User adoption and usage of end-to-end encryption tools is an ongoing research topic. A subset of such tools allows users to encrypt confidential emails, as well as manage their access control using features such as the expiration time, disabling forwarding, persistent protection, and watermarking. Previous studies have suggested that protective attitudes and behaviors could improve the adoption of new security technologies. Therefore, we conducted a user study on 19 participants to understand their perceptions of an email security tool and how they use it to manage access control to confidential information such as medical, tax, and employee information if sent via email. Our results showed that the participants’ first impression upon recei...
Support for strong electronic mail security is widely available yet only few communicants appear to ...
The purpose of this study was to provide a comprehensive understanding of the usage of software encr...
Data breaches from email attacks have been an issue since email was first implemented. Common attack...
International audienceSeveral end-to-end encryption technologies for emails such as PGP and S/MIME e...
Existing end-to-end-encrypted (E2EE) email systems, mainly PGP, have long been evaluated in controll...
End-to-end encryption has been heralded by privacy and security researchers as an effective defence ...
Email is one of the main communication tools and has seen significant adoption in the past decades. ...
End-to-end encryption has been heralded by privacy and security researchers as an effective defence ...
Email is undoubtedly the most used communications mechanism in society today. Within business alone,...
This paper presents the results of a usability study focused on three end-to-end encryption technolo...
Encryption is used to convert an email message to an unreadable format thereby securing patient priv...
The computer security community has advocated widespread adoption of secure communication tools to c...
Background: Findings and statements about how securely personal health information is managed in cli...
As people rely more heavily on online communication, privacy becomes an increasingly critical concer...
Why do email users perceive their communications to be private when email provides virtually no safe...
Support for strong electronic mail security is widely available yet only few communicants appear to ...
The purpose of this study was to provide a comprehensive understanding of the usage of software encr...
Data breaches from email attacks have been an issue since email was first implemented. Common attack...
International audienceSeveral end-to-end encryption technologies for emails such as PGP and S/MIME e...
Existing end-to-end-encrypted (E2EE) email systems, mainly PGP, have long been evaluated in controll...
End-to-end encryption has been heralded by privacy and security researchers as an effective defence ...
Email is one of the main communication tools and has seen significant adoption in the past decades. ...
End-to-end encryption has been heralded by privacy and security researchers as an effective defence ...
Email is undoubtedly the most used communications mechanism in society today. Within business alone,...
This paper presents the results of a usability study focused on three end-to-end encryption technolo...
Encryption is used to convert an email message to an unreadable format thereby securing patient priv...
The computer security community has advocated widespread adoption of secure communication tools to c...
Background: Findings and statements about how securely personal health information is managed in cli...
As people rely more heavily on online communication, privacy becomes an increasingly critical concer...
Why do email users perceive their communications to be private when email provides virtually no safe...
Support for strong electronic mail security is widely available yet only few communicants appear to ...
The purpose of this study was to provide a comprehensive understanding of the usage of software encr...
Data breaches from email attacks have been an issue since email was first implemented. Common attack...