Why Doesn't Jane Protect Her Privacy?
نویسندگان
چکیده
End-to-end encryption has been heralded by privacy and security researchers as an effective defence against dragnet surveillance, but there is no evidence of widespread end-user uptake. We argue that the non-adoption of end-toend encryption might not be entirely due to usability issues identified by Whitten and Tygar in their seminal paper “Why Johnny Can’t Encrypt”. Our investigation revealed a number of fundamental issues such as incomplete threat models, misaligned incentives, and a general absence of understanding of the email architecture. From our data and related research literature we found evidence of a number of potential explanations for the low uptake of end-to-end encryption. This suggests that merely increasing the availability and usability of encryption functionality in email clients will not automatically encourage increased deployment by email users. We shall have to focus, first, on building comprehensive end-user mental models related to email, and email security. We conclude by suggesting directions for future research.
منابع مشابه
Monitoring and Surveillance in the Workplace: Lessons Learnt? â€" Investigating the International Legal Position
When considering the legal implications of monitoring and surveillance in the workplace, the question may be asked why companies deploy computer surveillance and monitoring in the first place. Several reasons may be put forward to justify why more than 80% of all major American firms monitor employee e-mails and Internet usage. However, what most companies forget is the fact that the absence or...
متن کاملDéléguer la protection des données personnelles à des agents cognitifs
L’intégration des réglementations en matière de protection des données personnelles peut s’avérer complexe pour l’utilisateur. Malheureusement, les propositions techniques en matière de vie privée manquent à la fois d’un lien efficace avec les réglementations et de réelles capacités à aider les utilisateurs au cours de leurs interactions. C’est pourquoi nous proposons le modèle d’agent PAw, un ...
متن کاملAn User-centric MIX-net Protocol to Protect Privacy∗
“MIX-net” systems protect the privacy of participants by clouding together their transactions through cascades of third parties. Reliability and trust are therefore open issues in this literature and limit the applicability of these systems. This paper discusses how the MIX approach can be adapted to put the user at the center of the protocol and in control of it, so that each participant can t...
متن کاملDesigning for privacy management in hospitals: Understanding the gap between user activities and IT staff's understandings
PURPOSE We examined the role of privacy in collaborative clinical work and how it is understood by hospital IT staff. The purpose of our study was to identify the gaps between hospital IT staff members' perceptions of how electronic health record (EHR) users' protect the privacy of patient information and how users actually protect patients' private information in their daily collaborative acti...
متن کاملProtecting Privacy with Economics: Economic Incentives for Preventive Technologies in Ubiquitous Computing Environments
Ubiquitous computing environments make the economic analysis of privacy more difficult as they exacerbate information asymmetries and uncertainties. This paper discusses why the actual marketization of privacy is more difficult than its technical protection in these environments. It then focuses on the economic incentives that can justify the adoption of preventive privacy enhancing technologie...
متن کامل