Towards Understanding the Link Between Age and Smartphone Authentication

While previous work on smartphone (un)locking has revealed real world usage patterns, several aspects still need to be explored. In this paper, we fill one of these knowledge gaps: the interplay between age and smartphone authentication behavior. To do this, we performed a two-month long field study (N = 134). Our results indicate that there are indeed significant differences across age. For instance, younger participants were more likely to use biometric unlocking mechanisms and older participants relied more on auto locks.

[1]  Konstantin Beznosov,et al.  On the Impact of Touch ID on iPhone Passcodes , 2015, SOUPS.

[2]  Laura A. Dabbish,et al.  Privacy Attitudes of Mechanical Turk Workers and the U.S. Public , 2014, SOUPS.

[3]  René Mayrhofer,et al.  Diversity in locked and unlocked mobile device usage , 2014, UbiComp Adjunct.

[4]  Florian Alt,et al.  SnapApp: Reducing Authentication Overhead with a Time-Constrained Fast Unlock Option , 2016, CHI.

[5]  Sunny Consolvo,et al.  Are You Ready to Lock? Understanding User Motivations for Smartphone Locking Behaviors , 2014 .

[6]  David A. Wagner,et al.  Are You Ready to Lock? , 2014, CCS.

[7]  Luís Carriço,et al.  Snooping on Mobile Phones: Prevalence and Trends , 2016, SOUPS.

[8]  Karin Strauss,et al.  Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device's applications , 2012, SOUPS.

[9]  Serge Egelman,et al.  Keep on Lockin' in the Free World: A Multi-National Comparison of Smartphone Locking , 2016, CHI.

[10]  Alexander De Luca,et al.  It's a Hard Lock Life: A Field Study of Smartphone (Un)Locking Behavior and Risk Perception , 2014, SOUPS.

[11]  Ian Oakley,et al.  CASA: context-aware scalable authentication , 2013, SOUPS.

[12]  Konstantin Beznosov,et al.  Android users in the wild: Their authentication and usage behavior , 2016, Pervasive Mob. Comput..

[13]  Alastair R. Beresford,et al.  Device analyzer: large-scale mobile data collection , 2014, PERV.

[14]  Konstantin Beznosov,et al.  Know your enemy: the risk of unauthorized access in smartphones by insiders , 2013, MobileHCI '13.

[15]  Chuan Qin,et al.  Progressive Authentication: Deciding When to Authenticate on Mobile Phones , 2012, USENIX Security Symposium.

[16]  Serge Egelman,et al.  The Anatomy of Smartphone Unlocking: A Field Study of Android Lock Screens , 2016, CHI.