{"id":"https://openalex.org/W2774976451","doi":"https://doi.org/10.1109/pac.2017.27","title":"Towards Improving Comprehension of Touch ID Authentication with Smartphone Applications","display_name":"Towards Improving Comprehension of Touch ID Authentication with Smartphone Applications","publication_year":2017,"publication_date":"2017-08-01","ids":{"openalex":"https://openalex.org/W2774976451","doi":"https://doi.org/10.1109/pac.2017.27","mag":"2774976451"},"language":"en","primary_location":{"id":"doi:10.1109/pac.2017.27","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pac.2017.27","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Symposium on Privacy-Aware Computing (PAC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013067968","display_name":"Yousra Javed","orcid":"https://orcid.org/0000-0002-0293-9551"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yousra Javed","raw_affiliation_strings":["UNC Charlotte"],"affiliations":[{"raw_affiliation_string":"UNC Charlotte","institution_ids":["https://openalex.org/I102149020"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013557688","display_name":"Mohamed Shehab","orcid":"https://orcid.org/0000-0002-4189-9118"},"institutions":[{"id":"https://openalex.org/I102149020","display_name":"University of North Carolina at Charlotte","ror":"https://ror.org/04dawnj30","country_code":"US","type":"education","lineage":["https://openalex.org/I102149020"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mohamed Shehab","raw_affiliation_strings":["UNC Charlotte"],"affiliations":[{"raw_affiliation_string":"UNC Charlotte","institution_ids":["https://openalex.org/I102149020"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5013067968"],"corresponding_institution_ids":["https://openalex.org/I102149020"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.26049691,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"206","last_page":"207"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11800","display_name":"User Authentication and Security Systems","score":0.9884999990463257,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10470","display_name":"Usability and User Interface Design","score":0.9850000143051147,"subfield":{"id":"https://openalex.org/subfields/1709","display_name":"Human-Computer Interaction"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.817479133605957},{"id":"https://openalex.org/keywords/human\u2013computer-interaction","display_name":"Human\u2013computer interaction","score":0.6786656379699707},{"id":"https://openalex.org/keywords/dialog-box","display_name":"Dialog box","score":0.6276742219924927},{"id":"https://openalex.org/keywords/fingerprint","display_name":"Fingerprint (computing)","score":0.5739377737045288},{"id":"https://openalex.org/keywords/comprehension","display_name":"Comprehension","score":0.5728006958961487},{"id":"https://openalex.org/keywords/keystroke-logging","display_name":"Keystroke logging","score":0.5026941299438477},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4982140064239502},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.4669049382209778},{"id":"https://openalex.org/keywords/authorization","display_name":"Authorization","score":0.4247288703918457},{"id":"https://openalex.org/keywords/perception","display_name":"Perception","score":0.4152876138687134},{"id":"https://openalex.org/keywords/multimedia","display_name":"Multimedia","score":0.37134408950805664},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.3046848177909851},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2936611771583557},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.08353334665298462}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.817479133605957},{"id":"https://openalex.org/C107457646","wikidata":"https://www.wikidata.org/wiki/Q207434","display_name":"Human\u2013computer interaction","level":1,"score":0.6786656379699707},{"id":"https://openalex.org/C173853756","wikidata":"https://www.wikidata.org/wiki/Q86915","display_name":"Dialog box","level":2,"score":0.6276742219924927},{"id":"https://openalex.org/C2777826928","wikidata":"https://www.wikidata.org/wiki/Q3745713","display_name":"Fingerprint (computing)","level":2,"score":0.5739377737045288},{"id":"https://openalex.org/C511192102","wikidata":"https://www.wikidata.org/wiki/Q5156948","display_name":"Comprehension","level":2,"score":0.5728006958961487},{"id":"https://openalex.org/C161615301","wikidata":"https://www.wikidata.org/wiki/Q309396","display_name":"Keystroke logging","level":2,"score":0.5026941299438477},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4982140064239502},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.4669049382209778},{"id":"https://openalex.org/C108759981","wikidata":"https://www.wikidata.org/wiki/Q788590","display_name":"Authorization","level":2,"score":0.4247288703918457},{"id":"https://openalex.org/C26760741","wikidata":"https://www.wikidata.org/wiki/Q160402","display_name":"Perception","level":2,"score":0.4152876138687134},{"id":"https://openalex.org/C49774154","wikidata":"https://www.wikidata.org/wiki/Q131765","display_name":"Multimedia","level":1,"score":0.37134408950805664},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.3046848177909851},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2936611771583557},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.08353334665298462},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C187736073","wikidata":"https://www.wikidata.org/wiki/Q2920921","display_name":"Management","level":1,"score":0.0},{"id":"https://openalex.org/C169760540","wikidata":"https://www.wikidata.org/wiki/Q207011","display_name":"Neuroscience","level":1,"score":0.0},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pac.2017.27","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pac.2017.27","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE Symposium on Privacy-Aware Computing (PAC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.4000000059604645,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W2743192351","https://openalex.org/W6742500956"],"related_works":["https://openalex.org/W4299345863","https://openalex.org/W2798562158","https://openalex.org/W1580702054","https://openalex.org/W10199086","https://openalex.org/W2095735921","https://openalex.org/W274642192","https://openalex.org/W2545016324","https://openalex.org/W4283259439","https://openalex.org/W2379697190","https://openalex.org/W2982224826"],"abstract_inverted_index":{"Apple":[0],"recently":[1],"opened":[2],"Touch":[3,15,41,62,93,108,123,132],"ID":[4,16,42,109,124,133],"to":[5,13,65,100,163],"third-party":[6,9],"applications,":[7],"giving":[8],"developers":[10],"the":[11,66,72,92,120,131,166,171],"ability":[12],"utilize":[14],"fingerprint":[17,57,77],"sensor":[18],"for":[19],"user":[20,102],"sign-in":[21,64],"and":[22,31,81,104,126,149,159,168],"authorization":[23],"of":[24,54,74,84,107,122,136,170],"sensitive":[25,112],"tasks":[26],"such":[27],"as":[28,161],"money":[29],"transfer":[30],"purchase":[32],"completion.":[33],"This":[34],"has":[35],"introduced":[36],"several":[37],"misconceptions":[38],"about":[39],"how":[40,55],"use":[43,110],"with":[44,111],"applications.":[45,114],"A":[46],"recent":[47],"study":[48],"showed":[49],"that":[50,144],"users":[51],"are":[52,82],"unaware":[53,83],"a":[56,98],"is":[58],"being":[59],"used":[60],"during":[61,130],"ID-based":[63],"application,":[67,80],"have":[68],"incorrect":[69],"perceptions":[70],"regarding":[71],"access":[73,88],"their":[75,89],"registered":[76],"by":[78],"an":[79,137],"who":[85],"can":[86],"potentially":[87],"account":[90],"inside":[91],"ID-enabled":[94],"application.":[95,138],"We":[96,139,155],"propose":[97,140],"solution":[99,116],"increase":[101],"comprehension":[103,169],"risk":[105],"perception":[106],"task-based":[113],"Our":[115],"focuses":[117],"on":[118],"improving":[119],"design":[121],"terms":[125],"conditions":[127],"dialog":[128,142],"presented":[129,172],"setup":[134],"phase":[135],"four":[141],"designs":[143],"simplify":[145],"this":[146],"information":[147],"text":[148],"present":[150],"it":[151],"in":[152,165],"bulleted":[153],"format.":[154],"add":[156],"visual":[157],"examples":[158],"icons":[160],"cues":[162],"aid":[164],"attention":[167],"information.":[173]},"counts_by_year":[{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
