Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Why doesn’t Jane protect her privacy?
University of Glasgow, UK.
CASED / TU Darmstad, Germany.ORCID iD: 0000-0003-2674-4043
CASED / TU Darmstad, Germany.ORCID iD: 0000-0003-0965-5006
2014 (English)In: Privacy Enhancing Technologies: 14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014. Proceedings / [ed] Emiliano De Cristofaro, Steven J. Murdoch, Springer, 2014, p. 244-262Conference paper, Published paper (Refereed)
Abstract [en]

End-to-end encryption has been heralded by privacy and security researchers as an effective defence against dragnet surveillance, but there is no evidence of widespread end-user uptake. We argue that the non-adoption of end-to-end encryption might not be entirely due to usability issues identified by Whitten and Tygar in their seminal paper “Why Johnny Can’t Encrypt”. Our investigation revealed a number of fundamental issues such as incomplete threat models, misaligned incentives, and a general absence of understanding of the email architecture. From our data and related research literature we found evidence of a number of potential explanations for the low uptake of end-to-end encryption. This suggests that merely increasing the availability and usability of encryption functionality in email clients will not automatically encourage increased deployment by email users. We shall have to focus, first, on building comprehensive end-user mental models related to email, and email security. We conclude by suggesting directions for future research.

Place, publisher, year, edition, pages
Springer, 2014. p. 244-262
Series
Lecture Notes in Computer Science, ISSN 0302-9743, E-ISSN 1611-3349 ; 8555
Keywords [en]
email, end-to-end encryption, privacy, security, mental model
National Category
Computer and Information Sciences
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kau:diva-47225DOI: 10.1007/978-3-319-08506-7_13ISBN: 978-3-319-08505-0 (print)ISBN: 978-3-319-08506-7 (electronic)OAI: oai:DiVA.org:kau-47225DiVA, id: diva2:1051258
Conference
14th International Symposium, PETS 2014, Amsterdam, The Netherlands, July 16-18, 2014
Available from: 2016-12-01 Created: 2016-11-18 Last updated: 2019-11-11Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full text

Authority records BETA

Volkamer, Melanie

Search in DiVA

By author/editor
Volkamer, MelanieRenkema-Padmos, Arne
Computer and Information Sciences

Search outside of DiVA

GoogleGoogle Scholar

doi
isbn
urn-nbn

Altmetric score

doi
isbn
urn-nbn
Total: 114 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • harvard1
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf