{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T10:32:53Z","timestamp":1774866773396,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,8,27]],"date-time":"2018-08-27T00:00:00Z","timestamp":1535328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,8,27]]},"DOI":"10.1145\/3230833.3230859","type":"proceedings-article","created":{"date-parts":[[2018,8,13]],"date-time":"2018-08-13T12:29:48Z","timestamp":1534163388000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Finally Johnny Can Encrypt"],"prefix":"10.1145","author":[{"given":"Nina","family":"Gerber","sequence":"first","affiliation":[{"name":"SECUSO - Security, Usability, Society, Karlsruhe Institute of Technology, Karlsruhe, Germany"}]},{"given":"Verena","family":"Zimmermann","sequence":"additional","affiliation":[{"name":"Department of Human Sciences, Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Birgit","family":"Henhapl","sequence":"additional","affiliation":[{"name":"SECUSO - Security, Usability, Society, Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Sinem","family":"Emer\u00f6z","sequence":"additional","affiliation":[{"name":"Technische Universit\u00e4t Darmstadt, Darmstadt, Germany"}]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[{"name":"SECUSO - Security, Usability, Society, Karlsruhe Institute of Technology, Karlsruhe, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,8,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Open Whisper Systems. website. (2016). Available on https:\/\/whispersystems.org\/","author":"Open Whisper","year":"2017","unstructured":"Open Whisper Systems 2013-2016. 2016. Open Whisper Systems. website. (2016). Available on https:\/\/whispersystems.org\/ ; called on May 30th 2017 . Open Whisper Systems 2013-2016. 2016. Open Whisper Systems. website. (2016). Available on https:\/\/whispersystems.org\/; called on May 30th 2017."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.14722\/eurousec.2017.23006"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.65"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the Eleventh Symposium On Usable Privacy and Security. USENIX Association","author":"Atwater Erinn","year":"2015","unstructured":"Erinn Atwater , Cecylia Bocovich , Urs Hengartner , Ed Lank , and Ian Goldberg . 2015 . Leading Johnny to Water: Designing for Usability and Trust . In Proceedings of the Eleventh Symposium On Usable Privacy and Security. USENIX Association , Ottawa, 69--88. Erinn Atwater, Cecylia Bocovich, Urs Hengartner, Ed Lank, and Ian Goldberg. 2015. Leading Johnny to Water: Designing for Usability and Trust. In Proceedings of the Eleventh Symposium On Usable Privacy and Security. USENIX Association, Ottawa, 69--88."},{"key":"e_1_3_2_1_5_1","volume-title":"Ende-zu-Ende-Verschl\u00fcsselung kaum verbreitet. website. (2017). Available on https:\/\/de.statista.com\/infografik\/9522\/nutzung-von-ende-zu-ende-verschluesselung\/","author":"Brandt Mathias","year":"2017","unstructured":"Mathias Brandt . 2017. Ende-zu-Ende-Verschl\u00fcsselung kaum verbreitet. website. (2017). Available on https:\/\/de.statista.com\/infografik\/9522\/nutzung-von-ende-zu-ende-verschluesselung\/ ; called on August 7th 2017 . Mathias Brandt. 2017. Ende-zu-Ende-Verschl\u00fcsselung kaum verbreitet. website. (2017). Available on https:\/\/de.statista.com\/infografik\/9522\/nutzung-von-ende-zu-ende-verschluesselung\/; called on August 7th 2017."},{"key":"e_1_3_2_1_6_1","unstructured":"A. Freude and T. Freude. 2016. Echos of History: Understanding German Data Protection. website. (2016). Available on http:\/\/www.bfna.org\/publication\/newpolitik\/echos-of-history-understanding-german-data-protection; called on August 25th 2017.  A. Freude and T. Freude. 2016. Echos of History: Understanding German Data Protection. website. (2016). Available on http:\/\/www.bfna.org\/publication\/newpolitik\/echos-of-history-understanding-german-data-protection; called on August 25th 2017."