User Interaction with Smartphone Security and Privacy Mechanisms

Total Page:16

File Type:pdf, Size:1020Kb

User Interaction with Smartphone Security and Privacy Mechanisms User interaction with smartphone security and privacy mechanisms Interaktion von Nutzern mit Sicherheits- und Privatsph¨aremechanismen von Smartphones Der Rechts- und Wirtschaftswissenschaftlichen Fakult¨at/ dem Fachbereich Wirtschafts- und Sozialwissenschaften der Friedrich-Alexander-Universit¨atErlangen-N¨urnberg zur Erlangung des Doktorgrades Dr. rer. pol. vorgelegt von Lena Reinfelder M.Sc. aus Forchheim Als Dissertation genehmigt von der Rechts- und Wirtschaftswissenschaftlichen Fakult¨at/ vom Fachbereich Wirtschafts- und Sozialwissenschaften der Friedrich-Alexander-Universit¨atErlangen-N¨urnberg Promotionstermin: 09. Juli 2019 Tag der mundlichen¨ Prufung¨ : 02. Juli 2019 Vorsitzender des Promotionsorgans: Prof. Dr. Markus Beckmann Gutachter: Prof. Dr. Freimut Bodendorf Prof. Dr. Felix Freiling Abstract In the last ten years, smartphones revolutionized the way people are using and accessing the Internet. Today it is possible to go online (almost) anytime and anywhere. Further- more, smartphones have become an integral part of our world influencing social contacts, media usage and business processes. This growing importance and usage of smartphones also leads to an increased demand in security and privacy measures. While in the private context, the smartphone operating system providers implement security and privacy mechanisms, in the business context organizational IT departments often take the role in providing appropriate additional security measures. In this thesis, we investigate how users in a private context as well as in a business context interact with security mechanisms. First, we consider private smartphone usage with special regard to user interaction with the permission systems and application handling of the different smartphone operating systems of Google and Apple. We examine security and privacy attitudes, behavior of smartphone users as well as the relationship between the different smartphone platforms (Android and iOS) and security and privacy aspects. We apply quantitative as well as qualitative research methods in order to gain these insights by conducting and analyzing online-based surveys and semi-structured interviews. According to our results, we conclude that iOS is considered more secure than Android, which results in a feeling of responsibility for security by Android users. Also, Android users seem to be more security and privacy aware than iOS users mostly because they notice Android permissions. Further, the runtime permission model is perceived as more useful and evokes a more positive emotional attitude than the former Android permission model. With this research, we contribute to a better understanding of the role of the specific security and privacy features, such as permission systems and application handling. In doing so, we facilitate improvements of the current and future development of security and privacy features of mobile systems, such that the systems can be better adjusted with perceptions, concerns and requirements of the users. Second, we investigate interactions of smartphone users with security mechanisms in an organizational context. We first conduct a structured literature review. We base our search on the Dynamic Security Success Model (DSSM), which we develop according to the Organizational Learning Theory and the Information Systems Success Model. The DSSM provides insights into organizational smartphone security processes and reveals research gaps. According to the identified research gaps, we conduct semi-structured interviews with security managers from large-scale German organizations as well as with employees from various companies. We investigate the process of smartphone security development and implementation in organizations and uncover effects of these security mechanisms on the behavior of employees. The results reveal that smartphone security development in organizations lacks organizational structures for including users into this process. This leads to a negative perception of users by security managers and consequently in a control-oriented, rather than a user-oriented approach. The insights gained through our research help organizations to reconsider the role of employees during the development phase of their security solutions as usability of security measures is essential for their effectiveness. Zusammenfassung In den letzten zehn Jahren haben Smartphones die Art, wie Menschen das Internet nutzen und darauf zugreifen, revolutioniert. Es ist heute m¨oglich, von (nahezu) uberall¨ und zu jeder Zeit das Internet zu nutzen. Weiterhin sind Smartphones zu einem Teil unserer Welt geworden, der nicht mehr wegzudenken ist und Einfluss