Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

AppMoD: Helping Older Adults Manage Mobile Security with Online Social Help

Published: 14 September 2020 Publication History

Abstract

The rapid adoption of Smartphone devices has caused increasing security and privacy risks and breaches. Catching up with ever-evolving contemporary smartphone technology challenges leads older adults (aged 50+) to reduce or to abandon their use of mobile technology. To tackle this problem, we present AppMoD, a community-based approach that allows delegation of security and privacy decisions a trusted social connection, such as a family member or a close friend. The trusted social connection can assist in the appropriate decision or make it on behalf of the user. We implement the approach as an Android app and describe the results of three user studies (n=50 altogether), in which pairs of older adults and family members used the app in a controlled experiment. Using app anomalies as an ongoing case study, we show how delegation improves the accuracy of decisions made by older adults. Also, we show how combining decision-delegation with crowdsourcing can enhance the advice given and improve the decision-making process. Our results suggest that a community-based approach can improve the state of mobile security and privacy.

Supplementary Material

wan (wan.zip)
Supplemental movie, appendix, image and software files for, AppMoD: Helping Older Adults Manage Mobile Security with Online Social Help

References

[1]
Yuvraj Agarwal and Malcolm Hall. 2013. ProtectMyPrivacy: detecting and mitigating privacy leaks on iOS devices using crowdsourcing. In Proceedings of the 11th Annual International Conference on Mobile systems, Applications, and Services. ACM, 97--110.
[2]
Z Aljallad. 2019. Designing a Mobile Application to Support Social Processes for Privacy. In Proceedings of the NDSS Workshop on Usable Security and Privacy.
[3]
Hussain MJ Almohri, Danfeng Daphne Yao, and Dennis Kafura. 2014. Droidbarrier: Know what is executing on your android. In Proceedings of the 4th ACM Conference on Data and Application Security and Privacy. ACM, 257--264.
[4]
Monica Anderson and Andrew Perrin. 2017. Tech adoption climbs among older adults. Pew Research Center (2017), 1--22.
[5]
Daniel Arp, Michael Spreitzenbarth, Malte Hubner, Hugo Gascon, Konrad Rieck, and CERT Siemens. 2014. Drebin: Effective and explainable detection of android malware in your pocket. In Proceedings of the Network and Distributed System Security Symposium (NDSS), Vol. 14. 23--26.
[6]
Vitalii Avdiienko, Konstantin Kuznetsov, Alessandra Gorla, Andreas Zeller, Steven Arzt, Siegfried Rasthofer, and Eric Bodden. 2015. Mining apps for abnormal usage of sensitive data. In Proceedings of the 37th International Conference on Software Engineering-Volume 1. IEEE Press, 426--436.
[7]
Oshrat Ayalon and Eran Toch. 2018. Crowdsourcing privacy design critique: An empirical evaluation of framing effects. In Proceedings of the 51st Hawaii International Conference on System Sciences.
[8]
Ron Bitton, Andrey Finkelshtein, Lior Sidi, Rami Puzis, Lior Rokach, and Asaf Shabtai. 2018. Taxonomy of mobile users' security awareness. Computers & Security 73 (2018), 266--293.
[9]
Tim Broady, Amy Chan, and Peter Caputi. 2010. Comparison of older and younger adults' attitudes towards and abilities with computers: Implications for training and learning. British Journal of Educational Technology 41, 3 (2010), 473--485.
[10]
Iker Burguera, Urko Zurutuza, and Simin Nadjm-Tehrani. 2011. Crowdroid: behavior-based malware detection system for android. In Proceedings of the 1st ACM workshop on Security and Privacy in Smartphones and Mobile Devices. ACM, 15--26.
[11]
Daniel Buschek, Sarah Völkel, Clemens Stachl, Lukas Mecke, Sarah Prange, and Ken Pfeuffer. 2018. Experience Sampling as Information Transmission: Perspective and Implications. In Proceedings of the ACM International Joint Conference and International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers. ACM, 606--611.
[12]
David Chan. 2009. So why ask me? Are self-report data really that bad. Statistical and Methodological Myths and Urban Legends: Doctrine, Verity and Fable in Organizational and Social Sciences (2009), 309--336.
