Dimensions of risk in mobile applications: A user study

Zach Jorgensen, Jing Chen, Christopher S. Gates, Ninghui Li, Robert W. Proctor, Ting Yu

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

31 Citations (Scopus)

Abstract

Mobile platforms, such as Android, warn users about the permissions an app requests and trust that the user will make the correct decision about whether or not to install the app. Unfortunately many users either ignore the warning or fail to understand the permissions and the risks they imply. As a step toward developing an indicator of risk that decomposes risk into several categories, or dimensions, we conducted two studies designed to assess the dimensions of risk deemed most important by experts and novices. In Study 1, semi-structured interviews were conducted with 19 security experts, who also performed a card sorting task in which they categorized permissions. The experts identified three major risk dimensions in the interviews (personal information privacy, monetary risk, and device availability/ stability), and a forth dimension (data integrity) in the card sorting task. In Study 2, 350 typical Android users, recruited via Amazon Mechanical Turk, filled out a questionnaire in which they (a) answered questions concerning their mobile device usage, (b) rated how often they considered each of several types of information when installing apps, (c) indicated what they considered to be the biggest risk associated with installing an app on their mobile device, and (d) rated their concerns with regard to specific risk types and about apps having access to specific types of information. In general, the typical users' concerns were similar to those of the security experts. The results of the studies suggest that risk information should be organized into several risk types that can be better understood by users and that a mid-level risk summary should incorporate the dimensions of personal information privacy, monetary risk, device availability/ stability risk and data integrity risk.

Original languageEnglish
Title of host publicationCODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy
PublisherAssociation for Computing Machinery
Pages49-60
Number of pages12
ISBN (Electronic)9781450331913
DOIs
Publication statusPublished - 2 Mar 2015
Event5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015 - San Antonio, United States
Duration: 2 Mar 20154 Mar 2015

Publication series

NameCODASPY 2015 - Proceedings of the 5th ACM Conference on Data and Application Security and Privacy

Conference

Conference5th ACM Conference on Data and Application Security and Privacy, CODASPY 2015
Country/TerritoryUnited States
CitySan Antonio
Period2/03/154/03/15

Keywords

  • Android
  • Mobile security
  • Risk
  • Smartphones

Fingerprint

Dive into the research topics of 'Dimensions of risk in mobile applications: A user study'. Together they form a unique fingerprint.

Cite this