skip to main content
10.1145/1518701.1518953acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
short-paper

Can i borrow your phone?: understanding concerns when sharing mobile phones

Published:04 April 2009Publication History

ABSTRACT

Mobile phones are becoming increasingly personalized in terms of the data they store and the types of services they provide. At the same time, field studies have reported that there are a variety of situations in which it is natural for people to share their phones with others. However, most mobile phones support a binary security model that offers all-or-nothing access to the phone. We interviewed 12 smartphone users to explore how security and data privacy concerns affected their willingness to share their mobile phones. The diversity of guest user categorizations and associated security constraints expressed by the participants suggests the need for a security model richer than today's binary model.

References

  1. Nokia Inc. Nokia unveils two handsets that offer a range of useful features and colours aimed at consumers in emerging markets. Press Release (2007), http://www.nokia.com/A4805502.Google ScholarGoogle Scholar
  2. Stajano, F. One user, many hats; and, sometimes, no hat--towards a secure yet usable PDA. Security Protocols Workshop, Springer Verlag (2004), 51--64. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Steenson, M. and Donner, J. Beyond the personal and private: Modes of mobile phone sharing in urban India. In S. W. Campbell&R. Ling (Eds.), Mobile Comm. Research Annual (Vol. 1), Transaction Books (in press).Google ScholarGoogle Scholar
  4. Weilenmann, A. and Larsson, C. Local use and sharing of mobile phones. In B. Brown, N. Green and R. Harper (Eds.), Wireless World: Social and Interactional Aspects of the Mobile Age, Springer Verlag (2001), 99--115. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Can i borrow your phone?: understanding concerns when sharing mobile phones

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '09: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
      April 2009
      2426 pages
      ISBN:9781605582467
      DOI:10.1145/1518701

      Copyright © 2009 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 April 2009

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • short-paper

      Acceptance Rates

      CHI '09 Paper Acceptance Rate277of1,130submissions,25%Overall Acceptance Rate6,199of26,314submissions,24%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader