Skip to main content
Log in

Unpopuläre E-Mail-Verschlüsselung – Auflösung des Henne-Ei-Problems

Konzepte für anwenderfreundliche E-Mail-Sicherheit

  • Schwerpunkt
  • Published:
Datenschutz und Datensicherheit - DuD Aims and scope Submit manuscript

Abstract

E-Mail-Verschlüsselung könnte längst flächendeckend Verwendung finden. Der Beitrag gibt eine Antwort auf die Frage, warum dies nicht der Fall ist–und macht Vorschläge, was getan werden sollte, um dies zu ändern.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Literatur

  1. S/MIME und OpenPGP: RFC 3851–Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.1 Message Specification, RFC 5751–Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification, RFC 3156–MIME Security with OpenPGP.

  2. Garfinkel, Simson L.; Margrave, David; Schiller, Jeffrey I.; Nordlander, Erik; Miller, Robert C. (2005): How to make secure E-Mail easier to use. In: Gerrit van der Veer und Carolyn Gale (Hg.): CHI. Portland, 2005. S. 701–710.

    Google Scholar 

  3. Gross, Joshua B.; Rosson, Mary Beth: Looking for Trouble: Understanding End-user Security Management. In: Proceedings of the 2007 Symposium on Computer Human Interaction for the Management of Information Technology. CHIMIT’ 07, ACM, New York, 2007. Online verfügbar unter http://doi.acm.org/10.1145/1234772.1234786

  4. Straub, Tobias: Usability Challenges of PKI. Dissertation. TU Darmstadt, 2006.

    Google Scholar 

  5. Whitten, Alma; Tygar, J. Doug: Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0. In: Proceedings of the 8th USENIX Security Symposium, 1999.

    Google Scholar 

  6. Sheng, Steve; Broderick, Levi; Koranda, Colleen Alison; Hyland, Jeremy J.: Why Johnny still can’t encrypt: evaluating the usability of E-Mail encryption software. In: Symposium On Usable Privacy and Security, 2006.

    Google Scholar 

  7. Fry, Ann; Chiasson, Sonia; Somayaji, Anil: Not sealed but delivered: The (un) usability of s/mime today. In: Annual Symposium on Information Assurance and Secure Knowledge Management (ASIA’12), Albany, NY2012 2006..

    Google Scholar 

  8. Esslinger, Bernhard: Sichere E-Mail mit S/MIME. In: Datenschutz und Datensicherheit–DuD 38 (5/2014), S. 305-313. DOI: 10.1007/s11623-014-0116-7

    Article  Google Scholar 

  9. DeWitt, Alexander John Anthony George: Usability Issues with Security of Electronic Mail. Dissertation. Brunel University, 2007.

  10. Roth, Volker; Straub, Tobias; Richter, Kai: Security and usability engineering with particular attention to electronic mail. In: International Journal of Human-Computer Studies 63 (1-2), 2005, S. 51–73. DOI: 10.1016/j.ijhcs.2005.04.015

    Article  Google Scholar 

  11. Kapadia, Apu: A Case (Study) For Usability in Secure E-Mail Communication. In: IEEE Security & Privacy Mag. 5 (2), 2007, S. 80–84. DOI: 10.1109/MSP.2007.25

    Article  Google Scholar 

  12. Farrell, Stephen: Why Don’t We Encrypt Our E-Mail? In: IEEE Internet Computing 13 (1), 2009, S. 82–85. DOI: 10.1109/MIC.2009.25

    Article  Google Scholar 

  13. Whitten, Alma: Making security usable. Carnegie Mellon University, 2004.

    Google Scholar 

  14. West, Ryan: The Psychology of Security. In: Commun. ACM 51 (4), 2008, S. 34–40. DOI: 10.1145/1330311.1330320

    Article  Google Scholar 

  15. Wash, Rick; Rader, Emilee (2011): Influencing Mental Models of Security: A Research Agenda. In: Proceedings of the 2011 Workshop on New Security Paradigms Workshop 2011. ACM, New York, S. 57–66. Online verfügbar unter http://doi.acm.org/10.1145/2073276.2073283

    Chapter  Google Scholar 

  16. Balfanz, Dirk; Durfee, Glenn; Grinter, Rebecca E.; Smetters, D. K.: In Search of Usable Security: Five Lessons from the Field. In: IEEE Security and Privacy 2 (5), 2004, S. 19–24. DOI: 10.1109/MSP.2004.71

    Article  Google Scholar 

  17. Johnston, J.; Eloff, J. H. P.; Labuschagne, L.: Features: Security and Human Computer Interfaces. In: Computers and Security 22 (8), 2003, S. 675–684. DOI: 10.1016/S0167-4048(03)00006-3

    Article  Google Scholar 

  18. Nurse, Jason R. C.; Creese, Sadie; Goldsmith, Michael; Lamberts, Koen: Guidelines for usable cybersecurity: Past and present. In: 2011 International Workshop on Cyberspace Safety and Security (CSS). Milan, S. 21-26.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bernhard Esslinger.

Additional information

Prof. Bernhard Esslinger Professor für IT Security und Kryptologie. Ehemaliger CISO der SAP AG, heute selbstständig. Leiter des Open-Source-Projektes CrypTool (www.cryptool.org).

Prof. Dr.-Ing. Ludger Schmidt Leiter des Fachgebiets Mensch-Maschine-Systemtechnik Universität Kassel

Benjamin Strenge, M.Sc. Wissenschaftlicher Mitarbeiter Fachgebiet Mensch-Maschine-Systemtechnik Universität Kassel

Prof. Dr. Arno Wacker Leiter des Fachgebiets Angewandte Informationssicherheit Universität Kassel

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Esslinger, B., Schmidt, L., Strenge, B. et al. Unpopuläre E-Mail-Verschlüsselung – Auflösung des Henne-Ei-Problems. Datenschutz Datensich 40, 283–289 (2016). https://doi.org/10.1007/s11623-016-0597-7

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11623-016-0597-7

Navigation