Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems 2021
DOI: 10.1145/3411764.3445085
|View full text |Cite
|
Sign up to set email alerts
|

The Annoying, the Disturbing, and the Weird: Challenges with Phone Numbers as Identifiers and Phone Number Recycling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…However, participants' strategies were not foolproof and sometimes led to unnecessary inconveniences or resignations. P26, for example, changed their phone number to avoid excessive spam calls, unaware of alternative strategies like blocking specific numbers or registering on the national Do Not Call list that do not entail the disruption of phone number changes [88]. P20 shared their reliance on service providers such as credit card companies and identity theft monitoring vendors for handling scams rather than self-protection: "I would trust that the credit card company would tell me .…”
Section: Cybercrimementioning
confidence: 99%
“…However, participants' strategies were not foolproof and sometimes led to unnecessary inconveniences or resignations. P26, for example, changed their phone number to avoid excessive spam calls, unaware of alternative strategies like blocking specific numbers or registering on the national Do Not Call list that do not entail the disruption of phone number changes [88]. P20 shared their reliance on service providers such as credit card companies and identity theft monitoring vendors for handling scams rather than self-protection: "I would trust that the credit card company would tell me .…”
Section: Cybercrimementioning
confidence: 99%
“…Particularly, in today's China, mobile payment has become popular, and mobile phones now act as people's electronic wallets. There are a lot of reports that when individuals sell their used mobile phones, their personal information is restored (McDonald et al, 2021;Wang et al, 2021). Thus, people are curious about information security for going toward mobile phone recycling.…”
Section: Information Security Risk Perception and Recycling Behaviormentioning
confidence: 99%
“…The deployment of a recovery procedure by service providers has a significant impact on authentication security and usability. While locking users out of an account after losing access to MFA factors keeps up security assumptions of MFA, it might contribute to users' frustration [61], users leaving a service, or even avoiding MFA in the future. However, allowing users to access their accounts after losing their MFA factors by returning to password-based authentication significantly decreases security, allowing attackers to more easily gain access to user accounts than with MFA.…”
Section: Introductionmentioning
confidence: 99%