The Market Failure of Anonymity Services

While technologies for anonymous communication have been thoroughly researched and despite the existence of several protection services, the deployment of such services has not yet reached the mass market of end users. So far only a very small fraction of users are using anonymity services and early adopters, which are necessary to reach a critical mass of adopters, have not been attracted. Consequently, there is no beneficial market today for anonymity services. In this paper we conduct an analysis grounded in the diffusion of innovations theory on the reasons for the slow diffusion of anonymity services. We conclude that an unclear relative advantage, a high complexity and the inability to observe or demonstrate that the communication is really anonymous are major hindrances. Furthermore, we discuss several possibilities on how to stimulate the adoption.

[1]  France Bélanger,et al.  Trustworthiness in electronic commerce: the role of privacy, security, and site attributes , 2002, J. Strateg. Inf. Syst..

[2]  Oliver Günther,et al.  Privacy in e-commerce: stated preferences vs. actual behavior , 2005, CACM.

[3]  Alessandro Acquisti,et al.  Privacy and rationality in individual decision making , 2005, IEEE Security & Privacy.

[4]  Dennis F. Galletta,et al.  Web Site Delays: How Tolerant are Users? , 2004, J. Assoc. Inf. Syst..

[5]  Tyler Moore,et al.  The Economics of Information Security , 2006, Science.

[6]  Heiko Roßnagel,et al.  Mobile qualifizierte elektronische Signaturen , 2009 .

[7]  Sarah Spiekermann The Desire for Privacy: Insights into the Views and Nature of the Early Adopters of Privacy Services , 2005, Int. J. Technol. Hum. Interact..

[8]  Ann Cavoukian,et al.  Privacy in the clouds , 2008 .

[9]  George A. Akerlof The Market for “Lemons”: Quality Uncertainty and the Market Mechanism , 1970 .

[10]  Joan Feigenbaum,et al.  Economic Barriers to the Deployment of Existing Privacy Technologies , 2002 .

[11]  Andreas Pfitzmann,et al.  Networks Without User Observability: Design Options , 1985, EUROCRYPT.

[12]  Alessandro Acquisti,et al.  Privacy and Security of Personal Information - Economic Incentives and Technological Solutions , 2004, Economics of Information Security.

[13]  Alessandro Acquisti,et al.  Privacy and Rationality , 2006 .

[14]  Detmar W. Straub,et al.  Trust and TAM in Online Shopping: An Integrated Model , 2003, MIS Q..

[15]  Young U. Ryu,et al.  International Conference on Information Systems ( ICIS ) December 2005 I Am Fine but You Are Not : Optimistic Bias and Illusion of Control on Information Security , 2017 .

[16]  Roger Dingledine,et al.  On the Economics of Anonymity , 2003, Financial Cryptography.

[17]  L. G. Tornatzky,et al.  Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings , 1982, IEEE Transactions on Engineering Management.

[18]  Birgit Pfitzmann,et al.  ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead , 1991, Kommunikation in Verteilten Systemen.

[19]  Hannes Federrath,et al.  Web MIXes: A System for Anonymous and Unobservable Internet Access , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[20]  Hannes Federrath Designing Privacy Enhancing Technologies , 2001, Lecture Notes in Computer Science.

[21]  Hock-Hai Teo,et al.  The Value of Privacy Assurance: An Exploratory Field Experiment , 2007, MIS Q..

[22]  Dirk Grunwald,et al.  Shining Light in Dark Places: Understanding the Tor Network , 2008, Privacy Enhancing Technologies.

[23]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[24]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[25]  Mark J. Safferstone Information Rules: A Strategic Guide to the Network Economy , 1999 .

[26]  Andrew Grantham,et al.  Diffusing wireless applications in a mobile world , 2005 .

[27]  Stuart E. Schechter,et al.  Bootstrapping the Adoption of Internet Security Protocols , 2006, WEIS.

[28]  Robert N. M. Watson,et al.  Ignoring the Great Firewall of China , 2006, Privacy Enhancing Technologies.

[29]  Gurpreet Dhillon,et al.  Do privacy seals in e-commerce really work? , 2003, CACM.

[30]  Franz Pichler,et al.  Advances in Cryptology — EUROCRYPT’ 85 , 2000, Lecture Notes in Computer Science.

[31]  Alessandro Acquisti,et al.  Is There a Cost to Privacy Breaches? An Event Study , 2006, WEIS.

[32]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[33]  P. Syverson The Paradoxical Value of Privacy , 2003 .

[34]  Jan Zibuschka,et al.  Facilitating the Adoption of Tor by Focusing on a Promising Target Group , 2009, NordSec.

[35]  Izak Benbasat,et al.  Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation , 1991, Inf. Syst. Res..

[36]  Peter A. Todd,et al.  Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..

[37]  N. Weinstein Optimistic biases about personal risks. , 1989, Science.

[38]  Alessandro Acquisti,et al.  Privacy in electronic commerce and the economics of immediate gratification , 2004, EC '04.

[39]  Eytan Adar,et al.  Valuating Privacy , 2005, WEIS.

[40]  Jeremy Clark,et al.  Usability of anonymous web browsing: an examination of Tor interfaces and deployability , 2007, SOUPS '07.

[41]  S. Oren,et al.  Critical Mass and Tariff Structure in Electronic Communications Markets , 1981 .

[42]  A. Adam Whatever happened to information systems ethics? Caught between the devil and the deep blue sea , 2004 .

[43]  E. Rogers Diffusion of Innovations , 1962 .

[44]  Kieran Mathieson,et al.  Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of Planned Behavior , 1991, Inf. Syst. Res..

[45]  Robert J. Kauffman,et al.  Proceedings of the ninth international conference on Electronic commerce , 2003, ICEC 2007.

[46]  Nick Mathewson,et al.  Anonymity Loves Company: Usability and the Network Effect , 2006, WEIS.

[47]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[48]  Habtamu Abie,et al.  Towards a Research Road Map for the Management of Privacy Risks in Information Systems , 2008, Sicherheit.

[49]  E. Rogers,et al.  The diffusion of interactive communication innovations and the critical mass: the adoption of telecommunications services by German banks , 1999 .

[50]  Rachel Greenstadt,et al.  Why we can't be bothered to read privacy policies models of privacy economics as a lemons market , 2003, ICEC '03.

[51]  Andrew M. Odlyzko Privacy and the clandestine evolution of e-commerce , 2007, ICEC.

[52]  B. Ryan The diffusion of hybrid seed corn in two Iowa communities , 1943 .

[53]  Sarah Spiekermann Die Konsumenten der Anonymität - Wer nutzt Anonymisierungsdienste? , 2003, Datenschutz und Datensicherheit.

[54]  Paul A. Pavlou,et al.  Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..

[55]  Otto Spaniol,et al.  Mobilkommunikation ohne Bewegungsprofile , 1996, Informationstechnik Tech. Inform..

[56]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[57]  James A. Hendler,et al.  Information accountability , 2008, CACM.