{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T21:24:07Z","timestamp":1776115447893,"version":"3.50.1"},"reference-count":69,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2019,12,11]],"date-time":"2019-12-11T00:00:00Z","timestamp":1576022400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Interact. Mob. Wearable Ubiquitous Technol."],"published-print":{"date-parts":[[2019,12,11]]},"abstract":"<jats:p>The rapid adoption of Smartphone devices has caused increasing security and privacy risks and breaches. Catching up with ever-evolving contemporary smartphone technology challenges leads older adults (aged 50+) to reduce or to abandon their use of mobile technology. To tackle this problem, we present AppMoD, a community-based approach that allows delegation of security and privacy decisions a trusted social connection, such as a family member or a close friend. The trusted social connection can assist in the appropriate decision or make it on behalf of the user. We implement the approach as an Android app and describe the results of three user studies (n=50 altogether), in which pairs of older adults and family members used the app in a controlled experiment. Using app anomalies as an ongoing case study, we show how delegation improves the accuracy of decisions made by older adults. Also, we show how combining decision-delegation with crowdsourcing can enhance the advice given and improve the decision-making process. Our results suggest that a community-based approach can improve the state of mobile security and privacy.<\/jats:p>","DOI":"10.1145\/3369819","type":"journal-article","created":{"date-parts":[[2019,12,12]],"date-time":"2019-12-12T13:16:03Z","timestamp":1576156563000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["AppMoD"],"prefix":"10.1145","volume":"3","author":[{"given":"Zhiyuan","family":"Wan","sequence":"first","affiliation":[{"name":"Zhejiang University, Hangzhou, China, University of British Columbia, Vancouver, Canada"}]},{"given":"Lingfeng","family":"Bao","sequence":"additional","affiliation":[{"name":"Zhejiang University City College, Hangzhou, China"}]},{"given":"Debin","family":"Gao","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore"}]},{"given":"Eran","family":"Toch","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]},{"given":"Xin","family":"Xia","sequence":"additional","affiliation":[{"name":"Monash University, Melbourne, Australia"}]},{"given":"Tamir","family":"Mendel","sequence":"additional","affiliation":[{"name":"Tel Aviv University, Tel Aviv, Israel"}]},{"given":"David","family":"Lo","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore"}]}],"member":"320","published-online":{"date-parts":[[2020,9,14]]},"reference":[{"key":"e_1_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464460"},{"key":"e_1_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2019.23016"},{"key":"e_1_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2557547.2557571"},{"key":"e_1_2_2_4_1","volume-title":"Tech adoption climbs among older adults","author":"Anderson Monica","year":"2017","unstructured":"Monica Anderson and Andrew Perrin . 2017. Tech adoption climbs among older adults . Pew Research Center ( 2017 ), 1--22. Monica Anderson and Andrew Perrin. 2017. Tech adoption climbs among older adults. Pew Research Center (2017), 1--22."},{"key":"e_1_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23247"},{"key":"e_1_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818808"},{"key":"e_1_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2018.598"},{"key":"e_1_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2017.10.015"},{"key":"e_1_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8535.2008.00914.x"},{"key":"e_1_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046614.2046619"},{"key":"e_1_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267305.3267543"},{"key":"e_1_2_2_12_1","volume-title":"So why ask me? Are self-report data really that bad. Statistical and Methodological Myths and Urban Legends: Doctrine, Verity and Fable in Organizational and Social Sciences","author":"Chan David","year":"2009","unstructured":"David Chan . 2009. So why ask me? Are self-report data really that bad. Statistical and Methodological Myths and Urban Legends: Doctrine, Verity and Fable in Organizational and Social Sciences ( 2009 ), 309--336. David Chan. 2009. So why ask me? Are self-report data really that bad. Statistical and Methodological Myths and Urban Legends: Doctrine, Verity and Fable in Organizational and Social Sciences (2009), 309--336."