Usability of End-to-End Encryption in E-Mail Communication

被引:5
|
作者
Reuter, Adrian [1 ]
Abdelmaksoud, Ahmed [2 ]
Boudaoud, Karima [3 ]
Winckler, Marco [3 ]
机构
[1] Tech Univ Munich, Dept Informat, Munich, Germany
[2] Univ Cote dAzur, Poytech Nice Sophia, Nice, France
[3] Univ Cote dAzur, CNRS, I3S, Nice, France
来源
FRONTIERS IN BIG DATA | 2021年 / 4卷
关键词
e-mail encryption; user study; user testing; usability; PGP; S/MIME; PEP;
D O I
10.3389/fdata.2021.568284
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper presents the results of a usability study focused on three end-to-end encryption technologies for securing e-mail traffic, namely PGP, S/MIME, and Pretty Easy Privacy (pEp). The findings of this study show that, despite of existing technology, users seldom apply them for securing e-mail communication. Moreover, this study helps to explain why users hesitate to employ encryption technology in their e-mail communication. For this usability study, we have combined two methods: 1) an online survey, 2) and user testing with 12 participants who were enrolled in tasks requiring e-mail encryption. We found that more than 60% of our study participants (in both methods) are unaware of the existence of encryption technologies and thus never tried to use one. We observed that above all, users 1) are overwhelmed with the management of public keys and 2) struggle with the setup of encryption technology in their e-mail software. Nonetheless, 66% of the participants consider secure e-mail communication as important or very important. Particularly, we found an even stronger concern about identity theft among e-mail users, as 78% of the participants want to make sure that no other person is able to write e-mail on their behalf.
引用
收藏
页数:21
相关论文
共 50 条
  • [41] An Encryption Protocol for End-to-end Secure Transmission of SMS
    Thomas, Minta
    Panchami, V
    2015 INTERNATIONAL CONFERENCED ON CIRCUITS, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2015), 2015,
  • [43] Implementing End to End Encryption to Communication Apps
    Nalini, N.
    Harini, B.
    7th International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud), I-SMAC 2023 - Proceedings, 2023, : 201 - 209
  • [44] E-mail encryption methods and lawful interception methods of it
    Jeong, Young Sic
    Kang, Shin Gak
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 29 - 32
  • [45] Secure e-mail and databases using chaotic encryption
    Sobhy, MI
    Shehata, AE
    ELECTRONICS LETTERS, 2000, 36 (10) : 875 - 876
  • [46] Robot Deployment with End-to-End Communication Constraints
    Le Ny, Jerome
    Ribeiro, Alejandro
    Pappas, George J.
    2011 50TH IEEE CONFERENCE ON DECISION AND CONTROL AND EUROPEAN CONTROL CONFERENCE (CDC-ECC), 2011, : 4232 - 4238
  • [47] End-to-End Architecture for Adaptive Communication Systems
    Boufidis, Z.
    Alonistioti, N.
    Stamatelatos, M.
    Vogler, J.
    Luecking, U.
    Kloeck, C.
    Grandblaise, D.
    Bourse, D.
    2006 IEEE 64TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-6, 2006, : 3027 - +
  • [48] An End-to-End Communication System with Environmental Adaptability
    Zhao, Chengjie
    Wang, Jun
    Huang, Wei
    Chen, Xiaonan
    Peng, Qihang
    2023 IEEE 98TH VEHICULAR TECHNOLOGY CONFERENCE, VTC2023-FALL, 2023,
  • [49] SIP signaling security for end-to-end communication
    Ono, K
    Tachimoto, S
    APCC 2003: 9TH ASIA-PACIFIC CONFERENCE ON COMMUNICATION, VOLS 1-3, PROCEEDINGS, 2003, : 1042 - 1046
  • [50] Self-stabilizing end-to-end communication
    Johns Hopkins Univ, Baltimore, United States
    J High Speed Networks, 4 (365-381):