Author
Listed:
- Sonia Chiasson
(School of Computer Science, Carleton University, Ottawa, Ontario, Canada)
- Heather Crawford
(Department of Computer Science, Florida Institute of Technology, Melbourne, FL, USA)
- Serge Egelman
(University of California, Berkeley, CA, USA)
- Pourang Irani
(Department of Computer Science, University of Manitoba, Winnipeg, Manitoba, Canada)
Abstract
The Second Usable Privacy and Security for Mobile Devices Workshop (U-PriSM 2) was co-located with MobileHCI'13 in Munich, Germany. The U-PriSM 2 was an opportunity for researchers and practitioners to discuss research challenges and experiences around the usable privacy and security of mobile devices (smartphones and tablets). Security and privacy often involve having non-security experts, or even novice users, regularly making important decisions while their main focus is on other primary tasks. This is especially true for mobile devices where users can quickly and easily install apps, where user interfaces are minimal due to space constraints, and where users are often distracted by their environment. Likewise, mobile devices present unique privacy and security risks because they allow third-party applications access to personal information and sensor data. The amount and sensitivity of such personally identifying information is likely to increase as device functionality increases. The convergence of these factors means that improvements to security and privacy provisions on mobile devices are becoming increasingly important. Workshop participants had a chance to explore mobile device usage and the unique usable security and privacy challenges that arise, discuss proposed systems and ideas that address these needs, and work towards the development of design principles to inform future development in the area.
Suggested Citation
Sonia Chiasson & Heather Crawford & Serge Egelman & Pourang Irani, 2014.
"Reflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices,"
International Journal of Mobile Human Computer Interaction (IJMHCI), IGI Global, vol. 6(2), pages 73-78, April.
Handle:
RePEc:igg:jmhci0:v:6:y:2014:i:2:p:73-78
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jmhci0:v:6:y:2014:i:2:p:73-78. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.