Affiliation:
1. Goethe University Frankfurt , Germany
Abstract
Abstract
Today’s environment of data-driven business models relies heavily on collecting as much personal data as possible. Besides being protected by governmental regulation, internet users can also try to protect their privacy on an individual basis. One of the most famous ways to accomplish this, is to use privacy-enhancing technologies (PETs). However, the number of users is particularly important for the anonymity set of the service. The more users use the service, the more difficult it will be to trace an individual user. There is a lot of research determining the technical properties of PETs like Tor or JonDonym, but the use behavior of the users is rarely considered, although it is a decisive factor for the acceptance of a PET. Therefore, it is an important driver for increasing the user base.
We undertake a first step towards understanding the use behavior of PETs employing a mixed-method approach. We conducted an online survey with 265 users of the anonymity services Tor and JonDonym (124 users of Tor and 141 users of JonDonym). We use the technology acceptance model as a theoretical starting point and extend it with the constructs perceived anonymity and trust in the service in order to take account for the specific nature of PETs. Our model explains almost half of the variance of the behavioral intention to use the two PETs. The results indicate that both newly added variables are highly relevant factors in the path model. We augment these insights with a qualitative analysis of answers to open questions about the users’ concerns, the circumstances under which they would pay money and choose a paid premium tariff (only for JonDonym), features they would like to have and why they would or would not recommend Tor/JonDonym. Thereby, we provide additional insights about the users’ attitudes and perceptions of the services and propose new use factors not covered by our model for future research.
Reference61 articles.
1. [1] Ruba Abu-Salma, M Angela Sasse, Joseph Bonneau, Anastasia Danilova, Alena Naiakshina, and Matthew Smith. Obstacles to the Adoption of Secure Communication Tools. In IEEE Security & Privacy, pages 137 – 153, 2017.10.1109/SP.2017.65
2. [2] Alessandro Acquisti, Roger Dingledine, and Paul Syverson. On the Economics of Anonymity Alessandro. In International Conference on Financial Cryptography, pages 84–102. Springer Berlin Heidelberg, 2003.10.1007/978-3-540-45126-6_7
3. [3] Icek Ajzen. The Theory of Planned Behavior. Organizational Behavior and Human Decision Processes, 50(2):179–211, 1991.10.1016/0749-5978(91)90020-T
4. [4] Mashael Alsabah and Ian Goldberg. Performance and security improvements for tor: A survey. ACM Comput. Surv., 49(2):32:1–32:36, September 2016.10.1145/2946802
5. [5] Anonymized. Examining technology use factors of privacy-enhancing technologies: The role of perceived anonymity and trust. In 24th Americas Conference on Information Systems, AMCIS 2018, New Orleans, LA, USA, August 16-18, 2018. Association for Information Systems, 2018.
Cited by
28 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. The determinants of use behavior of e-procurement system in developing countries;International Journal of Business Ecosystem & Strategy (2687-2293);2024-06-05
2. Challenges of Usable Privacy;Synthesis Lectures on Information Security, Privacy, and Trust;2024
3. Overview of Usable Privacy Research: Major Themes and Research Directions;Synthesis Lectures on Information Security, Privacy, and Trust;2024
4. Factors of Intention to Use a Photo Tool: Comparison Between Privacy-Enhancing and Non-privacy-enhancing Tools;IFIP Advances in Information and Communication Technology;2024
5. A Systematic Approach for Automotive Privacy Management;Proceedings of the 7th ACM Computer Science in Cars Symposium;2023-12-05