Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
119 tokens/sec
GPT-4o
56 tokens/sec
Gemini 2.5 Pro Pro
43 tokens/sec
o3 Pro
6 tokens/sec
GPT-4.1 Pro
47 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

It Takes a Village: A Case for Including Extended Family Members in the Joint Oversight of Family-based Privacy and Security for Mobile Smartphones (2306.02287v2)

Published 4 Jun 2023 in cs.HC

Abstract: We conducted a user study with 19 parent-teen dyads to understand the perceived benefits and drawbacks of using a mobile app that allows them to co-manage mobile privacy, safety, and security within their families. While the primary goal of the study was to understand the use case as it pertained to parents and teens, an emerging finding from our study was that participants found value in extending app use to other family members (siblings, cousins, and grandparents). Participants felt that it would help bring the necessary expertise into their immediate family network and help protect the older adults and children of the family from privacy and security risks. However, participants expressed that co-monitoring by extended family members might cause tensions in their families, creating interpersonal conflicts. To alleviate these concerns, participants suggested more control over the privacy features to facilitate sharing their installed apps with only trusted family members.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (28)
  1. CO-OPS: A Mobile App for Community Oversight of Privacy and Security. In Companion Publication of the 2022 Conference on Computer Supported Cooperative Work and Social Computing (Virtual Event, Taiwan) (CSCW’22 Companion). Association for Computing Machinery, New York, NY, USA, 179–183. https://doi.org/10.1145/3500868.3559706
  2. From Parental Control to Joint Family Oversight: Can Parents and Teens Manage Mobile Online Safety and Privacy as Equals? Proc. ACM Hum.-Comput. Interact. 6, CSCW1, Article 57 (apr 2022), 28 pages. https://doi.org/10.1145/3512904
  3. Designing a Mobile Application to Support Social Processes for Privacy (Journal Article) | DOE PAGES. https://par.nsf.gov/biblio/10097722
  4. Permission vs. App Limiters: Profiling Smartphone Users to Understand Differing Strategies for Mobile Privacy Management. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (New Orleans, LA, USA) (CHI ’22). Association for Computing Machinery, New York, NY, USA, Article 406, 18 pages. https://doi.org/10.1145/3491102.3517652
  5. Monica Anderson. 2015. Mobile apps, privacy and permissions: 5 key takeaways. https://www.pewresearch.org/fact-tank/2015/11/10/key-takeaways-mobile-apps/
  6. Michelle Atkinson. 2015. Majority of U.S. Smartphone Owners Download Apps. https://www.pewresearch.org/internet/2015/11/10/the-majority-of-smartphone-owners-download-apps/
  7. Towards Assets-based Approaches for Adolescent Online Safety. In Badillo-Urquiola, Agha, Z., Akter, K., Wisniewski, P.,(2020)“Towards Assets-Based Approaches for Adolescent Online Safety” Extended Abstract presented at the ACM Conference on Computer-Supported Cooperative Work Workshop on Operationalizing an Assets-Based Design of Technology,(CSCW 2020).
  8. Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77–101.
  9. Automatically Granted Permissions in Android apps: An Empirical Study on their Prevalence and on the Potential Threats for Privacy. In Proceedings of the 17th International Conference on Mining Software Repositories (MSR ’20). Association for Computing Machinery, New York, NY, USA, 114–124. https://doi.org/10.1145/3379597.3387469
  10. Co-designing for Community Oversight: Helping People Make Privacy and Security Decisions Together. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (Nov. 2019), 1–31. https://doi.org/10.1145/3359248
  11. Brokering new technologies: The role of children in their parents’ usage of the internet - Teresa Correa, Joseph D Straubhaar, Wenhong Chen, Jeremiah Spence, 2015. https://journals.sagepub.com/doi/10.1177/1461444813506975
