Skip to main content

Study of Usability of Security and Privacy in Context Aware Mobile Applications

  • Conference paper

Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST,volume 35)

Abstract

Mobile devices, such as smart phones, are becoming increasingly powerful with more memory, processing capacity and interface to several hard and soft sensors, making it possible to easily develop and use context aware applications on them. Context aware applications make use of context from several sources including location, light, sound, as well social context and users’ behavioral patterns to make more informed decisions for the user. Since these applications are indeed aware of all the user’s personal information and context, it is important that they be designed with security and privacy in mind. In this paper, we discuss a study conducted to understand user perception of security and privacy features implemented in context aware mobile applications, improvements that can be made and design guidelines that will help improve the usability of these features.

Keywords

  • Context-aware
  • mobile applications
  • security
  • privacy
  • usable security
  • usability

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-642-12607-9_21
  • Chapter length: 5 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   109.00
Price excludes VAT (USA)
  • ISBN: 978-3-642-12607-9
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   139.00
Price excludes VAT (USA)

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Schilit, B., Adams, N., Want, R.: Context Aware Computing Applications. In: Proceedings of Workshop on Mobile Computing Systems and Applications, December 8-9, pp. 85–90 (1994)

    Google Scholar 

  2. Nokia Friend View Application, Nokia Beta Labs, http://betalabs.nokia.com/betas/view/nokia-friend-view

  3. Chen, G., Kotz, D.: A Survey of Context Aware Mobile Computing Research. Dartmouth Computer Science Technical Report (2000)

    Google Scholar 

  4. Iachello, G., Smith, I., Consolvo, S., Chen, M., Abowd, G.: Developing Privacy Guidelines for Social Location Disclosure Applications and Services. In: Proceedings of the 11th international symposium on Modeling, analysis and simulation of wireless and mobile systems, pp. 229–238 (2008)

    Google Scholar 

  5. Barkhuus, L., Anind, D.: Is Context-Aware Computing Taking Control Away from the User? Three Levels of Iteractivity Examined. In: Dey, A.K., Schmidt, A., McCarthy, J.F. (eds.) UbiComp 2003. LNCS, vol. 2864, pp. 150–156. Springer, Heidelberg (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2010 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Pattan, N., Madamanchi, D. (2010). Study of Usability of Security and Privacy in Context Aware Mobile Applications. In: Phan, T., Montanari, R., Zerfos, P. (eds) Mobile Computing, Applications, and Services. MobiCASE 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 35. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-12607-9_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-12607-9_21

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-12606-2

  • Online ISBN: 978-3-642-12607-9

  • eBook Packages: Computer ScienceComputer Science (R0)