{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:24:28Z","timestamp":1772907868965,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,2]],"date-time":"2019-05-02T00:00:00Z","timestamp":1556755200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"FCT - \"Funda\u00e7ao para a Cienciae a Tecnologia I.P.","award":["30347"],"award-info":[{"award-number":["30347"]}]},{"name":"FCT - \"Funda\u00e7ao para a Cienciae a Tecnologia I.P.","award":["SFRH\/BD\/98527\/2013"],"award-info":[{"award-number":["SFRH\/BD\/98527\/2013"]}]},{"name":"FCT - \"Funda\u00e7ao para a Cienciae a Tecnologia I.P.","award":["UID\/CEC\/00408\/2013"],"award-info":[{"award-number":["UID\/CEC\/00408\/2013"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,2]]},"DOI":"10.1145\/3290605.3300819","type":"proceedings-article","created":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T17:36:58Z","timestamp":1556559418000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Vulnerability &amp; Blame"],"prefix":"10.1145","author":[{"given":"Diogo","family":"Marques","sequence":"first","affiliation":[{"name":"Universidade de Lisboa, Lisbon, Portugal"}]},{"given":"Tiago","family":"Guerreiro","sequence":"additional","affiliation":[{"name":"Universidade de Lisboa, Lisbon, Portugal"}]},{"given":"Luis","family":"Carri\u00e7o","sequence":"additional","affiliation":[{"name":"Universidade de Lisboa, Lisbon, Portugal"}]},{"given":"Ivan","family":"Beschastnikh","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Konstantin","family":"Beznosov","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]}],"member":"320","published-online":{"date-parts":[[2019,5,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"d.}. Set your Android device to automatically unlock. Retrieved","author":"Android Help","year":"2018","unstructured":"Android Help {n. d.}. Set your Android device to automatically unlock. Retrieved Sep. 1, 2018 from https:\/\/support.google.com\/android\/answer\/9075927 Android Help {n. d.}. Set your Android device to automatically unlock. Retrieved Sep. 1, 2018 from https:\/\/support.google.com\/android\/answer\/9075927"},{"key":"e_1_3_2_1_2_1","volume-title":"interactions 23, 2 (Feb","author":"Bardzell Jeffrey","year":"2016","unstructured":"Jeffrey Bardzell and Shaowen Bardzell . 2016. Humanistic HCI. interactions 23, 2 (Feb . 2016 ), 20--29. Jeffrey Bardzell and Shaowen Bardzell. 2016. Humanistic HCI. interactions 23, 2 (Feb. 2016), 20--29."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.59.5.994"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2037373.2037442"},{"key":"e_1_3_2_1_5_1","volume-title":"Handbook of Research Methods in Health Social Sciences","author":"Braun Virginia","unstructured":"Virginia Braun , Victoria Clarke , Nikki Hayfield , Naomi Moller , and Irmgard Tischner . 2017. Qualitative Story Completion . In Handbook of Research Methods in Health Social Sciences . Springer , Singapore , 1--18. Virginia Braun, Victoria Clarke, Nikki Hayfield, Naomi Moller, and Irmgard Tischner. 2017. Qualitative Story Completion. In Handbook of Research Methods in Health Social Sciences. Springer, Singapore, 1--18."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.12.010"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the Eleventh Symposium On Usable Privacy and Security (SOUPS '15)","author":"Cherapau Ivan","year":"2015","unstructured":"Ivan Cherapau , Ildar Muslukhov , Nalin Asanka , and Konstantin Beznosov . 2015 . On the Impact of Touch ID on iPhone Passcodes . In Proceedings of the Eleventh Symposium On Usable Privacy and Security (SOUPS '15) . USENIX Association, Berkeley, CA, USA, 257-- 276. https:\/\/www.usenix.org\/conference\/soups 2015\/proceedings\/presentation\/cherapau Ivan Cherapau, Ildar Muslukhov, Nalin Asanka, and Konstantin Beznosov. 2015. On the Impact of Touch ID on iPhone Passcodes. In Proceedings of the Eleventh Symposium On Usable Privacy and Security (SOUPS '15). USENIX Association, Berkeley, CA, USA, 257-- 276. https:\/\/www.usenix.org\/conference\/soups2015\/proceedings\/presentation\/cherapau"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335358"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.intcom.2011.04.006"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660273"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025636"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381943"},{"key":"e_1_3_2_1_13_1","volume-title":"The critical incident technique. Psychological bulletin 51, 4","author":"Flanagan John C","year":"1954","unstructured":"John C Flanagan . 1954. The critical incident technique. Psychological bulletin 51, 4 ( 1954 ), 327. https:\/\/www.apa.org\/pubs\/databases\/psycinfo\/cit-article.pdf John C Flanagan. 