructured":"Habiba Farzand Karola Marky and Mohamed Khamis. 2023. \"... It\u2019s very unacceptable for someone to peek into your privacy.\" Chronicles of Shoulder Surfing: Exploring Deep into a Longitudinal Diary Study. (2023)."},{"key":"e_1_3_3_1_28_2","doi-asserted-by":"crossref","unstructured":"Cristina Fiani Pejman Saeghe Mark McGill and Mohamed Khamis. 2024. Exploring the Perspectives of Social VR-Aware Non-Parent Adults and Parents on Children\u2019s Use of Social Virtual Reality. Proceedings of the ACM on Human-Computer Interaction 8 CSCW1 (2024) 1\u201325.","DOI":"10.1145\/3652867"},{"key":"e_1_3_3_1_29_2","volume-title":"Visual Data Security White Paper","author":"Data\u00a0Security European\u00a0Association for Visual","year":"2012","unstructured":"European\u00a0Association for Visual Data\u00a0Security. 2012. Visual Data Security White Paper. Retrieved August 8, 2024 from https:\/\/multimedia.3m.com\/mws\/media\/950026O\/secure-white-paper.pdf"},{"key":"e_1_3_3_1_30_2","doi-asserted-by":"crossref","unstructured":"Wendy Goucher. 2011. Look behind you: the dangers of shoulder surfing. Computer Fraud & Security 2011 11 (2011) 17\u201320.","DOI":"10.1016\/S1361-3723(11)70116-6"},{"key":"e_1_3_3_1_31_2","doi-asserted-by":"publisher","DOI":"10.1145\/2785830.2785834"},{"key":"e_1_3_3_1_32_2","first-page":"213","volume-title":"10th symposium on usable privacy and security (SOUPS 2014)","author":"Harbach Marian","year":"2014","unstructured":"Marian Harbach, Emanuel Von\u00a0Zezschwitz, Andreas Fichtner, Alexander De\u00a0Luca, and Matthew Smith. 2014. { It\u2019s} a hard lock life: A field study of smartphone ({ Un) Locking} behavior and risk perception. In 10th symposium on usable privacy and security (SOUPS 2014). 213\u2013230."},{"key":"e_1_3_3_1_33_2","first-page":"213","volume-title":"10th Symposium On Usable Privacy and Security ({ SOUPS} 2014)","author":"Harbach Marian","year":"2014","unstructured":"Marian Harbach, Emanuel Von\u00a0Zezschwitz, Andreas Fichtner, Alexander De\u00a0Luca, and Matthew Smith. 2014. It\u2019s a hard lock life: A field study of smartphone (un) locking behavior and risk perception. In 10th Symposium On Usable Privacy and Security ({ SOUPS} 2014). 213\u2013230."},{"key":"e_1_3_3_1_34_2","doi-asserted-by":"publisher","DOI":"10.1145\/3544548.3581410"},{"key":"e_1_3_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376840"},{"key":"e_1_3_3_1_36_2","doi-asserted-by":"crossref","unstructured":"Mohamed Khamis Malin Eiband Martin Z\u00fcrn and Heinrich Hussmann. 2018. EyeSpot: Leveraging Gaze to Protect Private Text Content on Mobile Devices from Shoulder Surfing. Multimodal Technologies and Interaction 2 3 (2018) 45.","DOI":"10.3390\/mti2030045"},{"key":"e_1_3_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173738"},{"key":"e_1_3_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173738"},{"key":"e_1_3_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642460"},{"key":"e_1_3_3_1_40_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-42504-3_15"},{"key":"e_1_3_3_1_41_2","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451603"},{"key":"e_1_3_3_1_42_2","unstructured":"Shaun\u00a0Alexander Macdonald Habiba Farzand Norah Alotaibi Md\u00a0Shafiqul Islam and Mohamed Khamis. 2023. Change Policy or Users? Mitigating the Security Risks of Thermal Attacks. (2023)."},{"key":"e_1_3_3_1_43_2","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300819"},{"key":"e_1_3_3_1_44_2","first-page":"159","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS 2016)","author":"Marques Diogo","year":"2016","unstructured":"Diogo Marques, Ildar Muslukhov, Tiago Guerreiro, Lu\u00eds Carri\u00e7o, and Konstantin Beznosov. 2016. Snooping on mobile phones: Prevalence and trends. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). 159\u2013174."},{"key":"e_1_3_3_1_45_2","unstructured":"Philipp Mayring et\u00a0al. 2004. Qualitative content analysis. A companion to qualitative research 1 2 (2004) 159\u2013176."},{"key":"e_1_3_3_1_46_2","doi-asserted-by":"crossref","unstructured":"Nora McDonald Sarita Schoenebeck and Andrea Forte. 2019. Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice. Proceedings of the ACM on human-computer interaction 3 CSCW (2019) 1\u201323.","DOI":"10.1145\/3359174"},{"key":"e_1_3_3_1_47_2","doi-asserted-by":"publisher","DOI":"10.1145\/2732198.2732205"},{"key":"e_1_3_3_1_48_2","unstructured":"Helen Nissenbaum. 