Location disclosure to social relations: why, when, & what people want to share
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Stopping spyware at the gate: a user study of privacy, notice and spyware
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Developing privacy guidelines for social location disclosure applications and services
SOUPS '05 Proceedings of the 2005 symposium on Usable privacy and security
Power strips, prophylactics, and privacy, oh my!
SOUPS '06 Proceedings of the second symposium on Usable privacy and security
A study on the value of location privacy
Proceedings of the 5th ACM workshop on Privacy in electronic society
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish
Proceedings of the 3rd symposium on Usable privacy and security
Privacy in Location-Aware Computing Environments
IEEE Pervasive Computing
Timing is everything?: the effects of timing and placement of online privacy indicators
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Working Overtime: Patterns of Smartphone and PC Usage in the Day of an Information Worker
Pervasive '09 Proceedings of the 7th International Conference on Pervasive Computing
Understanding and capturing people's privacy policies in a mobile social networking application
Personal and Ubiquitous Computing
Semantically Rich Application-Centric Security in Android
ACSAC '09 Proceedings of the 2009 Annual Computer Security Applications Conference
Trained to accept?: a field experiment on consent dialogs
Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Proceedings of the 8th international conference on Mobile systems, applications, and services
Folk models of home computer security
Proceedings of the Sixth Symposium on Usable Privacy and Security
Locaccino: a privacy-centric location sharing application
Proceedings of the 12th ACM international conference adjunct papers on Ubiquitous computing - Adjunct
Soft biometric traits for continuous user authentication
IEEE Transactions on Information Forensics and Security
Proceedings of the 13th international conference on Ubiquitous computing
Smart phone use by non-mobile business users
Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services
On the need for different security methods on mobile phones
Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services
A survey of mobile malware in the wild
Proceedings of the 1st ACM workshop on Security and privacy in smartphones and mobile devices
Continuous Authentication Using Biometrics: Data, Models, and Metrics
Continuous Authentication Using Biometrics: Data, Models, and Metrics
Short paper: location privacy: user behavior in the field
Proceedings of the second ACM workshop on Security and privacy in smartphones and mobile devices
Follow you follow me: using location tracking to mitigate multi-device privacy threats
Proceedings of the Workshop on Multi-device App Middleware
Android and iOS users' differences concerning security and privacy
CHI '13 Extended Abstracts on Human Factors in Computing Systems
Know your enemy: the risk of unauthorized access in smartphones by insiders
Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services
"Little brothers watching you": raising awareness of data leaks on smartphones
Proceedings of the Ninth Symposium on Usable Privacy and Security
Comparing wireless network usage: laptop vs smart-phones
Proceedings of the 19th annual international conference on Mobile computing & networking
What you want is not what you get: predicting sharing policies for text-based content on facebook
Proceedings of the 2013 ACM workshop on Artificial intelligence and security
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Privacy disclosure risk: smartphone user guide
International Journal of Mobile Network Design and Innovation
RiskMon: continuous and automated risk assessment of mobile applications
Proceedings of the 4th ACM conference on Data and application security and privacy
Expert Systems with Applications: An International Journal
Reconciling mobile app privacy and usability on smartphones: could user privacy profiles help?
Proceedings of the 23rd international conference on World wide web
Hi-index | 0.00 |
In order to direct and build an effective, secure mobile ecosystem, we must first understand user attitudes toward security and privacy for smartphones and how they may differ from attitudes toward more traditional computing systems. What are users' comfort levels in performing different tasks? How do users select applications? What are their overall perceptions of the platform? This understanding will help inform the design of more secure smartphones that will enable users to safely and confidently benefit from the potential and convenience offered by mobile platforms. To gain insight into user perceptions of smartphone security and installation habits, we conduct a user study involving 60 smartphone users. First, we interview users about their willingness to perform certain tasks on their smartphones to test the hypothesis that people currently avoid using their phones due to privacy and security concerns. Second, we analyze why and how they select applications, which provides information about how users decide to trust applications. Based on our findings, we present recommendations and opportunities for services that will help users safely and confidently use mobile applications and platforms.