Are You Ready to Lock?. Egelman, S., Jain, S., Portnoff, R., S., Liao, K., Consolvo, S., & Wagner, D. In Proceedings of the ACM Conference on Computer and Communications Security (CCS), of CCS '14, pages 750-761, 2014. ACM.
Are You Ready to Lock? [link]Website  abstract   bibtex   
In addition to storing a plethora of sensitive personal and work information, smartphones also store sensor data about users and their daily activities. In order to understand users' behaviors and attitudes towards the security of their smartphone data, we conducted 28 qualitative interviews. We examined why users choose (or choose not) to employ locking mechanisms (e.g., PINs) and their perceptions and awareness about the sensitivity of the data stored on their devices. We performed two additional online experiments to quantify our interview results and the extent to which sensitive data could be found in a user's smartphone-accessible email archive. We observed a strong correlation between use of security features and risk perceptions, which indicates rational behavior. However, we also observed that most users likely underestimate the extent to which data stored on their smartphones pervades their identities, online and offline.
@inProceedings{
 title = {Are You Ready to Lock?},
 type = {inProceedings},
 year = {2014},
 identifiers = {[object Object]},
 keywords = {behavior,brace-related,human,perception,perceptions,privacy,risk,security,smartphone,user-study},
 pages = {750-761},
 websites = {http://doi.acm.org/10.1145/2660267.2660273},
 publisher = {ACM},
 city = {New York, NY, USA},
 series = {CCS '14},
 id = {75965127-9ad6-3351-bcb7-62038ffb0ef7},
 created = {2018-07-12T21:31:38.743Z},
 file_attached = {false},
 profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
 group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
 last_modified = {2018-07-12T21:31:38.743Z},
 read = {false},
 starred = {false},
 authored = {false},
 confirmed = {true},
 hidden = {false},
 citation_key = {egelman:ready14},
 source_type = {inproceedings},
 private_publication = {false},
 abstract = {In addition to storing a plethora of sensitive personal and work information, smartphones also store sensor data about users and their daily activities. In order to understand users' behaviors and attitudes towards the security of their smartphone data, we conducted 28 qualitative interviews. We examined why users choose (or choose not) to employ locking mechanisms (e.g., PINs) and their perceptions and awareness about the sensitivity of the data stored on their devices. We performed two additional online experiments to quantify our interview results and the extent to which sensitive data could be found in a user's smartphone-accessible email archive. We observed a strong correlation between use of security features and risk perceptions, which indicates rational behavior. However, we also observed that most users likely underestimate the extent to which data stored on their smartphones pervades their identities, online and offline.},
 bibtype = {inProceedings},
 author = {Egelman, Serge and Jain, Sakshi and Portnoff, Rebecca S and Liao, Kerwell and Consolvo, Sunny and Wagner, David},
 booktitle = {Proceedings of the ACM Conference on Computer and Communications Security (CCS)}
}

Downloads: 0