2004. Privacy as contextual integrity. Wash. L. Rev. 79 (2004) 119."},{"key":"e_1_3_3_1_49_2","unstructured":"George Probst. 2000. Analysis of the Effects of Privacy Filter Use on Horizontal Deviations in Posture of VDT Operators. Master\u2019s thesis. Virginia Polytechnic Institute and State University."},{"key":"e_1_3_3_1_50_2","unstructured":"Prolific. 2024. Prolific | Online participant recruitment for surveys and market research. https:\/\/www.prolific.co\/ Retrieved May 28 2024."},{"key":"e_1_3_3_1_51_2","unstructured":"Qualtrics. 2024. Qualtrics - Leading Experience Management and Survey Software. https:\/\/www.qualtrics.com\/uk\/?rid=ip&prevsite=en&newsite=uk&geo=GB&geomatch=uk Retrieved February 11 2024."},{"key":"e_1_3_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1145\/3519391.3519411"},{"key":"e_1_3_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046769"},{"key":"e_1_3_3_1_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/3282894.3282919"},{"key":"e_1_3_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3447526.3472058"},{"key":"e_1_3_3_1_56_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29387-1_5"},{"key":"e_1_3_3_1_57_2","first-page":"127","volume-title":"Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018)","author":"Sambasivan Nithya","year":"2018","unstructured":"Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura\u00a0Sanely Gayt\u00e1n-Lugo, Tara Matthews, Sunny Consolvo, and Elizabeth Churchill. 2018. \" Privacy is not for me, it\u2019s for those rich women\": Performative Privacy Practices on Mobile Phones by Women in South Asia. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). 127\u2013142."},{"key":"e_1_3_3_1_58_2","first-page":"1","volume-title":"Proceedings of the CHI Conference on Human Factors in Computing Systems","author":"Smith Garrett","year":"2024","unstructured":"Garrett Smith, Sarah Carson, Rhea\u00a0G Vengurlekar, Stephanie Morales, Yun-Chieh Tsai, Rachel George, Josh Bedwell, Trevor Jones, Mainack Mondal, Brian Smith, et\u00a0al. 2024. \" I Know I\u2019m Being Observed:\" Video Interventions to Educate Users about Targeted Advertising on Facebook. In Proceedings of the CHI Conference on Human Factors in Computing Systems. 1\u201327."},{"key":"e_1_3_3_1_59_2","doi-asserted-by":"crossref","unstructured":"Timothy\u00a0J Trull and Ulrich\u00a0W Ebner-Priemer. 2009. Using experience sampling methods\/ecological momentary assessment (ESM\/EMA) in clinical assessment and clinical research: introduction to the special section. (2009).","DOI":"10.1037\/a0017653"},{"key":"e_1_3_3_1_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702212"},{"key":"e_1_3_3_1_61_2","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642283"},{"key":"e_1_3_3_1_62_2","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3502057"},{"key":"e_1_3_3_1_63_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833686"},{"key":"e_1_3_3_1_64_2","doi-asserted-by":"crossref","unstructured":"Jie Zhang Zhanyong Tang Meng Li Dingyi Fang Xiaojiang Chen and Zheng Wang. 2019. Find me a safe zone: A countermeasure for channel state information based attacks. Computers & Security 80 (2019) 273\u2013290.","DOI":"10.1016\/j.cose.2018.09.017"},{"key":"e_1_3_3_1_65_2","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858232"},{"key":"e_1_3_3_1_66_2","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376570"}],"event":{"name":"MUM '25: 24th International Conference on Mobile and Ubiquitous Multimedia","acronym":"MUM '25","location":"Enna Italy"},"container-title":["Proceedings of the 24th International Conference on Mobile and Ubiquitous Multimedia"],"original-title":[],"deposited":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T12:09:42Z","timestamp":1764418182000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3771882.3771900"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,30]]},"references-count":65,"alternative-id":["10.1145\/3771882.3771900","10.1145\/3771882"],"URL":"https:\/\/doi.org\/10.1145\/3771882.3771900","relation":{},"subject":[],"published":{"date-parts":[[2025,11,30]]},"assertion":[{"value":"2025-11-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}