Cargando…

Usability of End-to-End Encryption in E-Mail Communication

This paper presents the results of a usability study focused on three end-to-end encryption technologies for securing e-mail traffic, namely PGP, S/MIME, and Pretty Easy Privacy (pEp). The findings of this study show that, despite of existing technology, users seldom apply them for securing e-mail c...

Descripción completa

Detalles Bibliográficos
Autores principales: Reuter, Adrian, Abdelmaksoud, Ahmed, Boudaoud, Karima, Winckler, Marco
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Frontiers Media S.A. 2021
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8318545/
https://www.ncbi.nlm.nih.gov/pubmed/34337395
http://dx.doi.org/10.3389/fdata.2021.568284
_version_ 1783730263976574976
author Reuter, Adrian
Abdelmaksoud, Ahmed
Boudaoud, Karima
Winckler, Marco
author_facet Reuter, Adrian
Abdelmaksoud, Ahmed
Boudaoud, Karima
Winckler, Marco
author_sort Reuter, Adrian
collection PubMed
description This paper presents the results of a usability study focused on three end-to-end encryption technologies for securing e-mail traffic, namely PGP, S/MIME, and Pretty Easy Privacy (pEp). The findings of this study show that, despite of existing technology, users seldom apply them for securing e-mail communication. Moreover, this study helps to explain why users hesitate to employ encryption technology in their e-mail communication. For this usability study, we have combined two methods: 1) an online survey, 2) and user testing with 12 participants who were enrolled in tasks requiring e-mail encryption. We found that more than 60% of our study participants (in both methods) are unaware of the existence of encryption technologies and thus never tried to use one. We observed that above all, users 1) are overwhelmed with the management of public keys and 2) struggle with the setup of encryption technology in their e-mail software. Nonetheless, 66% of the participants consider secure e-mail communication as important or very important. Particularly, we found an even stronger concern about identity theft among e-mail users, as 78% of the participants want to make sure that no other person is able to write e-mail on their behalf.
format Online
Article
Text
id pubmed-8318545
institution National Center for Biotechnology Information
language English
publishDate 2021
publisher Frontiers Media S.A.
record_format MEDLINE/PubMed
spelling pubmed-83185452021-07-29 Usability of End-to-End Encryption in E-Mail Communication Reuter, Adrian Abdelmaksoud, Ahmed Boudaoud, Karima Winckler, Marco Front Big Data Big Data This paper presents the results of a usability study focused on three end-to-end encryption technologies for securing e-mail traffic, namely PGP, S/MIME, and Pretty Easy Privacy (pEp). The findings of this study show that, despite of existing technology, users seldom apply them for securing e-mail communication. Moreover, this study helps to explain why users hesitate to employ encryption technology in their e-mail communication. For this usability study, we have combined two methods: 1) an online survey, 2) and user testing with 12 participants who were enrolled in tasks requiring e-mail encryption. We found that more than 60% of our study participants (in both methods) are unaware of the existence of encryption technologies and thus never tried to use one. We observed that above all, users 1) are overwhelmed with the management of public keys and 2) struggle with the setup of encryption technology in their e-mail software. Nonetheless, 66% of the participants consider secure e-mail communication as important or very important. Particularly, we found an even stronger concern about identity theft among e-mail users, as 78% of the participants want to make sure that no other person is able to write e-mail on their behalf. Frontiers Media S.A. 2021-07-14 /pmc/articles/PMC8318545/ /pubmed/34337395 http://dx.doi.org/10.3389/fdata.2021.568284 Text en Copyright © 2021 Reuter, Abdelmaksoud, Boudaoud and Winckler. https://creativecommons.org/licenses/by/4.0/This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.
spellingShingle Big Data
Reuter, Adrian
Abdelmaksoud, Ahmed
Boudaoud, Karima
Winckler, Marco
Usability of End-to-End Encryption in E-Mail Communication
title Usability of End-to-End Encryption in E-Mail Communication
title_full Usability of End-to-End Encryption in E-Mail Communication
title_fullStr Usability of End-to-End Encryption in E-Mail Communication
title_full_unstemmed Usability of End-to-End Encryption in E-Mail Communication
title_short Usability of End-to-End Encryption in E-Mail Communication
title_sort usability of end-to-end encryption in e-mail communication
topic Big Data
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8318545/
https://www.ncbi.nlm.nih.gov/pubmed/34337395
http://dx.doi.org/10.3389/fdata.2021.568284
work_keys_str_mv AT reuteradrian usabilityofendtoendencryptioninemailcommunication
AT abdelmaksoudahmed usabilityofendtoendencryptioninemailcommunication
AT boudaoudkarima usabilityofendtoendencryptioninemailcommunication
AT wincklermarco usabilityofendtoendencryptioninemailcommunication