skip to main content
10.1145/1753326.1753421acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Access Control for Home Data Sharing: Attitudes, Needs and Practices

Published: 10 April 2010 Publication History

Abstract

As digital content becomes more prevalent in the home, non-technical users are increasingly interested in sharing that content with others and accessing it from multiple devices. Not much is known about how these users think about controlling access to this data. To better understand this, we conducted semi-structured, in-situ interviews with 33 users in 15 households. We found that users create ad-hoc access-control mechanisms that do not always work; that their ideal policies are complex and multi-dimensional; that a priori policy specification is often insufficient; and that people's mental models of access control and security are often misaligned with current systems. We detail these findings and present a set of associated guidelines for designing usable access-control systems for the home environment.

References

[1]
ABI Research. Home networking end-user snapshot: Consumer adoption of home and media networking, June 2008. http://www.abiresearch.com/research/1000323-Home+Networking+End-User+Snapshot.
[2]
D.B. Baker. Fortresses built upon sand. In Proc. NSPW, pages 148--153, 1996.
[3]
L. Bauer, L.F. Cranor, R.W. Reeder, M.K. Reiter, and K. Vaniea. A user study of policy creation in a flexible access-control system. In Proc. CHI, 2008.
[4]
L. Bauer, S. Garriss, and M.K. Reiter. Distributed proving in access-control systems. In Proc. IEEE Symposium on Security & Privacy, 2005.
[5]
K. Beznosov and O. Beznosova. On the imbalance of the security problem space and its expected consequences. Information Management & Computer Security, 15:420--431, 2007.
[6]
A. Brush and K. Inkpen. Yours, mine and ours? Sharing and use of technology in domestic environments. In Proc. Ubicomp, 2007.
[7]
D. Dearman and J. S. Pierce. "It's on my other computer!": Computing with multiple devices. In Proc. CHI, 2008.
[8]
P. Dourish, E. Grinter, J. Delgado de la Flor, and M. Joseph. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal Ubiquitous Computing, 8:391--401, 2004.
[9]
S. Egelman, A. Brush, and K. Inkpen. Family accounts: A new paradigm for user accounts within the home environment. In Proc. CSCW, 2008.
[10]
R. Geambasu, M. Balazinska, S.D. Gribble, and H.M. Levy. HomeViews: Peer-to-peer middleware for personal data sharing applications. In Proc. SIGMOD, 2007.
[11]
A.K. Karlson, A.B. Brush, and S. Schechter. Can I borrow your phone? Understanding concerns when sharing mobile phones. In Proc. CHI, pages 1647--1650, 2009.
[12]
L. Little, E. Sillence, and P. Briggs. Ubiquitous systems and the family: thoughts about the networked home. In Proc. SOUPS, 2009.
[13]
R.A. Maxion and R.W. Reeder. Improving user-interface dependability through mitigation of human error. Int. J. Hum.-Comput. Stud., 63:25--50, 2005.
[14]
J.S. Olson, J. Grudin, and E. Horvitz. A study of preferences for sharing and privacy. In Proc. CHI, 2005.
[15]
E.S. Poole, M. Chetty, T. Morgan, R.E. Grinter, and W.K. Edwards. Computer help at home: methods and motivations for informal technical support. In Proc. CHI, 2009.
[16]
V. Ramasubramanian, T. Rodeheffer, D.B. Terry, M. Walraed-Sullivan, T. Wobber, C. Marshall, and A. Vahdat. Cimbiosys: A platform for content-based partial replication. Technical Report MSR-TR-2008-116, Microsoft Research, August 2008.
[17]
M.N. Razavi and L. Iverson. A grounded theory of information sharing behavior in a personal learning space. In Proc. CSCW, pages 459--468, 2006.
[18]
L. Richards. Handling Qualitative Data: A Practical Guide. Sage Publications, 2007.
[19]
L. Richards and J.M. Morse. Readme First for a User's Guide to Qualitative Methods. Sage Publications, Thousand Oaks, 2007.
[20]
B. Salmon, F. Hady, and J. Melican. Learning to share: A study of sharing among home storage devices. Technical Report CMU-PDL-07-107, Carnegie Mellon University Parallel Data Lab, October 2007.
[21]
B. Salmon, S.W. Schlosser, L.F. Cranor, and G.R. Ganger. Perspective: Semantic data management for the home. In Proc. FAST, 2009.
[22]
S. Voida, W.K. Edwards, M.W. Newman, R.E. Grinter, and N. Ducheneaut. Share and share alike: exploring the user interface affordances of file sharing. In Proc. CHI, 2006.

