Balancing Security and Usability in Encrypted Email
End-to-end encryption is the best way to protect digital messages. Historically, end-to-end encryption has been extremely difficult for people to use, but recent tools have made it more broadly accessible, largely by employing key-directory services. These services sacrifice some security properties...
Gespeichert in:
Veröffentlicht in: | IEEE internet computing 2017-05, Vol.21 (3), p.30-38 |
---|---|
Hauptverfasser: | , , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 38 |
---|---|
container_issue | 3 |
container_start_page | 30 |
container_title | IEEE internet computing |
container_volume | 21 |
creator | Wei Bai Doowon Kim Namara, Moses Yichen Qian Kelley, Patrick Gage Mazurek, Michelle L. |
description | End-to-end encryption is the best way to protect digital messages. Historically, end-to-end encryption has been extremely difficult for people to use, but recent tools have made it more broadly accessible, largely by employing key-directory services. These services sacrifice some security properties for convenience. The authors wanted to understand how average users think about these tradeoffs. They conducted a 52-person user study and found that participants could learn to understand properties of different encryption models. Users also made coherent assessments about when different tradeoffs might be appropriate. Participants recognized that the less-convenient exchange model was more secure overall, but considered the registration model's security sufficient for most everyday purposes. |
doi_str_mv | 10.1109/MIC.2017.57 |
format | Article |
fullrecord | <record><control><sourceid>crossref_RIE</sourceid><recordid>TN_cdi_ieee_primary_7927866</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7927866</ieee_id><sourcerecordid>10_1109_MIC_2017_57</sourcerecordid><originalsourceid>FETCH-LOGICAL-c253t-3ef84717459b64b4de9023ae1482c2c6ec9b48a44455940a90ab107f371079183</originalsourceid><addsrcrecordid>eNo9j01LxDAURYMoOI6uXLrpXlrfy0eTLLV0dGDEhc46pGkqkU4dkrrov7dlxM2778LhwiHkFqFABP3wuq0KCigLIc_ICjXHHJDh-fyD0rlUgJfkKqUvAFCK4oqwJ9vbwYXhM3v37ieGccrs0Gb7ZJvQLy0MWT24OB1H32b1wYb-mlx0tk_-5i_XZL-pP6qXfPf2vK0ed7mjgo05853iEiUXuil5w1uvgTLrkSvqqCu90w1XlnMuhOZgNdgGQXZMzlejYmtyf9p18Tul6DtzjOFg42QQzOJrZl-z-BohZ_ruRAfv_T8pNZWqLNkv-R5O1w</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Balancing Security and Usability in Encrypted Email</title><source>IEEE Electronic Library (IEL)</source><creator>Wei Bai ; Doowon Kim ; Namara, Moses ; Yichen Qian ; Kelley, Patrick Gage ; Mazurek, Michelle L.</creator><creatorcontrib>Wei Bai ; Doowon Kim ; Namara, Moses ; Yichen Qian ; Kelley, Patrick Gage ; Mazurek, Michelle L.</creatorcontrib><description>End-to-end encryption is the best way to protect digital messages. Historically, end-to-end encryption has been extremely difficult for people to use, but recent tools have made it more broadly accessible, largely by employing key-directory services. These services sacrifice some security properties for convenience. The authors wanted to understand how average users think about these tradeoffs. They conducted a 52-person user study and found that participants could learn to understand properties of different encryption models. Users also made coherent assessments about when different tradeoffs might be appropriate. Participants recognized that the less-convenient exchange model was more secure overall, but considered the registration model's security sufficient for most everyday purposes.</description><identifier>ISSN: 1089-7801</identifier><identifier>EISSN: 1941-0131</identifier><identifier>DOI: 10.1109/MIC.2017.57</identifier><identifier>CODEN: IICOFX</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer security ; Digital communication ; Encryption ; human factors ; Internet/Web technologies ; Privacy ; Public key ; public policy ; security and privacy ; Usability ; usable security</subject><ispartof>IEEE internet computing, 2017-05, Vol.21 (3), p.30-38</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c253t-3ef84717459b64b4de9023ae1482c2c6ec9b48a44455940a90ab107f371079183</citedby><cites>FETCH-LOGICAL-c253t-3ef84717459b64b4de9023ae1482c2c6ec9b48a44455940a90ab107f371079183</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7927866$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7927866$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Wei Bai</creatorcontrib><creatorcontrib>Doowon Kim</creatorcontrib><creatorcontrib>Namara, Moses</creatorcontrib><creatorcontrib>Yichen Qian</creatorcontrib><creatorcontrib>Kelley, Patrick Gage</creatorcontrib><creatorcontrib>Mazurek, Michelle L.</creatorcontrib><title>Balancing Security and Usability in Encrypted Email</title><title>IEEE internet computing</title><addtitle>MIC</addtitle><description>End-to-end encryption is the best way to protect digital messages. Historically, end-to-end encryption has been extremely difficult for people to use, but recent tools have made it more broadly accessible, largely by employing key-directory services. These services sacrifice some security properties for convenience. The authors wanted to understand how average users think about these tradeoffs. They conducted a 52-person user study and found that participants could learn to understand properties of different encryption models. Users also made coherent assessments about when different tradeoffs might be appropriate. Participants recognized that the less-convenient exchange model was more secure overall, but considered the registration model's security sufficient for most everyday purposes.</description><subject>Computer security</subject><subject>Digital communication</subject><subject>Encryption</subject><subject>human factors</subject><subject>Internet/Web technologies</subject><subject>Privacy</subject><subject>Public key</subject><subject>public policy</subject><subject>security and privacy</subject><subject>Usability</subject><subject>usable security</subject><issn>1089-7801</issn><issn>1941-0131</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9j01LxDAURYMoOI6uXLrpXlrfy0eTLLV0dGDEhc46pGkqkU4dkrrov7dlxM2778LhwiHkFqFABP3wuq0KCigLIc_ICjXHHJDh-fyD0rlUgJfkKqUvAFCK4oqwJ9vbwYXhM3v37ieGccrs0Gb7ZJvQLy0MWT24OB1H32b1wYb-mlx0tk_-5i_XZL-pP6qXfPf2vK0ed7mjgo05853iEiUXuil5w1uvgTLrkSvqqCu90w1XlnMuhOZgNdgGQXZMzlejYmtyf9p18Tul6DtzjOFg42QQzOJrZl-z-BohZ_ruRAfv_T8pNZWqLNkv-R5O1w</recordid><startdate>201705</startdate><enddate>201705</enddate><creator>Wei Bai</creator><creator>Doowon Kim</creator><creator>Namara, Moses</creator><creator>Yichen Qian</creator><creator>Kelley, Patrick Gage</creator><creator>Mazurek, Michelle L.</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>201705</creationdate><title>Balancing Security and Usability in Encrypted Email</title><author>Wei Bai ; Doowon Kim ; Namara, Moses ; Yichen Qian ; Kelley, Patrick Gage ; Mazurek, Michelle L.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c253t-3ef84717459b64b4de9023ae1482c2c6ec9b48a44455940a90ab107f371079183</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Computer security</topic><topic>Digital communication</topic><topic>Encryption</topic><topic>human factors</topic><topic>Internet/Web technologies</topic><topic>Privacy</topic><topic>Public key</topic><topic>public policy</topic><topic>security and privacy</topic><topic>Usability</topic><topic>usable security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wei Bai</creatorcontrib><creatorcontrib>Doowon Kim</creatorcontrib><creatorcontrib>Namara, Moses</creatorcontrib><creatorcontrib>Yichen Qian</creatorcontrib><creatorcontrib>Kelley, Patrick Gage</creatorcontrib><creatorcontrib>Mazurek, Michelle L.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE internet computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Wei Bai</au><au>Doowon Kim</au><au>Namara, Moses</au><au>Yichen Qian</au><au>Kelley, Patrick Gage</au><au>Mazurek, Michelle L.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Balancing Security and Usability in Encrypted Email</atitle><jtitle>IEEE internet computing</jtitle><stitle>MIC</stitle><date>2017-05</date><risdate>2017</risdate><volume>21</volume><issue>3</issue><spage>30</spage><epage>38</epage><pages>30-38</pages><issn>1089-7801</issn><eissn>1941-0131</eissn><coden>IICOFX</coden><abstract>End-to-end encryption is the best way to protect digital messages. Historically, end-to-end encryption has been extremely difficult for people to use, but recent tools have made it more broadly accessible, largely by employing key-directory services. These services sacrifice some security properties for convenience. The authors wanted to understand how average users think about these tradeoffs. They conducted a 52-person user study and found that participants could learn to understand properties of different encryption models. Users also made coherent assessments about when different tradeoffs might be appropriate. Participants recognized that the less-convenient exchange model was more secure overall, but considered the registration model's security sufficient for most everyday purposes.</abstract><pub>IEEE</pub><doi>10.1109/MIC.2017.57</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1089-7801 |
ispartof | IEEE internet computing, 2017-05, Vol.21 (3), p.30-38 |
issn | 1089-7801 1941-0131 |
language | eng |
recordid | cdi_ieee_primary_7927866 |
source | IEEE Electronic Library (IEL) |
subjects | Computer security Digital communication Encryption human factors Internet/Web technologies Privacy Public key public policy security and privacy Usability usable security |
title | Balancing Security and Usability in Encrypted Email |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-10T08%3A40%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Balancing%20Security%20and%20Usability%20in%20Encrypted%20Email&rft.jtitle=IEEE%20internet%20computing&rft.au=Wei%20Bai&rft.date=2017-05&rft.volume=21&rft.issue=3&rft.spage=30&rft.epage=38&rft.pages=30-38&rft.issn=1089-7801&rft.eissn=1941-0131&rft.coden=IICOFX&rft_id=info:doi/10.1109/MIC.2017.57&rft_dat=%3Ccrossref_RIE%3E10_1109_MIC_2017_57%3C/crossref_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=7927866&rfr_iscdi=true |