{"id":"https://openalex.org/W2145985203","doi":"https://doi.org/10.1145/2335356.2335359","title":"Goldilocks and the <i>two</i> mobile devices","display_name":"Goldilocks and the <i>two</i> mobile devices","publication_year":2012,"publication_date":"2012-07-11","ids":{"openalex":"https://openalex.org/W2145985203","doi":"https://doi.org/10.1145/2335356.2335359","mag":"2145985203"},"language":"en","primary_location":{"id":"doi:10.1145/2335356.2335359","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2335356.2335359","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighth Symposium on Usable Privacy and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5081832714","display_name":"Eiji Hayashi","orcid":"https://orcid.org/0009-0008-1248-554X"},"institutions":[{"id":"https://openalex.org/I74973139","display_name":"Carnegie Mellon University","ror":"https://ror.org/05x2bcf33","country_code":"US","type":"education","lineage":["https://openalex.org/I74973139"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Eiji Hayashi","raw_affiliation_strings":["Carnegie Mellon University, Pittsburgh PA","Carnegie-Mellon University, Pittsburgh, PA"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon University, Pittsburgh PA","institution_ids":["https://openalex.org/I74973139"]},{"raw_affiliation_string":"Carnegie-Mellon University, Pittsburgh, PA","institution_ids":["https://openalex.org/I74973139"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009480537","display_name":"Oriana Riva","orcid":null},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Oriana Riva","raw_affiliation_strings":["Microsoft Research, One Microsoft Way, Redmond, WA","Microsoft Research, One Microsoft Way, Redmond, WA,"],"affiliations":[{"raw_affiliation_string":"Microsoft Research, One Microsoft Way, Redmond, WA","institution_ids":["https://openalex.org/I1290206253"]},{"raw_affiliation_string":"Microsoft Research, One Microsoft Way, Redmond, WA,","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024493389","display_name":"Karin Strau\u00df","orcid":"https://orcid.org/0000-0002-8327-5477"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Karin Strauss","raw_affiliation_strings":["Microsoft Research, One Microsoft Way, Redmond, WA","Microsoft Research, One Microsoft Way, Redmond, WA,"],"affiliations":[{"raw_affiliation_string":"Microsoft Research, One Microsoft Way, Redmond, WA","institution_ids":["https://openalex.org/I1290206253"]},{"raw_affiliation_string":"Microsoft Research, One Microsoft Way, Redmond, WA,","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5078779537","display_name":"A. J. Bernheim Brush","orcid":"https://orcid.org/0000-0002-8206-1469"},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"A. J. Bernheim Brush","raw_affiliation_strings":["Microsoft Research, One Microsoft Way, Redmond, WA","Microsoft Research, One Microsoft Way, Redmond, WA,"],"affiliations":[{"raw_affiliation_string":"Microsoft Research, One Microsoft Way, Redmond, WA","institution_ids":["https://openalex.org/I1290206253"]},{"raw_affiliation_string":"Microsoft Research, One Microsoft Way, Redmond, WA,","institution_ids":["https://openalex.org/I1290206253"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088049592","display_name":"Stuart Schechter","orcid":null},"institutions":[{"id":"https://openalex.org/I1290206253","display_name":"Microsoft (United States)","ror":"https://ror.org/00d0nc645","country_code":"US","type":"company","lineage":["https://openalex.org/I1290206253"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Stuart Schechter","raw_affiliation_strings":["Microsoft Research, One Microsoft Way, Redmond, WA","Microsoft Research, One Microsoft Way, Redmond, WA,"],"affiliations":[{"raw_affiliation_string":"Microsoft Research, One Microsoft Way, Redmond, WA","institution_ids":["https://openalex.org/I1290206253"]},{"raw_affiliation_string":"Microsoft Research, One Microsoft Way, Redmond, WA,","institution_ids":["https://openalex.org/I1290206253"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5081832714"],"corresponding_institution_ids":["https://openalex.org/I74973139"],"apc_list":null,"apc_paid":null,"fwci":21.3165,"has_fulltext":false,"cited_by_count":79,"citation_normalized_percentile":{"value":0.99269991,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"11"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9922000169754028,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.6734389662742615},{"id":"https://openalex.org/keywords/biometrics","display_name":"Biometrics","score":0.5883420705795288},{"id":"https://openalex.org/keywords/mobile-device","display_name":"Mobile device","score":0.5871961712837219},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.586174726486206},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5777373313903809},{"id":"https://openalex.org/keywords/mobile-phone","display_name":"Mobile