Encouraging privacy-aware smartphone app installation: finding out what the technically-adept do

Oksana Kulyk, Paul Gerber, Michael El Hanafi, Benjamin Reinheimer, Karen Renaud, Melanie Volkamer

Research output: Chapter in Book/Report/Conference proceedingConference contribution book

14 Downloads (Pure)

Abstract

Smartphone apps can harvest very personal details from the phone with ease. This is a particular privacy concern. Unthinking installation of untrustworthy apps constitutes risky behaviour. This could be due to poor awareness or a lack of know- how: knowledge of how to go about protecting privacy. It seems that Smartphone owners proceed with installation, ignoring any misgivings they might have, and thereby irretrievably sacrifice their privacy.
In this paper, we focus on the lack of know-how. Our primary aim was to design a set of guidelines to help Smartphone owners to judge whether apps are likely to respect their privacy or not. To produce these we investigated the stances of those who do, to some extent, have the requisite awareness and knowledge, namely those with experience in IT security or computer science in general. Such technically-adept people can reasonably be expected to apply pattern-like heuristics when making installation decisions. We carried out a study to identify and describe their heuristics. We then distilled their app-related decision processes into a set of easily accessible guidelines and we conclude the paper by providing these.
Original languageEnglish
Title of host publicationProceedings of the 2016 Workshop on Usable Security (USEC)
Place of PublicationReston, VA.
Number of pages10
Publication statusPublished - 21 Feb 2016
EventUsable Security - San Diego, United States
Duration: 21 Feb 201621 Feb 2016
https://www.ndss-symposium.org/ndss2016/usec-workshop-programme-0/

Workshop

WorkshopUsable Security
Country/TerritoryUnited States
CitySan Diego
Period21/02/1621/02/16
Internet address

Keywords

  • smartphone apps
  • phone security
  • privacy

Fingerprint

Dive into the research topics of 'Encouraging privacy-aware smartphone app installation: finding out what the technically-adept do'. Together they form a unique fingerprint.

Cite this