TY - GEN
T1 - Obstacles to the Adoption of Secure Communication Tools
AU - Abu-Salma, Ruba
AU - Sasse, M. Angela
AU - Bonneau, Joseph
AU - Danilova, Anastasia
AU - Naiakshina, Alena
AU - Smith, Matthew
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/6/23
Y1 - 2017/6/23
N2 - The computer security community has advocated widespread adoption of secure communication tools to counter mass surveillance. Several popular personal communication tools (e.g., WhatsApp, iMessage) have adopted end-to-end encryption, and many new tools (e.g., Signal, Telegram) have been launched with security as a key selling point. However it remains unclear if users understand what protection these tools offer, and if they value that protection. In this study, we interviewed 60 participants about their experience with different communication tools and their perceptions of the tools' security properties. We found that the adoption of secure communication tools is hindered by fragmented user bases and incompatible tools. Furthermore, the vast majority of participants did not understand the essential concept of end-to-end encryption, limiting their motivation to adopt secure tools. We identified a number of incorrect mental models that underpinned participants' beliefs.
AB - The computer security community has advocated widespread adoption of secure communication tools to counter mass surveillance. Several popular personal communication tools (e.g., WhatsApp, iMessage) have adopted end-to-end encryption, and many new tools (e.g., Signal, Telegram) have been launched with security as a key selling point. However it remains unclear if users understand what protection these tools offer, and if they value that protection. In this study, we interviewed 60 participants about their experience with different communication tools and their perceptions of the tools' security properties. We found that the adoption of secure communication tools is hindered by fragmented user bases and incompatible tools. Furthermore, the vast majority of participants did not understand the essential concept of end-to-end encryption, limiting their motivation to adopt secure tools. We identified a number of incorrect mental models that underpinned participants' beliefs.
UR - http://www.scopus.com/inward/record.url?scp=85024496510&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85024496510&partnerID=8YFLogxK
U2 - 10.1109/SP.2017.65
DO - 10.1109/SP.2017.65
M3 - Conference contribution
AN - SCOPUS:85024496510
T3 - Proceedings - IEEE Symposium on Security and Privacy
SP - 137
EP - 153
BT - 2017 IEEE Symposium on Security and Privacy, SP 2017 - Proceedings
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 2017 IEEE Symposium on Security and Privacy, SP 2017
Y2 - 22 May 2017 through 24 May 2017
ER -