Poster : Mental Models – User understanding of messaging and encryption
@inproceedings{Naiakshina2016PosterM, title={Poster : Mental Models – User understanding of messaging and encryption}, author={Alena Naiakshina and A. Danilova and Sergej Dechand and K. Krol and M. Sasse and M. Smith}, year={2016} }
The surveillance revelations of 2013 have led to an increased interest in secure messaging. While widely adopted apps such as WhatsApp claim to have added certain security features, only limited detailed information is publicly available. On the other hand, open-source messaging apps such as Signal are more transparent and provide extended security and privacy features. However, relatively small user bases of open-source messaging apps might indicate that these solutions are less attractive to… CONTINUE READING
6 Citations
In Encryption We Don’t Trust: The Effect of End-to-End Encryption to the Masses on User Perception
- Computer Science
- 2019 IEEE European Symposium on Security and Privacy (EuroS&P)
- 2019
- 8
- PDF
Vision: Shred If Insecure – Persuasive Message Design as a Lesson and Alternative to Previous Approaches to Usable Secure Email Interfaces
- Computer Science
- 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)
- 2020
- PDF
Evaluation der Nutzbarkeit von PGP und S/MIME in Thunderbird
- Computer Science, Art
- Mensch & Computer Workshopband
- 2018
References
SHOWING 1-10 OF 14 REFERENCES
Johnny 2: a user test of key continuity management with S/MIME and Outlook Express
- Computer Science
- SOUPS '05
- 2005
- 183
- PDF
Investigating the Computer Security Practices and Needs of Journalists
- Computer Science
- USENIX Security Symposium
- 2015
- 59
- PDF
Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0
- Computer Science
- USENIX Security Symposium
- 1999
- 1,211
- PDF
How do consumers search for and appraise health information on the world wide web? Qualitative study using focus groups, usability tests, and in-depth interviews
- Computer Science, Medicine
- BMJ : British Medical Journal
- 2002
- 1,610
- PDF
A study of the use of mobile phones by older persons
- Psychology, Computer Science
- CHI EA '06
- 2006
- 104
- PDF
Public Perceptions of Privacy and Security in the Post-Snowden Era
- 2014
Renkema-Padmos, “Why Doesn’t Jane Protect Her Privacy?
- Privacy Enhancing Technologies. Springer,
- 2014