{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T04:24:48Z","timestamp":1648873488654},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,5,1]],"date-time":"2016-05-01T00:00:00Z","timestamp":1462060800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2016,5]]},"DOI":"10.1007\/s11623-016-0597-7","type":"journal-article","created":{"date-parts":[[2016,5,20]],"date-time":"2016-05-20T15:40:52Z","timestamp":1463758852000},"page":"283-289","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Unpopul\u00e4re E-Mail-Verschl\u00fcsselung \u2013 Aufl\u00f6sung des Henne-Ei-Problems"],"prefix":"10.1007","volume":"40","author":[{"given":"Bernhard","family":"Esslinger","sequence":"first","affiliation":[]},{"given":"Ludger","family":"Schmidt","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Strenge","sequence":"additional","affiliation":[]},{"given":"Arno","family":"Wacker","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,21]]},"reference":[{"key":"597_CR1","unstructured":"S\/MIME und OpenPGP: RFC 3851\u2013Secure\/Multipurpose Internet Mail Extensions (S\/MIME) Version 3.1 Message Specification, RFC 5751\u2013Secure\/Multipurpose Internet Mail Extensions (S\/MIME) Version 3.2 Message Specification, RFC 3156\u2013MIME Security with OpenPGP."},{"key":"597_CR2","first-page":"701","volume-title":"Gerrit van der Veer und Carolyn Gale (Hg.): CHI. Portland","author":"S. L. Garfinkel","year":"2005","unstructured":"Garfinkel, Simson L.; Margrave, David; Schiller, Jeffrey I.; Nordlander, Erik; Miller, Robert C. (2005): How to make secure E-Mail easier to use. In: Gerrit van der Veer und Carolyn Gale (Hg.): CHI. Portland, 2005. S. 701\u2013710."},{"key":"597_CR3","doi-asserted-by":"crossref","unstructured":"Gross, Joshua B.; Rosson, Mary Beth: Looking for Trouble: Understanding End-user Security Management. In: Proceedings of the 2007 Symposium on Computer Human Interaction for the Management of Information Technology. CHIMIT\u2019 07, ACM, New York, 2007. Online verf\u00fcgbar unter http:\/\/doi.acm.org\/10.1145\/1234772.1234786","DOI":"10.1145\/1234772.1234786"},{"key":"597_CR4","volume-title":"Usability Challenges of PKI","author":"T. Straub","year":"2006","unstructured":"Straub, Tobias: Usability Challenges of PKI. Dissertation. TU Darmstadt, 2006."},{"key":"597_CR5","volume-title":"Proceedings of the 8th USENIX Security Symposium","author":"A. Whitten","year":"1999","unstructured":"Whitten, Alma; Tygar, J. Doug: Why Johnny Can\u2019t Encrypt: A Usability Evaluation of PGP 5.0. In: Proceedings of the 8th USENIX Security Symposium, 1999."},{"key":"597_CR6","volume-title":"Symposium On Usable Privacy and Security","author":"S. Sheng","year":"2006","unstructured":"Sheng, Steve; Broderick, Levi; Koranda, Colleen Alison; Hyland, Jeremy J.: Why Johnny still can\u2019t encrypt: evaluating the usability of E-Mail encryption software. In: Symposium On Usable Privacy and Security, 2006."},{"key":"597_CR7","volume-title":"Annual Symposium on Information Assurance and Secure Knowledge Management (ASIA\u201912)","author":"A. Fry","year":"2006","unstructured":"Fry, Ann; Chiasson, Sonia; Somayaji, Anil: Not sealed but delivered: The (un) usability of s\/mime today. In: Annual Symposium on Information Assurance and Secure Knowledge Management (ASIA\u201912), Albany, NY2012 2006.."},{"issue":"5","key":"597_CR8","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1007\/s11623-014-0116-7","volume":"38","author":"Bernhard Esslinger","year":"2014","unstructured":"Esslinger, Bernhard: Sichere E-Mail mit S\/MIME. In: Datenschutz und Datensicherheit\u2013DuD 38 (5\/2014), S. 305-313. DOI: 10.1007\/s11623-014-0116-7","journal-title":"Datenschutz und Datensicherheit - DuD"},{"key":"597_CR9","unstructured":"DeWitt, Alexander John Anthony George: Usability Issues with Security of Electronic Mail. Dissertation. Brunel University, 2007."