Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications. Hayashi, E., Riva, O., Strauss, K., Brush, A., J., B., & Schechter, S. In Proceedings of the Symposium On Usable Privacy and Security (SOUPS), 7, 2012.
Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications [link]Website  abstract   bibtex   
Most mobile phones and tablets support only two access control device states: locked and unlocked. We investigated how well all or-nothing device access control meets the need of users by interviewing 20 participants who had both a smartphone and tablet. We find all-or-nothing device access control to be a remarkably poor fit with users' preferences. On both phones and tablets, participants wanted roughly half their applications to be available even when their device was locked and half protected by authentication. We also solicited participants' interest in new access control mechanisms designed specifically to facilitate device sharing. Fourteen participants out of 20 preferred these controls to existing security locks alone. Finally, we gauged participants' interest in using face and voice biometrics to authenticate to their mobile phone and tablets; participants were surprisingly receptive to biometrics, given that they were also aware of security and reliability limitations.
@inProceedings{
 title = {Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications},
 type = {inProceedings},
 year = {2012},
 identifiers = {[object Object]},
 keywords = {access-control,phone,sharing},
 websites = {http://dx.doi.org/10.1145/2335356.2335359},
 month = {7},
 id = {bf7c0bc0-dace-3eed-b549-90166c98a132},
 created = {2018-07-12T21:31:00.706Z},
 file_attached = {false},
 profile_id = {f954d000-ce94-3da6-bd26-b983145a920f},
 group_id = {b0b145a3-980e-3ad7-a16f-c93918c606ed},
 last_modified = {2018-07-12T21:31:00.706Z},
 read = {false},
 starred = {false},
 authored = {false},
 confirmed = {true},
 hidden = {false},
 citation_key = {hayashi:goldilocks12},
 source_type = {inproceedings},
 private_publication = {false},
 abstract = {Most mobile phones and tablets support only two access control device states: locked and unlocked. We investigated how well all or-nothing device access control meets the need of users by interviewing 20 participants who had both a smartphone and tablet. We find all-or-nothing device access control to be a remarkably poor fit with users' preferences. On both phones and tablets, participants wanted roughly half their applications to be available even when their device was locked and half protected by authentication. We also solicited participants' interest in new access control mechanisms designed specifically to facilitate device sharing. Fourteen participants out of 20 preferred these controls to existing security locks alone. Finally, we gauged participants' interest in using face and voice biometrics to authenticate to their mobile phone and tablets; participants were surprisingly receptive to biometrics, given that they were also aware of security and reliability limitations.},
 bibtype = {inProceedings},
 author = {Hayashi, Eiji and Riva, Oriana and Strauss, Karin and Brush, A J Bernheim and Schechter, Stuart},
 booktitle = {Proceedings of the Symposium On Usable Privacy and Security (SOUPS)}
}

Downloads: 0