Author
Listed:
- Elham Al Qahtani
(Department of Software Engineering, University of Jeddah, Makkah 23445, Saudi Arabia)
- Yousra Javed
(School of Information Technology, Illinois State University, Normal, IL 61761, USA)
- Sarah Tabassum
(Department of Software Information Systems, University of North Carolina, Charlotte, NC 28223, USA)
- Lipsarani Sahoo
(Department of Software Information Systems, University of North Carolina, Charlotte, NC 28223, USA)
- Mohamed Shehab
(Department of Software Information Systems, University of North Carolina, Charlotte, NC 28223, USA)
Abstract
User adoption and usage of end-to-end encryption tools is an ongoing research topic. A subset of such tools allows users to encrypt confidential emails, as well as manage their access control using features such as the expiration time, disabling forwarding, persistent protection, and watermarking. Previous studies have suggested that protective attitudes and behaviors could improve the adoption of new security technologies. Therefore, we conducted a user study on 19 participants to understand their perceptions of an email security tool and how they use it to manage access control to confidential information such as medical, tax, and employee information if sent via email. Our results showed that the participants’ first impression upon receiving an end-to-end encrypted email was that it looked suspicious, especially when received from an unknown person. After the participants were informed about the importance of the investigated tool, they were comfortable sharing medical, tax, and employee information via this tool. Regarding access control management of the three types of confidential information, the expiration time and disabling forwarding were most useful for the participants in preventing unauthorized and continued access. While the participants did not understand how the persistent protection feature worked, many still chose to use it, assuming it provided some extra layer of protection to confidential information and prevented unauthorized access. Watermarking was the least useful feature for the participants, as many were unsure of its usage. Our participants were concerned about data leaks from recipients’ devices if they set a longer expiration date, such as a year. We provide the practical implications of our findings.
Suggested Citation
Elham Al Qahtani & Yousra Javed & Sarah Tabassum & Lipsarani Sahoo & Mohamed Shehab, 2023.
"Managing Access to Confidential Documents: A Case Study of an Email Security Tool,"
Future Internet, MDPI, vol. 15(11), pages 1-23, October.
Handle:
RePEc:gam:jftint:v:15:y:2023:i:11:p:356-:d:1269385
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:15:y:2023:i:11:p:356-:d:1269385. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.