Abstract
This paper describes an investigation into the trust and security concerns of users who carry out interactions in ubiquitous and mobile computing environments. The study involved demonstrating an ”electronic wallet” to pay for a meal in a simulated restaurant, and analyzing subjects’ responses based on structured interviews. We asked the users to rank-order five payment methods including three choices for the payment target, and both wired and wireless connections. The analysis led us to classify the users into trust-, social- and convenience-oriented clusters. We provide a detailed analysis of the users’ reasoning about trust-related issues, and draw conclusions about the design of secure interaction technologies for ubiquitous computing.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: authenti-cation in ad-hoc wireless networks. In: Proc. Network and Distributed System Security Symposium (February 2002)
Cahill, V., Gray, E., Seigneur, J.-M., Jensen, C.D., Chen, Y., Shand, B., Dimmock, N., Twigg, A., Bacon, J., English, C., Wagealla, W., Terzis, S., Nixon, P., di Marzo Se-rugendo, G., Bryce, C., Carbone, M., Krukow, K., Nielsen, M.: Using Trust for Secure Collaboration in Uncertain Environments. IEEE Pervasive Computing 2(3), 52–61 (2003)
Hoffman, D., Novak, T., Peralta, M.: Building consumer trust online. Communications of the ACM 42(4), 80–85 (1999)
Kindberg, T., Fox, A.: System Software for Ubiquitous Computing. IEEE Pervasive Computing 1(1), 70–81 (2002)
Kindberg, T., Zhang, K.: Validating and Securing Spontaneous Associations between Wireless Devices. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 44–53. Springer, Heidelberg (2003)
Neilsen, J.: Designing Web Usability. New Riders, Indianapolis (1999)
Siau, K., Shen, Z.: Building customer trust in mobile commerce. Communications of the ACM 46(4), 91–94 (2003)
Siau, K., Sheng, H., Nah, F.: Development of a framework for trust in mobile com-merce. In: Proceedings of the Second Annual Workshop on HCI Research in MIS, Seattle, WA, pp. 85–89 (2003)
Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Christianson, B., Crispo, B., Roe, M. (eds.) Proc. 7th Interna-tional Workshop on Security Protocols. LNCS, Springer, Heidelberg (1999)
Stone, H., Sidel, J., Oliver, S., Woolsey, A., Singleton, R.C.: Sensory Evaluation by Quantitative Descriptive Analysis, Food Technology, pp. 24–34 (November 1974)
Ventakesh, V., Ramesh, V., Massey, A.P.: Understanding usability in mobile com-merce. Communications of the ACM 46(12), 53–56 (2003)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2004 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kindberg, T., Sellen, A., Geelhoed, E. (2004). Security and Trust in Mobile Interactions: A Study of Users’ Perceptions and Reasoning. In: Davies, N., Mynatt, E.D., Siio, I. (eds) UbiComp 2004: Ubiquitous Computing. UbiComp 2004. Lecture Notes in Computer Science, vol 3205. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30119-6_12
Download citation
DOI: https://doi.org/10.1007/978-3-540-30119-6_12
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-22955-1
Online ISBN: 978-3-540-30119-6
eBook Packages: Springer Book Archive