Skip to main content

Crowdsourced exploration of security configurations

Publication ,  Conference
Ismail, Q; Ahmed, T; Kapadia, A; Reiter, MK
Published in: Conference on Human Factors in Computing Systems - Proceedings
April 18, 2015

Smartphone apps today request permission to access a multitude of sensitive resources, which users must accept completely during installation (e.g., on Android) or selectively configure after installation (e.g., on iOS, but also planned for Android). Everyday users, however, do not have the ability to make informed decisions about which permissions are essential for their usage. For enhanced privacy, we seek to leverage crowdsourcing to find minimal sets of permissions that will preserve the usability of the app for diverse users. We advocate an efficient 'lattice-based' crowd-management strategy to explore the space of permissions sets. We conducted a user study (N = 26) in which participants explored different permission sets for the popular Instagram app. This study validates our efficient crowd management strategy and shows that usability scores for diverse users can be predicted accurately, enabling suitable recommendations.

Duke Scholars

Altmetric Attention Stats
Dimensions Citation Stats

Published In

Conference on Human Factors in Computing Systems - Proceedings

DOI

Publication Date

April 18, 2015

Volume

2015-April

Start / End Page

467 / 476

Related Subject Headings

  • 3507 Strategy, management and organisational behaviour
  • 1503 Business and Management
  • 1202 Building
 

Citation

APA
Chicago
ICMJE
MLA
NLM
Ismail, Q., Ahmed, T., Kapadia, A., & Reiter, M. K. (2015). Crowdsourced exploration of security configurations. In Conference on Human Factors in Computing Systems - Proceedings (Vol. 2015-April, pp. 467–476). https://doi.org/10.1145/2702123.2702370
Ismail, Q., T. Ahmed, A. Kapadia, and M. K. Reiter. “Crowdsourced exploration of security configurations.” In Conference on Human Factors in Computing Systems - Proceedings, 2015-April:467–76, 2015. https://doi.org/10.1145/2702123.2702370.
Ismail Q, Ahmed T, Kapadia A, Reiter MK. Crowdsourced exploration of security configurations. In: Conference on Human Factors in Computing Systems - Proceedings. 2015. p. 467–76.
Ismail, Q., et al. “Crowdsourced exploration of security configurations.” Conference on Human Factors in Computing Systems - Proceedings, vol. 2015-April, 2015, pp. 467–76. Scopus, doi:10.1145/2702123.2702370.
Ismail Q, Ahmed T, Kapadia A, Reiter MK. Crowdsourced exploration of security configurations. Conference on Human Factors in Computing Systems - Proceedings. 2015. p. 467–476.

Published In

Conference on Human Factors in Computing Systems - Proceedings

DOI

Publication Date

April 18, 2015

Volume

2015-April

Start / End Page

467 / 476

Related Subject Headings

  • 3507 Strategy, management and organisational behaviour
  • 1503 Business and Management
  • 1202 Building