Reflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices

Reflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices

Sonia Chiasson, Heather Crawford, Serge Egelman, Pourang Irani
Copyright: © 2014 |Volume: 6 |Issue: 2 |Pages: 6
ISSN: 1942-390X|EISSN: 1942-3918|EISBN13: 9781466655669|DOI: 10.4018/ijmhci.2014040106
Cite Article Cite Article

MLA

Chiasson, Sonia, et al. "Reflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices." IJMHCI vol.6, no.2 2014: pp.73-78. http://doi.org/10.4018/ijmhci.2014040106

APA

Chiasson, S., Crawford, H., Egelman, S., & Irani, P. (2014). Reflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices. International Journal of Mobile Human Computer Interaction (IJMHCI), 6(2), 73-78. http://doi.org/10.4018/ijmhci.2014040106

Chicago

Chiasson, Sonia, et al. "Reflections on U-PriSM 2: The Second Workshop on Usable Privacy and Security for Mobile Devices," International Journal of Mobile Human Computer Interaction (IJMHCI) 6, no.2: 73-78. http://doi.org/10.4018/ijmhci.2014040106

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

The Second Usable Privacy and Security for Mobile Devices Workshop (U-PriSM 2) was co-located with MobileHCI'13 in Munich, Germany. The U-PriSM 2 was an opportunity for researchers and practitioners to discuss research challenges and experiences around the usable privacy and security of mobile devices (smartphones and tablets). Security and privacy often involve having non-security experts, or even novice users, regularly making important decisions while their main focus is on other primary tasks. This is especially true for mobile devices where users can quickly and easily install apps, where user interfaces are minimal due to space constraints, and where users are often distracted by their environment. Likewise, mobile devices present unique privacy and security risks because they allow third-party applications access to personal information and sensor data. The amount and sensitivity of such personally identifying information is likely to increase as device functionality increases. The convergence of these factors means that improvements to security and privacy provisions on mobile devices are becoming increasingly important. Workshop participants had a chance to explore mobile device usage and the unique usable security and privacy challenges that arise, discuss proposed systems and ideas that address these needs, and work towards the development of design principles to inform future development in the area.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.