“MY SMARTPHONE IS A SAFE!” - The User’s Point of View Regarding Novel Authentication Methods and Gradual Security Levels on Smartphones

Tim Dörflinger, Anna Voth, Juliane Krämer, Ronald Fromm

2010

Abstract

This paper addresses laboratory tests regarding a graded security system on smartphones based on novel authentication methods. The main scope of this paper is the user’s perception of and the need for such a system, rather than the technical dimensions of it. In November 2009 we conducted four focus groups with a total of n=19 respondents with the goal to evaluate different prototypical authentication methods for smartphones and to determine the effects such methods would have for the user’s interaction with the devices. The focus groups were part of a larger research program at Deutsche Telekom Laboratories that included a web survey measuring general user preferences regarding security and smartphone usage as well as the development of prototypical authentication methods based on Google’s “Android” operating system. The goal of this research was to integrate the user into the development process as soon as possible and to determine the overall acceptance of new authentication methods, such as biometric authentication, but also 2D and 3D gestures, recognition based authentication and password authentication. This paper gives valuable insights on the weakest link of the security chain: the user.

References

  1. Canalys, 2009. Smartphone market shows modest growth in Q3, Canalys research release 2009/112. URL: http://www.canalys.com/pr/2009/r2009112.htm, Last checked: 2009/12/04.
  2. Dilanchian, 2009. Smartphone statistics and links. URL: http://www.dilanchian.com.au/index.php?option=com _content&view=article&id=577:smartphone-statisticsand-links&catid=23:ip&Itemid=114, Last checked: 2010/01/13.
  3. Gartner, 2009. Gartner Says PC Vendors Eyeing Booming Smartphone Market. http://www.gartner.com/it/ page.jsp?id=1215932, Last checked: 2010/01/22
  4. International Organization for Standardisation ISO, 1998. Ergonomic requirements for office work with visual display terminals ISO 9241-11.
  5. Krueger, R. A. & Casey, M. A., 2000. Focus Groups: A practical guide for applied research, 3rd Edition. Sage: Thousand Oaks, California.
  6. McAffee, 2009. Mobile Security Report 2009. URL: http://www.mcafee.com/us/local_content/reports/mobi le_security_report_2009.pdf. Last checked: 2010/01/13.
  7. Reinhardt, A. b., Furnell, S. M. & Clarke, N. L., 2009. From desktop to mobile: examining the security experience. In: Computer & Security, pp. 130-137.
  8. Stewart, D. W., Shamdasani, P. N. & Rook, D. W, 2007. Focus Groups: Theory and practice. Sage: Thousand Oaks, California.
Download


Paper Citation


in Harvard Style

Dörflinger T., Voth A., Krämer J. and Fromm R. (2010). “MY SMARTPHONE IS A SAFE!” - The User’s Point of View Regarding Novel Authentication Methods and Gradual Security Levels on Smartphones . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 155-164. DOI: 10.5220/0002915701550164


in Bibtex Style

@conference{secrypt10,
author={Tim Dörflinger and Anna Voth and Juliane Krämer and Ronald Fromm},
title={“MY SMARTPHONE IS A SAFE!” - The User’s Point of View Regarding Novel Authentication Methods and Gradual Security Levels on Smartphones },
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={155-164},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002915701550164},
isbn={978-989-8425-18-8},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - “MY SMARTPHONE IS A SAFE!” - The User’s Point of View Regarding Novel Authentication Methods and Gradual Security Levels on Smartphones
SN - 978-989-8425-18-8
AU - Dörflinger T.
AU - Voth A.
AU - Krämer J.
AU - Fromm R.
PY - 2010
SP - 155
EP - 164
DO - 10.5220/0002915701550164