Proceedings 2nd European Workshop on Usable Security 2017
DOI: 10.14722/eurousec.2017.23016
|View full text |Cite
|
Sign up to set email alerts
|

Can Johnny build a protocol? Co-ordinating developer and user intentions for privacy-enhanced secure messaging protocols

Abstract: As secure messaging protocols face increasingly widespread deployment, differences between what developers "believe" about user needs and the actual needs of real-existing users could have an impact on the design of future technologies. In the domain of secure messaging, the sometimes subtle choices made by protocol designers tend to elude the understanding of users, including high-risk activists. We'll overview some common protocol design questions facing developers of secure messaging protocols and test the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

4
16
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 15 publications
(20 citation statements)
references
References 18 publications
4
16
0
Order By: Relevance
“…The results presented here extend and deepen those results, and they directly contrast and even contradict the results given in the largest quantitative study of 80 low-risk users [1]. We first state our theses, generated after our first study [2] but before the additional interviews given in this study, in Section 2. Our qualitative methodology is explained in Section 3, with the interviews being delved into in Section 4.…”
Section: Introductionsupporting
confidence: 69%
See 3 more Smart Citations
“…The results presented here extend and deepen those results, and they directly contrast and even contradict the results given in the largest quantitative study of 80 low-risk users [1]. We first state our theses, generated after our first study [2] but before the additional interviews given in this study, in Section 2. Our qualitative methodology is explained in Section 3, with the interviews being delved into in Section 4.…”
Section: Introductionsupporting
confidence: 69%
“…This work is the first to do such a study that balances high-risk users, low-risk users, and developers themselves. Our previous qualitative study focused on less than 50 users [2]. The results presented here extend and deepen those results, and they directly contrast and even contradict the results given in the largest quantitative study of 80 low-risk users [1].…”
Section: Introductionsupporting
confidence: 66%
See 2 more Smart Citations
“…Existing qualitative studies have explored security practices of different groups of higher-risk users, e.g. [23,24,29,33,37,42,69,73,74,93], but none to our knowledge have studied such practices within large-scale urban protests.…”
Section: Introductionmentioning
confidence: 99%