skip to main content
10.1145/3491101.3519807acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
poster

“Where lots of people are sharing one thing, as soon as one person does something slightly different it can impact everyone” : A Formative Exploration of User Challenges and Expectations around Sharing of Accounts Online

Authors Info & Claims
Published:28 April 2022Publication History

ABSTRACT

While users often share accounts with others, currently most accounts support only single user interactions. Within industry, Netflix and Disney+ providing profiles within accounts are testaments to popular services identifying and responding to user needs in this context but the solutions here are mostly naïve. Within academia, while sharing practices are of interest, the practicalities of dealing with them are yet to be studied. This paper highlights said gap in research and reports the preliminary findings of 4 user focus groups that reveal practical challenges and future expectations around the experience of sharing, social implications and user privacy, which when accounted for would support users in their sharing interactions. We intend to extend these findings by integrating them with expert interviews with ‘makers’ who research and work on said technologies, to produce a holistic set of design recommendations that form a practical guide for support around account sharing.

Skip Supplemental Material Section

Supplemental Material

3491101.3519807-talk-video.mp4

mp4

12.7 MB

References

  1. D Alghamdi, I Flechais, and Marina Jirotka. 2015. Security practices for households bank customers in the Kingdom of Saudi Arabia. Eleventh Symposium On Usable Privacy and Security ({SOUPS} 2015): 297–308. Retrieved December 30, 2021 from https://www.usenix.org/system/files/conference/soups2015/soups15-paper-alghamdi.pdfGoogle ScholarGoogle Scholar
  2. Steve Berry, Steven Fazzio, Yongyi Zhou, Bethany Scott, and Luis Francisco-Revilla. 2010. Netflix recommendations for groups. Proceedings of the American Society for Information Science and Technology 47, 1: 1–3. https://doi.org/10.1002/meet.14504701402Google ScholarGoogle ScholarCross RefCross Ref
  3. Susanne Bødker and Ellen Christiansen. 2012. Poetry in motion. In Proceedings of the 30th European Conference on Cognitive Ergonomics - ECCE ’12, 78. https://doi.org/10.1145/2448136.2448152Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology. Retrieved September 18, 2017 from http://www.tandfonline.com/doi/abs/10.1191/1478088706qp063oaGoogle ScholarGoogle Scholar
  5. A. J. Bernheim Brush and Kori M. Inkpen. Yours, Mine and Ours? Sharing and Use of Technology in Domestic Environments. In UbiComp 2007: Ubiquitous Computing. Springer Berlin Heidelberg, Berlin, Heidelberg, 109–126. https://doi.org/10.1007/978-3-540-74853-3_7Google ScholarGoogle Scholar
  6. K Bryant, J Campbell - Australasian Journal of Information, and undefined 2006. User behaviours associated with password security and management. journal.acs.org.au. Retrieved December 30, 2021 from http://journal.acs.org.au/index.php/ajis/article/view/9Google ScholarGoogle Scholar
  7. Britta Busse and Marek Fuchs. 2013. Prevalence of cell phone sharing. Survey methods : Insights from the field, 15. Retrieved December 30, 2021 from https://www.ssoar.info/ssoar/handle/document/33369Google ScholarGoogle Scholar
  8. Serge Egelman, A.J. Bernheim Brush, and Kori M. Inkpen. 2008. Family accounts. In Proceedings of the ACM 2008 conference on Computer supported cooperative work - CSCW ’08, 669. https://doi.org/10.1145/1460563.1460666Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Serge Egelman, Marian Harbach, and Eyal Peer. 2016. Behavior Ever Follows Intention? In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems - CHI ’16, 5257–5261. https://doi.org/10.1145/2858036.2858265Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. BG Glaser and AL Strauss. 1998. Grounded theory. Strategien qualitativer Forschung. Bern: Retrieved November 22, 2016 from http://www.ssnpstudents.com/wp/wp-content/uploads/2015/02/THE-DISCOVERY-OF-GROUNDED-THEORY-Glaser-Strauss.docxGoogle ScholarGoogle Scholar
  11. Dina Goren-Bar, Oded Glinansky, and undefined 2004. 2004. FIT-recommend ing TV programs to family members. Computers & Graphics 28, 2: 149–156. Retrieved December 31, 2021 from https://www.sciencedirect.com/science/article/pii/S0097849303002589Google ScholarGoogle ScholarCross RefCross Ref
  12. Rebecca E. Grinter, W. Keith Edwards, Mark W. Newman, and Nicolas Ducheneaut. The Work to Make a Home Network Work. In ECSCW 2005. Springer-Verlag, Berlin/Heidelberg, 469–488. https://doi.org/10.1007/1-4020-4023-7_24Google ScholarGoogle ScholarCross RefCross Ref
  13. Maia Jacobs, Henriette Cramer, and Louise Barkhuus. 2016. Caring About Sharing. In Proceedings of the 19th International Conference on Supporting Group Work, 235–243. https://doi.org/10.1145/2957276.2957296Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Anthony Jameson and Barry Smyth. Recommendation to Groups. In The Adaptive Web. Springer Berlin Heidelberg, Berlin, Heidelberg, 596–627. https://doi.org/10.1007/978-3-540-72079-9_20Google ScholarGoogle Scholar
  15. William Jang, Adil Chhabra, and Aarathi Prasad. 2017. Enabling Multi-user Controls in Smart Home Devices. In Proceedings of the 2017 Workshop on Internet of Things Security and Privacy, 49–54. https://doi.org/10.1145/3139937.3139941Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Amy K. Karlson, A.J. Bernheim Brush, and Stuart Schechter. 2009. Can i borrow your phone? In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 1647–1650. https://doi.org/10.1145/1518701.1518953Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Joseph “Jofish” Kaye. 2011. Self-reported password sharing strategies. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 2619–2622. https://doi.org/10.1145/1978942.1979324Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Airi M I Lampinen. 2014. Account sharing in the context of networked hospitality exchange. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing, 499–504. https://doi.org/10.1145/2531602.2531665Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Charlotte P. Lee, Katie Derthick, Alexander Thayer, and Matthew J. Bietz. 2012. I love you, let's share calendars. In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work - CSCW ’12, 749. https://doi.org/10.1145/2145204.2145317Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Tara Matthews, Kerwell Liao, Anna Turner, Marianne Berkovich, Robert Reeder, and Sunny Consolvo. 2016. "She'll just grab any device that's closer" In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, 5921–5932. https://doi.org/10.1145/2858036.2858051Google ScholarGoogle Scholar
  21. Cheul Young Park, Cori Faklaris, Siyan Zhao, and Alex Sciuto. 2018. Share and share alike? An exploration of secure behaviors in romantic relationships. Fourteenth Symposium on Usable Privacy and Security ({SOUPS} 2018): 83–102. Retrieved December 30, 2021 from https://www.usenix.org/conference/soups2018/presentation/parkGoogle ScholarGoogle Scholar
  22. Supriya Singh, Anuja Cabraal, Catherine Demosthenous, Gunela Astbrink, and Michele Furlong. 2007. Password sharing. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 895–904. https://doi.org/10.1145/1240624.1240759Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Hue Watson, Eyitemi Moju-Igbene, Akanksha Kumari, and Sauvik Das. 2020. "We Hold Each Other Accountable": Unpacking How Social Groups Approach Cybersecurity and Privacy Together. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems, 1–12. https://doi.org/10.1145/3313831.3376605Google ScholarGoogle ScholarDigital LibraryDigital Library

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Conferences
    CHI EA '22: Extended Abstracts of the 2022 CHI Conference on Human Factors in Computing Systems
    April 2022
    3066 pages
    ISBN:9781450391566
    DOI:10.1145/3491101

    Copyright © 2022 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 28 April 2022

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • poster
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate6,164of23,696submissions,26%

    Upcoming Conference

    CHI '24
    CHI Conference on Human Factors in Computing Systems
    May 11 - 16, 2024
    Honolulu , HI , USA
  • Article Metrics

    • Downloads (Last 12 months)57
    • Downloads (Last 6 weeks)2

    Other Metrics

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format