Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1460563.1460666acmconferencesArticle/Chapter ViewAbstractPublication PagescscwConference Proceedingsconference-collections
research-article

Family accounts: a new paradigm for user accounts within the home environment

Published: 08 November 2008 Publication History

Abstract

In this paper we present Family Accounts, a new user account model for shared home computers. We conducted a study with sixteen families, eight who used individual profiles at home, and eight who shared a single profile. Our results demonstrate that Family Accounts is a good compromise between a single shared profile and individual profiles for each family member. In particular, we observed that because Family Accounts allowed individuals to switch profiles without forcing them to interrupt their tasks, family members tended to switch to their own profiles only when a task required some degree of privacy or personalization.

References

[1]
Adams, Anne and Sasse, M. Angela. Users are not the enemy: Why Users Compromise Computer Security Mechanisms and How to Take Remedial Measures. Communications of the ACM, 42(12). New York, NY, USA: ACM (1999), pp. 41--46.
[2]
Baecker, Ronald M. Readings in GroupWare and Computer-Supported Cooperative Work: Assisting Human-Human Collaboration. San Francisco, CA, USA: Morgan Kaufmann Publishers Inc. (1994).
[3]
Brush, A. J. Bernheim and Inkpen, Kori M. Yours, Mine and Ours? Sharing and Use of Technology in Domestic Environments. UbiComp 2007: Ubiquitous Computing. {ed.} John Krumm. Berlin: Springer-Verlag (2007), pp. 109--126.
[4]
Dewan, Prasun and Shen, Honghai. Controlling Access in Multiuser Interfaces. ACM Transactions on Computer-Human Interaction (ToCHI), 5(1). New York, NY, USA: ACM (1998), pp. 34--62.
[5]
Frohlich, D. M. and Kraut, R. The Social Context of Home Computing. Inside the Smart Home. {ed.} R. Harper. London: Springer-Verlag (2003), pp. 127--162.
[6]
Good, N. S. and Krekelberg, A. Usability and Privacy: A Study of Kazaa P2P File-Sharing. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI 2003). New York, NY, USA: ACM Press (2003), pp. 137--144.
[7]
Horrigan, John B. and Smith, Aaron. Home Broadband Adoption 2007. Pew Internet & American Life Project, 2007. http://www.pewinternet.org/PPF/r/217/report_display.asp (Accessed: March 21, 2008).
[8]
Kraut, Robert, Scherlis, William, Mukhopadhyay, Tridas, Manning, Jane, and Kiesler, Sara. HomeNet: A Field Trial of Residential Internet Services. CHI '96: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York, NY, USA: ACM (1996), pp. 284--291.
[9]
Lampson, Butler W. Protection. ACM SIGOPS Operating Systems Review. New York, NY, USA: ACM (January, 1974), pp. 18--24.
[10]
Lutters, Rosa R. and Heckle, Wayne G. Privacy Implications for Single Sign-on Authentication In a Hospital Environment. Symposium On Usable Privacy and Security (SOUPS). New York, NY, USA: ACM (2007), pp. 173--174.
[11]
Maxion, Roy A. and Reeder, Robert W. Improving User-Interface Dependability through Mitigation of Human Error. International Journal of Human-Computer Studies, 62(1). Amsterdam, The Netherlands: Elsevier Science Publishing (2005), pp. 25--50.
[12]
Sandhu, Ravi, Ranganathan, Kumar and Zhang, Xinwen. Secure Information Sharing Enabled by Trusted Computing and PEI Models. ASIACCS '06: Proceedings of the first ACM Symposium on Information, Computer and Communications Security. New York, NY, USA: ACM (2006).
[13]
Singh, Supriya, Cabraal, Anuja, Demosthenous, Catherine, Astbrink, Gunela, and Furlong, Michael. Password Sharing: Implications for security design based on social practice. In Proceedings of the ACM Conference on Human Factors in Computing Systems (CHI 2007). New York, NY, USA: ACM Press (2007), pp. 895--904.
[14]
U.S. Senate Sergeant at Arms. Report on the investigation into improper access to the Senate Judiciary Committee's computer system. United States Senate Committee on the Judiciary, March 4, 2004. http://judiciary.senate.gov/testimony.cfm?id=1085&wit_id=2514 (Accessed: March 21, 2008).
[15]
Venkatesh, Alladi. Computer and Other Interactive Technologies for the Home.Communications of the ACM, 39(12). New York, NY, USA: ACM (December 1996), pp. 47--54.
[16]
Zurko, Mary Ellen and Simon, Richard T. User-Centered Security. In Proceedings of the 1996 Workshop on New Security Paradigms. New York, NY, USA: ACM (1996), pp. 27--33.

