{"id":"https://openalex.org/W2989122499","doi":"https://doi.org/10.1145/3319535.3363250","title":"Force vs. Nudge","display_name":"Force vs. Nudge","publication_year":2019,"publication_date":"2019-11-06","ids":{"openalex":"https://openalex.org/W2989122499","doi":"https://doi.org/10.1145/3319535.3363250","mag":"2989122499"},"language":"en","primary_location":{"id":"doi:10.1145/3319535.3363250","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3319535.3363250","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5051580258","display_name":"Harshal Tupsamudre","orcid":null},"institutions":[{"id":"https://openalex.org/I55215948","display_name":"Tata Consultancy Services (India)","ror":"https://ror.org/01b9n8m42","country_code":"IN","type":"company","lineage":["https://openalex.org/I4210086519","https://openalex.org/I55215948"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Harshal Tupsamudre","raw_affiliation_strings":["TCS Research, Pune, India"],"affiliations":[{"raw_affiliation_string":"TCS Research, Pune, India","institution_ids":["https://openalex.org/I55215948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027918801","display_name":"Sukanya Vaddepalli","orcid":null},"institutions":[{"id":"https://openalex.org/I55215948","display_name":"Tata Consultancy Services (India)","ror":"https://ror.org/01b9n8m42","country_code":"IN","type":"company","lineage":["https://openalex.org/I4210086519","https://openalex.org/I55215948"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sukanya Vaddepalli","raw_affiliation_strings":["TCS Research, Pune, India"],"affiliations":[{"raw_affiliation_string":"TCS Research, Pune, India","institution_ids":["https://openalex.org/I55215948"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5059612224","display_name":"Vijayanand Banahatti","orcid":"https://orcid.org/0000-0003-0321-498X"},"institutions":[{"id":"https://openalex.org/I55215948","display_name":"Tata Consultancy Services (India)","ror":"https://ror.org/01b9n8m42","country_code":"IN","type":"company","lineage":["https://openalex.org/I4210086519","https://openalex.org/I55215948"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Vijayanand Banahatti","raw_affiliation_strings":["TCS Research, Pune, India"],"affiliations":[{"raw_affiliation_string":"TCS Research, Pune, India","institution_ids":["https://openalex.org/I55215948"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024708790","display_name":"Sachin Lodha","orcid":"https://orcid.org/0000-0001-5771-4977"},"institutions":[{"id":"https://openalex.org/I55215948","display_name":"Tata Consultancy Services (India)","ror":"https://ror.org/01b9n8m42","country_code":"IN","type":"company","lineage":["https://openalex.org/I4210086519","https://openalex.org/I55215948"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sachin Lodha","raw_affiliation_strings":["TCS Research, Pune, India"],"affiliations":[{"raw_affiliation_string":"TCS Research, Pune, India","institution_ids":["https://openalex.org/I55215948"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5051580258"],"corresponding_institution_ids":["https://openalex.org/I55215948"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20970093,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"2537","last_page":"2539"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9909999966621399,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8074231147766113},{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.7718814611434937},{"id":"https://openalex.org/keywords/login","display_name":"Login","score":0.686779260635376},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.5715153217315674},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4624057114124298},{"id":"https://openalex.org/keywords/behavioral-pattern","display_name":"Behavioral pattern","score":0.4350917339324951},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3439115285873413}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8074231147766113},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.7718814611434937},{"id":"https://openalex.org/C113324615","wikidata":"https://www.wikidata.org/wiki/Q472302","display_name":"Login","level":2,"score":0.686779260635376},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.5715153217315674},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4624057114124298},{"id":"https://openalex.org/C83804111","wikidata":"https://www.wikidata.org/wiki/Q1063558","display_name":"Behavioral pattern","level":2,"score":0.4350917339324951},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3439115285873413},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3319535.3363250","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3319535.3363250","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":8,"referenced_works":["https://openalex.org/W1995628302","https://openalex.org/W2044798763","https://openalex.org/W2077910711","https://openalex.org/W2191312859","https://openalex.org/W2254621492","https://openalex.org/W2599688144","https://openalex.org/W2684055372","https://openalex.org/W2886364621"],"related_works":["https://openalex.org/W4235220108","https://openalex.org/W4256170434","https://openalex.org/W4233948907","https://openalex.org/W4238894392","https://openalex.org/W4311722428","https://openalex.org/W2357607877","https://openalex.org/W4238771742","https://openalex.org/W4235839583","https://openalex.org/W4396833206","https://openalex.org/W4243085862"],"abstract_inverted_index":{"Android's":[0],"3X3":[1,20,54,105],"graphical":[2],"pattern":[3,55,158],"lock":[4],"scheme":[5],"is":[6,49],"one":[7],"of":[8,26,91,104,152],"the":[9,44,62,89,95,102],"widely":[10],"used":[11],"authentication":[12],"method":[13],"on":[14,135,174],"smartphone":[15],"devices.":[16],"However,":[17],"users":[18,53,68,87],"choose":[19],"patterns":[21,106,134,148,172],"from":[22,94],"a":[23,125,150],"small":[24,59],"subspace":[25],"all":[27],"possible":[28,50],"389,112":[29],"patterns.":[30],"The":[31],"two":[32,72],"recently":[33],"proposed":[34],"interfaces,":[35,138],"SysPal":[36,66,114,137,145],"by":[37,43,57],"Cho":[38],"et":[39],"al.":[40],"and":[41,115,132,141,146,154,165,179],"TinPal":[42,81,116,147,175],"authors,":[45],"demonstrate":[46],"that":[47,171],"it":[48],"to":[51,69,85,183],"influence":[52],"choices":[56],"making":[58],"modifications":[60],"in":[61,78],"existing":[63],"interface.":[64],"While":[65],"forces":[67],"include":[70],"one,":[71],"or":[73],"three":[74,136],"system-assigned":[75],"random":[76],"dots":[77,93],"their":[79],"pattern,":[80],"employs":[82],"highlighting":[83],"mechanism":[84],"inform":[86],"about":[88],"set":[90],"reachable":[92],"current":[96],"selected":[97],"dot.":[98],"Both":[99],"interfaces":[100],"improved":[101],"security":[103,153],"without":[107],"affecting":[108],"usability,":[109],"but":[110],"no":[111],"comparison":[112],"between":[113],"was":[117],"presented.":[118],"To":[119],"address":[120],"this":[121],"gap,":[122],"we":[123,169],"conduct":[124],"new":[126],"user":[127],"study":[128],"with":[129],"147":[130],"participants":[131],"collect":[133],"1-dot,":[139],"2-dot":[140],"3-dot.":[142],"We":[143],"compare":[144],"using":[149],"range":[151],"usability":[155],"metrics":[156],"including":[157],"length,":[159,161],"stroke":[160],"guessability,":[162],"recall":[163],"time":[164],"login":[166],"attempts.":[167],"Overall,":[168],"found":[170],"created":[173],"were":[176],"significantly":[177],"longer":[178],"offered":[180],"more":[181],"resistance":[182],"guessing":[184],"attacks.":[185]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2019-11-22T00:00:00"}