auf soziale Kontakte, Mediennutzung und Gesch¨aftsprozesse nimmt. Die wachsende Bedeutung und Nutzung von Smartphones fuhrt¨ auch zu einer erh¨ohten Nachfrage von Sicherheits- und Privatsph¨aremaßnahmen. W¨ahrend im privaten Kontext die Smartphone-Hersteller Sicherheits- und Privatsph¨aremechanismen zur Verfugung¨ stellen, sind es im Unternehmenskontext oftmals die IT-Abteilungen der Unternehmen, welche diese Rolle ubernehmen¨ und entsprechende zus¨atzliche Sicherheitsmaßnahmen ein- setzen. In der vorliegenden Arbeit wird untersucht, wie Nutzer mit Sicherheitsmaßnahmen sowohl in einem privaten als auch in einem beruflichen Kontext interagieren. Zuerst wird die private Smartphonenutzung betrachtet, insbesondere die Interakti- on der Nutzer mit den Berechtigungssystemen und ihren Umgang mit Applikatio- nen der Smartphone-Betriebssysteme von Google und Apple. Die Sicherheits- und Privatsph¨areeinstellungen, das Verhalten der Smartphonenutzer sowie die Beziehung zwischen der Art des Smartphones (Android und iOS) und den Sicherheits- und Pri- vatsph¨areaspekten werden untersucht. Dazu werden sowohl quantitative als auch qua- litative Forschungsmethoden angewendet, indem online-basierte Umfragen und halb- strukturierte Interviews durchfuhrt¨ und analysiert werden. Ausgehend von den Ergebnis- sen, schließen wir, dass iOS sicherer als Android wahrgenommen wird, was zu einem Gefuhl¨ der Verantwortung fur¨ Sicherheit bei Android Nutzern fuhrt.¨ Ebenso scheinen Android Nutzer ein ausgepr¨agteres Bewusstsein fur¨ Sicherheit und Privatsph¨are zu haben, als iOS Nutzer. Dieses Bewusstssein ist vor allem der Nutzerwahrnehmung von Android Berech- tigungen zuzuschreiben. Weiterhin wird das runtime Berechtigungssystem als nutzlicher¨ und als positiver wahrgenommen, im Vergleich zum vorherigen Berechtigungssystem. Mit dieser Forschung leisten wir einen Beitrag zu einem verbesserten Verst¨andnis davon, welche Rolle Sicherheits- und Privatsph¨arefunktionen spielen, wie z.B. das Berechti- gungssystem und der Umgang mit Apps. Somit erm¨oglichen wir Verbesserungen in der heutigen und zukunftigen¨ Entwicklung von Sicherheits- und Privatsph¨arefunktionen von mobilen Systemen, wodurch diese besser auf Nutzerwahrnehmungen, Bedenken und Anforderungen abgestimmt werden k¨onnen. Zweitens wird die Interaktion von Smartphonenutzern mit Sicherheitsmechanismen im Unternehmenskontext untersucht. Dazu wird eine strukturierte Literaturanalyse durch- gefuhrt.¨ Die Literatursuche basiert auf dem eigens entwickelten Dynamic Security Success Model (DSSM), welches sich von der Organizational Learning Theorie und dem In- formation Systems Success Model ableitet. Das DSSM beinhaltet Erkenntnisse uber¨ organisationelle Smartphone-Sicherheitsprozesse und identifiziert Forschungslucken.¨ Aus- gehend von den identifizierten Forschungslucken,¨ fuhren¨ wir halb-strukturierte Interviews mit Sicherheitsmanagern aus deutschen Großunternehmen durch, sowie mit Mitarbei- tern aus unterschiedlichen Unternehmen. Das Ziel ist es, den Prozess der Smartphone- Sicherheitsentwicklung und Umsetzung in Unternehmen zu untersuchen und Auswirkun- gen dieser Sicherheitsmaßnahmen auf das Verhalten der Mitarbeiter offen zu legen. Die Ergebnisse offenbaren, dass bei der Entwicklung von Smartphone-Sicherheit in Unterneh- men organisationelle Strukturen fehlen, um Nutzer in diesen Prozess einzubinden. Dies fuhrt¨ zu einer negativen Wahrnehmung der Nutzer durch Sicherheitsmanager und in der Konsequenz zu einem kontrollorientierten und nicht einem nutzerorientierten Ansatz. Die Erkenntnisse aus diesen Untersuchungen helfen Unternehmen die Rolle der Mitarbeiter im Entwicklungsprozess von Sicherheitsl¨osungen zu berucksichtigen,¨ da die Benutzbarkeit von Sicherheitsmaßnahmen essentiell fur¨ deren Effektivit¨at ist. Acknowledgments This thesis would not have been possible without quite a number of people. First of all, I want to thank my doctoral advisors Felix Freiling and Zinaida Benenson for giving me the chance to work at the chair of IT-Security Infrastructures at the Department of Computer Science at the FAU Erlangen-N¨urnberg. They supported me during various projects and helped me to overcome challenges regarding my research topic. In addition, I want to thank Freimut Bodendorf for his collaboration, which allowed me to work at the lab of Felix Freiling, while at the same time working on my thesis at the faculty of business, economics and law. He provided me with feedback on my work at numerous doctoral seminars. Furthermore, I would like to thank my colleagues at the lab, who provided me with support for content issues and even more important, who made me feel welcome. Last but not least, I want to thank my family, my parents and my brother Samuel, for supporting me in every condition of my life. And most importantly, I want to thank my husband Daniel (who I married, with whom I renovated an entire house,
