Balancing Security and Usability in Encrypted Email

End-to-end encryption is the best way to protect digital messages. Historically, end-to-end encryption has been extremely difficult for people to use, but recent tools have made it more broadly accessible, largely by employing key-directory services. These services sacrifice some security properties...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE internet computing 2017-05, Vol.21 (3), p.30-38
Hauptverfasser: Wei Bai, Doowon Kim, Namara, Moses, Yichen Qian, Kelley, Patrick Gage, Mazurek, Michelle L.
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 38
container_issue 3
container_start_page 30
container_title IEEE internet computing
container_volume 21
creator Wei Bai
Doowon Kim
Namara, Moses
Yichen Qian
Kelley, Patrick Gage
Mazurek, Michelle L.
description End-to-end encryption is the best way to protect digital messages. Historically, end-to-end encryption has been extremely difficult for people to use, but recent tools have made it more broadly accessible, largely by employing key-directory services. These services sacrifice some security properties for convenience. The authors wanted to understand how average users think about these tradeoffs. They conducted a 52-person user study and found that participants could learn to understand properties of different encryption models. Users also made coherent assessments about when different tradeoffs might be appropriate. Participants recognized that the less-convenient exchange model was more secure overall, but considered the registration model's security sufficient for most everyday purposes.
doi_str_mv 10.1109/MIC.2017.57
format Article
fullrecord <record><control><sourceid>crossref_RIE</sourceid><recordid>TN_cdi_ieee_primary_7927866</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>7927866</ieee_id><sourcerecordid>10_1109_MIC_2017_57</sourcerecordid><originalsourceid>FETCH-LOGICAL-c253t-3ef84717459b64b4de9023ae1482c2c6ec9b48a44455940a90ab107f371079183</originalsourceid><addsrcrecordid>eNo9j01LxDAURYMoOI6uXLrpXlrfy0eTLLV0dGDEhc46pGkqkU4dkrrov7dlxM2778LhwiHkFqFABP3wuq0KCigLIc_ICjXHHJDh-fyD0rlUgJfkKqUvAFCK4oqwJ9vbwYXhM3v37ieGccrs0Gb7ZJvQLy0MWT24OB1H32b1wYb-mlx0tk_-5i_XZL-pP6qXfPf2vK0ed7mjgo05853iEiUXuil5w1uvgTLrkSvqqCu90w1XlnMuhOZgNdgGQXZMzlejYmtyf9p18Tul6DtzjOFg42QQzOJrZl-z-BohZ_ruRAfv_T8pNZWqLNkv-R5O1w</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>Balancing Security and Usability in Encrypted Email</title><source>IEEE Electronic Library (IEL)</source><creator>Wei Bai ; Doowon Kim ; Namara, Moses ; Yichen Qian ; Kelley, Patrick Gage ; Mazurek, Michelle L.</creator><creatorcontrib>Wei Bai ; Doowon Kim ; Namara, Moses ; Yichen Qian ; Kelley, Patrick Gage ; Mazurek, Michelle L.</creatorcontrib><description>End-to-end encryption is the best way to protect digital messages. Historically, end-to-end encryption has been extremely difficult for people to use, but recent tools have made it more broadly accessible, largely by employing key-directory services. These services sacrifice some security properties for convenience. The authors wanted to understand how average users think about these tradeoffs. They conducted a 52-person user study and found that participants could learn to understand properties of different encryption models. Users also made coherent assessments about when different tradeoffs might be appropriate. Participants recognized that the less-convenient exchange model was more secure overall, but considered the registration model's security sufficient for most everyday purposes.</description><identifier>ISSN: 1089-7801</identifier><identifier>EISSN: 1941-0131</identifier><identifier>DOI: 10.1109/MIC.2017.57</identifier><identifier>CODEN: IICOFX</identifier><language>eng</language><publisher>IEEE</publisher><subject>Computer security ; Digital communication ; Encryption ; human factors ; Internet/Web technologies ; Privacy ; Public key ; public policy ; security and privacy ; Usability ; usable security</subject><ispartof>IEEE internet computing, 2017-05, Vol.21 (3), p.30-38</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c253t-3ef84717459b64b4de9023ae1482c2c6ec9b48a44455940a90ab107f371079183</citedby><cites>FETCH-LOGICAL-c253t-3ef84717459b64b4de9023ae1482c2c6ec9b48a44455940a90ab107f371079183</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/7927866$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/7927866$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Wei Bai</creatorcontrib><creatorcontrib>Doowon Kim</creatorcontrib><creatorcontrib>Namara, Moses</creatorcontrib><creatorcontrib>Yichen Qian</creatorcontrib><creatorcontrib>Kelley, Patrick Gage</creatorcontrib><creatorcontrib>Mazurek, Michelle L.</creatorcontrib><title>Balancing Security and Usability in Encrypted Email</title><title>IEEE internet computing</title><addtitle>MIC</addtitle><description>End-to-end encryption is the best way to protect digital messages. Historically, end-to-end encryption has been extremely difficult for people to use, but recent tools have made it more broadly accessible, largely by employing key-directory services. These services sacrifice some security properties for convenience. The authors wanted to understand how average users think about these tradeoffs. They conducted a 52-person user study and found that participants could learn to understand properties of different encryption models. Users also made coherent assessments about when different tradeoffs might be appropriate. Participants recognized that the less-convenient exchange model was more secure overall, but considered the registration model's security sufficient for most everyday purposes.</description><subject>Computer security</subject><subject>Digital communication</subject><subject>Encryption</subject><subject>human factors</subject><subject>Internet/Web technologies</subject><subject>Privacy</subject><subject>Public key</subject><subject>public policy</subject><subject>security and privacy</subject><subject>Usability</subject><subject>usable security</subject><issn>1089-7801</issn><issn>1941-0131</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNo9j01LxDAURYMoOI6uXLrpXlrfy0eTLLV0dGDEhc46pGkqkU4dkrrov7dlxM2778LhwiHkFqFABP3wuq0KCigLIc_ICjXHHJDh-fyD0rlUgJfkKqUvAFCK4oqwJ9vbwYXhM3v37ieGccrs0Gb7ZJvQLy0MWT24OB1H32b1wYb-mlx0tk_-5i_XZL-pP6qXfPf2vK0ed7mjgo05853iEiUXuil5w1uvgTLrkSvqqCu90w1XlnMuhOZgNdgGQXZMzlejYmtyf9p18Tul6DtzjOFg42QQzOJrZl-z-BohZ_ruRAfv_T8pNZWqLNkv-R5O1w</recordid><startdate>201705</startdate><enddate>201705</enddate><creator>Wei Bai</creator><creator>Doowon Kim</creator><creator>Namara, Moses</creator><creator>Yichen Qian</creator><creator>Kelley, Patrick Gage</creator><creator>Mazurek, Michelle L.</creator><general>IEEE</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>AAYXX</scope><scope>CITATION</scope></search><sort><creationdate>201705</creationdate><title>Balancing Security and Usability in Encrypted Email</title><author>Wei Bai ; Doowon Kim ; Namara, Moses ; Yichen Qian ; Kelley, Patrick Gage ; Mazurek, Michelle L.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c253t-3ef84717459b64b4de9023ae1482c2c6ec9b48a44455940a90ab107f371079183</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Computer security</topic><topic>Digital communication</topic><topic>Encryption</topic><topic>human factors</topic><topic>Internet/Web technologies</topic><topic>Privacy</topic><topic>Public key</topic><topic>public policy</topic><topic>security and privacy</topic><topic>Usability</topic><topic>usable security</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Wei Bai</creatorcontrib><creatorcontrib>Doowon Kim</creatorcontrib><creatorcontrib>Namara, Moses</creatorcontrib><creatorcontrib>Yichen Qian</creatorcontrib><creatorcontrib>Kelley, Patrick Gage</creatorcontrib><creatorcontrib>Mazurek, Michelle L.</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>CrossRef</collection><jtitle>IEEE internet computing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Wei Bai</au><au>Doowon Kim</au><au>Namara, Moses</au><au>Yichen Qian</au><au>Kelley, Patrick Gage</au><au>Mazurek, Michelle L.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Balancing Security and Usability in Encrypted Email</atitle><jtitle>IEEE internet computing</jtitle><stitle>MIC</stitle><date>2017-05</date><risdate>2017</risdate><volume>21</volume><issue>3</issue><spage>30</spage><epage>38</epage><pages>30-38</pages><issn>1089-7801</issn><eissn>1941-0131</eissn><coden>IICOFX</coden><abstract>End-to-end encryption is the best way to protect digital messages. Historically, end-to-end encryption has been extremely difficult for people to use, but recent tools have made it more broadly accessible, largely by employing key-directory services. These services sacrifice some security properties for convenience. The authors wanted to understand how average users think about these tradeoffs. They conducted a 52-person user study and found that participants could learn to understand properties of different encryption models. Users also made coherent assessments about when different tradeoffs might be appropriate. Participants recognized that the less-convenient exchange model was more secure overall, but considered the registration model's security sufficient for most everyday purposes.</abstract><pub>IEEE</pub><doi>10.1109/MIC.2017.57</doi><tpages>9</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1089-7801
ispartof IEEE internet computing, 2017-05, Vol.21 (3), p.30-38
issn 1089-7801
1941-0131
language eng
recordid cdi_ieee_primary_7927866
source IEEE Electronic Library (IEL)
subjects Computer security
Digital communication
Encryption
human factors
Internet/Web technologies
Privacy
Public key
public policy
security and privacy
Usability
usable security
title Balancing Security and Usability in Encrypted Email
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-10T08%3A40%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-crossref_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Balancing%20Security%20and%20Usability%20in%20Encrypted%20Email&rft.jtitle=IEEE%20internet%20computing&rft.au=Wei%20Bai&rft.date=2017-05&rft.volume=21&rft.issue=3&rft.spage=30&rft.epage=38&rft.pages=30-38&rft.issn=1089-7801&rft.eissn=1941-0131&rft.coden=IICOFX&rft_id=info:doi/10.1109/MIC.2017.57&rft_dat=%3Ccrossref_RIE%3E10_1109_MIC_2017_57%3C/crossref_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=7927866&rfr_iscdi=true