ABSTRACT
While users often share accounts with others, currently most accounts support only single user interactions. Within industry, Netflix and Disney+ providing profiles within accounts are testaments to popular services identifying and responding to user needs in this context but the solutions here are mostly naïve. Within academia, while sharing practices are of interest, the practicalities of dealing with them are yet to be studied. This paper highlights said gap in research and reports the preliminary findings of 4 user focus groups that reveal practical challenges and future expectations around the experience of sharing, social implications and user privacy, which when accounted for would support users in their sharing interactions. We intend to extend these findings by integrating them with expert interviews with ‘makers’ who research and work on said technologies, to produce a holistic set of design recommendations that form a practical guide for support around account sharing.
Supplemental Material
- D Alghamdi, I Flechais, and Marina Jirotka. 2015. Security practices for households bank customers in the Kingdom of Saudi Arabia. Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015): 297–308. Retrieved December 30, 2021 from https://www.usenix.org/system/files/conference/soups2015/soups15-paper-alghamdi.pdfGoogle Scholar
- Steve Berry, Steven Fazzio, Yongyi Zhou, Bethany Scott, and Luis Francisco-Revilla. 2010. Netflix recommendations for groups. Proceedings of the American Society for Information Science and Technology 47, 1: 1–3. https://doi.org/10.1002/meet.14504701402Google ScholarCross Ref
- Susanne Bødker and Ellen Christiansen. 2012. Poetry in motion. In Proceedings of the 30th European Conference on Cognitive Ergonomics - ECCE ’12, 78. https://doi.org/10.1145/2448136.2448152Google ScholarDigital Library
- Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology. Retrieved September 18, 2017 from http://www.tandfonline.com/doi/abs/10.1191/1478088706qp063oaGoogle Scholar
- A. J. Bernheim Brush and Kori M. Inkpen. Yours, Mine and Ours? Sharing and Use of Technology in Domestic Environments. In UbiComp 2007: Ubiquitous Computing. Springer Berlin Heidelberg, Berlin, Heidelberg, 109–126. https://doi.org/10.1007/978-3-540-74853-3_7Google Scholar
- K Bryant, J Campbell - Australasian Journal of Information, and undefined 2006. User behaviours associated with password security and management. journal.acs.org.au. Retrieved December 30, 2021 from http://journal.acs.org.au/index.php/ajis/article/view/9Google Scholar
- Britta Busse and Marek Fuchs. 2013. Prevalence of cell phone sharing. Survey methods : Insights from the field, 15. Retrieved December 30, 2021 from https://www.ssoar.info/ssoar/handle/document/33369Google Scholar
- Serge Egelman, A.J. Bernheim Brush, and Kori M. Inkpen. 2008. Family accounts. In Proceedings of the ACM 2008 conference on Computer supported cooperative work - CSCW ’08, 669. https://doi.org/10.1145/1460563.1460666Google ScholarDigital Library
- Serge Egelman, Marian Harbach, and Eyal Peer. 2016. Behavior Ever Follows Intention? In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems - CHI ’16, 5257–5261. https://doi.org/10.1145/2858036.2858265Google ScholarDigital Library
- BG Glaser and AL Strauss. 1998. Grounded theory. Strategien qualitativer Forschung. Bern: Retrieved November 22, 2016 from http://www.ssnpstudents.com/wp/wp-content/uploads/2015/02/THE-DISCOVERY-OF-GROUNDED-THEORY-Glaser-Strauss.docxGoogle Scholar
- Dina Goren-Bar, Oded Glinansky, and undefined 2004. 2004. FIT-recommend ing TV programs to family members. Computers & Graphics 28, 2: 149–156. Retrieved December 31, 2021 from https://www.sciencedirect.com/science/article/pii/S0097849303002589Google ScholarCross Ref
- Rebecca E. Grinter, W. Keith Edwards, Mark W. Newman, and Nicolas Ducheneaut. The Work to Make a Home Network Work. In ECSCW 2005. Springer-Verlag, Berlin/Heidelberg, 469–488. https://doi.org/10.1007/1-4020-4023-7_24Google ScholarCross Ref
