Proceedings of the SIGCHI Conference on Human Factors in Computing Systems 2005
DOI: 10.1145/1054972.1055069
|View full text |Cite
|
Sign up to set email alerts
|

How to make secure email easier to use

Abstract: Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchants who sell products on Amazon.com, we argue that the vast majority of Internet users can start enjoying digitally signed email today. We present suggestions for the use of digitally signed mail in e-commerce and simple modifications to webmail systems that would significantly increase integrity, privacy and authorship guarantees that… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
33
0
2

Year Published

2006
2006
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 56 publications
(35 citation statements)
references
References 8 publications
0
33
0
2
Order By: Relevance
“…Other studies (e.g., [44]- [48]) have considered PGP further as well as contact verification in OTR [26], secure communications in two-way radios [9], opportunistic email encryption [49], and public-key fingerprints [50], [51]. Furthermore, several studies have explored users' perceptions of email signatures [52], browser security indicators (e.g., [53], [54]), and specific features of specific security tools (e.g., selfdestructing messages in Snapchat [55]).…”
Section: B User Studies Of Secure Communication Toolsmentioning
confidence: 96%
“…Other studies (e.g., [44]- [48]) have considered PGP further as well as contact verification in OTR [26], secure communications in two-way radios [9], opportunistic email encryption [49], and public-key fingerprints [50], [51]. Furthermore, several studies have explored users' perceptions of email signatures [52], browser security indicators (e.g., [53], [54]), and specific features of specific security tools (e.g., selfdestructing messages in Snapchat [55]).…”
Section: B User Studies Of Secure Communication Toolsmentioning
confidence: 96%
“…Solusi lainnya untuk mencegah phishing pada tingkat e-mail adalah pengguna internet seharusnya menggunakan fasilitas Tanda tangan digital pada email atau Digital Signature E-mail (Garfinkel, et al, 2005). Tanda tangan digital menggunakan kunci asimetric kriptografi seperti RSA yang memungkinkan pengguna untuk membedakan identitas sang pengirim e-mail.…”
Section: Hasil Penelitian Dan Pembahasanunclassified
“…Additional examples are given in Table 3. (Little, Briggs, & Coventry, 2005), information disclosure (Price, Adam, & Nuseibeh, 2005), awareness applications (Patil & Lai, 2005), design methods for ubiquitous computing (Iachello & Abowd, 2005), privacy policies ( Credibility of online health information (Sillence, Briggs, Fishwick, & Harris, 2004), defining computer credibility (Fogg & Tseng, 1999), human-computer relationships (Bickmore & Pickard, 2005), relational agents (Bickmore & Cassell, 2001), e-commerce and trust (Riegelsberger, Sasse, & McCarthy, 2003) Computer security Phishing (Dhamija et al, 2006;Wu et al, 2006), secure e-mail (Garfinkel, Margrave, et al, 2005;Gaw et al, 2006), human interaction proofs (Chellapilla, Larson, Simard, & Czerwinski, 2005), mental models of security (Friedman, Hurley, et al, 2002) …”
Section: Technological Innovationsmentioning
confidence: 99%
“…Recent privacy work has explored issues such as phishing (Dhamija et al, 2006;Wu et al, 2006), spyware (Good et al, 2005), and secure e-mail (Garfinkel, Margrave, Schiller, Nordlander, & Miller, 2005;Gaw et al, 2006). The challenge of building interfaces that present clear information in a manner that meets user needs, goals, and cognitive models is a recurring theme in this work.…”
Section: Privacymentioning
confidence: 99%