It Takes a Village: A Case for Including Extended Family Members in the Joint Oversight of Family-based Privacy and Security for Mobile Smartphones (2306.02287v2)
Abstract: We conducted a user study with 19 parent-teen dyads to understand the perceived benefits and drawbacks of using a mobile app that allows them to co-manage mobile privacy, safety, and security within their families. While the primary goal of the study was to understand the use case as it pertained to parents and teens, an emerging finding from our study was that participants found value in extending app use to other family members (siblings, cousins, and grandparents). Participants felt that it would help bring the necessary expertise into their immediate family network and help protect the older adults and children of the family from privacy and security risks. However, participants expressed that co-monitoring by extended family members might cause tensions in their families, creating interpersonal conflicts. To alleviate these concerns, participants suggested more control over the privacy features to facilitate sharing their installed apps with only trusted family members.
- CO-OPS: A Mobile App for Community Oversight of Privacy and Security. In Companion Publication of the 2022 Conference on Computer Supported Cooperative Work and Social Computing (Virtual Event, Taiwan) (CSCW’22 Companion). Association for Computing Machinery, New York, NY, USA, 179–183. https://doi.org/10.1145/3500868.3559706
- From Parental Control to Joint Family Oversight: Can Parents and Teens Manage Mobile Online Safety and Privacy as Equals? Proc. ACM Hum.-Comput. Interact. 6, CSCW1, Article 57 (apr 2022), 28 pages. https://doi.org/10.1145/3512904
- Designing a Mobile Application to Support Social Processes for Privacy (Journal Article) | DOE PAGES. https://par.nsf.gov/biblio/10097722
- Permission vs. App Limiters: Profiling Smartphone Users to Understand Differing Strategies for Mobile Privacy Management. In Proceedings of the 2022 CHI Conference on Human Factors in Computing Systems (New Orleans, LA, USA) (CHI ’22). Association for Computing Machinery, New York, NY, USA, Article 406, 18 pages. https://doi.org/10.1145/3491102.3517652
- Monica Anderson. 2015. Mobile apps, privacy and permissions: 5 key takeaways. https://www.pewresearch.org/fact-tank/2015/11/10/key-takeaways-mobile-apps/
- Michelle Atkinson. 2015. Majority of U.S. Smartphone Owners Download Apps. https://www.pewresearch.org/internet/2015/11/10/the-majority-of-smartphone-owners-download-apps/
- Towards Assets-based Approaches for Adolescent Online Safety. In Badillo-Urquiola, Agha, Z., Akter, K., Wisniewski, P.,(2020)“Towards Assets-Based Approaches for Adolescent Online Safety” Extended Abstract presented at the ACM Conference on Computer-Supported Cooperative Work Workshop on Operationalizing an Assets-Based Design of Technology,(CSCW 2020).
- Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77–101.
- Automatically Granted Permissions in Android apps: An Empirical Study on their Prevalence and on the Potential Threats for Privacy. In Proceedings of the 17th International Conference on Mining Software Repositories (MSR ’20). Association for Computing Machinery, New York, NY, USA, 114–124. https://doi.org/10.1145/3379597.3387469
- Co-designing for Community Oversight: Helping People Make Privacy and Security Decisions Together. Proceedings of the ACM on Human-Computer Interaction 3, CSCW (Nov. 2019), 1–31. https://doi.org/10.1145/3359248
- Brokering new technologies: The role of children in their parents’ usage of the internet - Teresa Correa, Joseph D Straubhaar, Wenhong Chen, Jeremiah Spence, 2015. https://journals.sagepub.com/doi/10.1177/1461444813506975
- The effect of social influence on security sensitivity. In Proceedings of the Tenth USENIX Conference on Usable Privacy and Security (SOUPS ’14). USENIX Association, Menlo Park, CA, 143–157.
- The Role of Social Influence in Security Feature Adoption. In Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing (CSCW ’15). Association for Computing Machinery, Vancouver, BC, Canada, 1416–1426. https://doi.org/10.1145/2675133.2675225
- Android permissions: user attention, comprehension, and behavior. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS ’12). Association for Computing Machinery, New York, NY, USA, 1–14. https://doi.org/10.1145/2335356.2335360
- Securacy: an empirical investigation of Android applications’ network usage, privacy and security. In Proceedings of the 8th ACM Conference on Security & Privacy in Wireless and Mobile Networks (WiSec ’15). Association for Computing Machinery, New York, NY, USA, 1–11. https://doi.org/10.1145/2766498.2766506
- To Disclose or Not to Disclose: Examining the Privacy Decision-Making Processes of Older vs. Younger Adults. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (Yokohama, Japan) (CHI ’21). Association for Computing Machinery, New York, NY, USA, Article 686, 14 pages. https://doi.org/10.1145/3411764.3445204
- Privacy as part of the app decision-making process. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI ’13). Association for Computing Machinery, New York, NY, USA, 3393–3402. https://doi.org/10.1145/2470654.2466466
- Troubles With the Internet: The Dynamics of Help at Home. Human–Computer Interaction 15, 4 (Dec. 2000), 323–351. https://doi.org/10.1207/S15327051HCI1504_2
- Towards Building Community Collective Efficacy for Managing Digital Privacy and Security within Older Adult Communities. Proceedings of the ACM on Human-Computer Interaction 4, CSCW3 (Jan. 2021), 255:1–255:27. https://doi.org/10.1145/3432954
- Examining Collaborative Support for Privacy and Security in the Broader Context of Tech Caregiving. Proc. ACM Hum.-Comput. Interact. 5, CSCW2, Article 396 (oct 2021), 23 pages. https://doi.org/10.1145/3479540
- Demographics of Mobile Device Ownership and Adoption in the United States. https://www.pewresearch.org/internet/fact-sheet/mobile/
- Privacy Attitudes and COVID Symptom Tracking Apps: Understanding Active Boundary Management by Users. In Information for a Better World: Shaping the Global Future, Malte Smits (Ed.). Springer International Publishing, Cham, 332–346.
- Emilee Rader and Rick Wash. 2015. Identifying patterns in informal sources of security information. Journal of Cybersecurity 1, 1 (Sept. 2015), 121–144. https://doi.org/10.1093/cybsec/tyv008 Publisher: Oxford Academic.
- Stories as informal lessons about security. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS ’12). Association for Computing Machinery, Washington, D.C., 1–17. https://doi.org/10.1145/2335356.2335364
- 50 Ways to Leak Your Data: An Exploration of Apps’ Circumvention of the Android Permissions System. 603–620. https://www.usenix.org/conference/usenixsecurity19/presentation/reardon
- Stuart Schechter and Joseph Bonneau. 2015. Learning Assigned Secrets for Unlocking Mobile Devices. In ” ” (2015). USENIX, ” ”, 277–295. https://www.usenix.org/conference/soups2015/proceedings/presentation/schechter
- Bill Van Parys. 2019. You don’t need to be tech savvy to be a tech caregiver. https://www.fastcompany.com/90438110/you-dont-need-to-be-tech-savvy-to-be-a-tech-caregiver
- Emily A. Vogels and Monica Anderson. 2019. Americans and Digital Knowledge. Pew Research (Oct. 2019). https://www.pewresearch.org/internet/2019/10/09/americans-and-digital-knowledge/
- Mamtaj Akter (16 papers)
- Leena Alghamdi (5 papers)
- Jess Kropczynski (10 papers)
- Heather Lipford (6 papers)
- Pamela Wisniewski (25 papers)