Why Won't Johnny Encrypt?

被引:3
|
作者
Orman, Hilarie [1 ]
机构
[1] Purple Streak, Woodland Hills, UT 84653 USA
关键词
email; encryption; end-to-end; privacy;
D O I
10.1109/MIC.2015.16
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Very little Internet communication is truly private, even if it is encrypted. The original concept for email privacy dates back a few decades and was meant to provide end-to-end privacy. Today, almost no one uses the software that provides this strong guarantee of resistance to massive surveillance. Why not? What software is there, and how can users take advantage of it? © 2015 IEEE.
引用
收藏
页码:90 / 94
页数:5
相关论文
共 12 条
  • [1] Why Johnny Can't Unsubscribe: Barriers to Stopping Unwanted Email
    Dev, Jayati
    Rader, Emilee
    Patil, Sameer
    PROCEEDINGS OF THE 2020 CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS (CHI'20), 2020,
  • [2] Finally Johnny Can Encrypt. But Does This Make Him Feel More Secure?
    Gerber, Nina
    Zimmermann, Verena
    Henhapl, Birgit
    Emeroez, Sinem
    Volkamer, Melanie
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [3] Light Blind: Why Encrypt If You Can Share?
    Cincilla, Pierpaolo
    Boudguiga, Aymen
    Hadji, Makhlouf
    Kaiser, Arnaud
    2015 12TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS (ICETE), VOL 4, 2015, : 361 - 368
  • [4] Vision: Why Johnny Can't Configure Smart Home? A Behavioural Framework for Smart Home Privacy Configuration
    Shams, Joseph
    Arachchilage, Nalin A. G.
    Such, Jose M.
    2020 IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW 2020), 2020, : 184 - 189
  • [5] Why Joanie Can Encrypt: Easy Email Encryption with Easy Key Management
    Koh, John S.
    Bellovin, Steven M.
    Nieh, Jason
    PROCEEDINGS OF THE FOURTEENTH EUROSYS CONFERENCE 2019 (EUROSYS '19), 2019,
  • [6] Scaring and Bullying People into Security Won't Work
    Sasse, Angela
    IEEE SECURITY & PRIVACY, 2015, 13 (03) : 80 - 83
  • [7] Why Doesn't Jane Protect Her Privacy?
    Renaud, Karen
    Volkamer, Melanie
    Renkema-Padmos, Arne
    PRIVACY ENHANCING TECHNOLOGIES, PETS 2014, 2014, 8555 : 244 - 262
  • [8] Parents Just Don't Understand: Why Teens Don't Talk to Parents about Their Online Risk Experiences
    Wisniewski, Pamela
    Xu, Heng
    Rosson, Mary Beth
    Carroll, John M.
    CSCW'17: PROCEEDINGS OF THE 2017 ACM CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING, 2017, : 523 - 540
  • [9] Why Reviewing Apps Is Not Enough: Transparency for Trust (T4T) Principles of Responsible Health App Marketplaces
    Wykes, Til
    Schueller, Stephen
    JOURNAL OF MEDICAL INTERNET RESEARCH, 2019, 21 (05)
  • [10] Why don't UK citizens protest against privacy-invading dragnet surveillance?
    Renaud, Karen
    Flowerday, Stephen
    English, Rosanne
    Volkamer, Melanie
    INFORMATION AND COMPUTER SECURITY, 2016, 24 (04) : 400 - 416