Sciweavers

CHI
2009
ACM

Can I borrow your phone?: understanding concerns when sharing mobile phones

14 years 4 months ago
Can I borrow your phone?: understanding concerns when sharing mobile phones
Mobile phones are becoming increasingly personalized in terms of the data they store and the types of services they provide. At the same time, field studies have reported that there are a variety of situations in which it is natural for people to share their phones with others. However, most mobile phones support a binary security model that offers all-or-nothing access to the phone. We interviewed 12 smartphone users to explore how security and data privacy concerns affected their willingness to share their mobile phones. The diversity of guest user categorizations and associated security constraints expressed by the participants suggests the need for a security model richer than today's binary model. Author Keywords Mobile phone sharing, phone privacy, phone security. ACM Classification Keywords H.5.3 User Interface; user centered design.
Amy K. Karlson, A. J. Bernheim Brush, Stuart E. Sc
Added 24 Nov 2009
Updated 24 Nov 2009
Type Conference
Year 2009
Where CHI
Authors Amy K. Karlson, A. J. Bernheim Brush, Stuart E. Schechter
Comments (0)