TY - GEN
T1 - Know your enemy
T2 - 15th International Conference on Human-Computer Interaction with Mobile Devices and Services, MobileHCI 2013
AU - Muslukhov, Ildar
AU - Boshmaf, Yazan
AU - Kuo, Cynthia
AU - Lester, Jonathan
AU - Beznosov, Konstantin
PY - 2013
Y1 - 2013
N2 - Smartphones store large amounts of sensitive data, such as SMS messages, photos, or email. In this paper, we report the results of a study investigating users' concerns about unauthorized data access on their smartphones (22 interviewed and 724 surveyed subjects). We found that users are generally concerned about insiders (e.g., friends) accessing their data on smartphones. Furthermore, we present the first evidence that the insider threat is a real problem impacting smartphone users. In particular, 12% of subjects reported a negative experience with unauthorized access. We also found that younger users are at higher risk of experiencing unauthorized access. Based on our results, we propose a stronger adversarial model that incorporates the insider threat. To better reflect users' concerns and risks, a stronger adversarial model must be considered during the design and evaluation of data protection systems and authentication methods for smartphones.
AB - Smartphones store large amounts of sensitive data, such as SMS messages, photos, or email. In this paper, we report the results of a study investigating users' concerns about unauthorized data access on their smartphones (22 interviewed and 724 surveyed subjects). We found that users are generally concerned about insiders (e.g., friends) accessing their data on smartphones. Furthermore, we present the first evidence that the insider threat is a real problem impacting smartphone users. In particular, 12% of subjects reported a negative experience with unauthorized access. We also found that younger users are at higher risk of experiencing unauthorized access. Based on our results, we propose a stronger adversarial model that incorporates the insider threat. To better reflect users' concerns and risks, a stronger adversarial model must be considered during the design and evaluation of data protection systems and authentication methods for smartphones.
KW - insider
KW - loss
KW - physical threats
KW - smartphone
KW - stranger
KW - theft
KW - user study
UR - http://www.scopus.com/inward/record.url?scp=84883667031&partnerID=8YFLogxK
U2 - 10.1145/2493190.2493223
DO - 10.1145/2493190.2493223
M3 - Conference contribution
AN - SCOPUS:84883667031
SN - 9781450322737
T3 - MobileHCI 2013 - Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services
SP - 271
EP - 280
BT - MobileHCI 2013 - Proceedings of the 15th International Conference on Human-Computer Interaction with Mobile Devices and Services
Y2 - 27 August 2013 through 30 August 2013
ER -