Recommended publications
  • Gmail for Devices.Docx
    Gmail onto iPads Follow the steps below to setup Google Sync on your iPhone, iPad, or iPod Touch. Getting Started 1. Open the Settings application on your device's home screen. 2. Open Mail, Contacts, Calendars. 3. Press Add Account.... 4. Select Microsoft Exchange Enter Account Info 5. In the Email field, enter your full Google Account email address. Use your sedubois account: Example is [email protected], you may see an "Unable to verify certificate" warning when you proceed to the next step. 6. Leave the Domain field blank. 7. Enter your full Google Account email address as the Username. 8. Enter your Google Account password as the Password. 9. Tap Next at the top of your screen. 9a. Choose Cancel if the Unable to Verify Certificate dialog appears. 10. When the new Server field appears, enter m.google.com. ● To access m.google.com, set the language to English (US). 11. Press Next at the top of your screen again. Set up "Send Mail As" feature Enable "Send Mail As" feature Gmail and Google Apps users can send mail from a custom "From" address using the web browser on their iOS device or computer. 1. Sign in to Gmail using your web browser. 2. Click the gear in the top right. 3. Select Settings. 4. Select the Accounts tab. 5. Under Send mail as, click Add another email address you own. 6. In the Email address field, enter your name and alternate email address. If you want this address to be your default one, deselect Treat as an alias.
    [Show full text]
  • Amicus Link Guide: Google Contacts & Calendar
    Amicus Link Guide: Google Contacts & Calendar Applies to: Amicus Attorney Synchronize your Amicus and Google contacts and appointments. About the Link 2 What you need 2 Advantages of using the Link 3 Link overview 4 Synchronization direction 4 When synchronizations occur 4 Administering the Link at the firm level 5 Amicus Administrator checklist 5 Ensuring that Firm Members have access rights 5 Configuring the Link 6 Firm Member checklist 6 Special note if upgrading from an earlier version of Amicus Attorney 6 Using the Link Configuration wizard 7 Initializing the Link 14 Using the Link after initialization 16 Synchronizing information 16 Flagging individual Amicus Contacts & Appointments for synchronization 16 Preference settings for new items 17 Changing your Link configuration 18 Disabling the Link 18 Synchronization details 19 Match criteria 19 Contact synchronizations 20 Appointment synchronizations 21 Troubleshooting 23 Google Link Log 23 Resetting the Link 23 Other Important Information 24 Amicus Google Contacts & Calendar Link Guide © 2020 Abacus Data Systems Canada, Inc. 1 About the Link The Amicus Google Contacts & Calendar Link provides bi-directional synchronization that aligns your Amicus and Google Contacts and Appointments, and optionally Amicus Firm Members. And the sync is server-side. That means your Amicus workstation doesn’t have to be running when the sync takes place—a sync takes place automatically about every 15 minutes, regardless. And your assistant can do an immediate sync for you if necessary. You stay up to date when away from the office. Only Amicus Contacts and Appointments that are individually designated by you are synchronized. You select which of your Google Calendars to synchronize.
    [Show full text]
  • Technology Tidbits Title
    Volume 4, Issue 1 August 2017 C O L C H E S T E R I NFORMATION T E C H N O L O G Y D EPARTMENT T ECHNOLOGY TIDBITS INSIDE THIS ISSUE: Welcome Back! T ITLE Welcome Back 1 Welcome back to the Colchester School District for the 2017 – 2018 school year. We hope that Movie Creation 1 you had a fantastic summer. It is hard to believe Old Wireless 2 we are ready to start a new school year. This summer has been quite busy for IT, as we have Team Drive 3 been preparing technology for the start of the new school year. If you return to your building Android Apps 3 and/or classroom and something is not as you Windows 10 4 desire, please submit a helpdesk ticket, and we will help you as quickly as possible. Laptops for CHS Students! Interactive Projectors 5 Certain classrooms received new interactive Google Drive Sync 5 respond appropriately to your needs and projectors over the summer whereas others had to get the most out of our limited Technology Helpdesk 6 them installed towards the end of last year. If resources. I often hear when I am out in anyone needs a refresher course on how to use the buildings that technology is not the new technology, please review the article on working properly. When I inquire further, the subject later in this newsletter. If you need a it is not uncommon to learn that a more personal touch, please submit a helpdesk conversation was had with a technician in ticket.
    [Show full text]
  • Better Alignment of Flash Storage to Mobile System Behavior
    The SanDisk Brand § A global leader in storage technology § Most compelling value proposition § Unmatched innovation and IP § We are Data Champions 1 The Better Alignment of Managed Flash To System Behavior Alex Lemberg SW Manager 2 Agenda § Flash Storage in Mobile & Embedded § Real Performance Requirements § The Gap Between Synthetic and User Activities § Usage Case – Performance Peaks § How to Handle Performance Peaks in Flash Management Architecture § How it Affects the Endurance § Driver Support How to Get Better Performance? 3 Embedded Flash Memory is Everywhere IoT MOBILE WEARABLES COMPUTE HOME AUTO INDUSTRIAL 4 The “Real” Storage Performance Requirements § What is the Most Important Performance Metric? Sequential Write (MB/Sec) Sequential Read (MB/Sec) – Synthetic Benchmarks Random Write (IOPS) Random Read (IOPS) SQL Insert/Update/Delete IO Latency – System Analysis IO Flow IO Stack Level ? App Launch Time – User Experience Boot Time Multitasking Etc. 5 Getting IO Metrics – Is the Key 24-96 Hours of intensive “managed” user activity Statistics System Analysis & Research Wide platforms coverage Simulations \ Testing User Experience Various Android & Linux Versions 7 OEMs 16GB-64GB High End/Mid Range 1GB-4GB RAM EXT4/F2FS Regions 6 Enhanced Low Level Tracing Catch the Process and FS Info eMMC Device Driver Trace point eMMC Host Controller eMMC Device 7 Enhanced Low Level Tracing Allows to Gather Per-Process Stat. User Operation Context Gmail, W PS In stagram WifiDirect + Gmail 2.5K Night Suspend AppInstall + 4 K P layb ack (~16 Hours)
    [Show full text]
  • Open Thesis.Pdf
    The Pennsylvania State University The Graduate School ENERGY OPTIMIZATION FOR WIRELESS COMMUNICATIONS ON MOBILE DEVICES A Dissertation in Computer Science and Engineering by Yi Yang c 2018 Yi Yang Submitted in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy May 2018 The dissertation of Yi Yang was reviewed and approved∗ by the following: Guohong Cao Professor of Computer Science and Engineering Dissertation Advisor, Chair of Committee George Kesidis Professor of Computer Science and Engineering Professor of Electrical Engineering Sencun Zhu Associate Professor of Computer Science and Engineering Dinghao Wu Associate Professor of Information Sciences and Technology Mahmut Taylan Kandemir Professor of Computer Science and Engineering Graduate Program Chair of Computer Science and Engineering ∗Signatures are on file in the Graduate School. Abstract Mobile devices such as smartphones and smartwatches are becoming increasingly popular accompanied with a wide range of apps. Those apps usually require data communications through wireless interfaces, which will drain the battery quickly. Thus, it is of great value to characterize the energy consumption of wireless com- munications and propose energy saving solutions. The specific goal of this dissertation is to optimize the energy consumption of wireless communications on mobile devices. Specifically, this dissertation has four foci. First, we propose network quality aware prefetching algorithms to save energy for in-app advertising. The cellular interface on smartphones continues to consume a large amount of energy after a data transmission (referred to as the long tail problem). Then periodically fetching ads through the cellular network may lead to significant battery drain on smartphones. To reduce the tail energy, we can predict the number of ads needed in the future and then prefetch those ads together.
