32,026 research outputs found

    GazeTouchPIN: Protecting Sensitive Data on Mobile Devices Using Secure Multimodal Authentication

    Get PDF
    Although mobile devices provide access to a plethora of sensitive data, most users still only protect them with PINs or patterns, which are vulnerable to side-channel attacks (e.g., shoulder surfing). How-ever, prior research has shown that privacy-aware users are willing to take further steps to protect their private data. We propose GazeTouchPIN, a novel secure authentication scheme for mobile devices that combines gaze and touch input. Our multimodal approach complicates shoulder-surfing attacks by requiring attackers to ob-serve the screen as well as the user’s eyes to and the password. We evaluate the security and usability of GazeTouchPIN in two user studies (N=30). We found that while GazeTouchPIN requires longer entry times, privacy aware users would use it on-demand when feeling observed or when accessing sensitive data. The results show that successful shoulder surfing attack rate drops from 68% to 10.4%when using GazeTouchPIN

    Why Do People Adopt, or Reject, Smartphone Password Managers?

    Get PDF
    People use weak passwords for a variety of reasons, the most prescient of these being memory load and inconvenience. The motivation to choose weak passwords is even more compelling on Smartphones because entering complex passwords is particularly time consuming and arduous on small devices. Many of the memory- and inconvenience-related issues can be ameliorated by using a password manager app. Such an app can generate, remember and automatically supply passwords to websites and other apps on the phone. Given this potential, it is unfortunate that these applications have not enjoyed widespread adoption. We carried out a study to find out why this was so, to investigate factors that impeded or encouraged password manager adoption. We found that a number of factors mediated during all three phases of adoption: searching, deciding and trialling. The study’s findings will help us to market these tools more effectively in order to encourage future adoption of password managers

    A User-Focused Reference Model for Wireless Systems Beyond 3G

    Get PDF
    This whitepaper describes a proposal from Working Group 1, the Human Perspective of the Wireless World, for a user-focused reference model for systems beyond 3G. The general structure of the proposed model involves two "planes": the Value Plane and the Capability Plane. The characteristics of these planes are discussed in detail and an example application of the model to a specific scenario for the wireless world is provided

    Global Examples of COVID-19 Surveillance Technologies : Flash Report

    Get PDF
    The fast spread of coronavirus (COVID-19) around the world has put health services under an enormous strain. Turning to digital means for collating data on the spread of the virus, the associated symptoms, as well as the routes through which it may be spreading has been a common response. The situation, the associated technologies and the practices of their use vary across the globe and evolve rapidly. This report provides a global snapshot of the different types of technologies in use or in development for surveillance of COVID-19 at the beginning of April 2020. By the time this report is published, the situation will have developed further. The body of the report presents short descriptions of a selection of different apps from around the world. More detailed data tables are in Appendix 1 and include references used

    How technology interacts with emerging adulthood psychosocial developmental tasks: An examination of online self-presentation and cell phone usage

    Get PDF
    This dissertation outlines three distinct, yet interrelated, projects aimed at understanding the role of technology in relation to emerging adulthood developmental tasks: individuation & identity development. The first paper provides a context for understanding the developmental tasks of emerging adulthood, and the role that technology may serve in relation to those developmental tasks. This brief review of the literature on emerging adulthood developmental tasks provides a solid theoretical background and history for the theoretical premises proposed for the respective studies included in this dissertation. The second project is an empirical investigation that seeks to understand how the task of identity development may be related to online self-presentation, indicated by rates of profile picture cycling. The third project is a second empirical investigation that seeks to understand how the developmental task of individuation may be related to cell phone communication with parents. Final comments and integrated thoughts are provided to clarify the parallels between what we already know about emerging adulthood tasks, and how these tasks are being manifested via social media outlets and cell phone usage

    Encouraging Privacy-Aware Smartphone App Installation: Finding out what the Technically-Adept Do

    Get PDF
    Smartphone apps can harvest very personal details from the phone with ease. This is a particular privacy concern. Unthinking installation of untrustworthy apps constitutes risky behaviour. This could be due to poor awareness or a lack of knowhow: knowledge of how to go about protecting privacy. It seems that Smartphone owners proceed with installation, ignoring any misgivings they might have, and thereby irretrievably sacrifice their privacy

    Virtual Advice Services

    Get PDF
    The chapter looks at the issues involved with implementing and running a chat enquiry service, from choosing an appropriate product to staff training and publicity. The experiences of a number of UK Higher Education Institutions currently offering chat enquiry services are discussed at various stages. Aspects of more advanced use, such as web ‘co-browsing’ and virtual advice by appointment are also included. The chapter closes by considering what the future holds for virtual advice services and the potential impact of the growth in mobile technologies
    • …
    corecore