Reflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices

被引:0
|
作者
Chiasson, Sonia [1 ]
Crawford, Heather [2 ]
Egelman, Serge [3 ]
Irani, Pourang [4 ]
机构
[1] Carleton Univ, Sch Comp Sci, Ottawa, ON, Canada
[2] Florida Inst Technol, Dept Comp Sci, Melbourne, FL 32901 USA
[3] Univ Calif Berkeley, Berkeley, CA 94720 USA
[4] Univ Manitoba, Dept Comp Sci, Winnipeg, MB, Canada
关键词
Human-Computer Interaction; Mobile Devices; Security; Usable Privacy; Usable Security;
D O I
10.4018/ijmhci.2014040106
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The Second Usable Privacy and Security for Mobile Devices Workshop (U-PriSM 2) was co-located with MobileHCI' 13 in Munich, Germany. The U-PriSM 2 was an opportunity for researchers and practitioners to discuss research challenges and experiences around the usable privacy and security of mobile devices (smartphones and tablets). Security and privacy often involve having non-security experts, or even novice users, regularly making important decisions while their main focus is on other primary tasks. This is especially true for mobile devices where users can quickly and easily install apps, where user interfaces are minimal due to space constraints, and where users are often distracted by their environment. Likewise, mobile devices present unique privacy and security risks because they allow third-party applications access to personal information and sensor data. The amount and sensitivity of such personally identifying information is likely to increase as device functionality increases. The convergence of these factors means that improvements to security and privacy provisions on mobile devices are becoming increasingly important. Workshop participants had a chance to explore mobile device usage and the unique usable security and privacy challenges that arise, discuss proposed systems and ideas that address these needs, and work towards the development of design principles to inform future development in the area.
引用
收藏
页码:73 / 78
页数:6
相关论文
共 39 条
  • [31] Smarttention, Please! 2nd Workshop on Intelligent Attention Management on Mobile Devices
    Weber, Dominik
    Shirazi, Alireza Sahami
    Gehring, Sven
    Henze, Niels
    Poppinga, Benjamin
    Pielot, Martin
    Okoshi, Tadashi
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON HUMAN-COMPUTER INTERACTION WITH MOBILE DEVICES AND SERVICES (MOBILEHCI 2016), 2016, : 914 - 917
  • [32] Investigating the Influence of Security, Privacy, and Legal Concerns on Employees' Intention to Use BYOD Mobile Devices Completed Research Paper
    Lebek, Benedikt
    Degirmenci, Kenan
    Breitner, Michael H.
    AMCIS 2013 PROCEEDINGS, 2013,
  • [33] IoT S&P 2019: 2nd Workshop on Internet of Things Security and Privacy
    Liu, Peng
    Zhang, Yuqing
    PROCEEDINGS OF THE 2019 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'19), 2019, : 2713 - 2714
  • [34] A Security Analysis of a P2P Incentive Mechanisms for Mobile Devices
    Suomalainen, Jani
    Pehrsson, Anssi
    Nurminen, Jukka K.
    2008 3RD INTERNATIONAL CONFERENCE ON INTERNET AND WEB APPLICATIONS AND SERVICES (ICIW 2008), 2008, : 397 - +
  • [36] WACCO 2020: the 2nd Workshop on Attackers and Cybercrime Operations Co-held with IEEE European Symposium on Security and Privacy 2020
    Allodi, Luca
    Hutchings, Alice
    Massacci, Fabio
    Pastrana, Sergio
    Vasek, Marie
    2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020), 2020, : 427 - 427
  • [37] Examining the Influence of Mobile Store Features on User E-Satisfaction: Extending UTAUT2 with Personalization, Responsiveness, and Perceived Security and Privacy
    Alalwan, Ali Abdallah
    Baabdullah, Abdullah M.
    Rana, Nripendra P.
    Dwivedi, Yogesh K.
    Kizgin, Hatice
    DIGITAL TRANSFORMATION FOR A SUSTAINABLE SOCIETY IN THE 21ST CENTURY, 2019, 11701 : 50 - 61
  • [38] A cross-cultural study of the intention to use mobile banking between Lebanese and British consumers: Extending UTAUT2 with security, privacy and trust
    Merhi, Mohamed
    Hone, Kate
    Tarhini, Ali
    TECHNOLOGY IN SOCIETY, 2019, 59
  • [39] Devising and Evaluating B2B Conceptual Model for B2B portal for mobile interactive devices using Mann-Whitney U test
    Fetaji, Majlinda
    Morina, Labinot
    Fetaji, Bekim
    2017 6TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2017, : 484 - 487