Proceedings of the 29th Annual Symposium on User Interface Software and Technology 2016
DOI: 10.1145/2984511.2984580
|View full text |Cite
|
Sign up to set email alerts
|

Private Webmail 2.0

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 26 publications
(14 citation statements)
references
References 10 publications
0
7
0
Order By: Relevance
“…Moreover, users do not notice this due to lacking feedback. Security-enhancing applications should use security constraints, distinctive UI for the security features [37,40], and provide security status feedback.…”
Section: Design Principle 3: Prevent Insecure Behaviourmentioning
confidence: 99%
See 2 more Smart Citations
“…Moreover, users do not notice this due to lacking feedback. Security-enhancing applications should use security constraints, distinctive UI for the security features [37,40], and provide security status feedback.…”
Section: Design Principle 3: Prevent Insecure Behaviourmentioning
confidence: 99%
“…Thirdly, the experts indicated that the applications did not clarify why users should use them. A simple and convincing explanation of benefits and risks can provide motivation [1,3,16,35,37,40].…”
Section: Design Principle 4: Explain the Intended Secure Behaviourmentioning
confidence: 99%
See 1 more Smart Citation
“…After participants completed their tasks or reached the 20 minute limit per client, they completed the System Usability Scale (SUS) [27], an industry-standard questionnaire also used in many similar studies [33][34][35][36], for the system they had just used. At the end of the study, participants completed 14 additional survey questions specific to our research, and a final free-form question requesting any comments.…”
Section: Usabilitymentioning
confidence: 99%
“…STEED [22] extends the IMAP standard to support transparent end-to-end encryption, but requires modified clients and servers, and does not address key management at all. Pwm [36] and Pwm 2.0 [34] attempt to make end-to-end encryption transparent by integrating with popular mail providers and relying on a third-party identity-based encryption (IBE) server to manage keys, but users authenticate to the IBE server via their email account which does not protect against compromised accounts. Confidante [24] leverages users' ubiquitous use of social media accounts to ease public key management and verification via a third-party service.…”
Section: Related Workmentioning
confidence: 99%