On the need for different security methods on mobile phones

  • Authors:
  • Noam Ben-Asher;Niklas Kirschnick;Hanul Sieger;Joachim Meyer;Asaf Ben-Oved;Sebastian Möller

  • Affiliations:
  • Ben Gurion University, Beer Sheva, Israel;Quality and Usability Lab, Deutsche Telekom Laboratories, TU Berlin, Berlin, Germany;Quality and Usability Lab, Deutsche Telekom Laboratories, TU Berlin, Berlin, Germany;Ben Gurion University, Beer Sheva, Israel;Ben Gurion University, Beer Sheva, Israel;Quality and Usability Lab, Deutsche Telekom Laboratories, TU Berlin, Berlin, Germany

  • Venue:
  • Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Mobile phones are rapidly becoming small-size general purpose computers, so-called smartphones. However, applications and data stored on mobile phones are less protected from unauthorized access than on most desktop and mobile computers. This paper presents a survey on users' security needs, awareness and concerns in the context of mobile phones. It also evaluates acceptance and perceived protection of existing and novel authentication methods. The responses from 465 participants reveal that users are interested in increased security and data protection. The current protection by using PIN (Personal Identification Number) is perceived as neither adequate nor convenient in all cases. The sensitivity of data stored on the devices varies depending on the data type and the context of use, asking for the need for another level of protection. According to these findings, a two-level security model for mobile phones is proposed. The model provides differential data and service protection by utilizing existing capabilities of a mobile phone for authenticating users.