  12. The effect of social influence on security sensitivity. In Proceedings of the Tenth USENIX Conference on Usable Privacy and Security (SOUPS ’14). USENIX Association, Menlo Park, CA, 143–157.
  13. The Role of Social Influence in Security Feature Adoption. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW ’15). Association for Computing Machinery, Vancouver, BC, Canada, 1416–1426. https://doi.org/10.1145/2675133.2675225
  14. Android permissions: user attention, comprehension, and behavior. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS ’12). Association for Computing Machinery, New York, NY, USA, 1–14. https://doi.org/10.1145/2335356.2335360
  15. Securacy: an empirical investigation of Android applications’ network usage, privacy and security. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec ’15). Association for Computing Machinery, New York, NY, USA, 1–11. https://doi.org/10.1145/2766498.2766506
  16. To Disclose or Not to Disclose: Examining the Privacy Decision-Making Processes of Older vs. Younger Adults. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (Yokohama, Japan) (CHI ’21). Association for Computing Machinery, New York, NY, USA, Article 686, 14 pages. https://doi.org/10.1145/3411764.3445204
  17. Privacy as part of the app decision-making process. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’13). Association for Computing Machinery, New York, NY, USA, 3393–3402. https://doi.org/10.1145/2470654.2466466
  18. Troubles With the Internet: The Dynamics of Help at Home. Human–Computer Interaction 15, 4 (Dec. 2000), 323–351. https://doi.org/10.1207/S15327051HCI1504_2
  19. Towards Building Community Collective Efficacy for Managing Digital Privacy and Security within Older Adult Communities. Proceedings of the ACM on Human-Computer Interaction 4, CSCW3 (Jan. 2021), 255:1–255:27. https://doi.org/10.1145/3432954
  20. Examining Collaborative Support for Privacy and Security in the Broader Context of Tech Caregiving. Proc. ACM Hum.-Comput. Interact. 5, CSCW2, Article 396 (oct 2021), 23 pages. https://doi.org/10.1145/3479540
  21. Demographics of Mobile Device Ownership and Adoption in the United States. https://www.pewresearch.org/internet/fact-sheet/mobile/
  22. Privacy Attitudes and COVID Symptom Tracking Apps: Understanding Active Boundary Management by Users. In Information for a Better World: Shaping the Global Future, Malte Smits (Ed.). Springer International Publishing, Cham, 332–346.
  23. Emilee Rader and Rick Wash. 2015. Identifying patterns in informal sources of security information. Journal of Cybersecurity 1, 1 (Sept. 2015), 121–144. https://doi.org/10.1093/cybsec/tyv008 Publisher: Oxford Academic.
  24. Stories as informal lessons about security. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS ’12). Association for Computing Machinery, Washington, D.C., 1–17. https://doi.org/10.1145/2335356.2335364
  25. 50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System. 603–620. https://www.usenix.org/conference/usenixsecurity19/presentation/reardon
  26. Stuart Schechter and Joseph Bonneau. 2015. Learning Assigned Secrets for Unlocking Mobile Devices. In ” ” (2015). USENIX, ” ”, 277–295. https://www.usenix.org/conference/soups2015/proceedings/presentation/schechter
  27. Bill Van Parys. 2019. You don’t need to be tech savvy to be a tech caregiver. https://www.fastcompany.com/90438110/you-dont-need-to-be-tech-savvy-to-be-a-tech-caregiver
  28. Emily A. Vogels and Monica Anderson. 2019. Americans and Digital Knowledge. Pew Research (Oct. 2019). https://www.pewresearch.org/internet/2019/10/09/americans-and-digital-knowledge/
User Edit Pencil Streamline Icon: https://streamlinehq.com
Authors (5)
  1. Mamtaj Akter (16 papers)
  2. Leena Alghamdi (5 papers)
  3. Jess Kropczynski (10 papers)
  4. Heather Lipford (6 papers)
  5. Pamela Wisniewski (25 papers)
Citations (13)

Summary

We haven't generated a summary for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com

Tweets