Proceedings of the Eighth Symposium on Usable Privacy and Security 2012
DOI: 10.1145/2335356.2335371
|View full text |Cite
|
Sign up to set email alerts
|

Helping Johnny 2.0 to encrypt his Facebook conversations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
24
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 41 publications
(28 citation statements)
references
References 16 publications
1
24
0
Order By: Relevance
“…This suggests that the user wants to do something but is prevented from doing so by the complexity of the system and the poor design of the interface. Some researchers have worked on creating better interfaces to address this problem [17].…”
Section: Explanation 6: Privacy Concerned Wants To Act But Cannotmentioning
confidence: 99%
“…This suggests that the user wants to do something but is prevented from doing so by the complexity of the system and the poor design of the interface. Some researchers have worked on creating better interfaces to address this problem [17].…”
Section: Explanation 6: Privacy Concerned Wants To Act But Cannotmentioning
confidence: 99%
“…The effectiveness of E2E-encryption solutions for nonexpert users continues to be studied in the research community [3]- [7]. In 'Why Johnny Can't Encrypt' [2], Whitten and Tygar found that PGP 5.0's graphical user interface (GUI) was not as usable as advertised.…”
Section: A Usable E2e-encryption Cryptographymentioning
confidence: 99%
“…That general users can take advantage of encryption is however in question -in 1999, Whitten and Tygar [2] claimed that cryptographic details confuse users. Concerns persist about the usability of E2E-encryption, and continue to generate a considerable body of research [3]- [7].…”
Section: Introductionmentioning
confidence: 99%
“…The authors blamed the inadequacy of general user interface design principles for security tools, which result in dangerous mistakes, such as users sending secrets without encrypting them first. Fahl et al [17] performed an analysis of privacy preserving tools for OSNs and a usability study of existing approaches. They found that users tend to prefer tools that minimally disrupt their user experience.…”
Section: Usability Studies Of Cryptographic Toolsmentioning
confidence: 99%
“…Previous research has shown that users often have a hard time using encryption technologies, specifically at first contact (i.e., learning from scratch) [17], [31], [35]. In the case of Scramble!…”
Section: B Study Designmentioning
confidence: 99%