    [Show full text]
  • Android Upload File to Google Drive Example
    Android Upload File To Google Drive Example Isador often revindicating generously when unanalyzable Foster scandals frontward and cesses her leftover. Normand sheusually obtruding calved deplorablyunrhythmically and colloguedor rewritten her vacillatingly Mahratti. when conflagrant Cris bringing again and goofily. Gere is naevoid: Over flow see it will open a scanner you can select an android application frowned upon a file privacy policy also more more interesting library to example to upload file. If upload all derived assets, drive android example of uploaded. If upload files uploaded in drive rest apis is what is that was right direction to example, video on how? To do so we future to Google Drive SDK and Google Authentication Base on Google Drive Rest API we are arbitrary to off that. The Upload File To ASPNET Web API Client is your console client. The article introduces 2 methods to upload iMovie to Google Drive. Just keep in mind point you have was have right set route through your apps in eligible to activate this option. Upload File to Google Drive Feature Requests AppSheet. Listen for authentication whenever the file sharing, those files before uploading tool is? Store files upload file uploads. One example uploading is uploaded file upload command key from android? Founder of Android Example. Please ignore the example the client id for those? So i believe nothing to upload file google drive example for example below will be obtained from. Therefore, rename it, or mobile client. The Drive API allows you to upload file data when you create open update a. Google Drive Api Upload File Javascript.
    [Show full text]
  • Signing in with Google Chrome
    Signing in with Google Chrome Google has this cool feature called Google Sync, which keeps all your extensions, bookmarks and settings synchronized across machines. It also means if something happens to your computer, you don’t lose all your bookmarks! Setting up Google Sync On a Chromebook Google Sync is already automatic on a Chromebook, just log in and you’re done! On Windows Open Google Chrome Click the little guy in the top right hand corner (if it says your name up here, then you’re already done) Click Sign in to Chrome Enter your email address (that is, your [email protected], then log in via the normal school login (without the @lism.catholic.edu.au). Click Link Data. This will put any bookmarks you’ve already got onto your Google Chrome account so everything will sync up. All done! Now whenever you get onto a new machine and want to sync your Google Chrome account, repeat the above process to sign into your account, and it will sync all your settings over to the new computer. Note: if you’ve got a lot of extensions it might take a couple minutes for everything to load up. Bonus Tips Bookmarks Bar The Bookmarks Bar is glorious. Hit the little star on the right of the address bar and choose to add the link to your Bookmarks bar (if it’s not showing, hit Control-Shift-B to make it come up). Here’s what mine looks like: Bonus Bonus Tips: ● Group items into folders based on topics.
    [Show full text]
  • Files Tab (Google Drive Sync) Basics: All Users
    A REALVOLVE HOW-TO | By Mark Stepp ​ Files Tab (Google Drive Sync) Basics: All Users Realvolve now has the ability to sync the files tab of Contacts, Properties and Transactions with your linked Google Drive. Any files uploaded to Realvolve will automatically sync to the Google folder and files uploaded to Google will sync to the Realvolve files tab automatically once the Google folder is linked. (SEE VIDEO) ​ ​ SETUP: In order to link a Google Drive folder you MUST have your Google Account connected. ​ ​ Settings > My Social Network > [Add Google Account] NOTE: You will be required to REAUTHORIZE your Google account if you had connected your Google account prior to the release of this feature. Realvolve must be authorized with more permissions to perform the Google sync process. Settings > My Social Network > [Reauthorize Google Account] USAGE: 1. To link a Google Drive folder, go to the Files tab of a Contact, Property or Transaction and click on the [Google Drive] button. 2. A) Shows the current path and the ability to move “Back” one folder. B) Click [New Folder] to add a new folder to the current path. C) Highlighted folder is the current “chosen” folder which will be selected if the [Save] button is pressed. D) Click the (+) button to add a sub-folder to the highlighted folder. E) Click the (>) button to open the highlighted folder (double click works also) F) Click the [Save] button to select the highlighted folder to sync with. 3. Once a folder is chosen using the [Save] button all files will be sync’d (both ways).