[13]
Ke Chen and Alan Chan. 2013. Use or non-use of gerontechnology---A qualitative study. International Journal of Environmental Research and Public Health 10, 10 (2013), 4645--4666.
[14]
Yiwei Chen and Anna Persson. 2002. Internet use among young and older adults: Relation to psychological well-being. Educational Gerontology 28, 9 (2002), 731--744.
[15]
Michela Cozza, Antonella De Angeli, and Linda Tonolli. 2017. Ubiquitous technologies for older people. Personal and Ubiquitous Computing 21, 3 (2017), 607--619.
[16]
Leela Damodaran, CW Olphert, and Jatinder Sandhu. 2014. Falling off the bandwagon? Exploring the challenges to sustained digital engagement by older people. Gerontology 60, 2 (2014), 163--173.
[17]
Sauvik Das, Tiffany Hyun-Jin Kim, Laura A Dabbish, and Jason I Hong. 2014. The effect of social influence on security sensitivity. In Proceedings of the 10th Symposium On Usable Privacy and Security (SOUPS). 143--157.
[18]
Ana Correia de Barros, Roxanne Leitão, and Jorge Ribeiro. 2014. Design and evaluation of a mobile user interface for older adults: navigation, interaction and visual design recommendations. Procedia Computer Science 27 (2014), 369--378.
[19]
Adrienne Porter Felt, Elizabeth Ha, Serge Egelman, Ariel Haney, Erika Chin, and David Wagner. 2012. Android permissions: User attention, comprehension, and behavior. In Proceedings of the eighth symposium on usable privacy and security. ACM, 3.
[20]
Alisa Frik, Leysan Nurgalieva, Julia Bernd, Joyce Lee, Florian Schaub, and Serge Egelman. 2019. Privacy and security threat models and mitigation strategies of older adults. In Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS).
[21]
Alessandra Gorla, Ilaria Tavecchia, Florian Gross, and Andreas Zeller. 2014. Checking app behavior against app descriptions. In Proceedings of the 36th International Conference on Software Engineering. ACM, 1025--1035.
[22]
Dominik Hornung, Claudia Müller, Irina Shklovski, Timo Jakobi, and Volker Wulf. 2017. Navigating Relationships and Boundaries: Concerns Around ICT-uptake for Elderly People. In Proceedings of the CHI Conference on Human Factors in Computing Systems (CHI '17). ACM, New York, NY, USA, 7057--7069.
[23]
Peter Hornyack, Seungyeop Han, Jaeyeon Jung, Stuart Schechter, and David Wetherall. 2011. These aren't the droids you're looking for: retrofitting android to protect data from imperious applications. In Proceedings of the 18th ACM Conference on Computer and Communications Security. ACM, 639--652.
[24]
Qatrunnada Ismail, Tousif Ahmed, Apu Kapadia, and Michael K Reiter. 2015. Crowdsourced exploration of security configurations. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. ACM, 467--476.
[25]
Jonathan Joe and George Demiris. 2013. Older adults and mobile phones for health: a review. Journal of Biomedical Informatics 46, 5 (2013), 947--954.
[26]
Jaeyeon Jung, Seungyeop Han, and David Wetherall. 2012. Short paper: enhancing mobile application permissions with runtime feedback and constraints. In Proceedings of the 2nd ACM Workshop on Security and Privacy in Smartphones and Mobile Devices. ACM, 45--50.
[27]
Mayumi Karasawa, Katherine B Curhan, Hazel Rose Markus, Shinobu S Kitayama, Gayle Dienberg Love, Barry T Radler, and Carol D Ryff. 2011. Cultural perspectives on aging and well-being: A comparison of Japan and the United States. The International Journal of Aging and Human Development 73, 1 (2011), 73--98.
[28]
Lih-Jen Kau and Chih-Sheng Chen. 2015. A smart phone-based pocket fall accident detection, positioning, and rescue system. IEEE Journal of Biomedical and Health Informatics 19, 1 (2015), 44--56.
[29]
Patrick Gage Kelley, Sunny Consolvo, Lorrie Faith Cranor, Jaeyeon Jung, Norman Sadeh, and David Wetherall. 2012. A conundrum of permissions: installing applications on an android smartphone. In International Conference on Financial Cryptography and Data Security. Springer, 68--79.
[30]
Matthias Kranz, Andreas MöLler, Nils Hammerla, Stefan Diewald, Thomas PlöTz, Patrick Olivier, and Luis Roalter. 2013. The mobile fitness coach: Towards individualized skill assessment using personalized mobile devices. Pervasive and Mobile Computing 9, 2 (2013), 203--215.
