{"id":"https://openalex.org/W2108584323","doi":"https://doi.org/10.1145/2600176.2600209","title":"Modeling and sensing risky user behavior on mobile devices","display_name":"Modeling and sensing risky user behavior on mobile devices","publication_year":2014,"publication_date":"2014-04-08","ids":{"openalex":"https://openalex.org/W2108584323","doi":"https://doi.org/10.1145/2600176.2600209","mag":"2108584323"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/2600176.2600209","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100318530","display_name":"Qian Liu","orcid":"https://orcid.org/0000-0001-9070-2863"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qian Liu","raw_affiliation_strings":["North Carolina State University,"],"affiliations":[{"raw_affiliation_string":"North Carolina State University,","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072051036","display_name":"Juhee Bae","orcid":"https://orcid.org/0000-0002-2415-7243"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Juhee Bae","raw_affiliation_strings":["North Carolina State University,"],"affiliations":[{"raw_affiliation_string":"North Carolina State University,","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016365293","display_name":"Benjamin Watson","orcid":"https://orcid.org/0000-0002-3758-7357"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Benjamin Watson","raw_affiliation_strings":["North Carolina State University,"],"affiliations":[{"raw_affiliation_string":"North Carolina State University,","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035281081","display_name":"Anne McLaughhlin","orcid":null},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anne McLaughhlin","raw_affiliation_strings":["North Carolina State University,"],"affiliations":[{"raw_affiliation_string":"North Carolina State University,","institution_ids":["https://openalex.org/I137902535"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5024034310","display_name":"William Enck","orcid":"https://orcid.org/0000-0002-3043-8092"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"William Enck","raw_affiliation_strings":["North Carolina State University,"],"affiliations":[{"raw_affiliation_string":"North Carolina State University,","institution_ids":["https://openalex.org/I137902535"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.63,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":2,"citation_normalized_percentile":{"value":0.438356,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":73,"max":76},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10525","display_name":"Human-Automation Interaction and Safety","score":0.9909,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10525","display_name":"Human-Automation Interaction and Safety","score":0.9909,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T12607","display_name":"Personal Information Management and User Behavior","score":0.9882,"subfield":{"id":"https://openalex.org/subfields/1802","display_name":"Information Systems and Management"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10444","display_name":"Context-Aware Activity Recognition Systems","score":0.9346,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.72513306},{"id":"https://openalex.org/C186967261","wikidata":"https://www.wikidata.org/wiki/Q5082128","display_name":"Mobile device","level":2,"score":0.6143838},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.57685673},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.56053835},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.55260193},{"id":"https://openalex.org/C95491727","wikidata":"https://www.wikidata.org/wiki/Q992968","display_name":"Mobile telephony","level":3,"score":0.46625292},{"id":"https://openalex.org/C60952562","wikidata":"https://www.wikidata.org/wiki/Q6887246","display_name":"Mobile technology","level":3,"score":0.4174751},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3734011},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.33082283},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.21485099},{"id":"https://openalex.org/C2781307350","wikidata":"https://www.wikidata.org/wiki/Q6887221","display_name":"Mobile radio","level":2,"score":0.18223742},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.15134537},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1145/2600176.2600209","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[{"funder":"https://openalex.org/F4320306084","funder_display_name":"U.S. Department of Energy","award_id":null}],"datasets":[],"versions":[],"referenced_works_count":5,"referenced_works":["https://openalex.org/W1991830501","https://openalex.org/W2096299001","https://openalex.org/W2106437665","https://openalex.org/W2505436577","https://openalex.org/W623135921"],"related_works":["https://openalex.org/W4243905374","https://openalex.org/W4210272022","https://openalex.org/W2785815065","https://openalex.org/W2154498492","https://openalex.org/W2090296580","https://openalex.org/W2048100608","https://openalex.org/W2011442434","https://openalex.org/W1796074903","https://openalex.org/W1699002556","https://openalex.org/W1576249345"],"abstract_inverted_index":{"As":[0],"mobile":[1,31,44,84],"technology":[2],"begins":[3],"to":[4,47,52,58,81,101],"dominate":[5],"computing,":[6],"understanding":[7],"how":[8],"their":[9],"use":[10],"impacts":[11],"security":[12],"becomes":[13],"increasingly":[14],"important.":[15],"Fortunately,":[16],"this":[17,72],"challenge":[18],"is":[19],"also":[20],"an":[21],"opportunity:":[22],"the":[23],"rich":[24,37],"set":[25],"of":[26,66,77],"sensors":[27],"with":[28,74],"which":[29],"most":[30],"devices":[32],"are":[33,56,98],"equipped":[34],"provide":[35,62],"a":[36,75],"contextual":[38],"dataset,":[39],"one":[40],"that":[41,83,93],"should":[42],"enable":[43],"user":[45,90],"behavior":[46],"be":[48],"modeled":[49],"well":[50],"enough":[51],"predict":[53,89],"when":[54],"users":[55,94],"likely":[57,100],"act":[59,102],"insecurely,":[60],"and":[61,92],"cognitively":[63],"grounded":[64],"explanations":[65],"those":[67],"behaviors.":[68],"We":[69],"will":[70],"evaluate":[71],"hypothesis":[73],"series":[76],"experiments":[78],"designed":[79],"first":[80],"confirm":[82],"sensor":[85],"data":[86],"can":[87],"reliably":[88],"stress,":[91],"experiencing":[95],"such":[96],"stress":[97],"more":[99],"insecurely.":[103]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2108584323","counts_by_year":[{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":1}],"updated_date":"2025-01-19T10:22:38.288954","created_date":"2016-06-24"}