skip to main content
10.1145/2037373.2037442acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmobilehciConference Proceedingsconference-collections
research-article

On the need for different security methods on mobile phones

Authors Info & Claims
Published:30 August 2011Publication History

ABSTRACT

Mobile phones are rapidly becoming small-size general purpose computers, so-called smartphones. However, applications and data stored on mobile phones are less protected from unauthorized access than on most desktop and mobile computers. This paper presents a survey on users' security needs, awareness and concerns in the context of mobile phones. It also evaluates acceptance and perceived protection of existing and novel authentication methods. The responses from 465 participants reveal that users are interested in increased security and data protection. The current protection by using PIN (Personal Identification Number) is perceived as neither adequate nor convenient in all cases. The sensitivity of data stored on the devices varies depending on the data type and the context of use, asking for the need for another level of protection. According to these findings, a two-level security model for mobile phones is proposed. The model provides differential data and service protection by utilizing existing capabilities of a mobile phone for authenticating users.

References

  1. Ben-Asher, N., Ben-Oved, A., Meyer, J.: Preliminary survey results --- project "Graded Security for Mobiles". Deutsche Telekom Laboratories 2009Google ScholarGoogle Scholar
  2. Botha, R., Furnell, S., and Clarke, N.: From desktop to mobile: Examining the security experience. Computers & Security, 28(3--4):130--137, 2009.Google ScholarGoogle Scholar
  3. Braz, C., and Robert, J.: Security and usability: the case of the user authentication methods. Proceedings of the 18th International Conference of the Association Francophone d'Interaction Homme-Machine, page 203. ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Clarke, N., and Furnell, S.: Authentication of users on mobile telephones --- A survey of attitudes and practices. Computers & Security, 24(7):519--527, 2005.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Clarke, N., and Furnell, S.: Advanced user authentication for mobile devices. Computers & Security, 26(2):109--119, 2007.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Clarke, N., Furnell, S., Rodwell, P., and Reynolds P.: Acceptance of subscriber authentication methods for mobile telephony devices. Computers & Security, 21(3):220--228, 2002.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Clarke, N., Furnell, S., Reynolds P.: Biometric authentication for mobile devices. In: Proceedings of the 3rd Australian Information Warfare and Security Conference, Perth, Western Australia, 28--29 November 2002Google ScholarGoogle Scholar
  8. Dörflinger, T., Voth, A., Krämer, J.: "My Smartphone is a Safe!" The user's point of view regarding novel authentication methods and gradual security levels on smartphones. The International Conference on Security and Cryptography (SECRYPT) 2010, July 26--28, Athens, GreeceGoogle ScholarGoogle Scholar
  9. Furnell, S., Clarke, N., and Karatzouni, S.: Beyond the pin: Enhancing user authentication for mobile devices. Computer Fraud & Security, 2008(8):12--17, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  10. IDC: IDC press release from 28 Jan 2010 at www.idc.com/getdoc.jsp?containerId= prUS22186410Google ScholarGoogle Scholar
  11. Imperva Application Defense Center: Consumer Password Worst Practices. Imperva 2010 at www.imperva.com/docs/WP_Consumer_Password_Worst_Practices.pdfGoogle ScholarGoogle Scholar
  12. Jain, A. K., Flynn, P., Ross, A. A. (eds.): Handbook of Biometrics. Springer (2008) Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Karlson, A., Brush, A., and Schechter, S.: Can I borrow your phone?: Understanding concerns when sharing mobile phones. Proceedings of the 27thinternational conference on Human factors in computing systems, pages 1647--1650. ACM New York, NY, USA, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Kowalski, S. and Goldstein, M.: Consumers' Awareness of, Attitudes Towards and Adoption of Mobile Phone Security. Human Factors in Telecommunication (HFT) 06, 2006.Google ScholarGoogle Scholar
  15. Leavitt, N.: Mobile phones: The next frontier for hackers. IEEE Computer, 38(4): 20--23, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. McAfee, I.: Mobile Security Report 2009. Technical report, McAfee, 2009.Google ScholarGoogle Scholar
  17. Richardson, R.: CSI computer crime and security survey. Computer Security Institute, 2009.Google ScholarGoogle Scholar
  18. Riley, S.: Password security: what users know and what they actually do. Usability News, 8(1), 2006.Google ScholarGoogle Scholar
  19. Samarati, P. and De Capitani di Vimercati, S.: Access control: Policies, models, and mechanisms. Lecture Notes in Computer Science, pages 137--196, 2001.Google ScholarGoogle Scholar
  20. Samuelson, W. and Zeckhauser, R.: Status quo bias in decision making. Journal of risk and uncertainty, 1(1):7--59, 1988.Google ScholarGoogle Scholar
  21. Shaw, K.: Data on PDAs mostly unprotected, survey finds. World Wide Web electronic publication, 2004.Google ScholarGoogle Scholar
  22. Sieger, H., Kirschnick, N., Möller, S.: Poster: User preferences for biometric authentication methods and graded security on mobile phones. Symposium on Usability, Privacy, and Security (SOUPS) 2010Google ScholarGoogle Scholar
  23. Siponen, M.: A conceptual foundation for organizational information security awareness. Information Management and Computer Security, 8(1):31--41, 2000.Google ScholarGoogle ScholarCross RefCross Ref
  24. Tognazzini, B.: Design for Usability. Cranor, L. F., Garfinkel, S. (eds.): Security and Usability. Designing Secure Systems That People Can Use. O'Reilly (2005)Google ScholarGoogle Scholar
  25. Examined websites (as of early February 2011): Apple, Inc.: www.apple.com, LG Electronics, Inc.: www.lge.com, Motorola, Inc.: www.motorola.com, Nokia Corp.: www.nokia.com, Research in Motion Ltd.: www.rim.com, Samsung Electronics Co. Ltd.: www.samsumg.com, Sony Ericsson Mobile Communications AB: www.sonyericsson.comGoogle ScholarGoogle Scholar

Index Terms

  1. On the need for different security methods on mobile phones

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            MobileHCI '11: Proceedings of the 13th International Conference on Human Computer Interaction with Mobile Devices and Services
            August 2011
            781 pages
            ISBN:9781450305419
            DOI:10.1145/2037373

            Copyright © 2011 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 30 August 2011

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate202of906submissions,22%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader