Unauthorized physical access to personal devices by people known to the owner of the device is a common concern, and a common occurrence. But how do people experience incidents of unauthorized access? Using an online survey, we collected 102 accounts of unauthorized access. Participants wrote stories about past situations in which either they accessed the smartphone of someone they know, or someone they know accessed theirs. We describe the context leading up to these incidents, the course of events, and the consequences. We then identify two orthogonal themes in how participants conceptualized these incidents. First, participants understood trust as performative vulnerability: trust was necessary to sustain relationships, but building trus...
As smartphones overtake personal computers as the device of choice for internet access and everyday ...
This paper uses a scenario-based role-play experiment based on the usage of QR codes to detect how m...
Smartphones contain a myriad of personal information and, due to their ubiquity and the possibility ...
Smartphones are a central part of modern life and contain vast amounts of personal and professional ...
Smartphones store large amounts of sensitive data, such as SMS messages, photos, or email. In this p...
Smartphone applications pose interesting security problems because the same resources they use to en...
With so much of our lives digital, online, and not entirely under our control, we risk losing access...
Mobile systems, such as smartphones and tablets, are now the most common way users handle digitalinf...
Protecting smartphones against security threats is a multidimensional problem involving human and te...
Smartphones have changed the world from a primitive to a high-tech standpoint. However, there have b...
From light bulbs to smart locks, IoT is increasingly embed- ded into our homes and lives. This opens...
The proliferation of smartphones has changed our life due to the enhanced connectivity, increased st...
Smartphone penetration surpassed 80% in the US and nears 70% in Western Europe. In fact, smartphones...
Innovations in technology have created opportunities for employees to be increasingly efficient, pro...
Mobile phones are one of the essential parts of modern life. Making a phone call is not the main pur...
As smartphones overtake personal computers as the device of choice for internet access and everyday ...
This paper uses a scenario-based role-play experiment based on the usage of QR codes to detect how m...
Smartphones contain a myriad of personal information and, due to their ubiquity and the possibility ...
Smartphones are a central part of modern life and contain vast amounts of personal and professional ...
Smartphones store large amounts of sensitive data, such as SMS messages, photos, or email. In this p...
Smartphone applications pose interesting security problems because the same resources they use to en...
With so much of our lives digital, online, and not entirely under our control, we risk losing access...
Mobile systems, such as smartphones and tablets, are now the most common way users handle digitalinf...
Protecting smartphones against security threats is a multidimensional problem involving human and te...
Smartphones have changed the world from a primitive to a high-tech standpoint. However, there have b...
From light bulbs to smart locks, IoT is increasingly embed- ded into our homes and lives. This opens...
The proliferation of smartphones has changed our life due to the enhanced connectivity, increased st...
Smartphone penetration surpassed 80% in the US and nears 70% in Western Europe. In fact, smartphones...
Innovations in technology have created opportunities for employees to be increasingly efficient, pro...
Mobile phones are one of the essential parts of modern life. Making a phone call is not the main pur...
As smartphones overtake personal computers as the device of choice for internet access and everyday ...
This paper uses a scenario-based role-play experiment based on the usage of QR codes to detect how m...
Smartphones contain a myriad of personal information and, due to their ubiquity and the possibility ...