skip to main content
10.1145/1518701.1519004acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

"When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use

Published: 04 April 2009 Publication History

Abstract

Increasingly, users access online services such as email, e-commerce, and social networking sites via 802.11-based wireless networks. As they do so, they expose a range of personal information such as their names, email addresses, and ZIP codes to anyone within broadcast range of the network. This paper presents results from an exploratory study that examined how users from the general public understand Wi-Fi, what their concerns are related to Wi-Fi use, and which practices they follow to counter perceived threats. Our results reveal that while users understand the practical details of Wi-Fi use reasonably well, they lack understanding of important privacy risks. In addition, users employ incomplete protective practices which results in a false sense of security and lack of concern while on Wi-Fi. Based on our results, we outline opportunities for technology to help address these problems.

References

[1]
Anonymous. Wigle.net, http://wigle.net.
[2]
Cranor, L.F. 'I didn't' buy it for myself': Privacy and ecommerce personalization. In Proc. WPES '03, ACM Press, (2003).
[3]
Csikszentmihalyi, M. and Larson, R. Validity and reliability of the Experience Sampling Method. Journal of Nervous and Mental Disease, 175, 9, (1987), 526--536.
[4]
Dhamija, R., Tygar, J.D. and Hearst, M. Why phishing works. In Proc. CHI '06, ACM Press, (2006).
[5]
Dourish, P., Grinter, R., Delgado De La Flor, J. and Joseph, M. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 8, 6, (2004), 391--401.
[6]
Friedman, B., Howe, D.C. and Felton, E. Informed consent in the Mozilla browser: Implementing value-sensitive design. In Proc. 35th Hawaii International Conference on System Sciences, IEEE, (2002).
[7]
Friedman, B., Hurley, D., Howe, D.C., Felten, E. and Nissenbaum, H. Users' conceptions of web security: a comparative study. In Proc. CHI '02: CHI '02 extended abstracts on Human factors in computing systems, (2002).
[8]
Gideon, J., Cranor, L., Egelman, S. and Acquisti, A. Power strips, prophylactics, and privacy, oh my! In Proc. SOUPS '06, (2006).
[9]
Goffman, E. The presentation of self in everyday life. Doubleday, Garden City, NY, 1959.
[10]
Greenstein, B., McCoy, D., Pang, J., Kohno, T., Seshan, S. and Wetherall, D. Improving wireless privacy with an identifier-free link layer protocol. In Proc. MobiSys '08, (2008).
[11]
Horrigan, J.B. Home broadband adoption 2008, Pew Internet&American Life Project, Washington, DC, 2008, http://www.pewinternet.org/pdfs/PIP_Broadband_2008.pdf.
[12]
Jensen, C., Potts, C.,&Jensen, C. Privacy practices of Internet Users: Self-report versus observed behavior. IJHCS, 63, 1--2, (2005).
[13]
Jung, J., Sheth, A., Greenstein, B., Wetherall, D., Maganis, G. and Kohno, T. Privacy oracle: A system for finding application leaks using black-box differential testing. In Proc. CCS 2008, ACM Press, (2008).
[14]
Kindberg, T., O'Neill, E., Bevan, C., Kostakos, V., Fraser, D.S. and Jay, T. Measuring trust in Wi-Fi hotspots. In Proc. CHI '08, ACM Press, (2008).
[15]
King, J. and McDiarmid, A. Where's the beep? Security, privacy, and user misunderstandings of RFID. In Proc. Usenix, (2008).
[16]
Kowitz, B. and Cranor, L. Peripheral privacy notifications for wireless networks. In Proc. WPES '05, ACM Press, (2005).
[17]
Owyang, J. Social network stats: Facebook, MySpace reunion (Jan, 2008), 2008, http://tinyurl.com/ywnsgv.
[18]
Poole, E.S., Chetty, M., Grinter, R.E. and Edwards, W.K. More than meets the eye: transforming the user experience of home network management. In Proc. DIS '08, ACM Press, (2008).
[19]
Stoll, J., Tashman, C.S., Edwards, W.K. and Spafford, K. Sesame: Informing user security decisions with system visualization. In Proc. CHI 2008, ACM Press, (2008).
[20]
Strauss, A. and Corbin, J. Basics of qualitative research: Techniques and procedures for developing grounded theory. SAGE, Thousand Oaks, 1998.
[21]
Wu, M., Miller, R.C. and Garfinkel, S.L. Do security toolbars actually prevent phishing attacks? In Proc. CHI '06, ACM Press, (2006).

