Study of Usability of Security and Privacy in Context Aware Mobile Applications
N. Pattan, and D. Madamanchi. Mobile Computing, Applications, and Services, volume 35 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, Springer Berlin Heidelberg, 10.1007/978-3-642-12607-9_21.(2010)
Abstract
Mobile devices, such as smart phones, are becoming increasingly powerful with more memory, processing capacity and interface to several hard and soft sensors, making it possible to easily develop and use context aware applications on them. Context aware applications make use of context from several sources including location, light, sound, as well social context and users’ behavioral patterns to make more informed decisions for the user. Since these applications are indeed aware of all the user’s personal information and context, it is important that they be designed with security and privacy in mind. In this paper, we discuss a study conducted to understand user perception of security and privacy features implemented in context aware mobile applications, improvements that can be made and design guidelines that will help improve the usability of these features.
%0 Book Section
%1 springerlink:10.1007/978-3-642-12607-9_21
%A Pattan, Neha
%A Madamanchi, Deepthi
%B Mobile Computing, Applications, and Services
%D 2010
%E Akan, Ozgur
%E Bellavista, Paolo
%E Cao, Jiannong
%E Dressler, Falko
%E Ferrari, Domenico
%E Gerla, Mario
%E Kobayashi, Hisashi
%E Palazzo, Sergio
%E Sahni, Sartaj
%E Shen, Xuemin (Sherman)
%E Stan, Mircea
%E Xiaohua, Jia
%E Zomaya, Albert
%E Coulson, Geoffrey
%E Phan, Thomas
%E Montanari, Rebecca
%E Zerfos, Petros
%I Springer Berlin Heidelberg
%K context mobile mobilecomputing privacy security
%P 326-330
%T Study of Usability of Security and Privacy in Context Aware Mobile Applications
%U http://dx.doi.org/10.1007/978-3-642-12607-9_21
%V 35
%X Mobile devices, such as smart phones, are becoming increasingly powerful with more memory, processing capacity and interface to several hard and soft sensors, making it possible to easily develop and use context aware applications on them. Context aware applications make use of context from several sources including location, light, sound, as well social context and users’ behavioral patterns to make more informed decisions for the user. Since these applications are indeed aware of all the user’s personal information and context, it is important that they be designed with security and privacy in mind. In this paper, we discuss a study conducted to understand user perception of security and privacy features implemented in context aware mobile applications, improvements that can be made and design guidelines that will help improve the usability of these features.
%@ 978-3-642-12607-9
@incollection{springerlink:10.1007/978-3-642-12607-9_21,
abstract = {Mobile devices, such as smart phones, are becoming increasingly powerful with more memory, processing capacity and interface to several hard and soft sensors, making it possible to easily develop and use context aware applications on them. Context aware applications make use of context from several sources including location, light, sound, as well social context and users’ behavioral patterns to make more informed decisions for the user. Since these applications are indeed aware of all the user’s personal information and context, it is important that they be designed with security and privacy in mind. In this paper, we discuss a study conducted to understand user perception of security and privacy features implemented in context aware mobile applications, improvements that can be made and design guidelines that will help improve the usability of these features.},
added-at = {2010-10-13T11:59:09.000+0200},
affiliation = {Carnegie Mellon University USA},
author = {Pattan, Neha and Madamanchi, Deepthi},
biburl = {https://www.bibsonomy.org/bibtex/2628e61d0609d6489fb73d62712a2cae1/kw},
booktitle = {Mobile Computing, Applications, and Services},
editor = {Akan, Ozgur and Bellavista, Paolo and Cao, Jiannong and Dressler, Falko and Ferrari, Domenico and Gerla, Mario and Kobayashi, Hisashi and Palazzo, Sergio and Sahni, Sartaj and Shen, Xuemin (Sherman) and Stan, Mircea and Xiaohua, Jia and Zomaya, Albert and Coulson, Geoffrey and Phan, Thomas and Montanari, Rebecca and Zerfos, Petros},
interhash = {25076a0c7496c42fcadb41a96bee777f},
intrahash = {628e61d0609d6489fb73d62712a2cae1},
isbn = {978-3-642-12607-9},
keyword = {Computer Science},
keywords = {context mobile mobilecomputing privacy security},
note = {10.1007/978-3-642-12607-9_21},
pages = {326-330},
publisher = {Springer Berlin Heidelberg},
series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering},
timestamp = {2010-10-13T11:59:09.000+0200},
title = {Study of Usability of Security and Privacy in Context Aware Mobile Applications},
url = {http://dx.doi.org/10.1007/978-3-642-12607-9_21},
volume = 35,
year = 2010
}