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073001.1073003"},{"key":"e_1_3_2_1_8_1","volume-title":"Six alternatives to WhatsApp now that Facebook owns it. website. (2014). Available on https:\/\/www.theguardian.com\/technology\/2014\/feb\/20\/six-alternatives-whatsapp-facebook","author":"Gibbs S.","year":"2017","unstructured":"S. Gibbs . 2014. Six alternatives to WhatsApp now that Facebook owns it. website. (2014). Available on https:\/\/www.theguardian.com\/technology\/2014\/feb\/20\/six-alternatives-whatsapp-facebook ; called on August 30th 2017 . S. Gibbs. 2014. Six alternatives to WhatsApp now that Facebook owns it. website. (2014). Available on https:\/\/www.theguardian.com\/technology\/2014\/feb\/20\/six-alternatives-whatsapp-facebook; called on August 30th 2017."},{"key":"e_1_3_2_1_9_1","volume-title":"WhatsApp Fails. website.","author":"Greenberg Andy","year":"2015","unstructured":"Andy Greenberg . 2015. Rating Tech Giants on Privacy: Google Slips , WhatsApp Fails. website. ( 2015 ). Available on https:\/\/www.wired.com\/2015\/06\/rating-tech-giants-privacy-google-slips-whatsapp-fails\/, called on November 24th 2017. Andy Greenberg. 2015. Rating Tech Giants on Privacy: Google Slips, WhatsApp Fails. website. (2015). Available on https:\/\/www.wired.com\/2015\/06\/rating-tech-giants-privacy-google-slips-whatsapp-fails\/, called on November 24th 2017."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3046055.3046059"},{"key":"e_1_3_2_1_11_1","volume-title":"End-to-end encryption. website. (2016). Available on https:\/\/blog.whatsapp.com\/10000618\/end-to-end-encryption","author":"WhatsApp Inc. 2016.","year":"2017","unstructured":"WhatsApp Inc. 2016. End-to-end encryption. website. (2016). Available on https:\/\/blog.whatsapp.com\/10000618\/end-to-end-encryption ; called on August 30th 2017 . WhatsApp Inc. 2016. End-to-end encryption. website. (2016). Available on https:\/\/blog.whatsapp.com\/10000618\/end-to-end-encryption; called on August 30th 2017."},{"key":"e_1_3_2_1_12_1","volume-title":"WhatsApp Encryption Overview. website. (2016). Available on https:\/\/www.whatsapp.com\/security\/WhatsApp-Security-Whitepaper.pdf","author":"WhatsApp Inc. 2016.","year":"2017","unstructured":"WhatsApp Inc. 2016. WhatsApp Encryption Overview. website. (2016). Available on https:\/\/www.whatsapp.com\/security\/WhatsApp-Security-Whitepaper.pdf ; called on August 7th 2017 . WhatsApp Inc. 2016. WhatsApp Encryption Overview. website. (2016). Available on https:\/\/www.whatsapp.com\/security\/WhatsApp-Security-Whitepaper.pdf; called on August 7th 2017."},{"key":"e_1_3_2_1_13_1","volume-title":"WhatsApp Privacy Policy. website. (2016). Available on https:\/\/www.whatsapp.com\/legal\/#privacy-policy","author":"WhatsApp Inc. 2016.","year":"2017","unstructured":"WhatsApp Inc. 2016. WhatsApp Privacy Policy. website. (2016). Available on https:\/\/www.whatsapp.com\/legal\/#privacy-policy ; called on August 7th 2017 . WhatsApp Inc. 2016. WhatsApp Privacy Policy. website. (2016). Available on https:\/\/www.whatsapp.com\/legal\/#privacy-policy; called on August 7th 2017."},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the Twelfth Symposium on Usable Privacy and Security. USENIX Association, 147--157","author":"Luca Alexander De","year":"2016","unstructured":"Alexander De Luca , Sauvik Das , Martin Ortlieb , Iulia Ion , and Ben Laurie . 2016 . Expert and Non-Expert Attitudes towards (Secure) Instant Messaging . In Proceedings of the Twelfth Symposium on Usable Privacy and Security. USENIX Association, 147--157 . Alexander De Luca, Sauvik Das, Martin Ortlieb, Iulia Ion, and Ben Laurie. 2016. Expert and Non-Expert Attitudes towards (Secure) Instant Messaging. In Proceedings of the Twelfth Symposium on Usable Privacy and Security. USENIX Association, 147--157."},{"key":"e_1_3_2_1_15_1","volume-title":"website. (2014). Available on http:\/\/www.techadvisor.co.uk\/feature\/software\/5-whatsapp-facebook-messenger-alternatives-3324383\/","author":"Macro A.","year":"2017","unstructured":"A. Macro . 