Reflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices

被引:0
|
作者
Chiasson, Sonia [1 ]
Crawford, Heather [2 ]
Egelman, Serge [3 ]
Irani, Pourang [4 ]
机构
[1] Carleton Univ, Sch Comp Sci, Ottawa, ON, Canada
[2] Florida Inst Technol, Dept Comp Sci, Melbourne, FL 32901 USA
[3] Univ Calif Berkeley, Berkeley, CA 94720 USA
[4] Univ Manitoba, Dept Comp Sci, Winnipeg, MB, Canada
关键词
Human-Computer Interaction; Mobile Devices; Security; Usable Privacy; Usable Security;
D O I
10.4018/ijmhci.2014040106
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Second Usable Privacy and Security for Mobile Devices Workshop (U-PriSM 2) was co-located with MobileHCI' 13 in Munich, Germany. The U-PriSM 2 was an opportunity for researchers and practitioners to discuss research challenges and experiences around the usable privacy and security of mobile devices (smartphones and tablets). Security and privacy often involve having non-security experts, or even novice users, regularly making important decisions while their main focus is on other primary tasks. This is especially true for mobile devices where users can quickly and easily install apps, where user interfaces are minimal due to space constraints, and where users are often distracted by their environment. Likewise, mobile devices present unique privacy and security risks because they allow third-party applications access to personal information and sensor data. The amount and sensitivity of such personally identifying information is likely to increase as device functionality increases. The convergence of these factors means that improvements to security and privacy provisions on mobile devices are becoming increasingly important. Workshop participants had a chance to explore mobile device usage and the unique usable security and privacy challenges that arise, discuss proposed systems and ideas that address these needs, and work towards the development of design principles to inform future development in the area.
引用
收藏
页码:73 / 78
页数:6
相关论文
共 39 条
  • [21] Confidentiality and Privacy Information Security Risk Assessment for Android-Based Mobile Devices
    Irwan
    Asnar, Yudistira
    Hendradjaya, Bayu
    2015 INTERNATIONAL CONFERENCE ON DATA AND SOFTWARE ENGINEERING (ICODSE), 2015, : 60 - +
  • [22] Health Informatics Security and Privacy: A Social Sciences Exploration of Nurses' Knowledge and Risk Behaviours with Security and Privacy Issues Focusing on Use of Mobile Devices
    Weiner, Keith
    NURSING RESEARCH, 2016, 65 (02) : E25 - E26
  • [23] Third-year medical students' knowledge of privacy and security issues concerning mobile devices
    Whipple, Elizabeth C.
    Allgood, Kacy L.
    Larue, Elizabeth M.
    MEDICAL TEACHER, 2012, 34 (08) : E532 - E548
  • [24] Smart Use of Smart Devices in Your Home: A Smart-Home Security and Privacy Workshop for the General Public
    Jois, Tushar M.
    Pavlovich, Tina
    McCarron, Brigid M.
    Kotz, David
    Pierson, Timothy J.
    PROCEEDINGS OF THE 55TH ACM TECHNICAL SYMPOSIUM ON COMPUTER SCIENCE EDUCATION, SIGCSE 2024, VOL. 1, 2024, : 611 - 617
  • [25] Design and Security Assessment of Usable Multi-factor Authentication and Single Sign-On Solutions for Mobile Applications A Workshop Experience Report
    Carbone, Roberto
    Ranise, Silvio
    Sciarretta, Giada
    PRIVACY AND IDENTITY MANAGEMENT: FAIRNESS, ACCOUNTABILITY, AND TRANSPARENCY IN THE AGE OF BIG DATA, 2019, 547 : 51 - 66
  • [26] A Web-Based Wireless Mobile System Design of Security and Privacy Framework for u-Healthcare
    Yu, Weider D.
    Gummadikayala, Roopa
    Mudumbi, Sriram
    2008 10TH IEEE INTERNATIONAL CONFERENCE ON E-HEALTH NETWORKING, APPLICATIONS AND SERVICES, 2008, : 96 - 101
  • [27] On the use of mobile Imaging devices for the validation of first- and second-line security features
    Rodriguez, T
    Weaver, M
    OPTICAL SECURITY AND COUNTERFEIT DETERRENCE TECHNIQUES VI, 2006, 6075
  • [28] 2nd International Workshop on Safety, securiTy, and pRivacy In automotiVe systEms (STRIVE 2019)
    Costantino, Gianpiero
    Matteucci, Ilaria
    COMPUTER SAFETY, RELIABILITY, AND SECURITY, SAFECOMP 2019, 2019, 11699 : 199 - 201
  • [29] Link2U: augmenting social networks on mobile devices
    De Chiara, D.
    Romano, M.
    Sebillo, M.
    Vitiello, G.
    GEOMEDIA, 2011, 15 (03) : 28 - 30
  • [30] Autonomy, Heterogeneity, Trust, Security, and Privacy in Mobile P2P Environments
    Veijalainen, Jari
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2007, 1 (01): : 57 - 71