{"id":"https://openalex.org/W2921485906","doi":"https://doi.org/10.5220/0007346202660273","title":"Evaluating Security, Privacy and Usability Features of QR Code Readers","display_name":"Evaluating Security, Privacy and Usability Features of QR Code Readers","publication_year":2019,"publication_date":"2019-01-01","ids":{"openalex":"https://openalex.org/W2921485906","doi":"https://doi.org/10.5220/0007346202660273","mag":"2921485906"},"language":"en","primary_location":{"id":"doi:10.5220/0007346202660273","is_oa":false,"landing_page_url":"https://doi.org/10.5220/0007346202660273","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001717373","display_name":"Heider A. Wahsheh","orcid":"https://orcid.org/0000-0003-2908-5418"},"institutions":[{"id":"https://openalex.org/I149461666","display_name":"Ca' Foscari University of Venice","ror":"https://ror.org/04yzxz566","country_code":"IT","type":"education","lineage":["https://openalex.org/I149461666"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Heider Wahsheh","raw_affiliation_strings":["University Ca\u2019 Foscari, Venice and Italy, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"University Ca\u2019 Foscari, Venice and Italy, --- Select a Country ---","institution_ids":["https://openalex.org/I149461666"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5031937441","display_name":"Flaminia L. Luccio","orcid":"https://orcid.org/0000-0002-5409-5039"},"institutions":[{"id":"https://openalex.org/I149461666","display_name":"Ca' Foscari University of Venice","ror":"https://ror.org/04yzxz566","country_code":"IT","type":"education","lineage":["https://openalex.org/I149461666"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Flaminia Luccio","raw_affiliation_strings":["University Ca\u2019 Foscari, Venice and Italy, --- Select a Country ---"],"affiliations":[{"raw_affiliation_string":"University Ca\u2019 Foscari, Venice and Italy, --- Select a Country ---","institution_ids":["https://openalex.org/I149461666"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5001717373"],"corresponding_institution_ids":["https://openalex.org/I149461666"],"apc_list":null,"apc_paid":null,"fwci":3.0524,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.92576456,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"266","last_page":"273"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13270","display_name":"QR Code Applications and Technologies","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13270","display_name":"QR Code Applications and Technologies","score":0.9983000159263611,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9864000082015991,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12799","display_name":"Mobile and Web Applications","score":0.9564999938011169,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/usability","display_name":"Usability","score":0.7841895818710327},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7787128686904907},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4630375802516937},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.44367411732673645},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.4365866184234619},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41495952010154724},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.38150712847709656},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.2565956115722656},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1616288721561432}],"concepts":[{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.7841895818710327},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7787128686904907},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4630375802516937},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.44367411732673645},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.4365866184234619},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41495952010154724},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.38150712847709656},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.2565956115722656},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1616288721561432},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.5220/0007346202660273","is_oa":false,"landing_page_url":"https://doi.org/10.5220/0007346202660273","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 5th International Conference on Information Systems Security and Privacy","raw_type":"proceedings-article"},{"id":"pmh:oai:iris.unive.it:10278/3709374","is_oa":false,"landing_page_url":"http://hdl.handle.net/10278/3709374","pdf_url":null,"source":{"id":"https://openalex.org/S4306402336","display_name":"ARCA (Universit\u00e0 Ca' Foscari Venezia)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I149461666","host_organization_name":"Ca' Foscari University of Venice","host_organization_lineage":["https://openalex.org/I149461666"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferenceObject"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2584827882","https://openalex.org/W3195097297","https://openalex.org/W3038106605","https://openalex.org/W4225340788","https://openalex.org/W2513267613","https://openalex.org/W3049084372","https://openalex.org/W2528109871","https://openalex.org/W2905822832","https://openalex.org/W2940702331","https://openalex.org/W2240244939"],"abstract_inverted_index":{"The":[0,147],"widespread":[1],"of":[2,45,112,160],"smartphones":[3],"with":[4],"advanced":[5],"capabilities":[6],"has":[7],"motivated":[8],"developers":[9],"to":[10,155],"design":[11,83,173],"new":[12],"mobile":[13],"applications":[14,48,114],"that":[15,108,150,170],"are":[16,25],"used":[17],"as":[18],"barcode":[19,23,46,104],"scanners.":[20],"Although":[21],"several":[22],"readers":[24],"available,":[26],"they":[27],"still":[28],"have":[29,97,124,168],"security":[30,130,176],"and":[31,42,54,74,81,88,115,129,135,143,163,178],"privacy":[32,53],"limitations.":[33,122],"In":[34],"this":[35],"paper,":[36],"we":[37,96,167],"first":[38],"present":[39,82],"a":[40,101,126],"comprehensive":[41],"systematic":[43],"review":[44],"reader":[47,105],"by":[49],"analyzing":[50],"their":[51,66,79,121],"security,":[52,69,71],"usability":[55,128,179],"features.":[56],"We":[57,76,123],"categorize":[58],"these":[59],"apps":[60],"into":[61],"four":[62],"groups":[63],"depending":[64],"on":[65,93,132],"properties:":[67],"URLs":[68],"Crypto-based":[70],"Popular":[72],"applications,":[73],"Save-privacy.":[75],"also":[77],"highlight":[78],"weaknesses":[80],"recommendations":[84],"for":[85],"usable,":[86],"secure":[87,103],"privacy-guaranteed":[89],"scanner":[90],"applications.":[91],"Based":[92],"our":[94],"recommendations,":[95],"developed":[98],"BarSec":[99,133,151],"Driod":[100,134,152],"proof-of-concept":[102],"Android":[106],"app":[107],"exploits":[109],"some":[110],"features":[111],"other":[113,137],"at":[116],"the":[117,158,161,172],"same":[118],"time":[119],"overcomes":[120],"performed":[125],"user":[127],"survey,":[131],"two":[136],"popular":[138],"QR":[139,144],"code":[140],"readers,":[141],"KasperSky":[142],"Droid":[145],"Private.":[146],"results":[148],"show":[149],"is":[153,164],"easy":[154],"use,":[156],"satisfies":[157],"expectations":[159],"users":[162],"secure.":[165],"Moreover,":[166],"observed":[169],"following":[171],"tips,":[174],"user\u2019s":[175],"awareness":[177],"increase.":[180]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2019-03-22T00:00:00"}
