Goldilocks and the two mobile devices: Going beyond all-or-nothing access to a device's applications

58Citations
Citations of this article
79Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Most mobile phones and tablets support only two access control device states: locked and unlocked. We investigated how well all-or-nothing device access control meets the need of users by interviewing 20 participants who had both a smartphone and tablet. We find all-or-nothing device access control to be a remarkably poor fit with users' preferences. On both phones and tablets, participants wanted roughly half their applications to be available even when their device was locked and half protected by authentication. We also solicited participants' interest in new access control mechanisms designed specifically to facilitate device sharing. Fourteen participants out of 20 preferred these controls to existing security locks alone. Finally, we gauged participants' interest in using face and voice biometrics to authenticate to their mobile phone and tablets; participants were surprisingly receptive to biometrics, given that they were also aware of security and reliability limitations. Copyright is held by the author/owner.

Author supplied keywords

Cite

CITATION STYLE

APA

Hayashi, E., Riva, O., Strauss, K., Bernheim Brush, A. J., & Schechter, S. (2012). Goldilocks and the two mobile devices: Going beyond all-or-nothing access to a device’s applications. In SOUPS 2012 - Proceedings of the 8th Symposium on Usable Privacy and Security. https://doi.org/10.1145/2335356.2335359

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free