1954. The critical incident technique. Psychological bulletin 51, 4 (1954), 327. https:\/\/www.apa.org\/pubs\/databases\/psycinfo\/cit-article.pdf"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3174241"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2399016.2399061"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858267"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the Tenth Symposium On Usable Privacy and Security (SOUPS '14)","author":"Harbach Marian","year":"2014","unstructured":"Marian Harbach , Emanuel von Zezschwitz , Andreas Fichtner , Alexander De Luca , and Matthew Smith . 2014 . It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception . In Proceedings of the Tenth Symposium On Usable Privacy and Security (SOUPS '14) . USENIX Association, Berkeley, CA, USA, 213-- 230. https:\/\/www.usenix.org\/conference\/soups 2014\/proceedings\/ presentation\/harbach Marian Harbach, Emanuel von Zezschwitz, Andreas Fichtner, Alexander De Luca, and Matthew Smith. 2014. It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception. In Proceedings of the Tenth Symposium On Usable Privacy and Security (SOUPS '14). USENIX Association, Berkeley, CA, USA, 213-- 230. https:\/\/www.usenix.org\/conference\/soups2014\/proceedings\/ presentation\/harbach"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335359"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518953"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167204271594"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/0149206306294405"},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS '16)","author":"Marques Diogo","year":"2016","unstructured":"Diogo Marques , Ildar Muslukhov , Tiago Guerreiro , Lu\u00eds Carri\u00e7o , and Konstantin Beznosov . 2016 . Snooping on Mobile Phones: Prevalence and Trends . In Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS '16) . USENIX Association, Berkeley, CA, USA, 159--174. https:\/\/www.usenix.org\/conference\/soups 2016\/technical-sessions\/presentation\/marques Diogo Marques, Ildar Muslukhov, Tiago Guerreiro, Lu\u00eds Carri\u00e7o, and Konstantin Beznosov. 2016. Snooping on Mobile Phones: Prevalence and Trends. In Proceedings of the Twelfth Symposium on Usable Privacy and Security (SOUPS '16). USENIX Association, Berkeley, CA, USA, 159--174. https:\/\/www.usenix.org\/conference\/soups2016\/technical-sessions\/presentation\/marques"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858051"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025875"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753421"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2838739.2838748"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2012.83"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2493190.2493223"},{"key":"e_1_3_2_1_29_1","volume-title":"Perpetual Contact: Mobile Communication, Private Talk, Public Performance, James E","author":"Nafus Dawn","unstructured":"Dawn Nafus and Karina Tracey . 2002. Mobile phone consumption and concepts of personhood . In Perpetual Contact: Mobile Communication, Private Talk, Public Performance, James E . Katz and Mark Aakhus (Eds.). Cambridge University Press , Cambridge, UK , 206--222. Dawn Nafus and Karina Tracey. 2002. Mobile phone consumption and concepts of personhood. In Perpetual Contact: Mobile Communication, Private Talk, Public Performance, James E. Katz and Mark Aakhus (Eds.). Cambridge University Press, Cambridge, UK, 206--222."},{"key":"e_1_3_2_1_30_1","volume-title":"Machines That Become Us","author":"Oksman Virpi","unstructured":"Virpi Oksman and Pirio Rautianen . 2003. \" Perhaps it is a Body Part\" : How the Mobile Phone Became an Organic Part of the Everyday Lives of Finnish Children and Teenagers . In Machines That Become Us , James E. Katz (Ed.). Transaction Publishers , New Brunswick, NJ, USA , 293 -- 308. Virpi Oksman and Pirio Rautianen. 2003. \"Perhaps it is a Body Part\": How the Mobile Phone Became an Organic Part of the Everyday Lives of Finnish Children and Teenagers. In Machines That Become Us, James E. Katz (Ed.). Transaction Publishers, New Brunswick, NJ, USA, 293 -- 308."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642635"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the Fourteenth Symposium on Usable Privacy and Security (SOUPS '18)","author":"Park Cheul Young","year":"2018","unstructured":"Cheul Young Park , Cori Faklaris , Siyan Zhao , Alex Sciuto , Laura Dabbish , and Jason Hong . 2018 . Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships . In Proceedings of the Fourteenth Symposium on Usable Privacy and Security (SOUPS '18) . USENIX Association, Berkeley, CA, USA, 83--102. https:\/\/www.usenix.org\/conference\/soups 2018\/presentation\/park Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, and Jason Hong. 2018. Share and Share Alike? An Exploration of Secure Behaviors in Romantic Relationships. In Proceedings of the Fourteenth Symposium on Usable Privacy and Security (SOUPS '18). USENIX Association, Berkeley, CA, USA, 83--102. https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/park"},{"key":"e_1_3_2_1_33_1","volume-title":"Beyond the Turk: Alternative platforms for crowdsourcing behavioral research. Journal of Experimental Social Psychology 70 (may","author":"Peer Eyal","year":"2017","unstructured":"Eyal Peer , Laura Brandimarte , Sonam Samat , and Alessandro Acquisti . 2017. Beyond the Turk: Alternative platforms for crowdsourcing behavioral research. Journal of Experimental Social Psychology 70 (may 2017 ), 153--163. Eyal Peer, Laura Brandimarte, Sonam Samat, and Alessandro Acquisti. 2017. Beyond the Turk: Alternative platforms for crowdsourcing behavioral research. Journal of Experimental Social Psychology 70 (may 2017), 153--163."},{"key":"e_1_3_2_1_34_1","volume-title":"Privacy and Data Management on Mobile Devices. Retrieved","author":"Pew Research Center","year":"2018","unstructured":"Pew Research Center . 2012. Privacy and Data Management on Mobile Devices. Retrieved Sep. 1, 2018 from http:\/\/www.pewinternet.org\/2012\/09\/05\/privacy-and-data-management-on-mobile-devices\/ Pew Research Center. 2012. Privacy and Data Management on Mobile Devices. Retrieved Sep. 1, 2018 from http:\/\/www.pewinternet.org\/2012\/09\/05\/privacy-and-data-management-on-mobile-devices\/"},{"key":"e_1_3_2_1_35_1","volume-title":"Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018","author":"Sambasivan Nithya","year":"2018","unstructured":"Nithya Sambasivan , Garen Checkley , Amna Batool , Nova Ahmed , David Nemer , Laura Sanely Gayt\u00e1n-Lugo , Tara Matthews , Sunny Consolvo , and Elizabeth Churchill . 2018 . \" Privacy is not for me, it's for those rich women\": Performative Privacy Practices on Mobile Phones by Women in South Asia . In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018 ). USENIX Association, Berkeley, CA, USA, 127--142. https:\/\/www.usenix.org\/conference\/soups 2018\/presentation\/sambasivan Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura Sanely Gayt\u00e1n-Lugo, Tara Matthews, Sunny Consolvo, and Elizabeth Churchill. 2018. \"Privacy is not for me, it's for those rich women\": Performative Privacy Practices on Mobile Phones by Women in South Asia. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, Berkeley, CA, USA, 127--142. https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/sambasivan"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557330"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557421"},{"key":"e_1_3_2_1_38_1","volume-title":"Coercive control: The entrapment of women in personal life","author":"Stark Evan","unstructured":"Evan Stark . 2007. Coercive control: The entrapment of women in personal life . Oxford University Press , New York . Evan Stark. 2007. Coercive control: The entrapment of women in personal life. Oxford University Press, New York."},{"key":"e_1_3_2_1_39_1","volume-title":"The SAGE Handbook of Qualitative Research in Psychology","author":"Terry Gareth","unstructured":"Gareth Terry , Nikki Hayfield , Victoria Clarke , and Virginia Braun . 2017. Thematic Analysis . In The SAGE Handbook of Qualitative Research in Psychology . SAGE Publications Ltd , London, UK , 17--36. Gareth Terry, Nikki Hayfield, Victoria Clarke, and Virginia Braun. 2017. Thematic Analysis. In The SAGE Handbook of Qualitative Research in Psychology. SAGE Publications Ltd, London, UK, 17--36."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025901"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1177\/1077801216646277"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.82.4.675"}],"event":{"name":"CHI '19: CHI Conference on Human Factors in Computing Systems","location":"Glasgow Scotland Uk","acronym":"CHI '19","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2019 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290605.3300819","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3290605.3300819","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:10Z","timestamp":1750204390000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290605.3300819"}},"subtitle":["Making Sense of Unauthorized Access to Smartphones"],"short-title":[],"issued":{"date-parts":[[2019,5,2]]},"references-count":42,"alternative-id":["10.1145\/3290605.3300819","10.1145\/3290605"],"URL":"https:\/\/doi.org\/10.1145\/3290605.3300819","relation":{},"subject":[],"published":{"date-parts":[[2019,5,2]]},"assertion":[{"value":"2019-05-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}