[31]
Reed Larson and Mihaly Csikszentmihalyi. 2014. The experience sampling method. In Flow and the Foundations of Positive Psychology. Springer, 21--34.
[32]
Kenneth Leithwood and Doris Jantzi. 2008. Linking leadership to student learning: The contributions of leader efficacy. Educational Administration Quarterly 44, 4 (2008), 496--528.
[33]
Jialiu Lin, Shahriyar Amini, Jason I Hong, Norman Sadeh, Janne Lindqvist, and Joy Zhang. 2012. Expectation and purpose: understanding users' mental models of mobile app privacy through crowdsourcing. In Proceedings of the ACM conference on Ubiquitous Computing. ACM, 501--510.
[34]
Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Zhang, Norman Sadeh, Alessandro Acquisti, and Yuvraj Agarwal. 2016. Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. In Proceedings of the 12th Symposium on Usable Privacy and Security (SOUPS).
[35]
Bin Liu, Jialiu Lin, and Norman Sadeh. 2014. Reconciling mobile app privacy and usability on smartphones: Could user privacy profiles help?. In Proceedings of the 23rd International Conference on World Wide Web. ACM, 201--212.
[36]
Wiebke Maaß. 2011. The elderly and the Internet: How senior citizens deal with online privacy. In Privacy online. Springer, 235--249.
[37]
Tamir Mendel and Eran Toch. 2017. Susceptibility to social influence of privacy behaviors: Peer versus authoritative sources. In Proceedings of the ACM Conference on Computer Supported Cooperative Work and Social Computing. ACM, 581--593.
[38]
Tamir Mendel and Eran Toch. 2019. Social help: developing methods to support older adults in mobile privacy and security. Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies.
[39]
Tracy L Mitzner, Julie B Boron, Cara Bailey Fausset, Anne E Adams, Neil Charness, Sara J Czaja, Katinka Dijkstra, Arthur D Fisk, Wendy A Rogers, and Joseph Sharit. 2010. Older adults talk technology: Technology usage and attitudes. Computers in Human Behavior 26, 6 (2010), 1710--1721.
[40]
Alexios Mylonas, Marianthi Theoharidou, and Dimitris Gritzalis. 2013. Assessing privacy risks in android: A user-centric approach. In Proceedings of the International Workshop on Risk Assessment and Risk-driven Testing. Springer, 21--37.
[41]
Tobias Nef, Raluca L Ganea, René M Müri, and Urs P Mosimann. 2013. Social networking sites and older users-a systematic review. International Psychogeriatrics 25, 7 (2013), 1041--1053.
[42]
James Nicholson, Lynne Coventry, and Pamela Briggs. 2019. If It's Important It Will Be A Headline: Cybersecurity Information Seeking in Older Adults. In Proceedings of the CHI Conference on Human Factors in Computing Systems. ACM, 349.
[43]
Kenneth Olmstead and Aaron Smith. 2017. What the public knows about cybersecurity. Pew Research Center 22 (2017).
[44]
Samantha J Parker, Sonal Jessel, Joshua E Richardson, and M Cary Reid. 2013. Older adults are mobile too! Identifying the barriers and facilitators to older adults' use of mHealth for pain management. BMC geriatrics 13, 1 (2013), 43.
[45]
Sebastiaan TM Peek, Katrien G Luijkx, Maurice D Rijnaard, Marianne E Nieboer, Claire S van der Voort, Sil Aarts, Joost van Hoof, Hubertus JM Vrijhoef, and Eveline JM Wouters. 2016. Older adults' reasons for using technology while aging in place. Gerontology 62, 2 (2016), 226--237.
[46]
Bahman Rashidi, Carol Fung, and Tam Vu. 2016. Android fine-grained permission control system with real-time expert recommendations. Pervasive and Mobile Computing 32 (2016), 62--77.
[47]
Elissa M Redmiles, Sean Kross, and Michelle L Mazurek. 2016. How I learned to be secure: a census-representative survey of security advice sources and behavior. In Proceedings of the ACM SIGSAC conference on Computer and Communications Security. ACM, 666--677.
[48]
Elissa M Redmiles, Amelia R Malone, and Michelle L Mazurek. 2016. I think they're trying to tell me something: Advice sources and selection for digital security. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 272--288.
[49]
Talia Ringer, Dan Grossman, and Franziska Roesner. 2016. Audacious: User-driven access control with unmodified operating systems. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 204--216.
[50]