phone","score":0.5699723362922668},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.5604748725891113},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5308616757392883},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.47857049107551575},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.4618024230003357},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.45918363332748413},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.4417421519756317},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22737568616867065},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.16614514589309692}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6734389662742615},{"id":"https://openalex.org/C184297639","wikidata":"https://www.wikidata.org/wiki/Q177765","display_name":"Biometrics","level":2,"score":0.5883420705795288},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.5871961712837219},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.586174726486206},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5777373313903809},{"id":"https://openalex.org/C2777421447","wikidata":"https://www.wikidata.org/wiki/Q17517","display_name":"Mobile phone","level":2,"score":0.5699723362922668},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.5604748725891113},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5308616757392883},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.47857049107551575},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.4618024230003357},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.45918363332748413},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.4417421519756317},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22737568616867065},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.16614514589309692},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2335356.2335359","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2335356.2335359","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Eighth Symposium on Usable Privacy and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W163774565","https://openalex.org/W1485033854","https://openalex.org/W1503108337","https://openalex.org/W1503444668","https://openalex.org/W1578129213","https://openalex.org/W1602323913","https://openalex.org/W1873414311","https://openalex.org/W1921097329","https://openalex.org/W2013983933","https://openalex.org/W2046378201","https://openalex.org/W2094214226","https://openalex.org/W2099889879","https://openalex.org/W2116371103","https://openalex.org/W2129347810","https://openalex.org/W2136781735","https://openalex.org/W2144169730","https://openalex.org/W2154691736","https://openalex.org/W2156146541","https://openalex.org/W2160828020","https://openalex.org/W2166602595"],"related_works":["https://openalex.org/W143386018","https://openalex.org/W1004582678","https://openalex.org/W2656445685","https://openalex.org/W2115218409","https://openalex.org/W2076845124","https://openalex.org/W2183964146","https://openalex.org/W2090949570","https://openalex.org/W2263162522","https://openalex.org/W1989237518","https://openalex.org/W2062586268"],"abstract_inverted_index":{"Most":[0],"mobile":[1,124],"phones":[2,57],"and":[3,13,38,58,75,117,126,142],"tablets":[4],"support":[5],"only":[6],"two":[7],"access":[8,22,44,87],"control":[9,23,45,88],"device":[10,21,43,72,94],"states:":[11],"locked":[12,74],"unlocked.":[14],"We":[15,40,80],"investigated":[16],"how":[17],"well":[18],"all":[19],"or-nothing":[20],"meets":[24],"the":[25],"need":[26],"of":[27,99,140],"users":[28],"by":[29,78],"interviewing":[30],"20":[31,100],"participants":[32,60,97,128],"who":[33],"had":[34],"both":[35,56],"a":[36,48],"smartphone":[37],"tablet.":[39],"find":[41],"all-or-nothing":[42],"to":[46,66,92,104,120,122,132],"be":[47,67],"remarkably":[49],"poor":[50],"fit":[51],"with":[52],"users'":[53],"preferences.":[54],"On":[55],"tablets,":[59],"wanted":[61],"roughly":[62],"half":[63,76],"their":[64,71,123],"applications":[65],"available":[68],"even":[69],"when":[70],"was":[73],"protected":[77],"authentication.":[79],"also":[81,138],"solicited":[82],"participants'":[83,112],"interest":[84,113],"in":[85,114],"new":[86],"mechanisms":[89],"designed":[90],"specifically":[91],"facilitate":[93],"sharing.":[95],"Fourteen":[96],"out":[98],"preferred":[101],"these":[102],"controls":[103],"existing":[105],"security":[106,141],"locks":[107],"alone.":[108],"Finally,":[109],"we":[110],"gauged":[111],"using":[115],"face":[116],"voice":[118],"biometrics":[119],"authenticate":[121],"phone":[125],"tablets;":[127],"were":[129,137],"surprisingly":[130],"receptive":[131],"biometrics,":[133],"given":[134],"that":[135],"they":[136],"aware":[139],"reliability":[143],"limitations.":[144]},"counts_by_year":[{"year":2024,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":13},{"year":2017,"cited_by_count":6},{"year":2016,"cited_by_count":8},{"year":2015,"cited_by_count":9},{"year":2014,"cited_by_count":13},{"year":2013,"cited_by_count":7},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
