Re-designing Permission Requirements to Encourage BYOD Policy Adherence

Conference paper

DOI: 10.1007/978-3-319-20376-8_33

Part of the Lecture Notes in Computer Science book series (LNCS, volume 9190)
Cite this paper as:
Lee L., Still J.D. (2015) Re-designing Permission Requirements to Encourage BYOD Policy Adherence. In: Tryfonas T., Askoxylakis I. (eds) Human Aspects of Information Security, Privacy, and Trust. HAS 2015. Lecture Notes in Computer Science, vol 9190. Springer, Cham

Abstract

Many corporations and organizations support a Bring Your Own Device (BYOD) policy, which allows employees to use their personal smartphones for work-related purposes. Access to proprietary company data and information from an employee’s smartphone raises serious privacy and security concerns. Companies are vulnerable to data breaches if employees are unable to discern which applications are safe to install. Situating privacy requirements ought to encourage safer application install decisions and decrease risker ones. This study examines the use of context-relevant warning messages, which alert employees to be cautious when the company’s BYOD policy may be violated. We also explore the impact of presenting permission requirements before and after making the install decision. We provide evidence that the presence of warnings, despite the timing of when they were presented, facilitated a lower number of risky installations. In situations when it was safe to install an application, warning messages presented before the install decision drastically encouraged installations compared to when there were no warnings. Interestingly, the opposite pattern was found when warning messages were presented after the decision. Overall, better privacy and security decisions will be made if permission requirements are displayed with relevant warning messages. In addition, safe installations will be encouraged through the placement of these meaningful warnings on the description page of a mobile application before a user has decided to install it.

Keywords

Decision-making Interface design Mobile security Privacy Trust User experience 

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  1. 1.San José State UniversitySan JoseUSA

Personalised recommendations