Can I Borrow Your Phone? Understanding Concerns When Sharing Mobile Phones

Amy K. Karlson, A.J. Bernheim Brush, and Stuart Schechter

Abstract

Mobile phones are becoming increasingly personalized in terms of the data they store and the types of services they provide. At the same time, field studies have reported that there are a variety of situations in which it is natural for people to share their phones with others. However, most mobile phones support a binary security model that offers all-or-nothing access to the phone. We interviewed 12 smartphone users to explore how security and data privacy concerns affected their willingness to share their mobile phones. The diversity of guest user categorizations and associated security constraints expressed by the participants suggests the need for a security model richer than today’s binary model.

Details

Publication typeProceedings
Published inProceedings of CHI 2009
URLhttp://doi.acm.org/10.1145/1518701.1518953
Pages1647-1650
PublisherAssociation for Computing Machinery, Inc.
> Publications > Can I Borrow Your Phone? Understanding Concerns When Sharing Mobile Phones