2014
DOI: 10.1007/978-3-319-08506-7_13
|View full text |Cite
|
Sign up to set email alerts
|

Why Doesn’t Jane Protect Her Privacy?

Abstract: Abstract. End-to-end encryption has been heralded by privacy and security researchers as an effective defence against dragnet surveillance, but there is no evidence of widespread end-user uptake. We argue that the non-adoption of end-toend encryption might not be entirely due to usability issues identified by Whitten and Tygar in their seminal paper "Why Johnny Can't Encrypt". Our investigation revealed a number of fundamental issues such as incomplete threat models, misaligned incentives, and a general absenc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

8
62
1

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 76 publications
(71 citation statements)
references
References 40 publications
8
62
1
Order By: Relevance
“…Researchers have reported a number of non-usability related factors that are likely to hinder the adoption of security and privacy solutions in other contexts [23,11,10,24]. We synthesised a number of deterrents to adoption and usage:(1) Lack of awareness, (2) Lack of concern, (3) Lack of self-efficacy, (4) Lack of compulsion and (5) Lack of perseverance.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Researchers have reported a number of non-usability related factors that are likely to hinder the adoption of security and privacy solutions in other contexts [23,11,10,24]. We synthesised a number of deterrents to adoption and usage:(1) Lack of awareness, (2) Lack of concern, (3) Lack of self-efficacy, (4) Lack of compulsion and (5) Lack of perseverance.…”
Section: Discussionmentioning
confidence: 99%
“…Improving usability, on its own, while necessary, has not proved sufficient in many contexts [10,11,23]. It is necessary to investigate other justifications for non-adoption in the smartphone context [27].…”
Section: Introductionmentioning
confidence: 99%
“…In [57], Renaud et al proposed seven possible explanations for the non-adoption of E2E encryption in email, based on the literature and researchers' own observations. To validate these explanations, they interviewed students and staff members (not security experts), and surveyed computer science students.…”
Section: B User Studies Of Secure Communication Toolsmentioning
confidence: 99%
“…The gaps in mental models identified by Renaud et al suggest that users may think they are more secure than they are [57]. Similarly, the folk models of home network security described by Wash led his participants to believe that their practices were secure when they were not [63].…”
Section: B User Studies Of Secure Communication Toolsmentioning
confidence: 99%
“…Renaud et al proposed seven possible explanations for the non-adoption of E2E encryption in email [50]. They identified key factors for non-adoption, which included usability issues, incomplete threat models, misaligned incentives, and lack of understanding of the email architecture.…”
Section: Related Workmentioning
confidence: 99%