Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1460563.1460666acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article

Family accounts: a new paradigm for user accounts within the home environment

Published: 08 November 2008 Publication History
  • Get Citation Alerts
  • Abstract

    In this paper we present Family Accounts, a new user account model for shared home computers. We conducted a study with sixteen families, eight who used individual profiles at home, and eight who shared a single profile. Our results demonstrate that Family Accounts is a good compromise between a single shared profile and individual profiles for each family member. In particular, we observed that because Family Accounts allowed individuals to switch profiles without forcing them to interrupt their tasks, family members tended to switch to their own profiles only when a task required some degree of privacy or personalization.

    References

    [1]
    Adams, Anne and Sasse, M. Angela. Users are not the enemy: Why Users Compromise Computer Security Mechanisms and How to Take Remedial Measures. Communications of the ACM, 42(12). New York, NY, USA: ACM (1999), pp. 41--46.
    [2]
    Baecker, Ronald M. Readings in GroupWare and Computer-Supported Cooperative Work: Assisting Human-Human Collaboration. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc. (1994).
    [3]
    Brush, A. J. Bernheim and Inkpen, Kori M. Yours, Mine and Ours? Sharing and Use of Technology in Domestic Environments. UbiComp 2007: Ubiquitous Computing. {ed.} John Krumm. Berlin: Springer-Verlag (2007), pp. 109--126.
    [4]
    Dewan, Prasun and Shen, Honghai. Controlling Access in Multiuser Interfaces. ACM Transactions on Computer-Human Interaction (ToCHI), 5(1). New York, NY, USA: ACM (1998), pp. 34--62.
    [5]
    Frohlich, D. M. and Kraut, R. The Social Context of Home Computing. Inside the Smart Home. {ed.} R. Harper. London: Springer-Verlag (2003), pp. 127--162.
    [6]
    Good, N. S. and Krekelberg, A. Usability and Privacy: A Study of Kazaa P2P File-Sharing. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI 2003). New York, NY, USA: ACM Press (2003), pp. 137--144.
    [7]
    Horrigan, John B. and Smith, Aaron. Home Broadband Adoption 2007. Pew Internet & American Life Project, 2007. http://www.pewinternet.org/PPF/r/217/report_display.asp (Accessed: March 21, 2008).
    [8]
    Kraut, Robert, Scherlis, William, Mukhopadhyay, Tridas, Manning, Jane, and Kiesler, Sara. HomeNet: A Field Trial of Residential Internet Services. CHI '96: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM (1996), pp. 284--291.
    [9]
    Lampson, Butler W. Protection. ACM SIGOPS Operating Systems Review. New York, NY, USA: ACM (January, 1974), pp. 18--24.
    [10]
    Lutters, Rosa R. and Heckle, Wayne G. Privacy Implications for Single Sign-on Authentication In a Hospital Environment. Symposium On Usable Privacy and Security (SOUPS). New York, NY, USA: ACM (2007), pp. 173--174.
    [11]
    Maxion, Roy A. and Reeder, Robert W. Improving User-Interface Dependability through Mitigation of Human Error. International Journal of Human-Computer Studies, 62(1). Amsterdam, The Netherlands: Elsevier Science Publishing (2005), pp. 25--50.
    [12]
    Sandhu, Ravi, Ranganathan, Kumar and Zhang, Xinwen. Secure Information Sharing Enabled by Trusted Computing and PEI Models. ASIACCS '06: Proceedings of the first ACM Symposium on Information, Computer and Communications Security. New York, NY, USA: ACM (2006).
    [13]
    Singh, Supriya, Cabraal, Anuja, Demosthenous, Catherine, Astbrink, Gunela, and Furlong, Michael. Password Sharing: Implications for security design based on social practice. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI 2007). New York, NY, USA: ACM Press (2007), pp. 895--904.
    [14]
    U.S. Senate Sergeant at Arms. Report on the investigation into improper access to the Senate Judiciary Committee's computer system. United States Senate Committee on the Judiciary, March 4, 2004. http://judiciary.senate.gov/testimony.cfm?id=1085&wit_id=2514 (Accessed: March 21, 2008).
    [15]
    Venkatesh, Alladi. Computer and Other Interactive Technologies for the Home.Communications of the ACM, 39(12). New York, NY, USA: ACM (December 1996), pp. 47--54.
    [16]
    Zurko, Mary Ellen and Simon, Richard T. User-Centered Security. In Proceedings of the 1996 Workshop on New Security Paradigms. New York, NY, USA: ACM (1996), pp. 27--33.

    Cited By

    View all
    • (2024)Making of an Adaptive Podcast that Engenders Trust through Data NegotiabilityProceedings of the 2024 ACM International Conference on Interactive Media Experiences10.1145/3639701.3663634(334-341)Online publication date: 7-Jun-2024
    • (2023)CREBAS: Enabling Network Access Control in a Home with One ClickJournal of Information Processing10.2197/ipsjjip.31.17431(174-184)Online publication date: 2023
    • (2023)Supporting from the Background: How a Mobile Application for Parent Skills Development Encourages Authoritative ParentingCompanion Publication of the 2023 Conference on Computer Supported Cooperative Work and Social Computing10.1145/3584931.3606969(105-111)Online publication date: 14-Oct-2023
    • Show More Cited By

    Index Terms

    1. Family accounts: a new paradigm for user accounts within the home environment

        Recommendations

        Comments

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        CSCW '08: Proceedings of the 2008 ACM conference on Computer supported cooperative work
        November 2008
        752 pages
        ISBN:9781605580074
        DOI:10.1145/1460563
        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 08 November 2008

        Permissions

        Request permissions for this article.

        Check for updates

        Author Tags

        1. access control
        2. file sharing
        3. home computers
        4. personalization
        5. ubiquitous computing
        6. user account models

        Qualifiers

        • Research-article

        Conference

        CSCW08
        Sponsor:
        CSCW08: Computer Supported Cooperative Work
        November 8 - 12, 2008
        CA, San Diego, USA

        Acceptance Rates

        Overall Acceptance Rate 2,235 of 8,521 submissions, 26%

        Upcoming Conference

        CSCW '24

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)9
        • Downloads (Last 6 weeks)0
        Reflects downloads up to 09 Aug 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2024)Making of an Adaptive Podcast that Engenders Trust through Data NegotiabilityProceedings of the 2024 ACM International Conference on Interactive Media Experiences10.1145/3639701.3663634(334-341)Online publication date: 7-Jun-2024
        • (2023)CREBAS: Enabling Network Access Control in a Home with One ClickJournal of Information Processing10.2197/ipsjjip.31.17431(174-184)Online publication date: 2023
        • (2023)Supporting from the Background: How a Mobile Application for Parent Skills Development Encourages Authoritative ParentingCompanion Publication of the 2023 Conference on Computer Supported Cooperative Work and Social Computing10.1145/3584931.3606969(105-111)Online publication date: 14-Oct-2023
        • (2022)Protecting The VulnerableProceedings of the ACM on Human-Computer Interaction10.1145/35556476:CSCW2(1-26)Online publication date: 11-Nov-2022
        • (2022)"I Never Imagined Grandma Could Do So Well with Technology"Proceedings of the ACM on Human-Computer Interaction10.1145/35555796:CSCW2(1-29)Online publication date: 11-Nov-2022
        • (2022)An Exploration of Account Sharing Practices on Media PlatformsProceedings of the 2022 ACM International Conference on Interactive Media Experiences10.1145/3505284.3529974(141-150)Online publication date: 21-Jun-2022
        • (2022)“Where lots of people are sharing one thing, as soon as one person does something slightly different it can impact everyone” : A Formative Exploration of User Challenges and Expectations around Sharing of Accounts OnlineExtended Abstracts of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491101.3519807(1-6)Online publication date: 27-Apr-2022
        • (2022)SoK: Social Cybersecurity2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833757(1863-1879)Online publication date: May-2022
        • (2022)Capability Based Network Access Control for Smart Home Devices2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)10.1109/PerComWorkshops53856.2022.9767368(551-556)Online publication date: 21-Mar-2022
        • (2021)“We, three brothers have always known everything of each other”: A Cross-cultural Study of Sharing Digital Devices and Online AccountsProceedings on Privacy Enhancing Technologies10.2478/popets-2021-00672021:4(203-224)Online publication date: 23-Jul-2021
        • Show More Cited By

        View Options

        Get Access

        Login options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media