Local use and sharing of mobile phones
Wireless world
One user, many hats; and, sometimes, no hat: towards a secure yet usable PDA
SP'04 Proceedings of the 12th international conference on Security Protocols
A context-sensitive security model for privacy protection on mobile phones
Proceedings of the 11th International Conference on Human-Computer Interaction with Mobile Devices and Services
Proceedings of the 11th international conference on Ubiquitous computing
Access Control for Home Data Sharing: Attitudes, Needs and Practices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
A closer look at recognition-based graphical passwords on mobile devices
Proceedings of the Sixth Symposium on Usable Privacy and Security
Challenges in access right assignment for secure home networks
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
Pairing devices for social interactions: a comparative usability evaluation
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Empowerment through seamfulness: smart phones in everyday life
Personal and Ubiquitous Computing
On the need for different security methods on mobile phones
Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services
Using mobile phones to interact with tabletop computers
Proceedings of the ACM International Conference on Interactive Tabletops and Surfaces
TreasurePhone: context-sensitive user data protection on mobile phones
Pervasive'10 Proceedings of the 8th international conference on Pervasive Computing
Defending users against smartphone apps: techniques and future directions
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Understanding negotiation in airtime sharing in low-income microenterprises
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Touch me once and i know it's you!: implicit authentication based on touch screen patterns
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
When mobile phones expand into handheld tabletops
CHI '12 Extended Abstracts on Human Factors in Computing Systems
Demo: user identification and authentication with capacitive touch communication
Proceedings of the 10th international conference on Mobile systems, applications, and services
Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications
Proceedings of the Eighth Symposium on Usable Privacy and Security
Distinguishing users with capacitive touch communication
Proceedings of the 18th annual international conference on Mobile computing and networking
Progressive authentication: deciding when to authenticate on mobile phones
Security'12 Proceedings of the 21st USENIX conference on Security symposium
An empirical investigation into how users adapt to mobile phone auto-locks in a multitask setting
MobileHCI '12 Proceedings of the 14th international conference on Human-computer interaction with mobile devices and services
Degrees of sharing: proximate media sharing and messaging by young people in khayelitsha
MobileHCI '12 Proceedings of the 14th international conference on Human-computer interaction with mobile devices and services
Too much information!: user attitudes towards smartphone sharing
Proceedings of the 7th Nordic Conference on Human-Computer Interaction: Making Sense Through Design
Exploring user preferences for privacy interfaces in mobile sensing applications
Proceedings of the 11th International Conference on Mobile and Ubiquitous Multimedia
Making graphic-based authentication secure against smudge attacks
Proceedings of the 2013 international conference on Intelligent user interfaces
Concepts for mobile programming
Proceedings of the 18th ACM conference on Innovation and technology in computer science education
How groups of users associate wireless devices
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Back-of-device authentication on smartphones
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services
Tablets use in emerging markets: an exploration
Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services
SilentSense: silent user identification via touch and movement behavioral biometrics
Proceedings of the 19th annual international conference on Mobile computing & networking
Toward strong, usable access control for shared distributed data
FAST'14 Proceedings of the 12th USENIX conference on File and Storage Technologies
Hi-index | 0.01 |
Mobile phones are becoming increasingly personalized in terms of the data they store and the types of services they provide. At the same time, field studies have reported that there are a variety of situations in which it is natural for people to share their phones with others. However, most mobile phones support a binary security model that offers all-or-nothing access to the phone. We interviewed 12 smartphone users to explore how security and data privacy concerns affected their willingness to share their mobile phones. The diversity of guest user categorizations and associated security constraints expressed by the participants suggests the need for a security model richer than today's binary model.