Franziska Roesner and Tadayoshi Kohno. 2013. Securing embedded user interfaces: Android and beyond. In Proceedings of the 22nd USENIX Conference on Security. USENIX Association, 97--112.
[51]
Franziska Roesner, Tadayoshi Kohno, Alexander Moshchuk, Bryan Parno, Helen J Wang, and Crispin Cowan. 2012. User-driven access control: Rethinking permission granting in modern operating systems. In Proceedings of the IEEE Symposium on Security and privacy. IEEE, 224--238.
[52]
Jialiu Lin Bin Liu Norman Sadeh and Jason I Hong. 2014. Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS).
[53]
Asaf Shabtai, Uri Kanonov, Yuval Elovici, Chanan Glezer, and Yael Weiss. 2012. "Andromaly": a behavioral malware detection framework for android devices. Journal of Intelligent Information Systems 38, 1 (2012), 161--190.
[54]
Bilal Shebaro, Oyindamola Oluwatimi, Daniele Midi, and Elisa Bertino. 2014. IdentiDroid: Android can finally Wear its Anonymous Suit. Transactions on Data Privacy 7, 1 (2014), 27--50.
[55]
Deógenes P Silva Junior, Patricia Cristiane de Souza, and Thaíres A de Jesus Gonçalves. 2018. Early Privacy: Approximating Mental Models in the Definition of Privacy Requirements in Systems Design. In Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems. ACM, 19.
[56]
Hwee Lee Tan. 2018. Safety and Privacy of Smart-City Mobile Applications through Model Inference. MAIS Capstone Project Reports (Main, User Study, System Documentation) (2018).
[57]
Wei Tang, Guang Jin, Jiaming He, and Xianliang Jiang. 2011. Extending Android security enforcement with a security distance model. In Proceedings of the International Conference on Internet Technology and Applications. IEEE, 1--4.
[58]
Kyle Taylor and Laura Silver. 2019. Smartphone Ownership Is Growing Rapidly Around the World, but Not Always Equally. Pew Research Center (FEBRUARY 5Th 2019) (2019), 1--46.
[59]
Ilaria Torre, Odnan Ref Sanchez, Frosina Koceva, and Giovanni Adorni. 2018. Supporting users to take informed decisions on privacy settings of personal devices. Personal and Ubiquitous Computing 22, 2 (2018), 345--364.
[60]
Lynn Tsai, Primal Wijesekera, Joel Reardon, Irwin Reyes, Serge Egelman, David Wagner, Nathan Good, and Jung-Wei Chen. 2017. Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences. In Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS).
[61]
Niels van Berkel, Denzil Ferreira, and Vassilis Kostakos. 2017. The Experience Sampling Method on Mobile Devices. ACM Computing Surveys (CSUR) 50, 6, Article 93 (Dec. 2017), 40 pages.
[62]
Yang Wang. 2017. The third wave?: Inclusive privacy and security. In Proceedings of the New Security Paradigms Workshop. ACM, 122--130.
[63]
Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David Wagner, and Konstantin Beznosov. 2015. Android Permissions Remystified: A Field Study on Contextual Integrity. In Proceedings of the USENIX Security Symposium. 499--514.
[64]
Primal Wijesekera, Arjun Baokar, Lynn Tsai, Joel Reardon, Serge Egelman, David Wagner, and Konstantin Beznosov. 2017. The feasibility of dynamically granted permissions: Aligning mobile privacy with user preferences. In Proceedings of the 2017 IEEE Symposium on Security and Privacy. IEEE, 1077--1093.
[65]
Primal Wijesekera, Joel Reardon, Irwin Reyes, Lynn Tsai, Jung-Wei Chen, Nathan Good, David Wagner, Konstantin Beznosov, and Serge Egelman. 2018. Contextualizing Privacy Decisions for Better Prediction (and Protection). In Proceedings of the CHI Conference on Human Factors in Computing Systems. ACM, 268.
[66]
Frank Wilcoxon. 1945. Individual comparisons by ranking methods. Biometrics bulletin 1, 6 (1945), 80--83.
[67]
Bo Xie, Ivan Watkins, Jen Golbeck, and Man Huang. 2012. Understanding and changing older adults' perceptions and learning of social media. Educational Gerontology 38, 4 (2012), 282--296.
[68]
Eva-Maria Zeissig, Chantal Lidynia, Luisa Vervier, Andera Gadeib, and Martina Ziefle. 2017. Online privacy perceptions of older adults. In Proceedings of the International Conference on Human Aspects of IT for the Aged Population. Springer, 181--200.
[69]
Hengshu Zhu, Hui Xiong, Yong Ge, and Enhong Chen. 2014. Mobile app recommendations with security and privacy awareness. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 951--960.

Cited By

View all
  • (2024)Impact of Workplace Social Connections on Employee Wellbeing and HappinessInsights on Wellbeing and Happiness in the Workplace10.4018/979-8-3693-2939-9.ch006(109-130)Online publication date: 27-Dec-2024
  • (2024)Evaluating Privacy & Security of Online Dating Applications with a Focus on Older AdultsSSRN Electronic Journal10.2139/ssrn.4828190Online publication date: 2024
  • (2024)EasyAsk: An In-App Contextual Tutorial Search Assistant for Older Adults with Voice and Touch InputsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36785168:3(1-27)Online publication date: 9-Sep-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies  Volume 3, Issue 4
December 2019
873 pages
EISSN:2474-9567
DOI:10.1145/3375704
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 September 2020
Published in IMWUT Volume 3, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Mobile smartphones
  2. decision delegation
  3. older adults
  4. security

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)85
  • Downloads (Last 6 weeks)8
Reflects downloads up to 05 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Impact of Workplace Social Connections on Employee Wellbeing and HappinessInsights on Wellbeing and Happiness in the Workplace10.4018/979-8-3693-2939-9.ch006(109-130)Online publication date: 27-Dec-2024
  • (2024)Evaluating Privacy & Security of Online Dating Applications with a Focus on Older AdultsSSRN Electronic Journal10.2139/ssrn.4828190Online publication date: 2024
  • (2024)EasyAsk: An In-App Contextual Tutorial Search Assistant for Older Adults with Voice and Touch InputsProceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies10.1145/36785168:3(1-27)Online publication date: 9-Sep-2024
  • (2024)Development and Evaluation of the Mobile Tech Support Questionnaire for Older AdultsProceedings of the 26th International ACM SIGACCESS Conference on Computers and Accessibility10.1145/3663548.3675661(1-18)Online publication date: 27-Oct-2024
  • (2024)Just-In-Time TODO-Missed Commits DetectionIEEE Transactions on Software Engineering10.1109/TSE.2024.340500550:11(2732-2752)Online publication date: Nov-2024
  • (2024)Evaluating Privacy & Security of Online Dating Applications with a Focus on Older Adults2024 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)10.1109/EuroSPW61312.2024.00081(666-677)Online publication date: 8-Jul-2024
  • (2023)Characterizing the Technology Needs of Vulnerable Populations for Participation in Research and Design by Adopting Maslow’s Hierarchy of NeedsProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581221(1-20)Online publication date: 19-Apr-2023
  • (2023)Social Support for Mobile Security: Comparing Close Connections and Community Volunteers in a Field ExperimentProceedings of the 2023 CHI Conference on Human Factors in Computing Systems10.1145/3544548.3581183(1-18)Online publication date: 19-Apr-2023
  • (2023)Building of safer urban hubs: Insights from a comparative study on cyber telecom scams and early warning designUrban Governance10.1016/j.ugj.2023.05.0043:3(200-210)Online publication date: Sep-2023
  • (2022)“I Used To Carry A Wallet, Now I Just Need To Carry My Phone”: Understanding Current Banking Practices and Challenges Among Older Adults in ChinaProceedings of the 24th International ACM SIGACCESS Conference on Computers and Accessibility10.1145/3517428.3544820(1-16)Online publication date: 23-Oct-2022
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media