Inicio  /  Future Internet  /  Vol: 15 Par: 11 (2023)  /  Artículo
ARTÍCULO
TITULO

Managing Access to Confidential Documents: A Case Study of an Email Security Tool

Elham Al Qahtani    
Yousra Javed    
Sarah Tabassum    
Lipsarani Sahoo and Mohamed Shehab    

Resumen

User adoption and usage of end-to-end encryption tools is an ongoing research topic. A subset of such tools allows users to encrypt confidential emails, as well as manage their access control using features such as the expiration time, disabling forwarding, persistent protection, and watermarking. Previous studies have suggested that protective attitudes and behaviors could improve the adoption of new security technologies. Therefore, we conducted a user study on 19 participants to understand their perceptions of an email security tool and how they use it to manage access control to confidential information such as medical, tax, and employee information if sent via email. Our results showed that the participants? first impression upon receiving an end-to-end encrypted email was that it looked suspicious, especially when received from an unknown person. After the participants were informed about the importance of the investigated tool, they were comfortable sharing medical, tax, and employee information via this tool. Regarding access control management of the three types of confidential information, the expiration time and disabling forwarding were most useful for the participants in preventing unauthorized and continued access. While the participants did not understand how the persistent protection feature worked, many still chose to use it, assuming it provided some extra layer of protection to confidential information and prevented unauthorized access. Watermarking was the least useful feature for the participants, as many were unsure of its usage. Our participants were concerned about data leaks from recipients? devices if they set a longer expiration date, such as a year. We provide the practical implications of our findings.

 Artículos similares

       
 
Yuro Koga and Kayoko Yamamoto    
It is important that both static and dynamic information is efficiently used to create a suitable tourism plan. However, collecting, accumulating and managing dynamic information can cost tourists time, money and energy. In the present study, an original... ver más

 
Martin Zápotocký and Milan Koren    
The main objective of this research was to develop a web-based geographic information system (GIS) based on a detailed analysis of user preferences from the perspective of forest research, management and education. An anonymous questionnaire was used to ... ver más

 
Siti Dhalila Mohd Satar, Masnida Hussin, Zurina Mohd Hanapi and Mohamad Afendee Mohamed    
Managing and controlling access to the tremendous data in Cloud storage is very challenging. Due to various entities engaged in the Cloud environment, there is a high possibility of data tampering. Cloud encryption is being employed to control data acces... ver más
Revista: Future Internet

 
Hartmut Müller and Marije Louwsma    
The Covid-19 pandemic put a heavy burden on member states in the European Union. To govern the pandemic, having access to reliable geo-information is key for monitoring the spatial distribution of the outbreak over time. This study aims to analyze the ro... ver más

 
Ziheng Sun, Liping Di, Annie Burgess, Jason A. Tullis and Andrew B. Magill    
AI (artificial intelligence)-based analysis of geospatial data has gained a lot of attention. Geospatial datasets are multi-dimensional; have spatiotemporal context; exist in disparate formats; and require sophisticated AI workflows that include not only... ver más