Disclosing the authority applications demand of users as a condition of installation

نویسندگان

  • Jennifer Tam
  • Robert W. Reeder
  • Stuart Schechter
چکیده

Computer operating systems, and now websites that serve as application platforms, are increasingly adopting stricter application security models; they restrict the resources applications can access to those authorized by the user. Users are asked to authorize access to these resources either when the application is installed or when previously-unauthorized resources are required. For example, Facebook requires its 400+ million users to make authorization decisions whenever an application first tries to run within a user’s account. The Android mobile phone OS requires its millions of users to make application authorization decisions when downloading new applications. While the security of these users’ systems and data increasingly rests on their ability to make these authorization decisions, there is little research to guide those designing these application authorization experiences. We performed a laboratory study to evaluate different designs for disclosing the actions and resources that an application will be authorized to perform once installed. We used a within-participants design to observe thirty-three Facebook users’ ability to absorb and search information in seventeen different disclosure designs, all of which were presented in the context of a fictional Facebook application. These designs were chosen to proxy for designs users rely upon today, from platforms including Facebook, Android, OAuth, and HealthVault. Four of these designs conveyed only a set of resources to be authorized, such as the user’s contact information or friends. The other thirteen designs paired resources with different actions that could be performed on them, such as seeing contact information, changing contact information, or adding new contact information. We find that participants overwhelmingly prefer disclosure designs that present resources visually, using icons or pictures, and can search those containing icons most quickly. Surprisingly, we find little variance in participants’ performance on our information-absorption tasks over widely varying disclosure designs. We do, however, find that participants perform better when disclosures are organized by actions, and followed by the various resources on which the actions would be authorized, than when information is grouped by the resources.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Deformation mechanism and optimum design for large cross-sectional longwall installation roadway under compound roof

Both the deformation characters and the failure mode of the large cross-sectional longwall installation roadway under compound roof are becoming an emergent issue than ever before due to the rapid development of modern mining equipment. Various engineering applications have revealed that the insufficient design and inappropriate support technology are the main reasons for the fatal accidents as...

متن کامل

Place of Internet in Health information seeking behavior: Case of young Internet users in Shiraz

Background and Aim: Nowadays, Internet is known as an attractive source of health information to manage individual's health.  Given the importance of it, this study examined the role of Internet in health information seeking behavior among young people in Shiraz.      Method: This research was a survey which target population were youth Internet users in the city of Shiraz.  A sample of 400 we...

متن کامل

Robust uncapacitated multiple allocation hub location problem under demand uncertainty: minimization of cost deviations

The hub location–allocation problem under uncertainty is a real-world task arising in the areas such as public and freight transportation and telecommunication systems. In many applications, the demand is considered as inexact because of the forecasting inaccuracies or human’s unpredictability. This study addresses the robust uncapacitated multiple allocation hub location problem with a set of ...

متن کامل

Network Resource Management for Improving Users Quality of experience in Software Defined Network by Weighted Fuzzy Petri-NetMethod

The rapid rise in popularity of multimedia applications, such as VoIP, IPTV and Video Conferencing, intensifies the need to consider resource management for user satisfaction. Furthermore, improving Quality of Experience (QoE) in Software Defined Networks (SDNs) services is one of the important issues to be addressed by provisioning optimum resource management. In this paper, resource allocatio...

متن کامل

ریسک سنج: ابزاری برای سنجش دقیق میزان ریسک امنیتی برنامه‌ها در دستگاه‌های همراه

Nowadays smartphones and tablets are widely used due to their various capabilities and features for end users. In these devices, accessing a wide range of services and sensitive information including private personal data, contact list, geolocation, sending and receiving messages, accessing social networks and etc. are provided via numerous application programs. These types of accessibilities, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010