Reflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices

被引:0
|
作者
Chiasson, Sonia [1 ]
Crawford, Heather [2 ]
Egelman, Serge [3 ]
Irani, Pourang [4 ]
机构
[1] Carleton Univ, Sch Comp Sci, Ottawa, ON, Canada
[2] Florida Inst Technol, Dept Comp Sci, Melbourne, FL 32901 USA
[3] Univ Calif Berkeley, Berkeley, CA 94720 USA
[4] Univ Manitoba, Dept Comp Sci, Winnipeg, MB, Canada
关键词
Human-Computer Interaction; Mobile Devices; Security; Usable Privacy; Usable Security;
D O I
10.4018/ijmhci.2014040106
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Second Usable Privacy and Security for Mobile Devices Workshop (U-PriSM 2) was co-located with MobileHCI' 13 in Munich, Germany. The U-PriSM 2 was an opportunity for researchers and practitioners to discuss research challenges and experiences around the usable privacy and security of mobile devices (smartphones and tablets). Security and privacy often involve having non-security experts, or even novice users, regularly making important decisions while their main focus is on other primary tasks. This is especially true for mobile devices where users can quickly and easily install apps, where user interfaces are minimal due to space constraints, and where users are often distracted by their environment. Likewise, mobile devices present unique privacy and security risks because they allow third-party applications access to personal information and sensor data. The amount and sensitivity of such personally identifying information is likely to increase as device functionality increases. The convergence of these factors means that improvements to security and privacy provisions on mobile devices are becoming increasingly important. Workshop participants had a chance to explore mobile device usage and the unique usable security and privacy challenges that arise, discuss proposed systems and ideas that address these needs, and work towards the development of design principles to inform future development in the area.
引用
收藏
页码:73 / 78
页数:6
相关论文
共 39 条
  • [1] Workshop on Usable Privacy & Security for wearable and domestic ubIquitous DEvices (UPSIDE)
    Jung, Jaeyeon
    Kohno, Tadayoshi
    PROCEEDINGS OF THE 2014 ACM INTERNATIONAL JOINT CONFERENCE ON PERVASIVE AND UBIQUITOUS COMPUTING (UBICOMP'14 ADJUNCT), 2014, : 1279 - 1282
  • [2] Usable Privacy and Security in Mobile Applications: Perception of Mobile End Users in Saudi Arabia
    Saeed, Saqib
    BIG DATA AND COGNITIVE COMPUTING, 2024, 8 (11)
  • [3] SPE: Security and Privacy Enhancement Framework for Mobile Devices
    Krupp, Brian
    Sridhar, Nigamanth
    Zhao, Wenbing
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2017, 14 (04) : 433 - 446
  • [4] SECURITY AND PRIVACY IN AN ENTERPRISE SEARCH INFRASTRUCTURE FOR MOBILE DEVICES
    Praher, Christian P.
    Praher, Jakob F.
    IDIMT-2008: MANAGING THE UNMANAGEABLE, 2008, 25 : 431 - +
  • [5] SPSM 2015: 5th Annual ACM CCS Workshop on Security and Privacy in Smartphones and Mobile Devices
    Lie, David
    Wurster, Glenn
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1713 - 1714
  • [6] APPS 2020: Second International Workshop on Adaptive and Personalized Privacy and Security
    Belk, Marios
    Fidas, Christos
    Bowles, Juliana
    Athanasopoulos, Elias
    Pitsillides, Andreas
    UMAP'20: PROCEEDINGS OF THE 28TH ACM CONFERENCE ON USER MODELING, ADAPTATION AND PERSONALIZATION, 2020, : 398 - 399
  • [7] Security and Privacy for Smart, Connected, and Mobile IoT Devices and Platforms
    Andersson, Karl
    You, Ilsun
    Palmieri, Francesco
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [8] 1st International Usable Security and Privacy for Emerging Technologies Workshop (ASPIRING 2024): Preface
    Gharib, Mohamad
    De Moor, Katrien
    Li, Tong
    CEUR Workshop Proceedings, 2024, 3674
  • [9] Editorial to the Second Workshop on Security and Privacy in Enterprise Computing (InSPEC09)
    Accorsi, Rafael
    Damiani, Ernesto
    Innerhofer-Oberperfler, Frank
    Kerschbaum, Florian
    2009 13TH ENTERPRISE DISTRIBUTED OBJECT COMPUTING CONFERENCE WORKSHOPS (EDOCW 2009), 2009, : 166 - +
  • [10] Editorial of special issue on mobile networks and devices security, privacy and trust
    Meng, Weizhi
    Liu, Zhe
    Castiglione, Aniello
    Au, Man Ho
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2018, 41 : 170 - 171