On the need for different security methods on mobile phones

Noam Ben-Asher, Niklas Kirschnick, Hanul Sieger, Joachim Meyer, Asaf Ben-Oved, Sebastian Möller

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Mobile phones are rapidly becoming small-size general purpose computers, so-called smartphones. However, applications and data stored on mobile phones are less protected from unauthorized access than on most desktop and mobile computers. This paper presents a survey on users' security needs, awareness and concerns in the context of mobile phones. It also evaluates acceptance and perceived protection of existing and novel authentication methods. The responses from 465 participants reveal that users are interested in increased security and data protection. The current protection by using PIN (Personal Identification Number) is perceived as neither adequate nor convenient in all cases. The sensitivity of data stored on the devices varies depending on the data type and the context of use, asking for the need for another level of protection. According to these findings, a two-level security model for mobile phones is proposed. The model provides differential data and service protection by utilizing existing capabilities of a mobile phone for authenticating users.

Original languageAmerican English
Title of host publicationMobile HCI 2011 - 13th International Conference on Human-Computer Interaction with Mobile Devices and Services
Pages465-473
Number of pages9
DOIs
StatePublished - 27 Oct 2011
Event13th International Conference on Human-Computer Interaction with Mobile Devices and Services, Mobile HCI 2011 - Stockholm, Sweden
Duration: 30 Aug 20112 Sep 2011

Publication series

NameMobile HCI 2011 - 13th International Conference on Human-Computer Interaction with Mobile Devices and Services

Conference

Conference13th International Conference on Human-Computer Interaction with Mobile Devices and Services, Mobile HCI 2011
Country/TerritorySweden
CityStockholm
Period30/08/112/09/11

Keywords

  • authentication
  • authentication methods
  • data protection
  • graded security model
  • mobile phone security
  • survey

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Human-Computer Interaction

Fingerprint

Dive into the research topics of 'On the need for different security methods on mobile phones'. Together they form a unique fingerprint.

Cite this