Title | ||
---|---|---|
Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications |
Abstract | ||
---|---|---|
Most mobile phones and tablets support only two access control device states: locked and unlocked. We investigated how well all or-nothing device access control meets the need of users by interviewing 20 participants who had both a smartphone and tablet. We find all-or-nothing device access control to be a remarkably poor fit with users' preferences. On both phones and tablets, participants wanted roughly half their applications to be available even when their device was locked and half protected by authentication. We also solicited participants' interest in new access control mechanisms designed specifically to facilitate device sharing. Fourteen participants out of 20 preferred these controls to existing security locks alone. Finally, we gauged participants' interest in using face and voice biometrics to authenticate to their mobile phone and tablets; participants were surprisingly receptive to biometrics, given that they were also aware of security and reliability limitations. |
Year | DOI | Venue |
---|---|---|
2012 | 10.1145/2335356.2335359 | SOUPS |
Keywords | Field | DocType |
or-nothing device access control,fourteen participant,poor fit,mobile device,mobile phone,all-or-nothing access,device access control,existing security,device sharing,voice biometrics,access control device state,new access control mechanism,mobile devices,access control,mechanism design,sharing | Goldilocks principle,Internet privacy,Mobile search,Authentication,Computer science,Computer security,Interview,Mobile device,Access control,Mobile phone,Biometrics | Conference |
Citations | PageRank | References |
30 | 1.17 | 14 |
Authors | ||
5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Eiji Hayashi | 1 | 200 | 11.28 |
Riva | 2 | 654 | 39.32 |
Karin Strauss | 3 | 1111 | 72.82 |
A. J. Bernheim Brush | 4 | 1771 | 115.75 |
Stuart Schechter | 5 | 697 | 39.23 |