Usability of End-to-End Encryption in E-Mail Communication

被引:5
|
作者
Reuter, Adrian [1 ]
Abdelmaksoud, Ahmed [2 ]
Boudaoud, Karima [3 ]
Winckler, Marco [3 ]
机构
[1] Tech Univ Munich, Dept Informat, Munich, Germany
[2] Univ Cote dAzur, Poytech Nice Sophia, Nice, France
[3] Univ Cote dAzur, CNRS, I3S, Nice, France
来源
FRONTIERS IN BIG DATA | 2021年 / 4卷
关键词
e-mail encryption; user study; user testing; usability; PGP; S/MIME; PEP;
D O I
10.3389/fdata.2021.568284
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the results of a usability study focused on three end-to-end encryption technologies for securing e-mail traffic, namely PGP, S/MIME, and Pretty Easy Privacy (pEp). The findings of this study show that, despite of existing technology, users seldom apply them for securing e-mail communication. Moreover, this study helps to explain why users hesitate to employ encryption technology in their e-mail communication. For this usability study, we have combined two methods: 1) an online survey, 2) and user testing with 12 participants who were enrolled in tasks requiring e-mail encryption. We found that more than 60% of our study participants (in both methods) are unaware of the existence of encryption technologies and thus never tried to use one. We observed that above all, users 1) are overwhelmed with the management of public keys and 2) struggle with the setup of encryption technology in their e-mail software. Nonetheless, 66% of the participants consider secure e-mail communication as important or very important. Particularly, we found an even stronger concern about identity theft among e-mail users, as 78% of the participants want to make sure that no other person is able to write e-mail on their behalf.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] DCGAN-based symmetric encryption end-to-end communication systems
    An, Yongli
    Wang, Mengtao
    Chen, Lei
    Ji, Zhanlin
    AEU-INTERNATIONAL JOURNAL OF ELECTRONICS AND COMMUNICATIONS, 2022, 154
  • [2] Poster: Communication in Open-Source Projects-End of the E-mail Era?
    Kaefer, Verena
    Graziotin, Daniel
    Bogicevic, Ivan
    Wagner, Stefan
    Ramadani, Jasmin
    PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING - COMPANION (ICSE-COMPANION, 2018, : 242 - 243
  • [3] Research on end-to-end encryption of TETRA
    Beijing FORICH Software Technology Co. Ltd., Network Security Division, Beijing 100083, China
    不详
    J. China Univ. Post Telecom., 2006, 2 (70-73):
  • [4] Research on End-to-End Encryption of TETRA
    ZHANG Zhi-hui 1
    2.Information Security Center
    The Journal of China Universities of Posts and Telecommunications, 2006, (02) : 70 - 73
  • [5] SDNS ARCHITECTURE AND END-TO-END ENCRYPTION
    NELSON, R
    HEIMANN, J
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 435 : 356 - 366
  • [6] A European right to end-to-end encryption?
    Shurson, Jessica
    COMPUTER LAW & SECURITY REVIEW, 2024, 55
  • [7] Anonymous Traceback for End-to-End Encryption
    Kenney, Erin
    Tang, Qiang
    Wu, Chase
    COMPUTER SECURITY - ESORICS 2022, PT II, 2022, 13555 : 42 - 62
  • [8] End-to-end solution for mail or electronic messages
    Field, M
    Uemoto, K
    INTERNATIONAL CONFERENCE ON MAIL TECHNOLOGY - TOMORROW'S WORLD: BUSINESS OPPORTUNITIES AND SOLUTIONS IN A GLOBAL MARKET, 1999, 1999 (05): : 3 - 10
  • [9] Chaos Based Joint Compression and Encryption Framework for End-to-End Communication Systems
    Goel, Nidhi
    Raman, Balasubramanian
    Gupta, Indra
    ADVANCES IN MULTIMEDIA, 2014, 2014 (2014)
  • [10] E-mail security: The PKI way - Public key infrastructure end e-mail's similarity to postcards.
    Rothman, M
    COMMUNICATIONS NEWS, 2000, 37 (10): : 14 - 14