Browse > Article
http://dx.doi.org/10.14695/KJSOS.2014.17.4.79

The Effect of an Emotional Factor on User Experience with Smartphone Unlocking Process  

Lee, Sunhwa (HCI Lab, Yonsei University)
Shin, Youngsoo (HCI Lab, Yonsei University)
Im, Chaerin (HCI Lab, Yonsei University)
Beak, Hannah (HCI Lab, Yonsei University)
Lee, Sungho (Management of Technology, Yonsei University)
Kim, Jinwoo (HCI Lab, Yonsei University)
Publication Information
Science of Emotion and Sensibility / v.17, no.4, 2014 , pp. 79-88 More about this Journal
Abstract
Smart-phones have become a vital part of our lives, paying a bill online, shopping using applications, using email and office applications. Therefore, the risk of the leakage of personal informations and the misuse of them becomes high, for the cost of loosing smart-phone. Many types of smart-phone security features such as password, slide-lock, and pattern lock have been introduced. However, those security locks make users not to easily access and use a smart-phone. There is tradeoff between security on one hand, and usability and cost on the other. This paper propose Self-Concealment to solve the tradeoff problem and demonstrate the effect through the experiment. In sum, Self-Concealment lowers smart-phone experience; however increases smart-phone use intension. This paper has implication for proposing new User Experience (UX) construct to resolve the trade-off between security and usability.
Keywords
Smart-phone; Unlocking Process; Security Function; Usability; Self-Concealment; User Experience (UX);
Citations & Related Records
연도 인용수 순위
  • Reference
1 Brostoff, S., & Sasse, M. A. (2000). Are Passfaces more usable than passwords? A field trial investigation. In People and Computers XIV-Usability or Else! (pp. 405-424). Springer London.
2 Buchanan, G., Farrant, S., Jones, M., Thimbleby, H., Marsden, G., & Pazzani, M. (2001, April). Improving mobile internet usability. In Proceedings of the 10th international conference on World Wide Web (pp. 673-680). ACM.
3 Chiasson, S., van Oorschot, P. C., & Biddle, R. (2006, August). A Usability Study and Critique of Two Password Managers. In Usenix Security (Vol. 6).
4 Cranor, L. F., & Garfinkel, S. (2004). Guest Editors' Introduction: Secure or Usable?. Security & Privacy, IEEE, 2(5), 16-18.
5 Elliot, A. J., & Devine, P. G. (1994). On the motivational nature of cognitive dissonance: Dissonance as psychological discomfort. Journal of personality and social psychology, 67(3), 382.   DOI
6 Festinger, L, (1957). A Theory of Cognitive Dissonance. Evanston, IL: Row, Peterson.
7 Hafiz, M. D., Abdullah, A. H., Ithnin, N., & Mammi, H. K. (2008, May). Towards identifying usability and security features of graphical password in knowledge based authentication technique. In Modeling & Simulation, 2008. AICMS 08. Second Asia International Conference on (pp. 396-403). IEEE.
8 Kelly, A. E., & Achter, J. A. (1995). Self-concealment and attitudes toward counseling in university students. Journal of Counseling Psychology, 42(1), 40.   DOI
9 Kim, K., Proctor, R. W., & Salvendy, G. (2012). The relation between usability and product success in cell phones. Behaviour & Information Technology, 31(10), 969-982.   DOI
10 Larson, D. G., & Chastain, R. L. (1990). Self-concealment: Conceptualization, measurement, and health implications. Journal of Social and Clinical psychology, 9(4), 439-455.   DOI
11 Nine out of ten finders of lost smart-phones do 'This' (2012). IT Dong-A, Retrieved December 9, 2013, http://it.donga.com/8991/
12 Afifi, W. A., & Guerrero, L. K. (2000). Motivations underlying topic avoidance in close relationships. In Petronio, S. S. (Eds.), Balancing the secrets of private disclosures (pp. 165-179). Mahwah, NJ, US: Lawrence Erlbaum Associates Publishers.
13 Bederson, B. B., Clamage, A., Czerwinski, M. P., &Robertson, G. G. (2003, April). A fisheye calendar interface for PDAs: Providing overviews for small displays. In CHI'03 extended abstracts on Human factors in computing systems(pp. 618-619). ACM.
14 Norton, R., Feldman, C., & Tafoya, D. (1974). Risk parameters across types of secrets. Journal of Counseling Psychology, 21(5), 450.   DOI
15 Research on the information security in Korea (2013). Korea Internet & Security Agency, Retrieved December 9. 2013, http://isis.kisa.or.kr/
16 Ritz, T., & Dahme, B. (1996). Repression, self-concealment and rationality/emotional defensiveness: The correspondence between three questionnaire measures of defensive coping. Personality and Individual Differences, 20(1), 95-102.   DOI
17 Smart-phone users in Korea unlock their smart-phone once in every six minutes (2013). Joongang Ilbo, Retrieved December 9, 2013, http://article.joins.com/news/article/article.asp?total_id=13497286&ctg=1601
18 Thirty six per cent of the smart-phone users do not set up their own password (2013). Yonhap News, Retrieved December 9, 2013, http://www.yonhapnews.co.kr/international/2013/02/28/0608000000AKR20130228004100091.HTML
19 Yan, J. J., Blackwell, A. F., Anderson, R. J., & Grant, A. (2004). Password Memorability and Security: Empirical Results. IEEE Security & privacy, 2(5), 25-31.   DOI   ScienceOn
20 Zhang, T., Rau, P. L. P., & Salvendy, G. (2010). Exploring critical usability factors for handsets. Behaviour & Information Technology, 29(1), 45-55.   DOI
21 Ziefle, M., Bay, S., & Schwade, A. (2006). On keys' meanings and modes: The impact of different key solutions on children's efficiency using a mobile phone. Behaviour & Information Technology, 25(5), 413-431.   DOI