skip to main content
10.1145/2335356.2335371acmotherconferencesArticle/Chapter ViewAbstractPublication PagessoupsConference Proceedingsconference-collections
research-article

Helping Johnny 2.0 to encrypt his Facebook conversations

Authors Info & Claims
Published:11 July 2012Publication History

ABSTRACT

Several billion Facebook messages are sent every day. While there are many solutions to email security whose usability has been extensively studied, little work has been done in the area of message security for Facebook and even less on the usability aspects in this area. To evaluate the need for such a mechanism, we conducted a screening study with 514 participants, which showed a clear desire to protect private messages on Facebook. We therefore proceeded to analyse the usability of existing approaches and extracted key design decisions for further evaluation. Based on this analysis, we conducted a laboratory study with 96 participants to analyse different usability aspects and requirements of a Facebook message encryption mechanism. Two key findings of our study are that automatic key management and key recovery capabilities are important features for such a mechanism. Following on from these studies, we designed and implemented a usable service-based encryption mechanism for Facebook conversations. In a final study with 15 participants, we analysed the usability of our solution. All participants were capable of successfully encrypting their Facebook conversations without error when using our service, and the mechanism was perceived as usable and useful. The results of our work suggest that in the context of the social web, new security/usability trade-offs can be explored to protect users more effectively.

References

  1. J. Anderson, C. Diaz, J. Bonneau, and F. Stajano. Privacy-enabling Social Networking over Untrusted Networks. In Proceedings of the 2nd ACM Workshop on Online Social Networks, pages 1--6, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. F. Beato, M. Kohlweiss, and K. Wouters. Scramble! Your Social Network Data. In Proceedings of the 11th International Conference on Privacy Enhancing Technologies, pages 211--225. Springer, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. Brooke. SUS: A "Quick and Dirty" Usability Scale. In P. Jordan, B. Thomas, B. Weerdmeester, and A. McClelland, editors, Usability Evaluation in Industry. Taylor and Francis, 1996.Google ScholarGoogle Scholar
  4. B. Dodson, I. Vo, T. J. Purtell, A. Cannon, and M. S. Lam. Musubi: Disintermediated Interactive Social Feeds for Mobile Devices. In Proceedings of the 21st International Conference on World Wide Web, pages 211--220, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. S. Egelman, A. Oates, and S. Krishnamurthi. Oops, I Did it Again: Mitigating Repeated Access Control Errors on Facebook. In Proceedings of the 29th International Conference on Human Factors in Computing Systems. ACM, May 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Egelman, J. Tsai, L. F. Cranor, and A. Acquisti. Timing is Everything?: The Effects of Timing and Placement of Online Privacy Indicators. In Proceedings of the 27th International Conference on Human Factors in Computing Systems, pages 319--328. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. S. Fahl, M. Harbach, T. Muders, and M. Smith. Confidentiality as a Service - Usable Security for the Cloud. In Proceedings of the IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. S. Fahl, M. Harbach, T. Muders, and M. Smith. TrustSplit: Usable Confidentiality for Social Network Messaging. In Proceedings of the ACM Conference on Hypertext and Hypermedia, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Garfinkel. Email-based Identification and Authentication: An Alternative to PKI? IEEE Security & Privacy, 1(6):20--26, Nov. 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. S. L. Garfinkel and R. C. Miller. Johnny 2: A User Test of Key Continuity Management with S/MIME and Outlook Express. In Proceedings of the First Symposium on Usable Privacy and Security. ACM, July 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. M. Harbach, S. Fahl, T. Muders, and M. Smith. POSTER: All Our Messages Are Belong to Us: Usable Confidentiality in Social Networks. In Proceedings Companion of the 21st International Conference on World Wide Web, Apr. 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. C. Herley and P. Van Oorschot. A Research Agenda Acknowledging the Persistence of Passwords. IEEE Security & Privacy, 10(1):28--36, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. King, A. Lampinen, and A. Smolen. Privacy: Is There an App for That? In Proceedings of the Seventh Symposium on Usable Privacy and Security. ACM, July 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. P. Lambert, S. M. Bezek, and K. G. Karahalios. Waterhouse: Enabling Secure E-mail With Social Networking. In Proceedings of the International Conference On Human Factors In Computing Systems. ACM, Apr. 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Lazar, J. H. Feng, and H. Hochheiser. Resarch Methods in Human-Computer Interaction. Wiley, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. M. M. Lucas and N. Borisov. FlyByNight: Mitigating the Privacy Risks of Social Networking. In Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society, pages 1--8, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M.-E. Maurer, A. De Luca, and S. Kempe. Using Data Type Based Security Alert Dialogs To Raise Online Security Awareness. In Proceedings of the Seventh Symposium on Usable Privacy and Security. ACM, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. National Institute of Standards and Technology (NIST). Advanced Encryption Standard (AES) (FIPS PUB 197), October 2001.Google ScholarGoogle Scholar
  19. P. Rogaway and D. Wagner. Comments to NIST concerning AES Modes of Operations: CTR-Mode Encryption. National Institute of Standards and Technologies, 2000.Google ScholarGoogle Scholar
  20. S. Sheng, C. Koranda, J. Hyland, and L. Broderick. Why Johnny Still Can't Encrypt: Evaluating the Usability of Email Encryption Software. In Proceedings of the Second Symposium on Usable Privacy and Security, Poster, 2006.Google ScholarGoogle Scholar
  21. N. Wang, H. Xu, and J. Grossklags. Third-party Apps on Facebook: Privacy and the Illusion of Control. In Proceedings of the 5th ACM Symposium on Computer Human Interaction for Management of Information Technology, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. A. Whitten and J. Tygar. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In Proceedings of the 8th USENIX Security Symposium, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Helping Johnny 2.0 to encrypt his Facebook conversations

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          SOUPS '12: Proceedings of the Eighth Symposium on Usable Privacy and Security
          July 2012
          216 pages
          ISBN:9781450315326
          DOI:10.1145/2335356

          Copyright © 2012 Authors

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 11 July 2012

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate15of49submissions,31%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader