Understanding users' requirements for data protection in smartphones

Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, Jonathan Lester, Konstantin Beznosov

Research output: Chapter in Book/Report/Conference proceedingConference contribution

34 Citations (Scopus)

Abstract

Securing smartphones' data is a new and growing concern, especially when this data represents valuable or sensitive information. Even though there are many data protection solutions for smartphones, there are no studies that investigate users' requirements for such solutions. In this paper, we approach smartphones' data protection problem in a user-centric way, and analyze the requirements of data protection systems from users' perspectives. We elicit the data types that users desire to protect, investigate current users' practices in protecting such data, and show how security requirements vary for different data types. We report the results of an exploratory user study, where we interviewed 22 participants. Overall, we found that users would like to secure their smartphone data, but find it inconvenient to do so in practice using solutions available today.

Original languageEnglish
Title of host publicationProceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012
Pages228-235
Number of pages8
DOIs
Publication statusPublished - 2012
Externally publishedYes
Event2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012 - Arlington, VA, United States
Duration: 1 Apr 20125 Apr 2012

Other

Other2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012
CountryUnited States
CityArlington, VA
Period1/4/125/4/12

Fingerprint

Data privacy
Smartphones

ASJC Scopus subject areas

  • Software

Cite this

Muslukhov, I., Boshmaf, Y., Kuo, C., Lester, J., & Beznosov, K. (2012). Understanding users' requirements for data protection in smartphones. In Proceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012 (pp. 228-235). [6313685] https://doi.org/10.1109/ICDEW.2012.83

Understanding users' requirements for data protection in smartphones. / Muslukhov, Ildar; Boshmaf, Yazan; Kuo, Cynthia; Lester, Jonathan; Beznosov, Konstantin.

Proceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012. 2012. p. 228-235 6313685.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Muslukhov, I, Boshmaf, Y, Kuo, C, Lester, J & Beznosov, K 2012, Understanding users' requirements for data protection in smartphones. in Proceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012., 6313685, pp. 228-235, 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012, Arlington, VA, United States, 1/4/12. https://doi.org/10.1109/ICDEW.2012.83
Muslukhov I, Boshmaf Y, Kuo C, Lester J, Beznosov K. Understanding users' requirements for data protection in smartphones. In Proceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012. 2012. p. 228-235. 6313685 https://doi.org/10.1109/ICDEW.2012.83
Muslukhov, Ildar ; Boshmaf, Yazan ; Kuo, Cynthia ; Lester, Jonathan ; Beznosov, Konstantin. / Understanding users' requirements for data protection in smartphones. Proceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012. 2012. pp. 228-235
@inproceedings{1bf9d45778ff470895451fccfe15d36c,
title = "Understanding users' requirements for data protection in smartphones",
abstract = "Securing smartphones' data is a new and growing concern, especially when this data represents valuable or sensitive information. Even though there are many data protection solutions for smartphones, there are no studies that investigate users' requirements for such solutions. In this paper, we approach smartphones' data protection problem in a user-centric way, and analyze the requirements of data protection systems from users' perspectives. We elicit the data types that users desire to protect, investigate current users' practices in protecting such data, and show how security requirements vary for different data types. We report the results of an exploratory user study, where we interviewed 22 participants. Overall, we found that users would like to secure their smartphone data, but find it inconvenient to do so in practice using solutions available today.",
author = "Ildar Muslukhov and Yazan Boshmaf and Cynthia Kuo and Jonathan Lester and Konstantin Beznosov",
year = "2012",
doi = "10.1109/ICDEW.2012.83",
language = "English",
isbn = "9780769547480",
pages = "228--235",
booktitle = "Proceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012",

}

TY - GEN

T1 - Understanding users' requirements for data protection in smartphones

AU - Muslukhov, Ildar

AU - Boshmaf, Yazan

AU - Kuo, Cynthia

AU - Lester, Jonathan

AU - Beznosov, Konstantin

PY - 2012

Y1 - 2012

N2 - Securing smartphones' data is a new and growing concern, especially when this data represents valuable or sensitive information. Even though there are many data protection solutions for smartphones, there are no studies that investigate users' requirements for such solutions. In this paper, we approach smartphones' data protection problem in a user-centric way, and analyze the requirements of data protection systems from users' perspectives. We elicit the data types that users desire to protect, investigate current users' practices in protecting such data, and show how security requirements vary for different data types. We report the results of an exploratory user study, where we interviewed 22 participants. Overall, we found that users would like to secure their smartphone data, but find it inconvenient to do so in practice using solutions available today.

AB - Securing smartphones' data is a new and growing concern, especially when this data represents valuable or sensitive information. Even though there are many data protection solutions for smartphones, there are no studies that investigate users' requirements for such solutions. In this paper, we approach smartphones' data protection problem in a user-centric way, and analyze the requirements of data protection systems from users' perspectives. We elicit the data types that users desire to protect, investigate current users' practices in protecting such data, and show how security requirements vary for different data types. We report the results of an exploratory user study, where we interviewed 22 participants. Overall, we found that users would like to secure their smartphone data, but find it inconvenient to do so in practice using solutions available today.

UR - http://www.scopus.com/inward/record.url?scp=84869015230&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84869015230&partnerID=8YFLogxK

U2 - 10.1109/ICDEW.2012.83

DO - 10.1109/ICDEW.2012.83

M3 - Conference contribution

AN - SCOPUS:84869015230

SN - 9780769547480

SP - 228

EP - 235

BT - Proceedings - 2012 IEEE 28th International Conference on Data Engineering Workshops, ICDEW 2012

ER -