JonDonym Users' Information Privacy Concerns

Privacy concerns as well as trust and risk beliefs are important factors that can influence users’ decision to use a service. One popular model that integrates these factors is relating the Internet Users Information Privacy Concerns (IUIPC) construct to trust and risk beliefs. However, studies haven’t yet applied it to a privacy enhancing technology (PET) such as an anonymization service. Therefore, we conducted a survey among 416 users of the anonymization service JonDonym [1] and collected 141 complete questionnaires. We rely on the IUIPC construct and the related trust-risk model and show that it needs to be adapted for the case of PETs. In addition, we extend the original causal model by including trust beliefs in the anonymization service provider and show that they have a significant effect on the actual use behavior of the PET.

[1]  Albert H. Segars,et al.  An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..

[2]  Lujo Bauer,et al.  Privacy Expectations and Preferences in an IoT World , 2017, SOUPS.

[3]  Paul A. Pavlou,et al.  Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..

[4]  Thijs Veugen,et al.  Transparency Enhancing Tools (TETs): An Overview , 2013, 2013 Third Workshop on Socio-Technical Aspects in Security and Trust.

[5]  M. Hill,et al.  Consumer privacy and the Internet in Europe: a view from Germany , 2003 .

[6]  Naresh K. Malhotra,et al.  Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research , 2006, Manag. Sci..

[7]  Marko Sarstedt,et al.  Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research , 2014 .

[8]  Jon Heales,et al.  The Influence of Privacy, Trust, and National Culture on Internet Transactions , 2017, HCI.

[9]  Sebastian Pape,et al.  Privacy Concerns and Behavior of Pokémon Go Players in Germany , 2017, Privacy and Identity Management.

[10]  Sarah Spiekermann The Desire for Privacy: Insights into the Views and Nature of the Early Adopters of Privacy Services , 2005, Int. J. Technol. Hum. Interact..

[11]  Ganesh Iyer,et al.  A Usability Evaluation of Tor Launcher , 2017, Proc. Priv. Enhancing Technol..

[12]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[13]  Ioannis Krontiris,et al.  User Acceptance Factors for Anonymous Credentials: An Empirical Investigation , 2015, WEIS.

[14]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[15]  M. Sarstedt,et al.  A new criterion for assessing discriminant validity in variance-based structural equation modeling , 2015 .

[16]  Charles D. Raab,et al.  Laws, PETs and Other Technologies for Privacy Protection , 2001, J. Inf. Law Technol..

[17]  R. M. Fano,et al.  Some thoughts about the social implications of accessible computing , 1899, AFIPS '65 (Fall, part I).

[18]  Constantin Blome,et al.  Ethical Climate and Purchasing Social Responsibility: A Benevolence Focus , 2013 .

[19]  Sebastian Pape,et al.  Exploring the Hype: Investigating Technology Acceptance Factors of Pokémon Go , 2017, 2017 IEEE International Symposium on Mixed and Augmented Reality (ISMAR).

[20]  Larry D. Rosen,et al.  The Media and Technology Usage and Attitudes Scale: An empirical investigation , 2013, Comput. Hum. Behav..

[21]  Antonio Krüger,et al.  Towards Understanding the Influence of Personality on Mobile App Permission Settings , 2017, INTERACT.

[22]  Marko Sarstedt,et al.  PLS-SEM: Indeed a Silver Bullet , 2011 .