Cited By

View all
  • (2024)From Servers to Satellites: Understanding Internet Principles among New Computer Science TeachersACM Transactions on Computing Education10.1145/370915025:1(1-33)Online publication date: 24-Dec-2024
  • (2023)A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 CountriesProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581410(1-23)Online publication date: 19-Apr-2023
  • (2023)Blind-trust: Raising awareness of the dangers of using unsecured public Wi-Fi networksComputer Communications10.1016/j.comcom.2023.07.011209(359-367)Online publication date: Sep-2023
  • Show More Cited By

Index Terms

  1. "When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CHI '09: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
      April 2009
      2426 pages
      ISBN:9781605582467
      DOI:10.1145/1518701
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 04 April 2009

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Wi-Fi
      2. privacy
      3. security
      4. user study
      5. wireless networks

      Qualifiers

      • Research-article

      Conference

      CHI '09
      Sponsor:

      Acceptance Rates

      CHI '09 Paper Acceptance Rate 277 of 1,130 submissions, 25%;
      Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

      Upcoming Conference

      CHI 2025
      ACM CHI Conference on Human Factors in Computing Systems
      April 26 - May 1, 2025
      Yokohama , Japan

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)59
      • Downloads (Last 6 weeks)14
      Reflects downloads up to 07 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)From Servers to Satellites: Understanding Internet Principles among New Computer Science TeachersACM Transactions on Computing Education10.1145/370915025:1(1-33)Online publication date: 24-Dec-2024
      • (2023)A World Full of Privacy and Security (Mis)conceptions? Findings of a Representative Survey in 12 CountriesProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581410(1-23)Online publication date: 19-Apr-2023
      • (2023)Blind-trust: Raising awareness of the dangers of using unsecured public Wi-Fi networksComputer Communications10.1016/j.comcom.2023.07.011209(359-367)Online publication date: Sep-2023
      • (2023)Achieving Usable Security and Privacy Through Human-Centered DesignHuman Factors in Privacy Research10.1007/978-3-031-28643-8_5(83-113)Online publication date: 10-Mar-2023
      • (2022)A LONGITUDINAL STUDY ON IMPROVING EMPLOYEE INFORMATION PROTECTIVE KNOWLEDGE AND BEHAVIORSComputers & Security10.1016/j.cose.2022.102641(102641)Online publication date: Feb-2022
      • (2022)Risk Taking Behaviors Using Public Wi-Fi™Information Systems Frontiers10.1007/s10796-021-10119-724:3(965-982)Online publication date: 1-Jun-2022
      • (2021)Exploring mental models of the right to informational self-determination of office workers in GermanyProceedings on Privacy Enhancing Technologies10.2478/popets-2021-00352021:3(5-27)Online publication date: 27-Apr-2021
      • (2021)Up Close & Personal: Exploring User-preferred Image Schemas for Intuitive Privacy Awareness and ControlProceedings of the Fifteenth International Conference on Tangible, Embedded, and Embodied Interaction10.1145/3430524.3440626(1-13)Online publication date: 14-Feb-2021
      • (2021)Information privacy concern at individual, group, organization and societal level - a literature reviewVilakshan - XIMB Journal of Management10.1108/XJM-08-2020-0096ahead-of-print:ahead-of-printOnline publication date: 8-Jan-2021
      • (2021)Contextualizing human dynamics: Understanding the semantics of movement trajectories with Wi-Fi dataTravel Behaviour and Society10.1016/j.tbs.2021.07.00525(183-192)Online publication date: Oct-2021
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media