Cargando…
Usability of End-to-End Encryption in E-Mail Communication
This paper presents the results of a usability study focused on three end-to-end encryption technologies for securing e-mail traffic, namely PGP, S/MIME, and Pretty Easy Privacy (pEp). The findings of this study show that, despite of existing technology, users seldom apply them for securing e-mail c...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Frontiers Media S.A.
2021
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8318545/ https://www.ncbi.nlm.nih.gov/pubmed/34337395 http://dx.doi.org/10.3389/fdata.2021.568284 |
_version_ | 1783730263976574976 |
---|---|
author | Reuter, Adrian Abdelmaksoud, Ahmed Boudaoud, Karima Winckler, Marco |
author_facet | Reuter, Adrian Abdelmaksoud, Ahmed Boudaoud, Karima Winckler, Marco |
author_sort | Reuter, Adrian |
collection | PubMed |
description | This paper presents the results of a usability study focused on three end-to-end encryption technologies for securing e-mail traffic, namely PGP, S/MIME, and Pretty Easy Privacy (pEp). The findings of this study show that, despite of existing technology, users seldom apply them for securing e-mail communication. Moreover, this study helps to explain why users hesitate to employ encryption technology in their e-mail communication. For this usability study, we have combined two methods: 1) an online survey, 2) and user testing with 12 participants who were enrolled in tasks requiring e-mail encryption. We found that more than 60% of our study participants (in both methods) are unaware of the existence of encryption technologies and thus never tried to use one. We observed that above all, users 1) are overwhelmed with the management of public keys and 2) struggle with the setup of encryption technology in their e-mail software. Nonetheless, 66% of the participants consider secure e-mail communication as important or very important. Particularly, we found an even stronger concern about identity theft among e-mail users, as 78% of the participants want to make sure that no other person is able to write e-mail on their behalf. |
format | Online Article Text |
id | pubmed-8318545 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2021 |
publisher | Frontiers Media S.A. |
record_format | MEDLINE/PubMed |
spelling | pubmed-83185452021-07-29 Usability of End-to-End Encryption in E-Mail Communication Reuter, Adrian Abdelmaksoud, Ahmed Boudaoud, Karima Winckler, Marco Front Big Data Big Data This paper presents the results of a usability study focused on three end-to-end encryption technologies for securing e-mail traffic, namely PGP, S/MIME, and Pretty Easy Privacy (pEp). The findings of this study show that, despite of existing technology, users seldom apply them for securing e-mail communication. Moreover, this study helps to explain why users hesitate to employ encryption technology in their e-mail communication. For this usability study, we have combined two methods: 1) an online survey, 2) and user testing with 12 participants who were enrolled in tasks requiring e-mail encryption. We found that more than 60% of our study participants (in both methods) are unaware of the existence of encryption technologies and thus never tried to use one. We observed that above all, users 1) are overwhelmed with the management of public keys and 2) struggle with the setup of encryption technology in their e-mail software. Nonetheless, 66% of the participants consider secure e-mail communication as important or very important. Particularly, we found an even stronger concern about identity theft among e-mail users, as 78% of the participants want to make sure that no other person is able to write e-mail on their behalf. Frontiers Media S.A. 2021-07-14 /pmc/articles/PMC8318545/ /pubmed/34337395 http://dx.doi.org/10.3389/fdata.2021.568284 Text en Copyright © 2021 Reuter, Abdelmaksoud, Boudaoud and Winckler. https://creativecommons.org/licenses/by/4.0/This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms. |
spellingShingle | Big Data Reuter, Adrian Abdelmaksoud, Ahmed Boudaoud, Karima Winckler, Marco Usability of End-to-End Encryption in E-Mail Communication |
title | Usability of End-to-End Encryption in E-Mail Communication |
title_full | Usability of End-to-End Encryption in E-Mail Communication |
title_fullStr | Usability of End-to-End Encryption in E-Mail Communication |
title_full_unstemmed | Usability of End-to-End Encryption in E-Mail Communication |
title_short | Usability of End-to-End Encryption in E-Mail Communication |
title_sort | usability of end-to-end encryption in e-mail communication |
topic | Big Data |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC8318545/ https://www.ncbi.nlm.nih.gov/pubmed/34337395 http://dx.doi.org/10.3389/fdata.2021.568284 |
work_keys_str_mv | AT reuteradrian usabilityofendtoendencryptioninemailcommunication AT abdelmaksoudahmed usabilityofendtoendencryptioninemailcommunication AT boudaoudkarima usabilityofendtoendencryptioninemailcommunication AT wincklermarco usabilityofendtoendencryptioninemailcommunication |