CHI2006 sgaw

50 %
50 %
Information about CHI2006 sgaw
Education

Published on January 4, 2008

Author: Rafael

Source: authorstream.com

Secrecy, Flagging, and Paranoia: Adoption Criteria in Encrypted E-mail:  Secrecy, Flagging, and Paranoia: Adoption Criteria in Encrypted E-mail Shirley Gaw, Edward W. Felten, Patricia Fernandez-Kelly Princeton University Synopsis:  Social Meaning Synopsis Usability Social Meaning Adoption Slide4:  Alice Slide5:  ? Prior Work:  Prior Work PGP and Eudora Whitten and Tygar, 1999:  PGP and Eudora Whitten and Tygar, 1999 S/MIME and Outlook Garfinkel and Miller, 2005:  S/MIME and Outlook Garfinkel and Miller, 2005 Security with a Sociological Perspective:  Security with a Sociological Perspective Password security practices Adams and Sasse, 1999 Physical and digital security practices Dourish et al, 2004 Research Question And Method:  Research Question And Method What can we learn about current users to encourage adoption of encryption when needed? Extended Case Method. Burawoy, 1991 Site Selection:  Site Selection Protests Hanging Banners Squatting Slide13:  Interview Interview Participants (9):  Interview Participants (9) Campaigns (3) Finance Legal Tech Support (2) Media HR Organization Secrets Private Public Interview Participants (9):  Media HR Legal Campaigns (3) Finance Tech Support (2) Interview Participants (9) Technical Experience Novice Expert Findings:  Findings Applications of Encryption Encryption of Donation Information Encryption of Secret Plans Social Context to Using Encryption Necessity & Secrecy Flagging Importance Stigma & Paranoia Findings:  Findings Applications of Encryption Encryption of Donation Information Encryption of Secret Plans Social Context to Using Encryption Necessity & Secrecy Flagging Importance Stigma & Paranoia Encrypting Donation Information:  Encrypting Donation Information Slide19:  --Abe We have our supporters out there our supporters are giving us ... donations. So, they're doing it from ... the most sensitive place they can. There’s no commercial reward in it for them. They've come to us and said I have a good heart, I love what you guys do. I want to give you money so that you can do it. Slide20:  --Abe [If we violate their trust,] our supporters would say, [sighs] “you know what? You guys are not responsible. We can’t trust you with our—our credit cards. Now I'm not gonna give you any more money.” And that means we're finished. Slide21:  Maybe we're over-inflating our importance... but we'd like to believe that [people we oppose] would be very interested to run through our database and see exactly who supports us. They would be very interested to know who our supporters are. And so, we're obliged to protect it in every possible way. --Abe Findings:  Findings Applications of Encryption Encryption of Donation Information Encryption of Secret Plans Social Context to Using Encryption Necessity & Secrecy Flagging Importance Stigma & Paranoia Encrypting Secret Plans:  Encrypting Secret Plans Slide24:  We did a whole bunch of direct action ... we were sending encrypted e-mails back and forth ... so, like, leading up into that so people weren't reading what we were doing--or would know when we were going to do it. --Jenny Slide25:  If the ... police ever come and bust into the office, you shouldn't have a document saying "Hey, I'm discussing how I'm going to campaign against [a controversial issue]." It's not the kind of information you want them to have. --Abe Slide26:  You don't want to show your cards. You don't want that stuff out because people's lives are in jeopardy—really. I mean, people are taking an action and could be arrested, could be, you know, jeopardized in some way. --Stefan Findings:  Findings Applications of Encryption Encryption of Donation Information Encryption of Secret Plans Social Context to Using Encryption Necessity & Secrecy Flagging Importance Stigma & Paranoia Necessity and Secrecy:  Necessity and Secrecy Slide29:  I think the only people who do encryption in the organization are people who have been trained to be—who are associated with—specifically the [direct actions] we do. So we keep that stuff encrypted. --Stefan Slide30:  I don't know of any other reason I would need to encrypt my e-mails `cause most of my e-mails are just ... things public. People could learn, I mean, people could read my e-mails, they wouldn't see anything… --Jenny Slide31:  I don't think any of my communication is anything people are dying to get their hands on. I don't--I am not involved in any of the ... protests or that sort of situation we do. So, there's not as much need for, like, me in the organization to use that kind of thing. --Sandra Findings:  Findings Applications of Encryption Encryption of Donation Information Encryption of Secret Plans Social Context to Using Encryption Necessity & Secrecy Flagging Importance Stigma & Paranoia Flagging Importance:  Flagging Importance Slide34:  It's like—OK, if it's automated—fine. But, it's a bit irritating, you know. I get this message and "oooh, it's encrypted." "Can we have a meeting tomorrow at 2:00?" I'm like, what's the secret? --Abe Findings:  Findings Applications of Encryption Encryption of Donation Information Encryption of Secret Plans Social Context to Using Encryption Necessity & Secrecy Flagging Importance Stigma & Paranoia Stigma and Paranoia:  Stigma and Paranoia Slide37:  So you're saying that ... people should just—even normal people? That ... you're sending e-mail to ... your mom, like "Hey, things are going" That you should encrypt your e-mail. That people should do all that. --Jenny Slide38:  I'm not paranoid enough to think the CIA is monitoring my e-mails or anything to that effect. --Sandra Findings:  Findings Applications of Encryption Encryption of Donation Information Encryption of Secret Plans Social Context to Using Encryption Necessity & Secrecy Flagging Importance Stigma & Paranoia Design Implications:  Design Implications Invisible Security:  Invisible Security Network-in-a-Box, PARC Tailored Interfaces:  Tailored Interfaces Interoperable Systems:  Interoperable Systems Organization Secrets Private Public Technical Experience Novice Expert Summary:  Social Meaning Summary Usability Social Meaning Adoption Necessity & Secrecy Flagging Importance Stigma & Paranoia

Add a comment

Related presentations

Related pages

01Feb-Activists-sgaw-CHI2006 - Ace Recommendation Platform - 1

Secrecy, Flagging, and Paranoia:Adoption Criteria in Encrypted E-MailShirley GawDept of Computer SciencePrinceton UniversityPrinceton, NJ USAsgaw@cs ...
Read more

Chi2006.org | PageGlance

CHI2006 sgaw Views: 25 Slides: 44 ... Have a question? Call us at. US 210-787-1860. ... Chi2006 workshop paper on trust; Motivation and incentives; ...
Read more

[Enigmail] changing to PGP/MIME by default

> > http://www.cs.princeton.edu/~sgaw/publications/01Feb-Activists-sgaw-CHI2006.pdf Excellent paper.
Read more

Uncategorized | RGP Communications Security

http://www.cs.princeton.edu/~sgaw/publications/01Feb-Activists-sgaw-CHI2006.pdf. Secrecy, Flagging, and Paranoia: Adoption Criteria in Encrypted Email
Read more

Κρυπτογράφηση ηλεκτρονικού ταχυδρομείου - Βικιπαίδεια

http://www.cs.princeton.edu/~sgaw/publications/01Feb-Activists-sgaw-CHI2006.pdf. ...
Read more

091029-accessControl-mazurek - Ace Recommendation Platform - 1

01Feb-Activists-sgaw-CHI2006; sp.500-213; p591-gaw; Dec2-Bayuk; CMU-CS-05-130; ISAhomeuser1; finreview; oakland09; Recommended Topics; st teaching; read ...
Read more

cse544-lec4-multics - Ace Recommendation Platform - 1

01Feb-Activists-sgaw-CHI2006; detailedCV; PervasiveIMDSecurity; cqms-cidr09; TR-06-4; security_blackberry; wlee tpds06; cmpsc09; CV; Recommended Topics ...
Read more

E-mail Issues for Lawyers - Oklahoma Bar Association

E-mail Issues for Lawyers Today ... Adoption Criteria in Encrypted E-Mail http://www.cs.princeton.edu/~sgaw/publications/01Feb-Activists-sgaw-CHI2006.pdf ...
Read more