ABSTRACT
While previous work on smartphone (un)locking has revealed real world usage patterns, several aspects still need to be explored. In this paper, we fill one of these knowledge gaps: the interplay between age and smartphone authentication behavior. To do this, we performed a two-month long field study (N = 134). Our results indicate that there are indeed significant differences across age. For instance, younger participants were more likely to use biometric unlocking mechanisms and older participants relied more on auto locks.
Supplemental Material
Available for Download
Supplemental material includes our recruitment advertisement, which is a regular PDF file, and can be opened with Adobe Reader.
- Daniel Buschek, Fabian Hartmann, Emanuel von Zezschwitz, Alexander De Luca, and Florian Alt. 2016. SnapApp: Reducing Authentication Overhead with a Time-Constrained Fast Unlock Option. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 3736--3747. Google ScholarDigital Library
- Pew Research Center. 2013. Smartphone Ownership 2013. http://www.pewinternet.org/2013/06/05/smartphone-ownership-2013/Google Scholar
- Ivan Cherapau, Ildar Muslukhov, Nalin Asanka, and Konstantin Beznosov. 2015. On the Impact of Touch ID on iPhone Passcodes. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, 257--276. https://www.usenix.org/conference/soups2015/proceedings/presentation/cherapau Google ScholarDigital Library
- Wagner Daniel T, Rice Andrew, and Beresford Alastair R. 2014. Device Analyzer: Large-scale mobile data collection. ACM SIGMETRICS Performance Evaluation Review 41, 4 (2014), 53--56. Google ScholarDigital Library
- Serge Egelman, Sakshi Jain, Rebecca S. Portnoff, Kerwell Liao, Sunny Consolvo, and David Wagner. 2014. Are You Ready to Lock?. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS '14). ACM, New York, NY, USA, 750-- 761. Google ScholarDigital Library
- Marian Harbach, Alexander De Luca, and Serge Egelman. 2016. The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 4806-- 4817. Google ScholarDigital Library
- Marian Harbach, Alexander De Luca, Nathan Malkin, and Serge Egelman. 2016. Keep on Lockin' in the Free World: A Multi-National Comparison of Smartphone Locking. In Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems (CHI '16). ACM, New York, NY, USA, 4823--4827. Google ScholarDigital Library
- Marian Harbach, Emanuel von Zezschwitz, Andreas Fichtner, Alexander De Luca, and Matthew Smith. 2014. It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception. In Symposium On Usable Privacy and Security (SOUPS 2014). USENIX Association, Menlo Park, CA, 213--230. https://www.usenix.org/conference/soups2014/proceedings/presentation/harbach Google ScholarDigital Library
- Eiji Hayashi, Sauvik Das, Shahriyar Amini, Jason Hong, and Ian Oakley. 2013. CASA: Context-aware Scalable Authentication. In Proceedings of the Ninth Symposium on Usable Privacy and Security (SOUPS '13). ACM, New York, NY, USA, Article 3, 10 pages. Google ScholarDigital Library
- Eiji Hayashi, Oriana Riva, Karin Strauss, A. J. Bernheim Brush, and Stuart Schechter. 2012. Goldilocks and the Two Mobile Devices: Going Beyond All-or-nothing Access to a Device's Applications. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS2012). ACM, New York, NY, USA, Article 2, 11 pages. Google ScholarDigital Library
- Daniel Hintze, Rainhard D. Findling, Muhammad Muaaz, Sebastian Scholz, and René Mayrhofer. 2014. Diversity in Locked and Unlocked Mobile Device Usage. In Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing: Adjunct Publication (UbiComp '14 Adjunct). ACM, New York, NY, USA, 379-- 384. Google ScholarDigital Library
- Ruogu Kang, Stephanie Brown, Laura Dabbish, and Sara Kiesler. 2014. Privacy Attitudes of Mechanical Turk Workers and the U.S. Public. In 10th Symposium On Usable Privacy and Security (SOUPS 2014). USENIX Association, Menlo Park, CA, 37--49. https://www.usenix.org/conference/soups2014/proceedings/presentation/kang Google ScholarDigital Library
- Ahmed Mahfouz, Ildar Muslukhov, and Konstantin Beznosov. 2016. Android users in the wild: Their authentication and usage behavior. Pervasive and Mobile Computing 32 (2016), 50--61.Google ScholarCross Ref
- Diogo Marques, Ildar Muslukhov, Tiago Guerreiro, Luís Carriço, and Konstantin Beznosov. 2016. Snooping on Mobile Phones: Prevalence and Trends. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). USENIX Association, Denver, CO, 159--174. https://www.usenix.org/conference/soups2016/ technical-sessions/presentation/marques Google ScholarDigital Library
- Ildar Muslukhov, Yazan Boshmaf, Cynthia Kuo, Jonathan Lester, and Konstantin Beznosov. 2013. Know Your Enemy: The Risk of Unauthorized Access in Smartphones by Insiders. In Proceedings of the 15th International Conference on Human-computer Interaction with Mobile Devices and Services (MobileHCI '13). ACM, New York, NY, USA, 271--280. Google ScholarDigital Library
- Oriana Riva, Chuan Qin, Karin Strauss, and Dimitrios Lymberopoulos. 2012. Progressive Authentication: Deciding When to Authenticate on Mobile Phones. In Presented as part of the 21st USENIX Security Symposium (USENIX Security 12). USENIX, Bellevue, WA, 301--316. https://www.usenix.org/conference/usenixsecurity12/technical-sessions/presentation/riva Google ScholarDigital Library
Index Terms
- Towards Understanding the Link Between Age and Smartphone Authentication
Recommendations
Age-related difference in the use of mobile phones
This study examined the difference between younger adults and older adults in requirements for mobile phones and acceptance of new functions. A survey was conducted among 351 older adults and 140 younger adults in China. Four major findings were ...
Older Icelanders’ Experience of Barriers to Health Information: Association with Age, Sex, and Education
Human Aspects of IT for the Aged Population. Design, Interaction and Technology AcceptanceAbstractThe aim of the study is to examine the perceived barriers to health information among people at the age 60 years or older in Iceland. The following questions were asked: 1) What barriers do older adults experience in relation to information about ...
Age-specific predictive models of human performance
CHI EA '12: CHI '12 Extended Abstracts on Human Factors in Computing SystemsDesigners often struggle to create interfaces that are optimal for both younger and older adults, as they may interact differently with the same interface. Human-performance models have been used to aid designers in evaluating the efficiency of user ...
Comments