},{"key":"e_1_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.3390\/ijerph10104645"},{"key":"e_1_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/03601270290099921"},{"key":"e_1_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-017-1003-7"},{"key":"e_1_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1159\/000357431"},{"key":"e_1_2_2_17_1","volume-title":"Proceedings of the 10th Symposium On Usable Privacy and Security (SOUPS). 143--157","author":"Das Sauvik","year":"2014","unstructured":"Sauvik Das , Tiffany Hyun-Jin Kim , Laura A Dabbish , and Jason I Hong . 2014 . The effect of social influence on security sensitivity . In Proceedings of the 10th Symposium On Usable Privacy and Security (SOUPS). 143--157 . Sauvik Das, Tiffany Hyun-Jin Kim, Laura A Dabbish, and Jason I Hong. 2014. The effect of social influence on security sensitivity. In Proceedings of the 10th Symposium On Usable Privacy and Security (SOUPS). 143--157."},{"key":"e_1_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2014.02.041"},{"key":"e_1_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_2_2_20_1","volume-title":"Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS).","author":"Frik Alisa","year":"2019","unstructured":"Alisa Frik , Leysan Nurgalieva , Julia Bernd , Joyce Lee , Florian Schaub , and Serge Egelman . 2019 . Privacy and security threat models and mitigation strategies of older adults . In Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS). Alisa Frik, Leysan Nurgalieva, Julia Bernd, Joyce Lee, Florian Schaub, and Serge Egelman. 2019. Privacy and security threat models and mitigation strategies of older adults. In Proceedings of the 15th Symposium on Usable Privacy and Security (SOUPS)."},{"key":"e_1_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568276"},{"key":"e_1_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025859"},{"key":"e_1_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2046707.2046780"},{"key":"e_1_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702370"},{"key":"e_1_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2013.06.008"},{"key":"e_1_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381944"},{"key":"e_1_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.2190\/AG.73.1.d"},{"key":"e_1_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2014.2328593"},{"key":"e_1_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34638-5_6"},{"key":"e_1_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2012.06.002"},{"key":"e_1_2_2_31_1","volume-title":"Flow and the Foundations of Positive Psychology","author":"Larson Reed","unstructured":"Reed Larson and Mihaly Csikszentmihalyi . 2014. The experience sampling method . In Flow and the Foundations of Positive Psychology . Springer , 21--34. Reed Larson and Mihaly Csikszentmihalyi. 2014. The experience sampling method. In Flow and the Foundations of Positive Psychology. Springer, 21--34."},{"key":"e_1_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1177\/0013161X08321501"},{"key":"e_1_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_2_2_34_1","volume-title":"Proceedings of the 12th Symposium on Usable Privacy and Security (SOUPS).","author":"Liu Bin","year":"2016","unstructured":"Bin Liu , Mads Schaarup Andersen , Florian Schaub , Hazim Almuhimedi , Shikun Zhang , Norman Sadeh , Alessandro Acquisti , and Yuvraj Agarwal . 2016 . Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions . In Proceedings of the 12th Symposium on Usable Privacy and Security (SOUPS). Bin Liu, Mads Schaarup Andersen, Florian Schaub, Hazim Almuhimedi, Shikun Zhang, Norman Sadeh, Alessandro Acquisti, and Yuvraj Agarwal. 2016. Follow My Recommendations: A Personalized Privacy Assistant for Mobile App Permissions. In Proceedings of the 12th Symposium on Usable Privacy and Security (SOUPS)."},{"key":"e_1_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568035"},{"key":"e_1_2_2_36_1","volume-title":"Privacy online","author":"Maa\u00df Wiebke","unstructured":"Wiebke Maa\u00df . 2011. The elderly and the Internet: How senior citizens deal with online privacy . In Privacy online . Springer , 235--249. Wiebke Maa\u00df. 2011. The elderly and the Internet: How senior citizens deal with online privacy. In Privacy online. Springer, 235--249."},{"key":"e_1_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998323"},{"key":"e_1_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341162.3349311"},{"key":"e_1_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.06.020"},{"key":"e_1_2_2_40_1","volume-title":"Proceedings of the International Workshop on Risk Assessment and Risk-driven Testing. Springer, 21--37","author":"Mylonas Alexios","year":"2013","unstructured":"Alexios Mylonas , Marianthi Theoharidou , and Dimitris Gritzalis . 