Why Doesn't Jane Protect Her Privacy?

نویسندگان

  • Karen Renaud
  • Melanie Volkamer
  • Arne Renkema-Padmos
چکیده

End-to-end encryption has been heralded by privacy and security researchers as an effective defence against dragnet surveillance, but there is no evidence of widespread end-user uptake. We argue that the non-adoption of end-toend encryption might not be entirely due to usability issues identified by Whitten and Tygar in their seminal paper “Why Johnny Can’t Encrypt”. Our investigation revealed a number of fundamental issues such as incomplete threat models, misaligned incentives, and a general absence of understanding of the email architecture. From our data and related research literature we found evidence of a number of potential explanations for the low uptake of end-to-end encryption. This suggests that merely increasing the availability and usability of encryption functionality in email clients will not automatically encourage increased deployment by email users. We shall have to focus, first, on building comprehensive end-user mental models related to email, and email security. We conclude by suggesting directions for future research.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Monitoring and Surveillance in the Workplace: Lessons Learnt? â€" Investigating the International Legal Position

When considering the legal implications of monitoring and surveillance in the workplace, the question may be asked why companies deploy computer surveillance and monitoring in the first place. Several reasons may be put forward to justify why more than 80% of all major American firms monitor employee e-mails and Internet usage. However, what most companies forget is the fact that the absence or...

متن کامل

Déléguer la protection des données personnelles à des agents cognitifs

L’intégration des réglementations en matière de protection des données personnelles peut s’avérer complexe pour l’utilisateur. Malheureusement, les propositions techniques en matière de vie privée manquent à la fois d’un lien efficace avec les réglementations et de réelles capacités à aider les utilisateurs au cours de leurs interactions. C’est pourquoi nous proposons le modèle d’agent PAw, un ...

متن کامل

An User-centric MIX-net Protocol to Protect Privacy∗

“MIX-net” systems protect the privacy of participants by clouding together their transactions through cascades of third parties. Reliability and trust are therefore open issues in this literature and limit the applicability of these systems. This paper discusses how the MIX approach can be adapted to put the user at the center of the protocol and in control of it, so that each participant can t...

متن کامل

Designing for privacy management in hospitals: Understanding the gap between user activities and IT staff's understandings

PURPOSE We examined the role of privacy in collaborative clinical work and how it is understood by hospital IT staff. The purpose of our study was to identify the gaps between hospital IT staff members' perceptions of how electronic health record (EHR) users' protect the privacy of patient information and how users actually protect patients' private information in their daily collaborative acti...

متن کامل

Protecting Privacy with Economics: Economic Incentives for Preventive Technologies in Ubiquitous Computing Environments

Ubiquitous computing environments make the economic analysis of privacy more difficult as they exacerbate information asymmetries and uncertainties. This paper discusses why the actual marketization of privacy is more difficult than its technical protection in these environments. It then focuses on the economic incentives that can justify the adoption of preventive privacy enhancing technologie...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014