TY - GEN
T1 - On the need for different security methods on mobile phones
AU - Ben-Asher, Noam
AU - Kirschnick, Niklas
AU - Sieger, Hanul
AU - Meyer, Joachim
AU - Ben-Oved, Asaf
AU - Möller, Sebastian
PY - 2011/10/27
Y1 - 2011/10/27
N2 - Mobile phones are rapidly becoming small-size general purpose computers, so-called smartphones. However, applications and data stored on mobile phones are less protected from unauthorized access than on most desktop and mobile computers. This paper presents a survey on users' security needs, awareness and concerns in the context of mobile phones. It also evaluates acceptance and perceived protection of existing and novel authentication methods. The responses from 465 participants reveal that users are interested in increased security and data protection. The current protection by using PIN (Personal Identification Number) is perceived as neither adequate nor convenient in all cases. The sensitivity of data stored on the devices varies depending on the data type and the context of use, asking for the need for another level of protection. According to these findings, a two-level security model for mobile phones is proposed. The model provides differential data and service protection by utilizing existing capabilities of a mobile phone for authenticating users.
AB - Mobile phones are rapidly becoming small-size general purpose computers, so-called smartphones. However, applications and data stored on mobile phones are less protected from unauthorized access than on most desktop and mobile computers. This paper presents a survey on users' security needs, awareness and concerns in the context of mobile phones. It also evaluates acceptance and perceived protection of existing and novel authentication methods. The responses from 465 participants reveal that users are interested in increased security and data protection. The current protection by using PIN (Personal Identification Number) is perceived as neither adequate nor convenient in all cases. The sensitivity of data stored on the devices varies depending on the data type and the context of use, asking for the need for another level of protection. According to these findings, a two-level security model for mobile phones is proposed. The model provides differential data and service protection by utilizing existing capabilities of a mobile phone for authenticating users.
KW - authentication
KW - authentication methods
KW - data protection
KW - graded security model
KW - mobile phone security
KW - survey
UR - http://www.scopus.com/inward/record.url?scp=80054841454&partnerID=8YFLogxK
U2 - 10.1145/2037373.2037442
DO - 10.1145/2037373.2037442
M3 - Conference contribution
AN - SCOPUS:80054841454
SN - 9781450305419
T3 - Mobile HCI 2011 - 13th International Conference on Human-Computer Interaction with Mobile Devices and Services
SP - 465
EP - 473
BT - Mobile HCI 2011 - 13th International Conference on Human-Computer Interaction with Mobile Devices and Services
T2 - 13th International Conference on Human-Computer Interaction with Mobile Devices and Services, Mobile HCI 2011
Y2 - 30 August 2011 through 2 September 2011
ER -