non stranger danger
play

Non-Stranger Danger Diogo Marques , Tiago Guerreiro, Lus Carrio, Ivan - PowerPoint PPT Presentation

Ash unlocked the phone, not thinking twice about the request, and handed it over. P27 The phone had a password, but Val had been watching Ash entering it. P2 After several attempts at memorable dates, Val managed to get into Ashs


  1. “Ash unlocked the phone, not thinking twice about the request, and handed it over.” P27 “The phone had a password, but Val had been watching Ash entering it.” P2 “After several attempts at memorable dates, Val managed to get into Ash’s phone.” P48 Non-Stranger Danger Diogo Marques , Tiago Guerreiro, Luís Carriço, Ivan Beschastnikh & Konstantin Beznosov 1

  2. 2 Santeri Viinamäki [CC BY-SA 4.0], from Wikimedia Commons

  3. 3

  4. Are locks effective in deterring non-strangers? Objective: ● Find a range of ways in which locks are not effective Approach: ● Descriptions of past incidents ● Qualitative ● Online (Prolific.ac) 4

  5. Recall a situation where you have either physically accessed a smartphone of someone you know without their permission; or someone you know has physically accessed your smartphone without your permission. Prompt for story Your task is describe that situation in a story format. Instead of using real names, use the following characters: Ash, the smartphone owner. ● Val, the person who accessed the smartphone without permission. ● Extra instructions: anonymity If there are other characters in your story, use fictional names for them as well. To maintain anonymity, use gender-neutral pronouns such as 'they' instead of 'he' or 'she', or ‘their’ instead of ‘his’ or ‘her’. Do not include any personally identifiable information. Your story should include details, such as: Where did the situation take place and when? ● What was the relationships between Ash and Val? ● Why did Val wanted to access Ash’s smartphone? ● Extra instructions: How was Val able to get access to Ash's device? ● writing cues What did Val do on Ash’s smartphone? ● How, if at all, did Ash ever learn about Val having accessed the smartphone? ● Were there any consequences? ● You do not need to answer every question above explicitly, but include enough detail so that a reader 5 could understand the story and retell it to someone else.

  6. Recall a situation where you have either physically accessed a smartphone of someone you know without their permission; or someone you know has physically accessed your smartphone without your permission. Prompt for story Your task is describe that situation in a story format. Instead of using real names, use the following characters: Ash, the smartphone owner. ● Val, the person who accessed the smartphone without permission. ● Extra instructions: anonymity If there are other characters in your story, use fictional names for them as well. To maintain anonymity, use gender-neutral pronouns such as 'they' instead of 'he' or 'she', or ‘their’ instead of ‘his’ or ‘her’. Do not include any personally identifiable information. Your story should include details, such as: Where did the situation take place and when? ● What was the relationships between Ash and Val? ● Why did Val wanted to access Ash’s smartphone? ● Extra instructions: How was Val able to get access to Ash's device? ● writing cues What did Val do on Ash’s smartphone? ● How, if at all, did Ash ever learn about Val having accessed the smartphone? ● Were there any consequences? ● You do not need to answer every question above explicitly, but include enough detail so that a 6 reader could understand the story and retell it to someone else.

  7. Recall a situation where you have either physically accessed a smartphone of someone you know without their permission; or someone you know has physically accessed your smartphone without your permission. Prompt for story Your task is describe that situation in a story format. Instead of using real names, use the following characters: Ash, the smartphone owner. ● Val, the person who accessed the smartphone without permission. ● Extra instructions: anonymity If there are other characters in your story, use fictional names for them as well. To maintain anonymity, use gender-neutral pronouns such as 'they' instead of 'he' or 'she', or ‘their’ instead of ‘his’ or ‘her’. Do not include any personally identifiable information. Your story should include details, such as: Where did the situation take place and when? ● What was the relationships between Ash and Val? ● Why did Val wanted to access Ash’s smartphone? ● Extra instructions: How was Val able to get access to Ash's device? ● writing cues What did Val do on Ash’s smartphone? ● How, if at all, did Ash ever learn about Val having accessed the smartphone? ● Were there any consequences? ● You do not need to answer every question above explicitly, but include enough detail so that a 7 reader could understand the story and retell it to someone else.

  8. 102 stories 65 stories referencing locks 6 piles 8

  9. The 6 piles: No lock Borrowing Code sharing Shoulder-surfing Guessing secrets Beating the time-out 9

  10. The 6 piles: No lock Borrowing Code sharing Shoulder-surfing Guessing secrets Beating the time-out 10

  11. Trust No lock Borrowing Code sharing Shoulder-surfing Guessing secrets Beating the time-out Physical Knowledge proximity of target 11

  12. “Ash had left the phone on the kitchen counter of their fl at. Ash was only stepping away for a moment to attend to another matter. Val, the fl atmate, was able to get access to Ash’s phone, as it had been left unlocked, and Ash Trust trusted Val enough to not betray them in this way.” P45 Physical Knowledge proximity of target 12

  13. “Val had watched Ash for some time entering a pattern type password, which Ash changed regularly, but made sure to remember it.” P75 Trust Physical Knowledge proximity of target 13

  14. “Unable to unlock the device without Ash’s fi ngerprint at fi rst, Ash’s sibling was able to guess the passcode.” P63 Trust Physical Knowledge proximity of target 14

  15. “A quick swipe was all it took to open the contents within. Ash never used a password at home.” P37 Trust Physical Knowledge proximity of target 15

  16. Trust Physical Knowledge proximity of target 16

  17. trust 17

  18. Non-Stranger Danger Examining the Effectiveness of Smartphone Locks in Preventing Intrusions by Socially-Close Adversaries Diogo Marques , Tiago Guerreiro, Luís Carriço, Ivan Beschastnikh & Konstantin Beznosov dmarques@di.fc.ul.pt 18

  19. Extras 19

  20. Screening question: In the past, have you had at least one of the following experiences? Neutral language; I have, without permission, accessed a smartphone belonging to someone I know. ● role plausibly deniable. Someone I know, without permission, has accessed my smartphone. ● � Yes, I have had at least one of these experiences � No, I have not had any of these experiences � Rather not say / Not applicable 20

  21. Advert: Write a story: experiences with smartphones You are eligible for this study because you answered a screener indicating Neutral, priming for that you had at least one of the following experiences: storytelling I have, without permission, accessed a smartphone belonging to ● Inclusion criteria someone I know. reminder Someone I know, without permission, has accessed my smartphone. ● Your task is to write an anonymous story, with fictional characters, Prompt preview recounting such an experience. 21

  22. Participants ● Total n = 102 ● Gender identity: ○ 60% female ○ 39% male ○ 1% other gender identity ● Age: ○ 30% 18-24 years old ○ 63% 25-44 years old ○ 8% 45-64 years old ● Participant locations: United Kingdom (48), United States (16), Portugal (13), Italy (7), Greece (3), Canada (2), Germany (2), Japan (2), Spain (2), Czech Republic (1), Finland (1), Netherlands (1), Poland (1), Tunisia (1) ● Average task completion time of 9.4 minutes (SD = 5.5), for 921 words (SD = 638) 22

  23. Cumulative count of codes and subcodes in codebook. Reliability: 95% agreement between two raters for first 35 stories (Cohen’s Kappa = 0.91) prior to consensus. 23

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend