{"id":"https://openalex.org/W2041145152","doi":"https://doi.org/10.1145/2501604.2501614","title":"Modifying smartphone user locking behavior","display_name":"Modifying smartphone user locking behavior","publication_year":2013,"publication_date":"2013-07-24","ids":{"openalex":"https://openalex.org/W2041145152","doi":"https://doi.org/10.1145/2501604.2501614","mag":"2041145152"},"language":"en","primary_location":{"id":"doi:10.1145/2501604.2501614","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2501604.2501614","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Ninth Symposium on Usable Privacy and Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5037901627","display_name":"Dirk Van Bruggen","orcid":"https://orcid.org/0000-0001-9436-5200"},"institutions":[{"id":"https://openalex.org/I107639228","display_name":"University of Notre Dame","ror":"https://ror.org/00mkhxb43","country_code":"US","type":"education","lineage":["https://openalex.org/I107639228"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Dirk Van Bruggen","raw_affiliation_strings":["University of Notre Dame"],"affiliations":[{"raw_affiliation_string":"University of Notre Dame","institution_ids":["https://openalex.org/I107639228"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064499660","display_name":"Shu Liu","orcid":"https://orcid.org/0000-0002-2903-9270"},"institutions":[{"id":"https://openalex.org/I107639228","display_name":"University of Notre Dame","ror":"https://ror.org/00mkhxb43","country_code":"US","type":"education","lineage":["https://openalex.org/I107639228"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shu Liu","raw_affiliation_strings":["University of Notre Dame"],"affiliations":[{"raw_affiliation_string":"University of Notre Dame","institution_ids":["https://openalex.org/I107639228"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048319592","display_name":"Mitch Kajzer","orcid":null},"institutions":[{"id":"https://openalex.org/I107639228","display_name":"University of Notre Dame","ror":"https://ror.org/00mkhxb43","country_code":"US","type":"education","lineage":["https://openalex.org/I107639228"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mitch Kajzer","raw_affiliation_strings":["University of Notre Dame"],"affiliations":[{"raw_affiliation_string":"University of Notre Dame","institution_ids":["https://openalex.org/I107639228"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5048928683","display_name":"Aaron Striegel","orcid":"https://orcid.org/0000-0002-3157-2859"},"institutions":[{"id":"https://openalex.org/I107639228","display_name":"University of Notre Dame","ror":"https://ror.org/00mkhxb43","country_code":"US","type":"education","lineage":["https://openalex.org/I107639228"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Aaron Striegel","raw_affiliation_strings":["University of Notre Dame"],"affiliations":[{"raw_affiliation_string":"University of Notre Dame","institution_ids":["https://openalex.org/I107639228"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088606631","display_name":"Charles R. Crowell","orcid":"https://orcid.org/0000-0002-4337-3726"},"institutions":[{"id":"https://openalex.org/I107639228","display_name":"University of Notre Dame","ror":"https://ror.org/00mkhxb43","country_code":"US","type":"education","lineage":["https://openalex.org/I107639228"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Charles R. Crowell","raw_affiliation_strings":["University of Notre Dame"],"affiliations":[{"raw_affiliation_string":"University of Notre Dame","institution_ids":["https://openalex.org/I107639228"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103175402","display_name":"John D\u2019Arcy","orcid":"https://orcid.org/0000-0003-0286-5772"},"institutions":[{"id":"https://openalex.org/I86501945","display_name":"University of Delaware","ror":"https://ror.org/01sbq1a82","country_code":"US","type":"education","lineage":["https://openalex.org/I86501945"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"John D'Arcy","raw_affiliation_strings":["University of Delaware"],"affiliations":[{"raw_affiliation_string":"University of Delaware","institution_ids":["https://openalex.org/I86501945"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5037901627"],"corresponding_institution_ids":["https://openalex.org/I107639228"],"apc_list":null,"apc_paid":null,"fwci":27.0229,"has_fulltext":false,"cited_by_count":71,"citation_normalized_percentile":{"value":0.99431256,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"14"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6644078493118286},{"id":"https://openalex.org/keywords/baseline","display_name":"Baseline (sea)","score":0.6069749593734741},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.5903281569480896},{"id":"https://openalex.org/keywords/deterrence-theory","display_name":"Deterrence theory","score":0.5534392595291138},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5429257750511169},{"id":"https://openalex.org/keywords/morality","display_name":"Morality","score":0.5326352119445801},{"id":"https://openalex.org/keywords/mobile-phone","display_name":"Mobile phone","score":0.47874587774276733},{"id":"https://openalex.org/keywords/smart-phone","display_name":"Smart phone","score":0.4784248471260071},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4756826162338257},{"id":"https://openalex.org/keywords/phone","display_name":"Phone","score":0.4531053900718689},{"id":"https://openalex.org/keywords/cybercrime","display_name":"Cybercrime","score":0.44404086470603943},{"id":"https://openalex.org/keywords/intervention","display_name":"Intervention (counseling)","score":0.43676796555519104},{"id":"https://openalex.org/keywords/security-controls","display_name":"Security controls","score":0.42386484146118164},{"id":"https://openalex.org/keywords/behavior-change","display_name":"Behavior change","score":0.42091432213783264},{"id":"https://openalex.org/keywords/control","display_name":"Control (management)","score":0.20766204595565796},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.13799169659614563},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.11608019471168518},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.08984068036079407}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6644078493118286},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.6069749593734741},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.5903281569480896},{"id":"https://openalex.org/C60643870","wikidata":"https://www.wikidata.org/wiki/Q1949683","display_name":"Deterrence theory","level":2,"score":0.5534392595291138},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5429257750511169},{"id":"https://openalex.org/C200113983","wikidata":"https://www.wikidata.org/wiki/Q48324","display_name":"Morality","level":2,"score":0.5326352119445801},{"id":"https://openalex.org/C2777421447","wikidata":"https://www.wikidata.org/wiki/Q17517","display_name":"Mobile phone","level":2,"score":0.47874587774276733},{"id":"https://openalex.org/C2984771860","wikidata":"https://www.wikidata.org/wiki/Q22645","display_name":"Smart phone","level":2,"score":0.4784248471260071},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4756826162338257},{"id":"https://openalex.org/C2778707766","wikidata":"https://www.wikidata.org/wiki/Q202064","display_name":"Phone","level":2,"score":0.4531053900718689},{"id":"https://openalex.org/C2779390178","wikidata":"https://www.wikidata.org/wiki/Q29137","display_name":"Cybercrime","level":3,"score":0.44404086470603943},{"id":"https://openalex.org/C2780665704","wikidata":"https://www.wikidata.org/wiki/Q959298","display_name":"Intervention (counseling)","level":2,"score":0.43676796555519104},{"id":"https://openalex.org/C178148461","wikidata":"https://www.wikidata.org/wiki/Q1632136","display_name":"Security controls","level":3,"score":0.42386484146118164},{"id":"https://openalex.org/C14262774","wikidata":"https://www.wikidata.org/wiki/Q4880695","display_name":"Behavior change","level":2,"score":0.42091432213783264},{"id":"https://openalex.org/C2775924081","wikidata":"https://www.wikidata.org/wiki/Q55608371","display_name":"Control (management)","level":2,"score":0.20766204595565796},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.13799169659614563},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.11608019471168518},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.08984068036079407},{"id":"https://openalex.org/C175444787","wikidata":"https://www.wikidata.org/wiki/Q39072","display_name":"Microeconomics","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C185544564","wikidata":"https://www.wikidata.org/wiki/Q81197","display_name":"Nuclear physics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111368507","wikidata":"https://www.wikidata.org/wiki/Q43518","display_name":"Oceanography","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C127313418","wikidata":"https://www.wikidata.org/wiki/Q1069","display_name":"Geology","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.0},{"id":"https://openalex.org/C118552586","wikidata":"https://www.wikidata.org/wiki/Q7867","display_name":"Psychiatry","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2501604.2501614","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2501604.2501614","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the Ninth Symposium on Usable Privacy and Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions","score":0.800000011920929}],"awards":[{"id":"https://openalex.org/G8114007926","display_name":null,"funder_award_id":"IIS-0915775","funder_id":"https://openalex.org/F4320337389","funder_display_name":"Division of Information and Intelligent Systems"}],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"},{"id":"https://openalex.org/F4320337389","display_name":"Division of Information and Intelligent Systems","ror":"https://ror.org/053a2cp42"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":57,"referenced_works":["https://openalex.org/W90935590","https://openalex.org/W591137247","https://openalex.org/W606553535","https://openalex.org/W617440698","https://openalex.org/W1489067988","https://openalex.org/W1538043169","https://openalex.org/W1538847865","https://openalex.org/W1564117467","https://openalex.org/W1602619638","https://openalex.org/W1626992774","https://openalex.org/W1846357020","https://openalex.org/W1856261916","https://openalex.org/W1942875096","https://openalex.org/W1974589815","https://openalex.org/W1981406113","https://openalex.org/W2003722078","https://openalex.org/W2021464460","https://openalex.org/W2024419606","https://openalex.org/W2024957958","https://openalex.org/W2025309197","https://openalex.org/W2028849308","https://openalex.org/W2044935933","https://openalex.org/W2045591401","https://openalex.org/W2055847123","https://openalex.org/W2066310381","https://openalex.org/W2069183540","https://openalex.org/W2069613430","https://openalex.org/W2081436185","https://openalex.org/W2087554220","https://openalex.org/W2099647042","https://openalex.org/W2100797043","https://openalex.org/W2125639892","https://openalex.org/W2129100925","https://openalex.org/W2133073140","https://openalex.org/W2138929707","https://openalex.org/W2142919106","https://openalex.org/W2143554828","https://openalex.org/W2150659349","https://openalex.org/W2152903211","https://openalex.org/W2154126956","https://openalex.org/W2154229299","https://openalex.org/W2160828020","https://openalex.org/W2164739023","https://openalex.org/W2167956239","https://openalex.org/W2170554716","https://openalex.org/W2170899042","https://openalex.org/W2180609588","https://openalex.org/W2250323125","https://openalex.org/W2914723769","https://openalex.org/W3000645669","https://openalex.org/W3005993375","https://openalex.org/W3006975230","https://openalex.org/W3123896171","https://openalex.org/W3124248532","https://openalex.org/W4252497028","https://openalex.org/W6789318899","https://openalex.org/W6980834207"],"related_works":["https://openalex.org/W2338899373","https://openalex.org/W199254545","https://openalex.org/W2997836625","https://openalex.org/W4252285266","https://openalex.org/W4244102749","https://openalex.org/W111175386","https://openalex.org/W2476504758","https://openalex.org/W4248464163","https://openalex.org/W1937580673","https://openalex.org/W2405230758"],"abstract_inverted_index":{"With":[0],"an":[1],"increasing":[2],"number":[3],"of":[4,27,37,42,67,100,154],"organizations":[5],"allowing":[6],"personal":[7,29],"smart":[8,105],"phones":[9],"onto":[10],"their":[11,33,158],"networks,":[12],"considerable":[13],"security":[14,19,57,69,76,83,95],"risk":[15,20],"is":[16,21,59,70,164],"introduced.":[17],"The":[18],"exacerbated":[22],"by":[23,40,48],"the":[24,28,43,49,51,71,112,141],"tremendous":[25],"heterogeneity":[26],"mobile":[30],"devices":[31,44,159],"and":[32,124],"respective":[34],"installed":[35],"pool":[36],"applications.":[38],"Furthermore,":[39],"virtue":[41],"not":[45],"being":[46],"owned":[47],"organization,":[50],"ability":[52,72,113],"to":[53,73,114,131,166],"authoritatively":[54],"enforce":[55],"organizational":[56,68],"polices":[58],"challenging.":[60],"As":[61],"a":[62,64,91,98,151],"result,":[63],"critical":[65],"part":[66],"drive":[74,115],"user":[75,94],"behavior":[77,96],"through":[78],"either":[79],"on-device":[80],"mechanisms":[81],"or":[82],"awareness":[84],"programs.":[85],"In":[86],"this":[87],"paper,":[88],"we":[89],"establish":[90],"baseline":[92],"for":[93],"from":[97],"population":[99],"over":[101,136],"one":[102],"hundred":[103],"fifty":[104],"phone":[106],"users.":[107],"We":[108],"then":[109],"systematically":[110],"evaluate":[111],"behavioral":[116],"change":[117,168],"via":[118],"messaging":[119],"centered":[120],"on":[121],"morality,":[122],"deterrence,":[123],"incentives.":[125],"Our":[126],"findings":[127,147],"suggest":[128],"that":[129,149],"appeals":[130],"morality":[132],"are":[133,156],"most":[134,142],"effective":[135],"time,":[137],"whereas":[138],"deterrence":[139],"produces":[140],"immediate":[143],"reaction.":[144],"Additionally,":[145],"our":[146],"show":[148],"while":[150],"significant":[152],"portion":[153],"users":[155],"securing":[157],"without":[160],"prior":[161],"intervention,":[162],"it":[163],"difficult":[165],"influence":[167],"in":[169],"those":[170],"who":[171],"do":[172],"not.":[173]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":5},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":3},{"year":2018,"cited_by_count":9},{"year":2017,"cited_by_count":8},{"year":2016,"cited_by_count":15},{"year":2015,"cited_by_count":11},{"year":2014,"cited_by_count":6}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2025-10-10T00:00:00"}