Cited By

View all
  • (2024)Making of an Adaptive Podcast that Engenders Trust through Data NegotiabilityProceedings of the 2024 ACM International Conference on Interactive Media Experiences10.1145/3639701.3663634(334-341)Online publication date: 7-Jun-2024
  • (2023)CREBAS: Enabling Network Access Control in a Home with One ClickJournal of Information Processing10.2197/ipsjjip.31.17431(174-184)Online publication date: 2023
  • (2023)Supporting from the Background: How a Mobile Application for Parent Skills Development Encourages Authoritative ParentingCompanion Publication of the 2023 Conference on Computer Supported Cooperative Work and Social Computing10.1145/3584931.3606969(105-111)Online publication date: 14-Oct-2023
  • Show More Cited By

Index Terms

  1. Family accounts: a new paradigm for user accounts within the home environment

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CSCW '08: Proceedings of the 2008 ACM conference on Computer supported cooperative work
      November 2008
      752 pages
      ISBN:9781605580074
      DOI:10.1145/1460563
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 08 November 2008

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. access control
      2. file sharing
      3. home computers
      4. personalization
      5. ubiquitous computing
      6. user account models

      Qualifiers

      • Research-article

      Conference

      CSCW08
      Sponsor:
      CSCW08: Computer Supported Cooperative Work
      November 8 - 12, 2008
      CA, San Diego, USA

      Acceptance Rates

      Overall Acceptance Rate 2,235 of 8,521 submissions, 26%

      Upcoming Conference

      CSCW '25

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)10
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 30 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Making of an Adaptive Podcast that Engenders Trust through Data NegotiabilityProceedings of the 2024 ACM International Conference on Interactive Media Experiences10.1145/3639701.3663634(334-341)Online publication date: 7-Jun-2024
      • (2023)CREBAS: Enabling Network Access Control in a Home with One ClickJournal of Information Processing10.2197/ipsjjip.31.17431(174-184)Online publication date: 2023
      • (2023)Supporting from the Background: How a Mobile Application for Parent Skills Development Encourages Authoritative ParentingCompanion Publication of the 2023 Conference on Computer Supported Cooperative Work and Social Computing10.1145/3584931.3606969(105-111)Online publication date: 14-Oct-2023
      • (2022)Protecting The VulnerableProceedings of the ACM on Human-Computer Interaction10.1145/35556476:CSCW2(1-26)Online publication date: 11-Nov-2022
      • (2022)"I Never Imagined Grandma Could Do So Well with Technology"Proceedings of the ACM on Human-Computer Interaction10.1145/35555796:CSCW2(1-29)Online publication date: 11-Nov-2022
      • (2022)An Exploration of Account Sharing Practices on Media PlatformsProceedings of the 2022 ACM International Conference on Interactive Media Experiences10.1145/3505284.3529974(141-150)Online publication date: 21-Jun-2022
      • (2022)“Where lots of people are sharing one thing, as soon as one person does something slightly different it can impact everyone” : A Formative Exploration of User Challenges and Expectations around Sharing of Accounts OnlineExtended Abstracts of the 2022 CHI Conference on Human Factors in Computing Systems10.1145/3491101.3519807(1-6)Online publication date: 27-Apr-2022
      • (2022)SoK: Social Cybersecurity2022 IEEE Symposium on Security and Privacy (SP)10.1109/SP46214.2022.9833757(1863-1879)Online publication date: May-2022
      • (2022)Capability Based Network Access Control for Smart Home Devices2022 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops)10.1109/PerComWorkshops53856.2022.9767368(551-556)Online publication date: 21-Mar-2022
      • (2021)“We, three brothers have always known everything of each other”: A Cross-cultural Study of Sharing Digital Devices and Online AccountsProceedings on Privacy Enhancing Technologies10.2478/popets-2021-00672021:4(203-224)Online publication date: 23-Jul-2021
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media