- Maia Jacobs, Henriette Cramer, and Louise Barkhuus. 2016. Caring About Sharing. In Proceedings of the 19th International Conference on Supporting Group Work, 235–243. https://doi.org/10.1145/2957276.2957296Google ScholarDigital Library
- Anthony Jameson and Barry Smyth. Recommendation to Groups. In The Adaptive Web. Springer Berlin Heidelberg, Berlin, Heidelberg, 596–627. https://doi.org/10.1007/978-3-540-72079-9_20Google Scholar
- William Jang, Adil Chhabra, and Aarathi Prasad. 2017. Enabling Multi-user Controls in Smart Home Devices. In Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 49–54. https://doi.org/10.1145/3139937.3139941Google ScholarDigital Library
- Amy K. Karlson, A.J. Bernheim Brush, and Stuart Schechter. 2009. Can i borrow your phone? In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1647–1650. https://doi.org/10.1145/1518701.1518953Google ScholarDigital Library
- Joseph “Jofish” Kaye. 2011. Self-reported password sharing strategies. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2619–2622. https://doi.org/10.1145/1978942.1979324Google ScholarDigital Library
- Airi M I Lampinen. 2014. Account sharing in the context of networked hospitality exchange. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing, 499–504. https://doi.org/10.1145/2531602.2531665Google ScholarDigital Library
- Charlotte P. Lee, Katie Derthick, Alexander Thayer, and Matthew J. Bietz. 2012. I love you, let's share calendars. In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work - CSCW ’12, 749. https://doi.org/10.1145/2145204.2145317Google ScholarDigital Library
- Tara Matthews, Kerwell Liao, Anna Turner, Marianne Berkovich, Robert Reeder, and Sunny Consolvo. 2016. "She'll just grab any device that's closer" In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 5921–5932. https://doi.org/10.1145/2858036.2858051Google Scholar
- Cheul Young Park, Cori Faklaris, Siyan Zhao, and Alex Sciuto. 2018. Share and share alike? An exploration of secure behaviors in romantic relationships. Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018): 83–102. Retrieved December 30, 2021 from https://www.usenix.org/conference/soups2018/presentation/parkGoogle Scholar
- Supriya Singh, Anuja Cabraal, Catherine Demosthenous, Gunela Astbrink, and Michele Furlong. 2007. Password sharing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 895–904. https://doi.org/10.1145/1240624.1240759Google ScholarDigital Library
- Hue Watson, Eyitemi Moju-Igbene, Akanksha Kumari, and Sauvik Das. 2020. "We Hold Each Other Accountable": Unpacking How Social Groups Approach Cybersecurity and Privacy Together. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 1–12. https://doi.org/10.1145/3313831.3376605Google ScholarDigital Library
Recommendations
An Exploration of Account Sharing Practices on Media Platforms
IMX '22: Proceedings of the 2022 ACM International Conference on Interactive Media ExperiencesOften accounts and profiles on media platforms discount the real-world complexities of sharing by naively designing technology that supports one user per account. While recently popular media platforms like Netlfix and Disney+ have started responding ...
Sharing one secret vs. sharing many secrets
A secret sharing scheme is a method for distributing a secret among several parties in such a way that only qualified subsets of the parties can reconstruct it and unqualified subsets receive no information about the secret. A multi-secret sharing ...
Sharing One Secret vs. Sharing Many Secrets: Tight Bounds for the Max Improvement Ratio
MFCS '01: Proceedings of the 26th International Symposium on Mathematical Foundations of Computer ScienceAsecret sharing scheme is a method for distributing a secret among several parties in such a way that only qualified subsets of the parties can reconstruct it and unqualified subsets receive no information about the secret. Am ulti secret sharing scheme ...
Comments