Analyzing End-Users' Knowledge and Feelings Surrounding Smartphone Security and Privacy

Lydia Kraus, Tobias Fiebig, Victor Miruchna, Sebastian Moeller, Asaf Shabtai

    Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

    Abstract

    Along with the significant growth in the popularity
    of smartphones and the number of available mobile applications,
    the amount of threats that harm users or compromise their
    privacy has dramatically increased. The mobile security
    research community constantly uncovers new threats and
    develops associated mitigations. Recently, there is an increasing
    interest in the human factors and various studies investigated
    user-aspects in the implementation of security mechanisms as
    well as users’ perception of threats. In this paper we present a
    qualitative study on end-users’ knowledge and perceptions of
    threats and mitigations on mobile devices. Moreover, we identify
    feelings surrounding smartphone security and privacy. We
    interpret these feelings in the context of basic psychological need
    fulfillment. Our findings suggest that so-far little considered
    aspects of why end-users do not utilize mitigations reside in the
    need fulfillment plane, and not only in the conflict of usability
    and security. Following these findings we give examples of how
    developers of mitigations could ensure that these mitigations are
    actually adopted by end-users.
    Original languageEnglish
    Title of host publicationIEEE S&P Workshop on Mobile Security Technologies
    Publication statusPublished - 2015

    Fingerprint Dive into the research topics of 'Analyzing End-Users' Knowledge and Feelings Surrounding Smartphone Security and Privacy'. Together they form a unique fingerprint.

  • Cite this

    Kraus, L., Fiebig, T., Miruchna, V., Moeller, S., & Shabtai, A. (2015). Analyzing End-Users' Knowledge and Feelings Surrounding Smartphone Security and Privacy. In IEEE S&P Workshop on Mobile Security Technologies http://www.ieee-security.org/TC/SPW2015/MoST/papers/s1p2.pdf