Proceedings 2018 Workshop on Usable Security 2018
DOI: 10.14722/usec.2018.23015
|View full text |Cite
|
Sign up to set email alerts
|

Metaphors considered harmful? An exploratory study of the effectiveness of functional metaphors for end-to-end encryption

Abstract: Abstract-Background: Research has shown that users do not use encryption and fail to understand the security properties which encryption provides. We hypothesise that one contributing factor to failed user understanding is poor explanations of security properties, as the technical descriptions used to explain encryption focus on structural mental models. Purpose: We methodically generate metaphors for end-to-end (E2E) encryption that cue functional models and develop and test the metaphors' effect on users' un… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(13 citation statements)
references
References 26 publications
0
13
0
Order By: Relevance
“…We investigated the media outlets 2 and companies applying differential privacy to see how differential privacy is conveyed to users. We found that differential privacy is conveyed to people using an example of tossing a coin for changing responses to sensitive questions, 3 noisy sound waves of radio channels, 4 and a noisy portrait 5 from the media outlets. Exploring how companies described differential privacy to their users did not result in any further metaphors which we could analyse and use in our study.…”
Section: Results Of Phasementioning
confidence: 95%
See 3 more Smart Citations
“…We investigated the media outlets 2 and companies applying differential privacy to see how differential privacy is conveyed to users. We found that differential privacy is conveyed to people using an example of tossing a coin for changing responses to sensitive questions, 3 noisy sound waves of radio channels, 4 and a noisy portrait 5 from the media outlets. Exploring how companies described differential privacy to their users did not result in any further metaphors which we could analyse and use in our study.…”
Section: Results Of Phasementioning
confidence: 95%
“…Two of the important steps in the framework proposed by Alty et al [1] are identifying system functionality and analysing metaphor-system pairings. To analyse the metaphors of E2E encryption, Demjaha et al [4] benefited from a metaphor evaluation matrix. The template of the metaphor evaluation matrix we use for analysing metaphor-system pairings is shown in Table 1 and is adapted from [4].…”
Section: Phase 1: Metaphor Generationmentioning
confidence: 99%
See 2 more Smart Citations
“…The authors suggest to implement a user interface that makes E2E encryption processes more graspable for the user and increases transparency about the business model and the encryption protocol, which is not publicly available yet. The creation of metaphors with the objective of improving user understanding of encryption also seems to be a promising direction for future research, however, Demjaha et al, [10] showed that using metaphors can sometimes do more harm than good, and the authors underline the difficulties of explaining encryption to users. Similar problems are pointed out by Abu-Salma and colleagues [1], who analyzed the user interface of the secure messaging app Telegram.…”
Section: Consequences Of Invisible and Ineffectively Communicated Encmentioning
confidence: 99%