4 research outputs found

    How Urgent is Mobile Authentication in Special Need/Education? A Review Systematic of Cyber Security and Psychological Approach

    Get PDF
    The use of mobile apps due to the Covid-19 pandemic for the distance learning process, learning media, entertainment, and payment instruments creates an awareness of how urgently cyber security is needed in special education. Students, teachers, parents, and therapists, in special education who has interests and have the responsibility data, must be kept confidential or protected as the authenticity of their work, as well as the diversity of levels of disability, trying to study in a systematic review through scientific journal searches related to contemporary mobile authentication methods, authenticity. The review was conducted through several scientific search engines and mobile apps. The results show that authentication is a challenging study for mobile app (computing) developers but it is not easy to facilitate the unique, diverse needs of disability, and the privacy of personal data is still not following cyber security standards while the need for mobile apps in the health and education sectors is growing rapidly

    GestureMeter: Evaluating Gesture Password Selection on Smartphones with Strength Meter

    Get PDF
    Department of Human Factors EngineeringGestures are potential authentication method for touchscreen devices and common tasks such as phone lock. While many studies have indicated gesture passwords can achieve high usability, evaluating their security remains a grey area. Key challenges stem from the small sample sizes in current gesture password studies and the requirement to use similarity-based recognition metrics which prevent the application of traditional entropy assessment methods. To overcome these problems, we perform a large-scale study online (N=2594). With the resulting data set, we develop a novel multi-stage discretization method and n-gram Markov models that enable us to assess the partial guessing entropy of gesture passwords and to create a novel clustering-based dictionary attack. We report then while partial guessing entropy appears to be greater than other common phone lock methods (e.g., Pin, pattern), gestures are highly susceptible to dictionary attack. To improve the security of gesture passwords, we develop a novel gesture password strength meter. Password strength meters has been previously proposed as an effective password policy that can improve the security of other authentication techniques such as passwords or pattern. Using the meter, we propose various mandated compliances in which users are restricted to meet certain level of strength: default (none), weak, fair, and strong. We validate the effectiveness of gesture strength meter designs on security by performing a follow up online study and applying the security framework and attacks established in the first study. The default policy improves the gesture password security with small cost in usability. This thesis concludes that gesture password meters can be an effective technique for improving the security of gesture authentication systems that deserve further study.clos

    “It’s Like Being Gone For A Second”: Using Subjective Evidence-Based Ethnography to Understand Locked Smartphone Use Among Young Adults

    Full text link
    Smartphone use usually refers to what happens after users unlock their devices. But a large number of smartphone interactions actually take place on the lock screen of the phone. This paper presents evidence from a mixed-methods study using a situated video-ethnography technique (SEBE) and a dataset of over 200h of first-person and interview recordings with 221 unique lock screen checks (n=41). We find eight categories contextual antecedents to locked smartphone use that influence the nature and the content of the subsequent smartphone interaction. Overall, locked smartphone use emerges as a means to structure the flow of daily activities and to balance between not getting too distracted and not experiencing fomo (the fear of missing out). It also appears as highly habitualised, which can cause over-use and disruption. Based on this analysis, we provide recommendations on how intervention and design approaches can leverage differences in context and purpose of locked smartphone use to improve user experience

    Smartphones as steady companions: device use in everyday life and the economics of attention

    Get PDF
    This thesis investigates smartphone use in naturally occurring contexts with a dataset comprising 200 hours of audio-visual first-person recordings from wearable cameras, and self-confrontation interview video footage (N = 41 users). The situated context in which smartphone use takes place has often been overlooked because of the technical difficulty of capturing context of use, actual action of users, and their subjective experience simultaneously. This research project contributes to filling this gap, with a detailed, mixed-methods analysis of over a thousand individual phone engagement behaviours (EB). We observe that (a) the smartphone is a key structuring element in the flow of daily activities. Participants report complex strategies on how they manage engaging with or avoiding their devices. (b) Unexpectedly, we find that the majority of EB (89%) are initiated by users, not devices; users engage with the phone roughly every five minutes regardless of the context they are in. (c) A large portion of EB seems to stem from contextual cues and an unconscious urge to pick up the device, even when there is no clear reason to do so. d) Participants are surprised about, and often unhappy with how frequently they mindlessly reach for the phone. Our in-depth analysis unveils several overlapping layers of motivations and triggers driving EB. Monitoring incoming notifications, managing time use, responding to social pressures, actually completing a task with the phone, design factors, unconscious urges, as well as the accessibility of the device, and most importantly its affordance for distraction all contribute to picking up the phone. This user drive for EB is used by providers to feed the attention economy. So far, keeping the smartphone outside of the visual field and immediate reach has appeared as the only efficient strategy to prevent overuse
    corecore