Back to Results
First PageMeta Content
Computing / Email authentication / Public-key cryptography / Cryptographic software / PGP / Pretty Good Privacy / Email encryption / Hushmail / S/MIME / Cryptography / Internet privacy / Internet


Secrecy, Flagging, and Paranoia: Adoption Criteria in Encrypted E-Mail Shirley Gaw
Add to Reading List

Document Date: 2006-02-01 16:05:32


Open Document

File Size: 114,92 KB

Share Result on Facebook

City

Montreal / New York / /

Company

Wiley Publishing Inc. / New York Times / Adidas / Nike / PGP Corporation / ACM Press / ActivistCorp / Wiley Computer Publishing / Pearson / Berkshire Publishing Group / Microsoft / /

Country

Canada / United States / /

Currency

USD / /

/

Event

Person Communication and Meetings / Labor Issues / /

Facility

University of California Press / /

IndustryTerm

wireless hotspots / free software / generic encryption systems / finance / online donations / e-mail communications / usable security technologies / encrypted e-mail systems / software hole / encryption technologies / e-mail systems / secure applications / software purchases / software setups / web browsers / security technology / encryption protocol / adopted systems / web browser design / secure wireless network / cryptographic systems / mail server / wireless Internet / /

OperatingSystem

Microsoft Windows / /

Organization

office of Population Research Princeton University Princeton / Princeton University / U.S. Securities and Exchange Commission / Central Intelligence Agency / University of California Press / National Science Foundation / Center for Information Technology Policy Dept of Computer Science Princeton University Princeton / Federal Bureau of Investigation / /

Person

Abe / Patricia Fernandez-Kelly / Woodward / Shirley Gaw / Jenny / Karyn Moffatt / Chris / Stefan / Pierre-Antoine Kremp / Flor / /

Position

head / Author / research manager / representative / editor / manager / project manager / researcher / co-author / head of campaigns / leader / lawyer / /

Product

Cooper / /

ProvinceOrState

Quebec / New York / /

PublishedMedium

Qualitative Research / /

Technology

usable security technologies / Secure Hash Algorithm / secret key / operating system / public key encryption / encryption / cryptography / Equating encryption / universal / routine encryption / security technology / how public key encryption / encryption protocol / digital signature / using encryption / flash / specific technology / S/MIME / peer-to-peer / private key / Secure SHell / SSL / Woodward start using encryption / public key / encryption technologies / Invisible Security Protocols / /

SocialTag