Author:
Pape Sebastian,Harborth David
Abstract
AbstractThis chapter provides information about acceptance factors of privacy-enhancing technologies (PETs) based on our research why users are using Tor and JonDonym, respectively. For that purpose, we surveyed 124 Tor users (Harborth and Pape 2020) and 142 JonDonym users (Harborth Pape 2020) and did a quantitative evaluation (PLS-SEM) on different user acceptance factors. We investigated trust in the PET and perceived anonymity (Harborth et al. 2021; Harborth et al. 2020; Harborth and Pape 2018), privacy concerns, and risk and trust beliefs (Harborth and Pape 2019) based on Internet Users Information Privacy Concerns (IUIPC) and privacy literacy (Harborth and Pape 2020). The result was that trust in the PET seems to be the major driver. Furthermore, we investigated the users’ willingness to pay or donate for/to the service (Harborth et al. 2019). In this case, risk propensity and the frequency of perceived improper invasions of users’ privacy were relevant factors besides trust in the PET. While these results were new in terms of the application of acceptance factors to PETs, none of the identified factors was surprising. To identify new factors and learn about differences in users’ perceptions between the two PETs, we also did a qualitative analysis of the questions if users have any concerns about using the PET, when they would be willing to pay or donate, which features they would like to have and why they would (not) recommend the PET (Harborth et al. 2021; Harborth et al. 2020). To also investigate the perspective of companies, we additionally interviewed 12 experts and managers dealing with privacy and PETs in their daily business and identified incentives and hindrances to implement PETs from a business perspective (Harborth et al. 2018).
Publisher
Springer International Publishing
Reference69 articles.
1. Abu-Salma, R., Sasse, M. A., Bonneau, J., Danilova, A., Naiakshina, A., & Smith, M. (2017). Obstacles to the adoption of secure communication tools. In IEEE security & privacy (pp. 137–153).
2. Ajzen, I. (1991). The theory of planned behavior. Organizational Behavior and Human Decision Processes, 50(2), 179–211.
3. Bédard, M. (2016). The underestimated economic benefits of the Internet. Regulation series, The Montreal Economic Institute. Economic Notes.
4. Bracamonte, V., Pape, S., & Kiyomoto, S. (2021). Investigating user intention to use a privacy sensitive information detection tool. In Symposium on Cryptography and Information Security (SCIS).
5. Bracamonte, V., Pape, S., & Löbner, S. (2022). “All apps do this”: Comparing privacy concerns towards privacy tools and non-privacy tools for social media content. Proceedings on Privacy Enhancing Technologies (PoPETs), 2022(3), 57–78.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Systematic Approach for Automotive Privacy Management;Proceedings of the 7th ACM Computer Science in Cars Symposium;2023-12-05