Cited By

View all
  • (2024)Un/Making Data Imaginaries: The Data EpicsACM Transactions on Computer-Human Interaction10.1145/368526931:6(1-38)Online publication date: 14-Aug-2024
  • (2024)Making of an Adaptive Podcast that Engenders Trust through Data NegotiabilityProceedings of the 2024 ACM International Conference on Interactive Media Experiences10.1145/3639701.3663634(334-341)Online publication date: 7-Jun-2024
  • (2023)CREBAS: Enabling Network Access Control in a Home with One ClickJournal of Information Processing10.2197/ipsjjip.31.17431(174-184)Online publication date: 2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CHI '10: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
April 2010
2690 pages
ISBN:9781605589299
DOI:10.1145/1753326
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 10 April 2010

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. access control
  2. home computing
  3. privacy
  4. security

Qualifiers

  • Research-article

Conference

CHI '10
Sponsor:

Acceptance Rates

Overall Acceptance Rate 6,199 of 26,314 submissions, 24%

Upcoming Conference

CHI 2025
ACM CHI Conference on Human Factors in Computing Systems
April 26 - May 1, 2025
Yokohama , Japan

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)121
  • Downloads (Last 6 weeks)18
Reflects downloads up to 19 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Un/Making Data Imaginaries: The Data EpicsACM Transactions on Computer-Human Interaction10.1145/368526931:6(1-38)Online publication date: 14-Aug-2024
  • (2024)Making of an Adaptive Podcast that Engenders Trust through Data NegotiabilityProceedings of the 2024 ACM International Conference on Interactive Media Experiences10.1145/3639701.3663634(334-341)Online publication date: 7-Jun-2024
  • (2023)CREBAS: Enabling Network Access Control in a Home with One ClickJournal of Information Processing10.2197/ipsjjip.31.17431(174-184)Online publication date: 2023
  • (2023)No Privacy in the Electronics Repair Industry2023 IEEE Symposium on Security and Privacy (SP)10.1109/SP46215.2023.10179413(3347-3364)Online publication date: May-2023
  • (2022)Balancing power dynamics in smart homesProceedings of the Eighteenth USENIX Conference on Usable Privacy and Security10.5555/3563609.3563646(687-706)Online publication date: 8-Aug-2022
  • (2022)Sharing without scaringProceedings of the Eighteenth USENIX Conference on Usable Privacy and Security10.5555/3563609.3563645(671-685)Online publication date: 8-Aug-2022
  • (2022)Hands-Free Authentication for Virtual Assistants with Trusted IoT Device and Machine LearningSensors10.3390/s2204132522:4(1325)Online publication date: 9-Feb-2022
  • (2022)Protecting The VulnerableProceedings of the ACM on Human-Computer Interaction10.1145/35556476:CSCW2(1-26)Online publication date: 11-Nov-2022
  • (2022)What Users Want From Cloud Deletion and the Information They Need: A Participatory Action StudyACM Transactions on Privacy and Security10.1145/354657826:1(1-34)Online publication date: 7-Nov-2022
  • (2022)An Exploration of Account Sharing Practices on Media PlatformsProceedings of the 2022 ACM International Conference on Interactive Media Experiences10.1145/3505284.3529974(141-150)Online publication date: 21-Jun-2022
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media