Abstract
Wireless connectivity is a key feature of smartphones, enabling users to connect to the Internet and communicate directly with other local devices and accessories. However, such channels can also introduce security and privacy risks if not configured and used correctly, which can in turn depend upon the perceptions, capabilities and understanding of the users. This study examines the issue from the potential of iPhone users, a popular platform that is often perceived as being easy to use and offering better default protection. Findings from interview-based data collection involving 16 smartphone users. These revealed that while all users made regular and significant use of their wireless connectivity, there were varying levels of awareness in relation to security and related usage. The findings also revealed notable variations in users’ abilities to navigate and interpret related interfaces, with the potential consequence that related features are not located or are misinterpreted.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Ramokapane, K.M., Mazeli, A.C., Rashid, A.: Skip, skip, skip, accept!!!: A study on the usability of smartphone manufacturer provided default features and user privacy. Proc. Priv. Enhanc. Technol. 2019(2), 209–227 (2019). https://doi.org/10.2478/popets-2019-0027
Apple: How to use AirDrop on your iPhone or iPad. Apple Support, 26 September 2023. https://support.apple.com/en-gb/HT204144
Al Neyadi, E., Al Shehhi, S., Al Shehhi, A., Al Hashimi, N., Qbea’H, M., Alrabaee, S.: Discovering public Wi-Fi vulnerabilities using raspberry pi and Kali Linux. In: 2020 12th Annual Undergraduate Research Conference on Applied Computing (URC), pp. 1–4 (2020).https://doi.org/10.1109/URC49805.2020.9099187
Stouffer, C.: Bluetooth security risks to know (and how to avoid them). Norton, 2 October 2022. https://us.norton.com/blog/mobile/bluetooth-security
Stute, M., et al.: A Billion Open Interfaces for Eve and Mallory: MitM, DoS, and Tracking Attacks on iOS and macOS Through Apple Wireless Direct Link (2019). https://www.usenix.org/conference/usenixsecurity19/presentation/stute
Maimon, D., Howell, C.J., Jacques, S., Perkins, R.C.: Situational awareness and public Wi-Fi users’ self-protective behaviors. Secur. J. 35(1), 154–174 (2022). https://doi.org/10.1057/s41284-020-00270-2
Imgraben, J., Engelbrecht, A., Choo, K.K.R.: Always connected, but are smart mobile users getting more security savvy? A survey of smart mobile device users. Behav. Inf. Technol. 33(12) (2014). https://doi.org/10.1080/0144929X.2014.934286
Winder, D.: Critical Security Warning For iPhone Users. Forbes, 21 June 2019. https://www.forbes.com/sites/daveywinder/2019/06/21/new-critical-security-warning-for-iphone-and-ipad-users/
Apple: Switch from Android to iPhone. Apple UK (2024). https://www.apple.com/uk/iphone/switch/. Accessed 25 Jan 24
Apple: Use Bluetooth and Wi-Fi in Control Centre. Apple Support, 13 October 2023. https://support.apple.com/en-in/102412
Winder, D.: New iPhone iOS 16 Bluetooth Hack Attack—How To Stop It. Forbes, 23 September 2023. https://www.forbes.com/sites/daveywinder/2023/09/06/new-iphone-ios-16-bluetooth-hack-attack-how-to-stop-it/
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Tugcu, E., Furnell, S. (2024). Exploring User Understanding of Wireless Connectivity and Security on Smartphones. In: Moallem, A. (eds) HCI for Cybersecurity, Privacy and Trust. HCII 2024. Lecture Notes in Computer Science, vol 14728. Springer, Cham. https://doi.org/10.1007/978-3-031-61379-1_8
Download citation
DOI: https://doi.org/10.1007/978-3-031-61379-1_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-61378-4
Online ISBN: 978-3-031-61379-1
eBook Packages: Computer ScienceComputer Science (R0)