Usability of end-to-end encryption in e-mail communication
A Reuter, A Abdelmaksoud, K Boudaoud… - Frontiers in big …, 2021 - frontiersin.org
This paper presents the results of a usability study focused on three end-to-end encryption
technologies for securing e-mail traffic, namely PGP, S/MIME, and Pretty Easy Privacy (pEp) …
technologies for securing e-mail traffic, namely PGP, S/MIME, and Pretty Easy Privacy (pEp) …
Strategies and perceived risks of sending sensitive documents
N Warford, CW Munyendo, A Mediratta… - 30th USENIX Security …, 2021 - usenix.org
People are frequently required to send documents, forms, or other materials containing
sensitive data (eg, personal information, medical records, financial data) to remote parties …
sensitive data (eg, personal information, medical records, financial data) to remote parties …
ExD: Explainable Deletion
KM Ramokapane, A Rashid - Proceedings of the 2023 New Security …, 2023 - dl.acm.org
This paper focuses on a critical yet often overlooked aspect of data in digital systems and
services—deletion. Through a review of existing literature we highlight the challenges that …
services—deletion. Through a review of existing literature we highlight the challenges that …
[PDF][PDF] Privacy-Enhancing Technologies.
KE Seamons - 2022 - library.oapen.org
An increasing amount of sensitive information is being communicated and stored online.
Frequent reports of data breaches and sensitive data disclosures underscore the need for …
Frequent reports of data breaches and sensitive data disclosures underscore the need for …
Overview of Usable Privacy Research: Major Themes and Research Directions
S Fischer-Hübner, F Karegar - The Curious Case of Usable Privacy …, 2024 - Springer
A wide variety of literature exists on privacy across different communities and disciplines,
including Human-Computer Interaction (HCI). Privacy literature is also scattered within HCI …
including Human-Computer Interaction (HCI). Privacy literature is also scattered within HCI …
[图书][B] Resolving the privacy paradox: bridging the behavioral intention gap with risk communication theory
JCW Wu - 2019 - search.proquest.com
The advent of the Internet has led to vastly increased levels of data accessibility to both
users and would-be attackers. The privacy paradox is an established phenomenon wherein …
users and would-be attackers. The privacy paradox is an established phenomenon wherein …