},{"issue":"1-2","key":"597_CR10","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/j.ijhcs.2005.04.015","volume":"63","author":"V. Roth","year":"2005","unstructured":"Roth, Volker; Straub, Tobias; Richter, Kai: Security and usability engineering with particular attention to electronic mail. In: International Journal of Human-Computer Studies 63 (1-2), 2005, S. 51\u201373. DOI: 10.1016\/j.ijhcs.2005.04.015","journal-title":"International Journal of Human-Computer Studies"},{"issue":"2","key":"597_CR11","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MSP.2007.25","volume":"5","author":"A. Kapadia","year":"2007","unstructured":"Kapadia, Apu: A Case (Study) For Usability in Secure E-Mail Communication. In: IEEE Security & Privacy Mag. 5 (2), 2007, S. 80\u201384. DOI: 10.1109\/MSP.2007.25","journal-title":"IEEE Security & Privacy Mag"},{"issue":"1","key":"597_CR12","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/MIC.2009.25","volume":"13","author":"S. Farrell","year":"2009","unstructured":"Farrell, Stephen: Why Don\u2019t We Encrypt Our E-Mail? In: IEEE Internet Computing 13 (1), 2009, S. 82\u201385. DOI: 10.1109\/MIC.2009.25","journal-title":"IEEE Internet Computing"},{"key":"597_CR13","volume-title":"Making security usable","author":"A. Whitten","year":"2004","unstructured":"Whitten, Alma: Making security usable. Carnegie Mellon University, 2004."},{"issue":"4","key":"597_CR14","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/1330311.1330320","volume":"51","author":"R. West","year":"2008","unstructured":"West, Ryan: The Psychology of Security. In: Commun. ACM 51 (4), 2008, S. 34\u201340. DOI: 10.1145\/1330311.1330320","journal-title":"Commun. ACM"},{"key":"597_CR15","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/2073276.2073283","volume-title":"Proceedings of the 2011 Workshop on New Security Paradigms Workshop","author":"R. Wash","year":"2011","unstructured":"Wash, Rick; Rader, Emilee (2011): Influencing Mental Models of Security: A Research Agenda. In: Proceedings of the 2011 Workshop on New Security Paradigms Workshop 2011. ACM, New York, S. 57\u201366. Online verf\u00fcgbar unter http:\/\/doi.acm.org\/10.1145\/2073276.2073283"},{"issue":"5","key":"597_CR16","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/MSP.2004.71","volume":"2","author":"D. Balfanz","year":"2004","unstructured":"Balfanz, Dirk; Durfee, Glenn; Grinter, Rebecca E.; Smetters, D. K.: In Search of Usable Security: Five Lessons from the Field. In: IEEE Security and Privacy 2 (5), 2004, S. 19\u201324. DOI: 10.1109\/MSP.2004.71","journal-title":"IEEE Security and Privacy"},{"issue":"8","key":"597_CR17","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1016\/S0167-4048(03)00006-3","volume":"22","author":"J. Johnston","year":"2003","unstructured":"Johnston, J.; Eloff, J. H. P.; Labuschagne, L.: Features: Security and Human Computer Interfaces. In: Computers and Security 22 (8), 2003, S. 675\u2013684. DOI: 10.1016\/S0167-4048(03)00006-3","journal-title":"Computers and Security"},{"key":"597_CR18","doi-asserted-by":"crossref","unstructured":"Nurse, Jason R. C.; Creese, Sadie; Goldsmith, Michael; Lamberts, Koen: Guidelines for usable cybersecurity: Past and present. In: 2011 International Workshop on Cyberspace Safety and Security (CSS). Milan, S. 21-26.","DOI":"10.1109\/CSS.2011.6058566"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-016-0597-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-016-0597-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-016-0597-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-016-0597-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T04:33:26Z","timestamp":1567917206000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-016-0597-7"}},"subtitle":["Konzepte f\u00fcr anwenderfreundliche E-Mail-Sicherheit"],"short-title":[],"issued":{"date-parts":[[2016,5]]},"references-count":18,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2016,5]]}},"alternative-id":["597"],"URL":"https:\/\/doi.org\/10.1007\/s11623-016-0597-7","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5]]}}}