{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T17:08:52Z","timestamp":1769879332940,"version":"3.49.0"},"reference-count":60,"publisher":"Association for Computing Machinery (ACM)","issue":"CSCW1","license":[{"start":{"date-parts":[[2023,4,14]],"date-time":"2023-04-14T00:00:00Z","timestamp":1681430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Hum.-Comput. Interact."],"published-print":{"date-parts":[[2023,4,14]]},"abstract":"<jats:p>Users share their personal devices with different entities in various circumstances. While prior research shed light on the broad reasons behind the sharing of mobile phones, there is a dearth of systematic study to understand the user's decision-making process and the underlying preferences and concerns in the context of phone sharing. To address these gaps, we designed a prototype that we leveraged to investigate the interplay between a user's relationship with sharees, preferences of sharing a subset of apps with a certain entity, perceived sensitivity of the apps being shared, and how these factors relate to their authentication behavior. We conducted a multi-session study with 50 participants from three countries (USA, Turkey, and Nepal), where the participants interacted with our prototype and took part in semi-structured interviews. The findings from our study revealed the need for phone sharing at a granular level, where we identified the factors that could influence a user's decision-making process in sharing. Our analysis unpacked the relation between a user's perceived sensitivity of apps being shared, and authentication behavior to protect information from unauthorized access. Overall, our findings advance the CSCW community's understanding of how the user attains a balance between privacy protection and the need for phone sharing.<\/jats:p>","DOI":"10.1145\/3579595","type":"journal-article","created":{"date-parts":[[2023,4,16]],"date-time":"2023-04-16T17:23:07Z","timestamp":1681665787000},"page":"1-22","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["A Deep Dive into User's Preferences and Behavior around Mobile Phone Sharing"],"prefix":"10.1145","volume":"7","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3840-9015","authenticated-orcid":false,"given":"Rizu","family":"Paudel","sequence":"first","affiliation":[{"name":"Utah State University, Logan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6326-5810","authenticated-orcid":false,"given":"Prakriti","family":"Dumaru","sequence":"additional","affiliation":[{"name":"Utah State University, Logan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9012-6146","authenticated-orcid":false,"given":"Ankit","family":"Shrestha","sequence":"additional","affiliation":[{"name":"Utah State University, Logan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1555-4992","authenticated-orcid":false,"given":"Huzeyfe","family":"Kocabas","sequence":"additional","affiliation":[{"name":"Utah State University, Logan, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5764-2253","authenticated-orcid":false,"given":"Mahdi Nasrullah","family":"Al-Ameen","sequence":"additional","affiliation":[{"name":"Utah State University, Logan, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,4,16]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"e_1_2_1_2_1","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS","author":"Afnan Tanisha","year":"2022","unstructured":"Tanisha Afnan, Yixin Zou, Maryam Mustafa, Mustafa Naseem, and Florian Schaub. 2022. Aunties, Strangers, and the $$FBI$$: Online Privacy Concerns and Experiences of $$Muslim-American$$ Women. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). 387--406."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1240624.1240683"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909609.2909661"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3134652"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300410"},{"key":"e_1_2_1_7_1","volume-title":"The Impact of Cues and User Interaction on the Memorability of System-Assigned Recognition-Based Graphical Passwords. In Eleventh Symposium On Usable Privacy and Security (SOUPS). 185--196","author":"Al-Ameen Mahdi Nasrullah","year":"2015","unstructured":"Mahdi Nasrullah Al-Ameen, Kanis Fatema, Matthew Wright, and Shannon Scielzo. 2015a. The Impact of Cues and User Interaction on the Memorability of System-Assigned Recognition-Based Graphical Passwords. In Eleventh Symposium On Usable Privacy and Security (SOUPS). 185--196."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24177-7_22"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0067"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2020.1858161"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702241"},{"key":"e_1_2_1_13_1","volume-title":"Understanding Your Users: A Practical Guide to User Research Methods 2 ed.)","author":"Baxter Kathy","unstructured":"Kathy Baxter, Catherine Courage, and Kelly Caine. 2015. Understanding Your Users: A Practical Guide to User Research Methods 2 ed.). Morgan Kaufmann Publishers Inc., San Francisco, CA, USA."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2037373.2037442"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2369220.2369225"},{"key":"e_1_2_1_16_1","volume-title":"Transforming qualitative information: Thematic analysis and code development. sage","author":"Boyatzis Richard E","unstructured":"Richard E Boyatzis. 1998. Transforming qualitative information: Thematic analysis and code development. sage, Thousand Oaks, CA, USA."},{"key":"e_1_2_1_17_1","volume-title":"Using thematic analysis in psychology. Qualitative research in psychology","author":"Braun Virginia","year":"2006","unstructured":"Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology, Vol. 3, 2 (2006), 77--101."},{"key":"e_1_2_1_18_1","volume-title":"One size fits all? What counts as quality practice in (reflexive) thematic analysis? Qualitative research in psychology","author":"Braun Virginia","year":"2021","unstructured":"Virginia Braun and Victoria Clarke. 2021. One size fits all? What counts as quality practice in (reflexive) thematic analysis? Qualitative research in psychology, Vol. 18, 3 (2021), 328--352."},{"key":"e_1_2_1_19_1","volume-title":"Eighteenth Symposium on Usable Privacy and Security (SOUPS","author":"Chen Jiayi","year":"2022","unstructured":"Jiayi Chen, Urs Hengartner, and Hassan Khan. 2022. Sharing without Scaring: Enabling Smartphones to Become Aware of Temporary Sharing. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). 671--685."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/3235866.3235888"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.55"},{"key":"e_1_2_1_22_1","doi-asserted-by":"crossref","unstructured":"S. Chiasson P. C. van Oorschot and R. Biddle. 2007. Graphical password authentication using Cued Click Points. In ESORICS.","DOI":"10.1007\/978-3-540-74835-9_24"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3491102.3517501"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDIM.2009.5356782"},{"key":"e_1_2_1_25_1","first-page":"18642","article-title":"Nudge Theory in Information Systems Research A Comprehensive Systematic Review of the Literature. In Academy of Management Proceedings, Vol. 2018. Academy of Management Briarcliff Manor","volume":"10510","author":"Collier Cassandra Artman","year":"2018","unstructured":"Cassandra Artman Collier. 2018. Nudge Theory in Information Systems Research A Comprehensive Systematic Review of the Literature. In Academy of Management Proceedings, Vol. 2018. Academy of Management Briarcliff Manor, NY 10510, 18642.","journal-title":"NY"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540--4560.1977.tb01885.x"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445301"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3328915"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3313831.3376747"},{"key":"e_1_2_1_30_1","volume-title":"International Conference on Active Media Technology. Springer, 195--206","author":"Hoe-Lian Goh Dion","year":"2009","unstructured":"Dion Hoe-Lian Goh, Rebecca P Ang, Alton YK Chua, and Chei Sian Lee. 2009. Why we share: A study of motivations for mobile media sharing. In International Conference on Active Media Technology. Springer, 195--206."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2399016.2399061"},{"key":"e_1_2_1_32_1","volume-title":"Bangladesh. In Proceedings of the 2020 International Conference on Information and Communication Technologies and Development. 1--12","author":"Taiabul Haque SM","year":"2020","unstructured":"SM Taiabul Haque, MD Romael Haque, Swapnil Nandy, Priyank Chandra, Mahdi Nasrullah Al-Ameen, Shion Guha, and Syed Ishtiaque Ahmed. 2020. Privacy vulnerabilities in public digital service centers in Dhaka, Bangladesh. In Proceedings of the 2020 International Conference on Information and Communication Technologies and Development. 1--12."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335359"},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction","volume":"3","author":"Ibtasam Samia","year":"2019","unstructured":"Samia Ibtasam, Lubna Razaq, Maryam Ayub, Jennifer R Webster, Syed Ishtiaque Ahmed, and Richard Anderson. 2019. \"My cousin bought the phone for me. I never go to mobile shops.\" The Role of Family in Women's Technological Inclusion in Islamic Culture. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (2019), 1--33."},{"key":"e_1_2_1_35_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction","volume":"3","author":"Jack Margaret C","year":"2019","unstructured":"Margaret C Jack, Pang Sovannaroth, and Nicola Dell. 2019. \"Privacy is not a concept, but a way of dealing with life\" Localization of Transnational Technology Platforms and Liminal Privacy Practices in Cambodia. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (2019), 1--19."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2957276.2957296"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335369"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518953"},{"key":"e_1_2_1_39_1","volume-title":"Understanding mobile phone sharing and the concerns it elicits in rural Kenya. for (e) dialogue","author":"Komen Leah","year":"2016","unstructured":"Leah Komen. 2016. ?Here you can use it\": Understanding mobile phone sharing and the concerns it elicits in rural Kenya. for (e) dialogue, Vol. 1, 1 (2016), 52--65."},{"key":"e_1_2_1_40_1","volume-title":"Proceedings of the ACM on Human-Computer Interaction","volume":"5","author":"Lin Junchao","year":"2021","unstructured":"Junchao Lin, Jason I Hong, and Laura Dabbish. 2021. \" It's our mutual responsibility to share\" The Evolution of Account Sharing in Romantic Couples. Proceedings of the ACM on Human-Computer Interaction, Vol. 5, CSCW1 (2021), 1--27."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290605.3300819"},{"key":"e_1_2_1_42_1","volume-title":"Twelfth Symposium on Usable Privacy and Security (SOUPS","author":"Mathur Arunesh","year":"2016","unstructured":"Arunesh Mathur, Josefine Engel, Sonam Sobti, Victoria Chang, and Marshini Chetty. 2016. \" They Keep Coming Back Like Zombies\": Improving Software Updating Interfaces. In Twelfth Symposium on Usable Privacy and Security (SOUPS 2016). 43--58."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858051"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3415217"},{"key":"e_1_2_1_45_1","volume-title":"Fourteenth Symposium on Usable Privacy and Security (SOUPS). 83--102","author":"Park Cheul Young","year":"2018","unstructured":"Cheul Young Park, Cori Faklaris, Siyan Zhao, Alex Sciuto, Laura Dabbish, and Jason Hong. 2018. Share and share alike? An exploration of secure behaviors in romantic relationships. In Fourteenth Symposium on Usable Privacy and Security (SOUPS). 83--102."},{"key":"e_1_2_1_46_1","volume-title":"USENIX Security Symposium. 1949--1966","author":"Reichel Jake","year":"2020","unstructured":"Jake Reichel, Fleming Peck, Mikako Inaba, Bisrat Moges, Brahmnoor Singh Chawla, and Marshini Chetty. 2020. 'I have too much respect for my elders': Understanding South African Mobile Users' Perceptions of Privacy and Current Behaviors on Facebook and WhatsApp. In USENIX Security Symposium. 1949--1966."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3170427.3188671"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29387-1_5"},{"key":"e_1_2_1_49_1","volume-title":"Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018","author":"Sambasivan Nithya","year":"2018","unstructured":"Nithya Sambasivan, Garen Checkley, Amna Batool, Nova Ahmed, David Nemer, Laura Sanely Gayt\u00e1n-Lugo, Tara Matthews, Sunny Consolvo, and Elizabeth Churchill. 2018. \"Privacy is not for me, ittextquoterights for those rich women\": Performative Privacy Practices on Mobile Phones by Women in South Asia. In Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018). USENIX Association, Baltimore, MD, 127--142. https:\/\/www.usenix.org\/conference\/soups2018\/presentation\/sambasivan"},{"key":"e_1_2_1_50_1","volume-title":"Exploring mobile phone-sharing practices in Ghana. info","author":"Sey Araba","year":"2009","unstructured":"Araba Sey. 2009. Exploring mobile phone-sharing practices in Ghana. info (2009)."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3126594.3126633"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557377"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359185"},{"key":"e_1_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Julie Thorpe Brent MacRae and Amirali Salehi-Abari. 2013. Usability and Security Evaluation of GeoPass: A Geographic Location-Password Scheme. In SOUPS.","DOI":"10.1145\/2501604.2501618"},{"key":"e_1_2_1_55_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS","author":"Ur Blase","year":"2015","unstructured":"Blase Ur, Fumiko Noma, Jonathan Bees, Sean M Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. 2015. \" I Added'!'at the End to Make It Secure\": Observing Password Creation in the Lab. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). 123--140."},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3209811.3209818"},{"key":"e_1_2_1_57_1","volume-title":"Towards Privacy-Aware Mobile Device Sharing. In 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI\/SPMU).","author":"Zezschwitz Emanuel Von","year":"2012","unstructured":"Emanuel Von Zezschwitz and Alina Hang. 2012. Towards Privacy-Aware Mobile Device Sharing. In 4th International Workshop on Security and Privacy in Spontaneous Interaction and Mobile Phone Use (IWSSI\/SPMU)."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2371574.2371636"},{"key":"e_1_2_1_59_1","doi-asserted-by":"crossref","unstructured":"S. Wiedenbeck J. Waters J. Birget A. Brodskiy and N. Memon. 2005. Authentication using graphical passwords: Effects of tolerance and image choice. In SOUPS.","DOI":"10.1145\/1073001.1073002"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998181.2998352"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40548-3_82"}],"container-title":["Proceedings of the ACM on Human-Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579595","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3579595","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:25Z","timestamp":1750182685000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3579595"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,14]]},"references-count":60,"journal-issue":{"issue":"CSCW1","published-print":{"date-parts":[[2023,4,14]]}},"alternative-id":["10.1145\/3579595"],"URL":"https:\/\/doi.org\/10.1145\/3579595","relation":{},"ISSN":["2573-0142"],"issn-type":[{"value":"2573-0142","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,14]]},"assertion":[{"value":"2023-04-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}