    [Show full text]
  • Setting up Iphone with Google Apps
    Mobile Home Google for Your Phone Mobile Apps Blog Help Setting up Google Sync with your iOS device Setup Sync Calendars Known Issues Follow the steps below to setup Google Sync on your iPhone, iPad, or iPod Touch. Requirements and Backing Up Data 1.Google Sync is only supported on Apple iOS versions 3.0 and above. You can check your current version by going to Settings > General > About > Version. If you're running an iOS before 3.0, upgrade to the latest iOS on Apple's site: http://www.apple.com/ios/ before setting up Google Sync. 2. Perform a sync with iTunes to ensure that Contacts and Calendars from your iOS device are backed up to your computer. Learn more about backing up your Contacts and Calendars. 3. If your business, school, or organization uses Google Apps, your administrator will first need to enable Google Sync before you can take advantage of this feature. Note that if you enable Google Sync, your administrator may also have additional remote management capabilities (such as remote wipe or password requirements). Click to learn more or contact your administrator. Getting Started 1. Open the Settings application on your device's home screen. 2. Open Mail, Contacts, Calendars. 3. Press Add Account.... 4. Select Microsoft Exchange. iOS 4.0+ allows multiple Exchange accounts. However, if you're on a device that doesn't let you add a second account, you could also use CalDAV to sync Google Calendar and IMAP to sync Gmail. Enter Account Info 5. In the Email field, enter your full Google Account email address.
    [Show full text]
  • Google Apps Technical Transition Guide for Business, Education, and Government
    Google Apps Technical Transition Guide For Business, Education, and Government Google, Inc. 1600 Amphitheatre Parkway Mountain View, CA 94043 www.google.com Part number: GATTG_1.4 August 12, 2015 © Copyright 2015 Google, Inc. All rights reserved. Google, the Google logo, Google Apps, Google Apps Mail, Google Docs, Google Calendar, Google Sites, Google Video, Google Talk, Gmail, Google Message Filtering, Google Message Security, Google Message Discovery are trademarks, registered trademarks, or service marks of Google Inc. All other trademarks are the property of their respective owners. Use of any Google solution is governed by the license agreement included in your original contract. Any intellectual property rights relating to the Google services are and shall remain the exclusive property of Google, Inc. and/or its subsidiaries (“Google”). You may not attempt to decipher, decompile, or develop source code for any Google product or service offering, or knowingly allow others to do so. Google documentation may not be sold, resold, licensed or sublicensed and may not be transferred without the prior written consent of Google. Your right to copy this manual is limited by copyright law. Making copies, adaptations, or compilation works, without prior written authorization of Google. is prohibited by law and constitutes a punishable violation of the law. No part of this manual may be reproduced in whole or in part without the express written consent of Google. Copyright © by Google Inc. Google provides this publication “as is” without warranty of any either express or implied, including but not limited to the implied warranties of merchantability or fitness for a particular purpose.
    [Show full text]
  • Networking Best Practices for Large Deployments Google, Inc
    Networking Best Practices for Large Deployments Google, Inc. 1600 Amphitheatre Parkway Mountain View, CA 94043 www.google.com Part number: NETBP_GAPPS_3.8 November 16, 2016 © Copyright 2016 Google, Inc. All rights reserved. Google, the Google logo, G Suite, Gmail, Google Docs, Google Calendar, Google Sites, Google+, Google Talk, Google Hangouts, Google Drive, Gmail are trademarks, registered trademarks, or service marks of Google Inc. All other trademarks are the property of their respective owners. Use of any Google solution is governed by the license agreement included in your original contract. Any intellectual property rights relating to the Google services are and shall remain the exclusive property of Google, Inc. and/or its subsidiaries (“Google”). You may not attempt to decipher, decompile, or develop source code for any Google product or service offering, or knowingly allow others to do so. Google documentation may not be sold, resold, licensed or sublicensed and may not be transferred without the prior written consent of Google. Your right to copy this manual is limited by copyright law. Making copies, adaptations, or compilation works, without prior written authorization of Google. is prohibited by law and constitutes a punishable violation of the law. No part of this manual may be reproduced in whole or in part without the express written consent of Google. Copyright © by Google Inc. Google provides this publication “as is” without warranty of any either express or implied, including but not limited to the implied warranties of merchantability or fitness for a particular purpose. Google Inc. may revise this publication from time to time without notice.
    [Show full text]
  • Sony Ericsson Mobile Communications AB Or Its Local Affiliated Company, Without Any Warranty
    X8 Extended User guide Contents User support.................................................................................5 User guide in the phone......................................................................5 User support application.....................................................................5 Experience more. Discover how..........................................................5 Getting started..............................................................................6 Assembly............................................................................................6 Turning the phone on and off..............................................................7 Starting your phone for the first time....................................................7 Getting to know your phone......................................................10 Phone overview.................................................................................10 Charging the battery.........................................................................11 Using the hardware keys...................................................................11 Home screen....................................................................................11 Status bar.........................................................................................12 Notification panel..............................................................................14 Applications panes............................................................................14 Recently
    [Show full text]