Skip to main content

Security and Trust in Mobile Interactions: A Study of Users’ Perceptions and Reasoning

  • Conference paper
UbiComp 2004: Ubiquitous Computing (UbiComp 2004)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 3205))

Included in the following conference series:

Abstract

This paper describes an investigation into the trust and security concerns of users who carry out interactions in ubiquitous and mobile computing environments. The study involved demonstrating an ”electronic wallet” to pay for a meal in a simulated restaurant, and analyzing subjects’ responses based on structured interviews. We asked the users to rank-order five payment methods including three choices for the payment target, and both wired and wireless connections. The analysis led us to classify the users into trust-, social- and convenience-oriented clusters. We provide a detailed analysis of the users’ reasoning about trust-related issues, and draw conclusions about the design of secure interaction technologies for ubiquitous computing.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Balfanz, D., Smetters, D.K., Stewart, P., Wong, H.C.: Talking to strangers: authenti-cation in ad-hoc wireless networks. In: Proc. Network and Distributed System Security Symposium (February 2002)

    Google Scholar 

  2. Cahill, V., Gray, E., Seigneur, J.-M., Jensen, C.D., Chen, Y., Shand, B., Dimmock, N., Twigg, A., Bacon, J., English, C., Wagealla, W., Terzis, S., Nixon, P., di Marzo Se-rugendo, G., Bryce, C., Carbone, M., Krukow, K., Nielsen, M.: Using Trust for Secure Collaboration in Uncertain Environments. IEEE Pervasive Computing 2(3), 52–61 (2003)

    Article  Google Scholar 

  3. Hoffman, D., Novak, T., Peralta, M.: Building consumer trust online. Communications of the ACM 42(4), 80–85 (1999)

    Article  Google Scholar 

  4. Kindberg, T., Fox, A.: System Software for Ubiquitous Computing. IEEE Pervasive Computing 1(1), 70–81 (2002)

    Article  Google Scholar 

  5. Kindberg, T., Zhang, K.: Validating and Securing Spontaneous Associations between Wireless Devices. In: Boyd, C., Mao, W. (eds.) ISC 2003. LNCS, vol. 2851, pp. 44–53. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  6. Neilsen, J.: Designing Web Usability. New Riders, Indianapolis (1999)

    Google Scholar 

  7. Siau, K., Shen, Z.: Building customer trust in mobile commerce. Communications of the ACM 46(4), 91–94 (2003)

    Article  Google Scholar 

  8. Siau, K., Sheng, H., Nah, F.: Development of a framework for trust in mobile com-merce. In: Proceedings of the Second Annual Workshop on HCI Research in MIS, Seattle, WA, pp. 85–89 (2003)

    Google Scholar 

  9. Stajano, F., Anderson, R.: The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks. In: Christianson, B., Crispo, B., Roe, M. (eds.) Proc. 7th Interna-tional Workshop on Security Protocols. LNCS, Springer, Heidelberg (1999)

    Google Scholar 

  10. Stone, H., Sidel, J., Oliver, S., Woolsey, A., Singleton, R.C.: Sensory Evaluation by Quantitative Descriptive Analysis, Food Technology, pp. 24–34 (November 1974)

    Google Scholar 

  11. Ventakesh, V., Ramesh, V., Massey, A.P.: Understanding usability in mobile com-merce. Communications of the ACM 46(12), 53–56 (2003)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2004 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kindberg, T., Sellen, A., Geelhoed, E. (2004). Security and Trust in Mobile Interactions: A Study of Users’ Perceptions and Reasoning. In: Davies, N., Mynatt, E.D., Siio, I. (eds) UbiComp 2004: Ubiquitous Computing. UbiComp 2004. Lecture Notes in Computer Science, vol 3205. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-30119-6_12

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-30119-6_12

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-22955-1

  • Online ISBN: 978-3-540-30119-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics