skip to main content
10.1145/1753326.1753421acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Access Control for Home Data Sharing: Attitudes, Needs and Practices

Authors Info & Claims
Published:10 April 2010Publication History

ABSTRACT

As digital content becomes more prevalent in the home, non-technical users are increasingly interested in sharing that content with others and accessing it from multiple devices. Not much is known about how these users think about controlling access to this data. To better understand this, we conducted semi-structured, in-situ interviews with 33 users in 15 households. We found that users create ad-hoc access-control mechanisms that do not always work; that their ideal policies are complex and multi-dimensional; that a priori policy specification is often insufficient; and that people's mental models of access control and security are often misaligned with current systems. We detail these findings and present a set of associated guidelines for designing usable access-control systems for the home environment.

References

  1. ABI Research. Home networking end-user snapshot: Consumer adoption of home and media networking, June 2008. http://www.abiresearch.com/research/1000323-Home+Networking+End-User+Snapshot.Google ScholarGoogle Scholar
  2. D.B. Baker. Fortresses built upon sand. In Proc. NSPW, pages 148--153, 1996. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. L. Bauer, L.F. Cranor, R.W. Reeder, M.K. Reiter, and K. Vaniea. A user study of policy creation in a flexible access-control system. In Proc. CHI, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. L. Bauer, S. Garriss, and M.K. Reiter. Distributed proving in access-control systems. In Proc. IEEE Symposium on Security & Privacy, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. K. Beznosov and O. Beznosova. On the imbalance of the security problem space and its expected consequences. Information Management & Computer Security, 15:420--431, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  6. A. Brush and K. Inkpen. Yours, mine and ours? Sharing and use of technology in domestic environments. In Proc. Ubicomp, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. D. Dearman and J. S. Pierce. "It's on my other computer!": Computing with multiple devices. In Proc. CHI, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. P. Dourish, E. Grinter, J. Delgado de la Flor, and M. Joseph. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal Ubiquitous Computing, 8:391--401, 2004. Google ScholarGoogle ScholarCross RefCross Ref
  9. S. Egelman, A. Brush, and K. Inkpen. Family accounts: A new paradigm for user accounts within the home environment. In Proc. CSCW, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. R. Geambasu, M. Balazinska, S.D. Gribble, and H.M. Levy. HomeViews: Peer-to-peer middleware for personal data sharing applications. In Proc. SIGMOD, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A.K. Karlson, A.B. Brush, and S. Schechter. Can I borrow your phone? Understanding concerns when sharing mobile phones. In Proc. CHI, pages 1647--1650, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. L. Little, E. Sillence, and P. Briggs. Ubiquitous systems and the family: thoughts about the networked home. In Proc. SOUPS, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. R.A. Maxion and R.W. Reeder. Improving user-interface dependability through mitigation of human error. Int. J. Hum.-Comput. Stud., 63:25--50, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J.S. Olson, J. Grudin, and E. Horvitz. A study of preferences for sharing and privacy. In Proc. CHI, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. E.S. Poole, M. Chetty, T. Morgan, R.E. Grinter, and W.K. Edwards. Computer help at home: methods and motivations for informal technical support. In Proc. CHI, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. V. Ramasubramanian, T. Rodeheffer, D.B. Terry, M. Walraed-Sullivan, T. Wobber, C. Marshall, and A. Vahdat. Cimbiosys: A platform for content-based partial replication. Technical Report MSR-TR-2008-116, Microsoft Research, August 2008.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M.N. Razavi and L. Iverson. A grounded theory of information sharing behavior in a personal learning space. In Proc. CSCW, pages 459--468, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. L. Richards. Handling Qualitative Data: A Practical Guide. Sage Publications, 2007.Google ScholarGoogle Scholar
  19. L. Richards and J.M. Morse. Readme First for a User's Guide to Qualitative Methods. Sage Publications, Thousand Oaks, 2007.Google ScholarGoogle Scholar
  20. B. Salmon, F. Hady, and J. Melican. Learning to share: A study of sharing among home storage devices. Technical Report CMU-PDL-07-107, Carnegie Mellon University Parallel Data Lab, October 2007.Google ScholarGoogle Scholar
  21. B. Salmon, S.W. Schlosser, L.F. Cranor, and G.R. Ganger. Perspective: Semantic data management for the home. In Proc. FAST, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. S. Voida, W.K. Edwards, M.W. Newman, R.E. Grinter, and N. Ducheneaut. Share and share alike: exploring the user interface affordances of file sharing. In Proc. CHI, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Access Control for Home Data Sharing: Attitudes, Needs and Practices

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            CHI '10: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
            April 2010
            2690 pages
            ISBN:9781605589299
            DOI:10.1145/1753326

            Copyright © 2010 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 10 April 2010

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate6,199of26,314submissions,24%

            Upcoming Conference

            CHI '24
            CHI Conference on Human Factors in Computing Systems
            May 11 - 16, 2024
            Honolulu , HI , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader