Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1518701.1518953acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
short-paper

Can i borrow your phone?: understanding concerns when sharing mobile phones

Published: 04 April 2009 Publication History

Abstract

Mobile phones are becoming increasingly personalized in terms of the data they store and the types of services they provide. At the same time, field studies have reported that there are a variety of situations in which it is natural for people to share their phones with others. However, most mobile phones support a binary security model that offers all-or-nothing access to the phone. We interviewed 12 smartphone users to explore how security and data privacy concerns affected their willingness to share their mobile phones. The diversity of guest user categorizations and associated security constraints expressed by the participants suggests the need for a security model richer than today's binary model.

References

[1]
Nokia Inc. Nokia unveils two handsets that offer a range of useful features and colours aimed at consumers in emerging markets. Press Release (2007), http://www.nokia.com/A4805502.
[2]
Stajano, F. One user, many hats; and, sometimes, no hat--towards a secure yet usable PDA. Security Protocols Workshop, Springer Verlag (2004), 51--64.
[3]
Steenson, M. and Donner, J. Beyond the personal and private: Modes of mobile phone sharing in urban India. In S. W. Campbell&R. Ling (Eds.), Mobile Comm. Research Annual (Vol. 1), Transaction Books (in press).
[4]
Weilenmann, A. and Larsson, C. Local use and sharing of mobile phones. In B. Brown, N. Green and R. Harper (Eds.), Wireless World: Social and Interactional Aspects of the Mobile Age, Springer Verlag (2001), 99--115.

Cited By

View all
  • (2024)Making of an Adaptive Podcast that Engenders Trust through Data NegotiabilityProceedings of the 2024 ACM International Conference on Interactive Media Experiences10.1145/3639701.3663634(334-341)Online publication date: 7-Jun-2024
  • (2024)Hospital Employee Experiences Caring for Patients in Smart Patient RoomsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642201(1-16)Online publication date: 11-May-2024
  • (2024)Occupying Another’s Digital Space: Privacy of Smartphone Users as a Situated PracticeComputer Supported Cooperative Work (CSCW)10.1007/s10606-024-09492-zOnline publication date: 23-Feb-2024
  • Show More Cited By

Index Terms

  1. Can i borrow your phone?: understanding concerns when sharing mobile phones

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    CHI '09: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
    April 2009
    2426 pages
    ISBN:9781605582467
    DOI:10.1145/1518701
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 04 April 2009

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. mobile phone sharing
    2. phone privacy
    3. phone security

    Qualifiers

    • Short-paper

    Conference

    CHI '09
    Sponsor:

    Acceptance Rates

    CHI '09 Paper Acceptance Rate 277 of 1,130 submissions, 25%;
    Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)64
    • Downloads (Last 6 weeks)5
    Reflects downloads up to 22 Sep 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Making of an Adaptive Podcast that Engenders Trust through Data NegotiabilityProceedings of the 2024 ACM International Conference on Interactive Media Experiences10.1145/3639701.3663634(334-341)Online publication date: 7-Jun-2024
    • (2024)Hospital Employee Experiences Caring for Patients in Smart Patient RoomsProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642201(1-16)Online publication date: 11-May-2024
    • (2024)Occupying Another’s Digital Space: Privacy of Smartphone Users as a Situated PracticeComputer Supported Cooperative Work (CSCW)10.1007/s10606-024-09492-zOnline publication date: 23-Feb-2024
    • (2023)“Someone Definitely Used 0000”: Strategies, Performance, and User Perception of Novice Smartphone-Unlock PIN-GuessersProceedings of the 2023 European Symposium on Usable Security10.1145/3617072.3617113(158-174)Online publication date: 16-Oct-2023
    • (2023)A Deep Dive into User's Preferences and Behavior around Mobile Phone SharingProceedings of the ACM on Human-Computer Interaction10.1145/35795957:CSCW1(1-22)Online publication date: 16-Apr-2023
    • (2023)Characterizing Everyday Misuse of Smart Home Devices2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179476(2835-2849)Online publication date: May-2023
    • (2023)No Privacy in the Electronics Repair Industry2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179413(3347-3364)Online publication date: May-2023
    • (2022)Sharing without scaringProceedings of the Eighteenth USENIX Conference on Usable Privacy and Security10.5555/3563609.3563645(671-685)Online publication date: 8-Aug-2022
    • (2022)“Someone Else Is Behind The Screen”: Visibility, Privacy, and Trust on Geosocial Networking Apps in IndiaSocial Media + Society10.1177/205630512211260768:3(205630512211260)Online publication date: 26-Sep-2022
    • (2022)CalicoProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/35503236:3(1-32)Online publication date: 7-Sep-2022
    • Show More Cited By

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media