{"id":"https://openalex.org/W4388115913","doi":"https://doi.org/10.1109/isi58743.2023.10297219","title":"Shoulder Surfing on Mobile Authentication: Perception vis-a-vis Performance from the Attacker's Perspective","display_name":"Shoulder Surfing on Mobile Authentication: Perception vis-a-vis Performance from the Attacker's Perspective","publication_year":2023,"publication_date":"2023-10-02","ids":{"openalex":"https://openalex.org/W4388115913","doi":"https://doi.org/10.1109/isi58743.2023.10297219"},"language":"en","primary_location":{"id":"doi:10.1109/isi58743.2023.10297219","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi58743.2023.10297219","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085177224","display_name":"Kanlun Wang","orcid":"https://orcid.org/0000-0003-3084-7168"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kanlun Wang","raw_affiliation_strings":["The University of North Carolina at Charlotte,Department of Business Information Systems and Operations Management,Charlotte,USA","Department of Business Information Systems and Operations Management, The University of North Carolina at Charlotte, Charlotte, USA"],"affiliations":[{"raw_affiliation_string":"The University of North Carolina at Charlotte,Department of Business Information Systems and Operations Management,Charlotte,USA","institution_ids":["https://openalex.org/I102149020"]},{"raw_affiliation_string":"Department of Business Information Systems and Operations Management, The University of North Carolina at Charlotte, Charlotte, USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010146682","display_name":"Lina Zhou","orcid":"https://orcid.org/0000-0003-1864-0527"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Lina Zhou","raw_affiliation_strings":["The University of North Carolina at Charlotte,Department of Business Information Systems and Operations Management,Charlotte,USA","Department of Business Information Systems and Operations Management, The University of North Carolina at Charlotte, Charlotte, USA"],"affiliations":[{"raw_affiliation_string":"The University of North Carolina at Charlotte,Department of Business Information Systems and Operations Management,Charlotte,USA","institution_ids":["https://openalex.org/I102149020"]},{"raw_affiliation_string":"Department of Business Information Systems and Operations Management, The University of North Carolina at Charlotte, Charlotte, USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5103074782","display_name":"Dongsong Zhang","orcid":"https://orcid.org/0000-0001-6084-7041"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dongsong Zhang","raw_affiliation_strings":["The University of North Carolina at Charlotte,Department of Business Information Systems and Operations Management,Charlotte,USA","Department of Business Information Systems and Operations Management, The University of North Carolina at Charlotte, Charlotte, USA"],"affiliations":[{"raw_affiliation_string":"The University of North Carolina at Charlotte,Department of Business Information Systems and Operations Management,Charlotte,USA","institution_ids":["https://openalex.org/I102149020"]},{"raw_affiliation_string":"Department of Business Information Systems and Operations Management, The University of North Carolina at Charlotte, Charlotte, USA","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056277859","display_name":"Jianwei Lai","orcid":"https://orcid.org/0000-0002-8769-8143"},"institutions":[{"id":"https://openalex.org/I47301684","display_name":"Illinois State University","ror":"https://ror.org/050kcr883","country_code":"US","type":"education","lineage":["https://openalex.org/I47301684"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jianwei Lai","raw_affiliation_strings":["School of Information Technology Illinois State University,Normal,USA","School of Information Technology Illinois State University, Normal, USA"],"affiliations":[{"raw_affiliation_string":"School of Information Technology Illinois State University,Normal,USA","institution_ids":["https://openalex.org/I47301684"]},{"raw_affiliation_string":"School of Information Technology Illinois State University, Normal, USA","institution_ids":["https://openalex.org/I47301684"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5085177224"],"corresponding_institution_ids":["https://openalex.org/I102149020"],"apc_list":null,"apc_paid":null,"fwci":0.9178,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.80800357,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9901999831199646,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.6724489331245422},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6214486956596375},{"id":"https://openalex.org/keywords/workload","display_name":"Workload","score":0.6097515821456909},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.5783079266548157},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5606099963188171},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.5537034869194031},{"id":"https://openalex.org/keywords/clarity","display_name":"CLARITY","score":0.5411890745162964},{"id":"https://openalex.org/keywords/perspective","display_name":"Perspective (graphical)","score":0.5249699950218201},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5074154734611511},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.4852766692638397},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.43106791377067566},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.41082948446273804},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.17789021134376526},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.1220180094242096}],"concepts":[{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.6724489331245422},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6214486956596375},{"id":"https://openalex.org/C2778476105","wikidata":"https://www.wikidata.org/wiki/Q628539","display_name":"Workload","level":2,"score":0.6097515821456909},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.5783079266548157},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5606099963188171},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.5537034869194031},{"id":"https://openalex.org/C2777146004","wikidata":"https://www.wikidata.org/wiki/Q14949826","display_name":"CLARITY","level":2,"score":0.5411890745162964},{"id":"https://openalex.org/C12713177","wikidata":"https://www.wikidata.org/wiki/Q1900281","display_name":"Perspective (graphical)","level":2,"score":0.5249699950218201},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5074154734611511},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.4852766692638397},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.43106791377067566},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.41082948446273804},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.17789021134376526},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.1220180094242096},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isi58743.2023.10297219","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi58743.2023.10297219","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2023 IEEE International Conference on Intelligence and Security Informatics (ISI)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/4","score":0.550000011920929,"display_name":"Quality Education"}],"awards":[{"id":"https://openalex.org/G487619237","display_name":null,"funder_award_id":"CNS 1917537","funder_id":"https://openalex.org/F4320306076","funder_display_name":"National Science Foundation"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W2108525321","https://openalex.org/W2157289187","https://openalex.org/W2522003857","https://openalex.org/W2579555219","https://openalex.org/W2611149039","https://openalex.org/W2756320651","https://openalex.org/W2759738317","https://openalex.org/W2789705423","https://openalex.org/W2794095167","https://openalex.org/W2803380720","https://openalex.org/W2836649006","https://openalex.org/W2886739557","https://openalex.org/W2912533355","https://openalex.org/W2925198140","https://openalex.org/W2955526316","https://openalex.org/W2969029503","https://openalex.org/W2972243556","https://openalex.org/W3104387631","https://openalex.org/W3106195390","https://openalex.org/W3126562902","https://openalex.org/W3194925106","https://openalex.org/W3215735247","https://openalex.org/W4286255287","https://openalex.org/W4296784662","https://openalex.org/W4297156542","https://openalex.org/W4304142421","https://openalex.org/W4321609210","https://openalex.org/W6766594811"],"related_works":["https://openalex.org/W2086338133","https://openalex.org/W4367679314","https://openalex.org/W225526533","https://openalex.org/W2078361494","https://openalex.org/W2009234990","https://openalex.org/W4244083766","https://openalex.org/W2091016074","https://openalex.org/W2134615400","https://openalex.org/W2023583523","https://openalex.org/W2022769024"],"abstract_inverted_index":{"Shoulder-surfing":[0],"studies":[1],"in":[2,77,118,145],"the":[3,13,26,32,37,47,69,72,81,86,90,95,106,115,131,136,139,150,160],"context":[4],"of":[5,25,49,85,108,120,162],"mobile":[6,56,151],"user":[7,57,152],"authentication":[8,58,87,109,153],"have":[9,17],"focused":[10],"on":[11,94,114],"evaluating":[12],"attackers'":[14,38,73,116,140],"performance,":[15],"yet":[16],"paid":[18],"much":[19],"less":[20],"attention":[21],"to":[22,45],"their":[23],"perception":[24,39,48,74,117],"shoulder-surfing":[27,33,163,175],"process.":[28],"Whether":[29],"and":[30,60,75,80,111,125,143],"how":[31],"setting":[34],"might":[35],"affect":[36],"remains":[40],"under-explored.":[41],"This":[42],"study":[43],"aims":[44],"investigate":[46],"shoulder":[50,78,146],"surfers":[51],"with":[52,149],"two":[53],"different":[54,62],"password-based":[55],"methods":[59,110],"three":[61],"observation":[63,112,123],"angles.":[64],"Moreover,":[65],"this":[66],"work":[67],"examines":[68],"relationship":[70,137],"between":[71,138],"performance":[76,144],"surfing":[79,147],"possible":[82],"moderating":[83],"effect":[84],"method":[88],"for":[89,174],"first":[91],"time.":[92],"Based":[93],"data":[96],"collected":[97],"from":[98,165],"an":[99,166],"online":[100],"experiment,":[101],"our":[102],"analysis":[103],"results":[104,132],"reveal":[105],"effects":[107],"angles":[113],"terms":[119],"cognitive":[121,141],"workload,":[122],"clarity,":[124],"repetitive":[126],"learning":[127],"advantage.":[128],"In":[129],"addition,":[130],"also":[133,170],"show":[134],"that":[135],"workload":[142],"varies":[148],"method.":[154],"Our":[155],"findings":[156],"not":[157],"only":[158],"deepen":[159],"understanding":[161],"attacks":[164],"attacker's":[167],"perspective,":[168],"but":[169],"facilitate":[171],"developing":[172],"countermeasures":[173],"attacks.":[176]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