2014. 5 WhatsApp & Facebook Messenger alternatives. website. (2014). Available on http:\/\/www.techadvisor.co.uk\/feature\/software\/5-whatsapp-facebook-messenger-alternatives-3324383\/ ; called on August 30th 2017 . A. Macro. 2014. 5 WhatsApp & Facebook Messenger alternatives. website. (2014). Available on http:\/\/www.techadvisor.co.uk\/feature\/software\/5-whatsapp-facebook-messenger-alternatives-3324383\/; called on August 30th 2017."},{"key":"e_1_3_2_1_16_1","unstructured":"C. Metz. 2016. Forget Apple vs. the FBI: WhatsApp Just Switched on Encryption for a Billion People. website. (2016). Available on https:\/\/www.wired.com\/2016\/04\/forget-apple-vs-fbi-whatsapp-just-switched-encryption-billion-people\/; called on August 30th 2017.  C. Metz. 2016. Forget Apple vs. the FBI: WhatsApp Just Switched on Encryption for a Billion People. website. (2016). Available on https:\/\/www.wired.com\/2016\/04\/forget-apple-vs-fbi-whatsapp-just-switched-encryption-billion-people\/; called on August 30th 2017."},{"key":"e_1_3_2_1_17_1","unstructured":"M. Murgia. 2016. WhatsApp adds end-to-end encryption: What is it and what does it mean for you?. website. (2016). Available on http:\/\/www.telegraph.co.uk\/technology\/2016\/04\/05\/whatsapp-encryption-what-is-it-and-what-does-it-mean-for-you\/; called on August 30th 2017.  M. Murgia. 2016. WhatsApp adds end-to-end encryption: What is it and what does it mean for you?. website. (2016). Available on http:\/\/www.telegraph.co.uk\/technology\/2016\/04\/05\/whatsapp-encryption-what-is-it-and-what-does-it-mean-for-you\/; called on August 30th 2017."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of European Symposium on Security and Privacy.","author":"Naiakshina A.","unstructured":"A. Naiakshina , A. Danilova , S. Dechand , K. Krol , M. A. Sasse , and M. Smith . 2016. Poster: Mental Models--User understanding of messaging and encryption . In Proceedings of European Symposium on Security and Privacy. A. Naiakshina, A. Danilova, S. Dechand, K. Krol, M. A. Sasse, and M. Smith. 2016. Poster: Mental Models--User understanding of messaging and encryption. In Proceedings of European Symposium on Security and Privacy."},{"key":"e_1_3_2_1_19_1","unstructured":"J. Naughton. 2016. Your WhatsApp secrets are safe now. But Big Brother is still watching you... website. (2016). Available on https:\/\/www.theguardian.com\/commentisfree\/2016\/apr\/10\/whatsapp-encryption-billion-users-data-security; called on August 30th 2017.  J. Naughton. 2016. Your WhatsApp secrets are safe now. But Big Brother is still watching you... website. (2016). Available on https:\/\/www.theguardian.com\/commentisfree\/2016\/apr\/10\/whatsapp-encryption-billion-users-data-security; called on August 30th 2017."},{"key":"e_1_3_2_1_20_1","unstructured":"Office of the Privacy Commissioner Canada. 2013. Investigation into the personal information handling practices of WhatsApp Inc.- PIPEDA Report of Findings. website. (2013). Available on https:\/\/www.priv.gc.ca\/en\/opc-actions-and-decisions\/investigations\/investigations-into-businesses\/2013\/pipeda-2013-001\/ called on November 24th 2017.  Office of the Privacy Commissioner Canada. 2013. Investigation into the personal information handling practices of WhatsApp Inc.- PIPEDA Report of Findings. website. (2013). Available on https:\/\/www.priv.gc.ca\/en\/opc-actions-and-decisions\/investigations\/investigations-into-businesses\/2013\/pipeda-2013-001\/ called on November 24th 2017."},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of the 18th British HCI Group Annual Conference, A. Dearden and L. Watts (Eds.). Leeds, England, 85--88","author":"Patil S.","year":"2004","unstructured":"S. Patil and Alfred Kobsa . 2004 . Instant Messaging and Privacy . In Proceedings of the 18th British HCI Group Annual Conference, A. Dearden and L. Watts (Eds.). Leeds, England, 85--88 . S. Patil and Alfred Kobsa. 2004. Instant Messaging and Privacy. In Proceedings of the 18th British HCI Group Annual Conference, A. Dearden and L. Watts (Eds.). Leeds, England, 85--88."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"K. Renaud M. Volkamer and A. Renkema-Padmos. 2014. Why Doesn't Jane Protect Her Privacy?. In Privacy Enhancing Technologies. Springer 244--262.  K. Renaud M. Volkamer and A. Renkema-Padmos. 2014. Why Doesn't Jane Protect Her Privacy?. In Privacy Enhancing Technologies. Springer 244--262.","DOI":"10.1007\/978-3-319-08506-7_13"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501609"},{"key":"e_1_3_2_1_24_1","volume-title":"Six Great Messaging Alternatives To WhatsApp. website. (March","author":"Russell B.","year":"2014","unstructured":"B. Russell . 2014. Six Great Messaging Alternatives To WhatsApp. website. (March 2014 ). Available on https:\/\/www.technobuffalo.com\/2014\/03\/14\/six-great-messaging-alternatives-to-whatsapp\/\"; called on August 30th 2017. B. Russell. 2014. Six Great Messaging Alternatives To WhatsApp. website. (March 2014). Available on https:\/\/www.technobuffalo.com\/2014\/03\/14\/six-great-messaging-alternatives-to-whatsapp\/\"; called on August 30th 2017."},{"key":"e_1_3_2_1_25_1","unstructured":"D.E. Sanger and E. Schmitt. 2014. Snowden Used Low-Cost Tool to Best N.S.A. website. (2014). Available on https:\/\/www.nytimes.com\/2014\/02\/09\/us\/snowden-used-low-cost-tool-to-best-nsa.html&_r=0; called on August 30th 2017.  D.E. Sanger and E. Schmitt. 2014. Snowden Used Low-Cost Tool to Best N.S.A. website. (2014). Available on https:\/\/www.nytimes.com\/2014\/02\/09\/us\/snowden-used-low-cost-tool-to-best-nsa.html&_r=0; called on August 30th 2017."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 1st European Workshop on Usable Security. Internet Society.","author":"Schr\u00f6der S.","unstructured":"S. Schr\u00f6der , M. Huber , D. Wind , and C. Rottermanner . 2016. When SIGNAL hits the Fan: On the Usability and Security of State-of-the-Art Secure Mobile Messaging . In Proceedings of the 1st European Workshop on Usable Security. Internet Society. S. Schr\u00f6der, M. Huber, D. Wind, and C. Rottermanner. 2016. When SIGNAL hits the Fan: On the Usability and Security of State-of-the-Art Secure Mobile Messaging. In Proceedings of the 1st European Workshop on Usable Security. Internet Society."},{"key":"e_1_3_2_1_27_1","volume-title":"WhatsApp accounts almost completely unprotected. website. (2012). Available on http:\/\/www.h-online.com\/security\/news\/item\/WhatsApp-accounts-almost-completely-unprotected-1708545.html","author":"Security The H","year":"2017","unstructured":"The H Security . 2012. WhatsApp accounts almost completely unprotected. website. (2012). Available on http:\/\/www.h-online.com\/security\/news\/item\/WhatsApp-accounts-almost-completely-unprotected-1708545.html ; called on November 24th 2017 . The H Security. 2012. WhatsApp accounts almost completely unprotected. website. (2012). Available on http:\/\/www.h-online.com\/security\/news\/item\/WhatsApp-accounts-almost-completely-unprotected-1708545.html; called on November 24th 2017."},{"key":"e_1_3_2_1_28_1","volume-title":"Facebook to buy messaging app WhatsApp for $19bn. website. (2014). Available on http:\/\/www.bbc.com\/news\/business-26266689","author":"News Services BBC","year":"2017","unstructured":"BBC News Services . 2014. Facebook to buy messaging app WhatsApp for $19bn. website. (2014). Available on http:\/\/www.bbc.com\/news\/business-26266689 ; called on May 30th 2017 . BBC News Services. 2014. Facebook to buy messaging app WhatsApp for $19bn. website. (2014). Available on http:\/\/www.bbc.com\/news\/business-26266689; called on May 30th 2017."},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the Second Symposium On Usable Privacy and Security -- Poster Session. 3--4.","author":"Sheng S.","unstructured":"S. Sheng , L. Broderick ., C. A. Koranda , and J. J. Hyland . 2006. Why Johnny Still Can't Encrypt: Evaluating the Usability of Email Encryption Software . In Proceedings of the Second Symposium On Usable Privacy and Security -- Poster Session. 3--4. S. Sheng, L. Broderick., C. A. Koranda, and J. J. Hyland. 2006. Why Johnny Still Can't Encrypt: Evaluating the Usability of Email Encryption Software. In Proceedings of the Second Symposium On Usable Privacy and Security -- Poster Session. 3--4."},{"key":"e_1_3_2_1_30_1","volume-title":"Number of monthly active WhatsApp users worldwide from","author":"Statista","year":"2013","unstructured":"Statista 2017. Number of monthly active WhatsApp users worldwide from April 2013 to July 2017 (in millions). website. (2017). Available on https:\/\/www.statista.com\/statistics\/260819\/number-of-monthly-active-whatsapp-users\/; called on August 30th 2017. Statista 2017. Number of monthly active WhatsApp users worldwide from April 2013 to July 2017 (in millions). website. (2017). Available on https:\/\/www.statista.com\/statistics\/260819\/number-of-monthly-active-whatsapp-users\/; called on August 30th 2017."},{"key":"e_1_3_2_1_31_1","unstructured":"A. Strauss and J. Corbin. 1990. Basics of Qualitative Research: Grounded Theory Procedures and Techniques. Sage Publications Newbury Park California.  A. Strauss and J. Corbin. 1990. Basics of Qualitative Research: Grounded Theory Procedures and Techniques. Sage Publications Newbury Park California."},{"key":"e_1_3_2_1_32_1","volume-title":"Qualitative analysis for social scientists","author":"Strauss Anselm L.","unstructured":"Anselm L. Strauss . 1987. Qualitative analysis for social scientists . Cambridge University Press , New York, NY , US. Anselm L. Strauss. 1987. Qualitative analysis for social scientists. Cambridge University Press, New York, NY, US."},{"key":"e_1_3_2_1_33_1","volume-title":"Encrypt: A Usability Evaluation of PGP 5.0. In Usenix Security","author":"Whitten A.","year":"1999","unstructured":"A. Whitten and J. D. Tygar . 1999 . Why Johnny Can 't Encrypt: A Usability Evaluation of PGP 5.0. In Usenix Security , Vol. 1999 . A. Whitten and J. D. Tygar. 1999. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0. In Usenix Security, Vol. 1999."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11623-017-0781-4"},{"key":"e_1_3_2_1_35_1","volume-title":"Facebook Community Update 5.3.2017. website. (2017). Available on https:\/\/www.facebook.com\/zuck\/posts\/10103696178824801","author":"Zuckerberg M.","year":"2017","unstructured":"M. Zuckerberg . 2017. Facebook Community Update 5.3.2017. website. (2017). Available on https:\/\/www.facebook.com\/zuck\/posts\/10103696178824801 ; called on May 30th 2017 . M. Zuckerberg. 2017. Facebook Community Update 5.3.2017. website. (2017). Available on https:\/\/www.facebook.com\/zuck\/posts\/10103696178824801; called on May 30th 2017."}],"event":{"name":"ARES 2018: International Conference on Availability, Reliability and Security","location":"Hamburg Germany","acronym":"ARES 2018","sponsor":["Universit\u00e4t Hamburg Universit\u00e4t Hamburg"]},"container-title":["Proceedings of the 13th International Conference on Availability, Reliability and Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230859","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3230833.3230859","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:50Z","timestamp":1750212470000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3230833.3230859"}},"subtitle":["But Does This Make Him Feel More Secure?"],"short-title":[],"issued":{"date-parts":[[2018,8,27]]},"references-count":35,"alternative-id":["10.1145\/3230833.3230859","10.1145\/3230833"],"URL":"https:\/\/doi.org\/10.1145\/3230833.3230859","relation":{},"subject":[],"published":{"date-parts":[[2018,8,27]]},"assertion":[{"value":"2018-08-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}