How Privacy Concerns and Trust and Risk Beliefs Influence Users' Intentions to Use Privacy-Enhancing Technologies - The Case of Tor

Due to an increasing collection of personal data by internet companies and several data breaches, research related to privacy gained importance in the last years in the information systems domain. Privacy concerns can strongly influence users’ decision to use a service. The Internet Users Information Privacy Concerns (IUIPC) construct is one operationalization to measure the impact of privacy concerns on the use of technologies. However, when applied to a privacy enhancing technology (PET) such as an anonymization service the original rationales do not hold anymore. In particular, an inverted impact of trusting and risk beliefs on behavioral intentions can be expected. We show that the IUIPC model needs to be adapted for the case of PETs. In addition, we extend the original causal model by including trust beliefs in the anonymization service itself. A survey among 124 users of the anonymization service Tor shows that they have a significant effect on the actual use behavior of the PET.

[1]  Steffen Kunz,et al.  Are you willing to wait longer for internet privacy? , 2011, ECIS.

[2]  Nancy K. Lankton,et al.  Technology, Humanness, and Trust: Rethinking Trust in Technology , 2015, J. Assoc. Inf. Syst..

[3]  Jason Bennett Thatcher,et al.  Trust in a specific technology: An investigation of its components and measures , 2011, TMIS.

[4]  Blair H. Sheppard,et al.  The Theory of Reasoned Action: A Meta-Analysis of Past Research with Recommendations for Modifications and Future Research , 1988 .

[5]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..

[6]  Paul A. Pavlou,et al.  Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model , 2003, Int. J. Electron. Commer..

[7]  Larry D. Rosen,et al.  The Media and Technology Usage and Attitudes Scale: An empirical investigation , 2013, Comput. Hum. Behav..

[8]  M. Sarstedt,et al.  A new criterion for assessing discriminant validity in variance-based structural equation modeling , 2015 .

[9]  Jacob Cohen Statistical Power Analysis for the Behavioral Sciences , 1969, The SAGE Encyclopedia of Research Design.

[10]  Scott B. MacKenzie,et al.  Common method biases in behavioral research: a critical review of the literature and recommended remedies. , 2003, The Journal of applied psychology.

[11]  Ioannis Krontiris,et al.  User Acceptance Factors for Anonymous Credentials: An Empirical Investigation , 2015, WEIS.

[12]  M. Hill,et al.  Consumer privacy and the Internet in Europe: a view from Germany , 2003 .

[13]  Jon Heales,et al.  The Influence of Privacy, Trust, and National Culture on Internet Transactions , 2017, HCI.

[14]  Wynne W. Chin The partial least squares approach for structural equation modeling. , 1998 .

[15]  Constantin Blome,et al.  Ethical Climate and Purchasing Social Responsibility: A Benevolence Focus , 2013 .

[16]  Ganesh Iyer,et al.  A Usability Evaluation of Tor Launcher , 2017, Proc. Priv. Enhancing Technol..

[17]  Antonio Krüger,et al.  Towards Understanding the Influence of Personality on Mobile App Permission Settings , 2017, INTERACT.

[18]  I. Ajzen,et al.  Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research , 1977 .

[19]  Albert H. Segars,et al.  An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..

[20]  Lujo Bauer,et al.  Privacy Expectations and Preferences in an IoT World , 2017, SOUPS.

[21]  R. M. Fano,et al.  Some thoughts about the social implications of accessible computing , 1899, AFIPS '65 (Fall, part I).

[22]  Charles D. Raab,et al.  Laws, PETs and Other Technologies for Privacy Protection , 2001, J. Inf. Law Technol..

[23]  Marko Sarstedt,et al.  PLS-SEM: Indeed a Silver Bullet , 2011 .

[24]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[25]  Naresh K. Malhotra,et al.  Common Method Variance in IS Research: A Comparison of Alternative Approaches and a Reanalysis of Past Research , 2006, Manag. Sci..

[26]  Marko Sarstedt,et al.  Partial least squares structural equation modeling (PLS-SEM): An emerging tool in business research , 2014 .