2013 . Assessing privacy risks in android: A user-centric approach . In Proceedings of the International Workshop on Risk Assessment and Risk-driven Testing. Springer, 21--37 . Alexios Mylonas, Marianthi Theoharidou, and Dimitris Gritzalis. 2013. Assessing privacy risks in android: A user-centric approach. In Proceedings of the International Workshop on Risk Assessment and Risk-driven Testing. Springer, 21--37."},{"key":"e_1_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1041610213000355"},{"key":"e_1_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300579"},{"key":"e_1_2_2_43_1","volume-title":"What the public knows about cybersecurity","author":"Olmstead Kenneth","year":"2017","unstructured":"Kenneth Olmstead and Aaron Smith . 2017. What the public knows about cybersecurity . Pew Research Center 22 ( 2017 ). Kenneth Olmstead and Aaron Smith. 2017. What the public knows about cybersecurity. Pew Research Center 22 (2017)."},{"key":"e_1_2_2_44_1","volume-title":"Older adults are mobile too! Identifying the barriers and facilitators to older adults' use of mHealth for pain management. BMC geriatrics 13, 1","author":"Parker Samantha J","year":"2013","unstructured":"Samantha J Parker , Sonal Jessel , Joshua E Richardson , and M Cary Reid . 2013. Older adults are mobile too! Identifying the barriers and facilitators to older adults' use of mHealth for pain management. BMC geriatrics 13, 1 ( 2013 ), 43. Samantha J Parker, Sonal Jessel, Joshua E Richardson, and M Cary Reid. 2013. Older adults are mobile too! Identifying the barriers and facilitators to older adults' use of mHealth for pain management. BMC geriatrics 13, 1 (2013), 43."},{"key":"e_1_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1159\/000430949"},{"key":"e_1_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2016.04.013"},{"key":"e_1_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978307"},{"key":"e_1_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.24"},{"key":"e_1_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978344"},{"key":"e_1_2_2_50_1","volume-title":"Proceedings of the 22nd USENIX Conference on Security. USENIX Association, 97--112","author":"Roesner Franziska","year":"2013","unstructured":"Franziska Roesner and Tadayoshi Kohno . 2013 . Securing embedded user interfaces: Android and beyond . In Proceedings of the 22nd USENIX Conference on Security. USENIX Association, 97--112 . Franziska Roesner and Tadayoshi Kohno. 2013. Securing embedded user interfaces: Android and beyond. In Proceedings of the 22nd USENIX Conference on Security. USENIX Association, 97--112."},{"key":"e_1_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.24"},{"key":"e_1_2_2_52_1","volume-title":"Proceedings of the Symposium on Usable Privacy and Security (SOUPS).","author":"Bin Liu Norman Sadeh Jialiu Lin","year":"2014","unstructured":"Jialiu Lin Bin Liu Norman Sadeh and Jason I Hong . 2014 . Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings . In Proceedings of the Symposium on Usable Privacy and Security (SOUPS). Jialiu Lin Bin Liu Norman Sadeh and Jason I Hong. 2014. Modeling Users' Mobile App Privacy Preferences: Restoring Usability in a Sea of Permission Settings. In Proceedings of the Symposium on Usable Privacy and Security (SOUPS)."},{"key":"e_1_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10844-010-0148-x"},{"key":"e_1_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.5555\/2612163.2612165"},{"key":"e_1_2_2_55_1","volume-title":"Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems. ACM, 19","author":"Silva Junior De\u00f3genes P","year":"2018","unstructured":"De\u00f3genes P Silva Junior , Patricia Cristiane de Souza , and Tha\u00edres A de Jesus Gon\u00e7alves . 2018 . Early Privacy: Approximating Mental Models in the Definition of Privacy Requirements in Systems Design . In Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems. ACM, 19 . De\u00f3genes P Silva Junior, Patricia Cristiane de Souza, and Tha\u00edres A de Jesus Gon\u00e7alves. 2018. Early Privacy: Approximating Mental Models in the Definition of Privacy Requirements in Systems Design. In Proceedings of the 17th Brazilian Symposium on Human Factors in Computing Systems. ACM, 19."},{"key":"e_1_2_2_56_1","volume-title":"User Study, System Documentation)","author":"Tan Hwee Lee","year":"2018","unstructured":"Hwee Lee Tan . 2018. Safety and Privacy of Smart-City Mobile Applications through Model Inference. MAIS Capstone Project Reports (Main , User Study, System Documentation) ( 2018 ). Hwee Lee Tan. 2018. Safety and Privacy of Smart-City Mobile Applications through Model Inference. MAIS Capstone Project Reports (Main, User Study, System Documentation) (2018)."},{"key":"e_1_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITAP.2011.6006288"},{"key":"e_1_2_2_58_1","volume-title":"Smartphone Ownership Is Growing Rapidly Around the World, but Not Always Equally","author":"Taylor Kyle","year":"2019","unstructured":"Kyle Taylor and Laura Silver . 2019. Smartphone Ownership Is Growing Rapidly Around the World, but Not Always Equally . Pew Research Center (FEBRUARY 5Th 2019 ) (2019), 1--46. Kyle Taylor and Laura Silver. 2019. Smartphone Ownership Is Growing Rapidly Around the World, but Not Always Equally. Pew Research Center (FEBRUARY 5Th 2019) (2019), 1--46."},{"key":"e_1_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-017-1068-3"},{"key":"e_1_2_2_60_1","volume-title":"Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS).","author":"Tsai Lynn","year":"2017","unstructured":"Lynn Tsai , Primal Wijesekera , Joel Reardon , Irwin Reyes , Serge Egelman , David Wagner , Nathan Good , and Jung-Wei Chen . 2017 . Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences . In Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS). Lynn Tsai, Primal Wijesekera, Joel Reardon, Irwin Reyes, Serge Egelman, David Wagner, Nathan Good, and Jung-Wei Chen. 2017. Turtle Guard: Helping Android Users Apply Contextual Privacy Preferences. In Proceedings of the 13th Symposium on Usable Privacy and Security (SOUPS)."},{"key":"e_1_2_2_61_1","volume-title":"Article 93 (Dec.","author":"van Berkel Niels","year":"2017","unstructured":"Niels van Berkel , Denzil Ferreira , and Vassilis Kostakos . 2017. The Experience Sampling Method on Mobile Devices. ACM Computing Surveys (CSUR) 50, 6 , Article 93 (Dec. 2017 ), 40 pages. Niels van Berkel, Denzil Ferreira, and Vassilis Kostakos. 2017. The Experience Sampling Method on Mobile Devices. ACM Computing Surveys (CSUR) 50, 6, Article 93 (Dec. 2017), 40 pages."},{"key":"e_1_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3171533.3171538"},{"key":"e_1_2_2_63_1","volume-title":"Proceedings of the USENIX Security Symposium. 499--514","author":"Wijesekera Primal","year":"2015","unstructured":"Primal Wijesekera , Arjun Baokar , Ashkan Hosseini , Serge Egelman , David Wagner , and Konstantin Beznosov . 2015 . Android Permissions Remystified: A Field Study on Contextual Integrity .. In Proceedings of the USENIX Security Symposium. 499--514 . Primal Wijesekera, Arjun Baokar, Ashkan Hosseini, Serge Egelman, David Wagner, and Konstantin Beznosov. 2015. Android Permissions Remystified: A Field Study on Contextual Integrity.. In Proceedings of the USENIX Security Symposium. 499--514."},{"key":"e_1_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.51"},{"key":"e_1_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173574.3173842"},{"key":"e_1_2_2_66_1","volume-title":"Individual comparisons by ranking methods. Biometrics bulletin 1, 6","author":"Wilcoxon Frank","year":"1945","unstructured":"Frank Wilcoxon . 1945. Individual comparisons by ranking methods. Biometrics bulletin 1, 6 ( 1945 ), 80--83. Frank Wilcoxon. 1945. Individual comparisons by ranking methods. Biometrics bulletin 1, 6 (1945), 80--83."},{"key":"e_1_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1080\/03601277.2010.544580"},{"key":"e_1_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-58536-9_16"},{"key":"e_1_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623705"}],"container-title":["Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3369819","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3369819","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:27Z","timestamp":1750203867000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3369819"}},"subtitle":["Helping Older Adults Manage Mobile Security with Online Social Help"],"short-title":[],"issued":{"date-parts":[[2019,12,11]]},"references-count":69,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,12,11]]}},"alternative-id":["10.1145\/3369819"],"URL":"https:\/\/doi.org\/10.1145\/3369819","relation":{},"ISSN":["2474-9567"],"issn-type":[{"value":"2474-9567","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,11]]},"assertion":[{"value":"2020-09-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}