skip to main content
10.1145/1518701.1519004acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

"When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use

Published:04 April 2009Publication History

ABSTRACT

Increasingly, users access online services such as email, e-commerce, and social networking sites via 802.11-based wireless networks. As they do so, they expose a range of personal information such as their names, email addresses, and ZIP codes to anyone within broadcast range of the network. This paper presents results from an exploratory study that examined how users from the general public understand Wi-Fi, what their concerns are related to Wi-Fi use, and which practices they follow to counter perceived threats. Our results reveal that while users understand the practical details of Wi-Fi use reasonably well, they lack understanding of important privacy risks. In addition, users employ incomplete protective practices which results in a false sense of security and lack of concern while on Wi-Fi. Based on our results, we outline opportunities for technology to help address these problems.

References

  1. Anonymous. Wigle.net, http://wigle.net.Google ScholarGoogle Scholar
  2. Cranor, L.F. 'I didn't' buy it for myself': Privacy and ecommerce personalization. In Proc. WPES '03, ACM Press, (2003). Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Csikszentmihalyi, M. and Larson, R. Validity and reliability of the Experience Sampling Method. Journal of Nervous and Mental Disease, 175, 9, (1987), 526--536.Google ScholarGoogle ScholarCross RefCross Ref
  4. Dhamija, R., Tygar, J.D. and Hearst, M. Why phishing works. In Proc. CHI '06, ACM Press, (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Dourish, P., Grinter, R., Delgado De La Flor, J. and Joseph, M. Security in the wild: user strategies for managing security as an everyday, practical problem. Personal and Ubiquitous Computing, 8, 6, (2004), 391--401. Google ScholarGoogle ScholarCross RefCross Ref
  6. Friedman, B., Howe, D.C. and Felton, E. Informed consent in the Mozilla browser: Implementing value-sensitive design. In Proc. 35th Hawaii International Conference on System Sciences, IEEE, (2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Friedman, B., Hurley, D., Howe, D.C., Felten, E. and Nissenbaum, H. Users' conceptions of web security: a comparative study. In Proc. CHI '02: CHI '02 extended abstracts on Human factors in computing systems, (2002). Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Gideon, J., Cranor, L., Egelman, S. and Acquisti, A. Power strips, prophylactics, and privacy, oh my! In Proc. SOUPS '06, (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Goffman, E. The presentation of self in everyday life. Doubleday, Garden City, NY, 1959.Google ScholarGoogle Scholar
  10. Greenstein, B., McCoy, D., Pang, J., Kohno, T., Seshan, S. and Wetherall, D. Improving wireless privacy with an identifier-free link layer protocol. In Proc. MobiSys '08, (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Horrigan, J.B. Home broadband adoption 2008, Pew Internet&American Life Project, Washington, DC, 2008, http://www.pewinternet.org/pdfs/PIP_Broadband_2008.pdf.Google ScholarGoogle Scholar
  12. Jensen, C., Potts, C.,&Jensen, C. Privacy practices of Internet Users: Self-report versus observed behavior. IJHCS, 63, 1--2, (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Jung, J., Sheth, A., Greenstein, B., Wetherall, D., Maganis, G. and Kohno, T. Privacy oracle: A system for finding application leaks using black-box differential testing. In Proc. CCS 2008, ACM Press, (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Kindberg, T., O'Neill, E., Bevan, C., Kostakos, V., Fraser, D.S. and Jay, T. Measuring trust in Wi-Fi hotspots. In Proc. CHI '08, ACM Press, (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. King, J. and McDiarmid, A. Where's the beep? Security, privacy, and user misunderstandings of RFID. In Proc. Usenix, (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Kowitz, B. and Cranor, L. Peripheral privacy notifications for wireless networks. In Proc. WPES '05, ACM Press, (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Owyang, J. Social network stats: Facebook, MySpace reunion (Jan, 2008), 2008, http://tinyurl.com/ywnsgv.Google ScholarGoogle Scholar
  18. Poole, E.S., Chetty, M., Grinter, R.E. and Edwards, W.K. More than meets the eye: transforming the user experience of home network management. In Proc. DIS '08, ACM Press, (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Stoll, J., Tashman, C.S., Edwards, W.K. and Spafford, K. Sesame: Informing user security decisions with system visualization. In Proc. CHI 2008, ACM Press, (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Strauss, A. and Corbin, J. Basics of qualitative research: Techniques and procedures for developing grounded theory. SAGE, Thousand Oaks, 1998.Google ScholarGoogle Scholar
  21. Wu, M., Miller, R.C. and Garfinkel, S.L. Do security toolbars actually prevent phishing attacks? In Proc. CHI '06, ACM Press, (2006). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. "When I am on Wi-Fi, I am fearless": privacy concerns & practices in eeryday Wi-Fi use

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        CHI '09: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
        April 2009
        2426 pages
        ISBN:9781605582467
        DOI:10.1145/1518701

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 4 April 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        CHI '09 Paper Acceptance Rate277of1,130submissions,25%Overall Acceptance Rate6,199of26,314submissions,24%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader