2020
DOI: 10.2478/popets-2020-0020
|View full text |Cite
|
Sign up to set email alerts
|

Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonym

Abstract: Today’s environment of data-driven business models relies heavily on collecting as much personal data as possible. Besides being protected by governmental regulation, internet users can also try to protect their privacy on an individual basis. One of the most famous ways to accomplish this, is to use privacy-enhancing technologies (PETs). However, the number of users is particularly important for the anonymity set of the service. The more users use the service, the more difficult it will be to trace an individ… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

3
37
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 38 publications
(44 citation statements)
references
References 35 publications
3
37
0
Order By: Relevance
“…online anonymity-granting software and applications, are among the most important users-oriented PETs in circulation (Nia and Martinez 2018;Spiekermann 2005). Despite PETs being as old as the web itself (Fritsch 2007), research has largely focused on their technical features while the role of users has been overlooked (Harborth et al 2020). As a matter of fact, looking closely at the literature to date reveals three separate research branches in studies on PETs.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…online anonymity-granting software and applications, are among the most important users-oriented PETs in circulation (Nia and Martinez 2018;Spiekermann 2005). Despite PETs being as old as the web itself (Fritsch 2007), research has largely focused on their technical features while the role of users has been overlooked (Harborth et al 2020). As a matter of fact, looking closely at the literature to date reveals three separate research branches in studies on PETs.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Compared to the first two research streams, this third one is still in its infancy and therefore comparatively smaller. Namara et al (2020) and Harborth et al (2020) recently mentioned how surprising it is that empirical research on what motivates users to adopt PETs is still underdeveloped, considering their overall service quality and cost-effectiveness, which dramatically depends on the degree of diffusion they are able to achieve. The few available publications that explain users' adoption of PETs (or intention to adopt them) have relied on the Technology Acceptance Model (TAM) (Davis 1985) (see Table 1 for an overview), extending this pioneering theory on why people do or do not use technologies, to encompass variables suited to measuring users' perceptions of PET-specific attributes.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…As mentioned previously, due to its popularity and the services it offers, Tor has been broadly studied and many issues regarding it has been analysed. It has been analysed both from user's point of view [14] and a technical point of view [5,11,13]. Being the technical studies the most common.…”
Section: Introductionmentioning
confidence: 99%
“…As mentioned previously, due to its popularity and the services it offers, Tor has been broadly studied and many issues regarding it have been analysed. It has been analysed both from the user's point of view [17] and a technical point of view [5,12,15]. Technical studies are the most common analyses.…”
Section: Introductionmentioning
confidence: 99%