Are you willing to wait longer for internet privacy?

It becomes increasingly common for governments, service providers and specialized data aggregators to systematically collect traces of personal communication on the Internet without the user’s knowledge or approval. An analysis of these personal traces by data mining algorithms can reveal sensitive personal information, such as location data, behavioral patterns, or personal profiles including preferences and dislikes. Recent studies show that this information can be used for various purposes, for example by insurance companies or banks to identify potentially risky customers, by governments to observe their citizens, and also by repressive regimes to monitor political opponents. Online anonymity software, such as Tor, can help users to protect their privacy, but often comes at the prize of low usability, e.g., by causing increased latency during surfing. In this exploratory study, we determine factors that influence the usage of Internet anonymity software. In particular, we show that Internet literacy, Internet privacy awareness and Internet privacy concerns are important antecedents for determining an Internet user’s intention to use anonymity software, and that Internet patience has a positive moderating effect on the intention to use anonymity software, as well as on its perceived usefulness.

[1]  Heng Xu,et al.  Examining the Formation of Individual's Privacy Concerns: Toward an Integrative View , 2008, ICIS.

[2]  H. Kundel,et al.  Measurement of observer agreement. , 2003, Radiology.

[3]  Balachander Krishnamurthy,et al.  Measuring privacy loss and the impact of privacy protection in web browsing , 2007, SOUPS '07.

[4]  Steffen Kunz,et al.  Privately Waiting - A Usability Analysis of the Tor Anonymity Network , 2010, AMCIS.

[5]  Wynne W. Chin The partial least squares approach for structural equation modeling. , 1998 .

[6]  Bernadette Szajna,et al.  Software Evaluation and Choice: Predictive Validation of the Technology Acceptance Instrument , 1994, MIS Q..

[7]  Fred D. Davis,et al.  User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .

[8]  J. Hornik Subjective vs. Objective Time Measures: A Note on the Perception of Time in Consumer Behavior , 1984 .

[9]  Justus J. Randolph Free-Marginal Multirater Kappa (multirater K[free]): An Alternative to Fleiss' Fixed-Marginal Multirater Kappa. , 2005 .

[10]  Fiona Fui-Hoon Nah,et al.  A study on tolerable waiting time: how long are Web users willing to wait? , 2004, AMCIS.

[11]  Albert H. Segars,et al.  An Empirical Examination of the Concern for Information Privacy Instrument , 2002, Inf. Syst. Res..

[12]  Tamara Dinev,et al.  An Extended Privacy Calculus Model for E-Commerce Transactions , 2006, Inf. Syst. Res..

[13]  Tamara Dinev,et al.  Internet Privacy , Social Awareness , And Internet Technical Literacy – An Exploratory Investigation , 2004 .

[14]  Michael K. Hui,et al.  What to Tell Consumers in Waits of Different Lengths: An Integrative Model of Service Evaluation , 1996 .

[15]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[16]  Viswanath Venkatesh,et al.  Determinants of Perceived Ease of Use: Integrating Control, Intrinsic Motivation, and Emotion into the Technology Acceptance Model , 2000, Inf. Syst. Res..

[17]  Rudolf R. Sinkovics,et al.  The Use of Partial Least Squares Path Modeling in International Marketing , 2009 .

[18]  Marko Sarstedt,et al.  PLS-SEM: Indeed a Silver Bullet , 2011 .

[19]  Roger Dingledine,et al.  Performance Improvements on Tor or, Why Tor is slow and what we're going to do about it , 2009 .

[20]  Gordon B. Davis,et al.  User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..

[21]  C. Fornell,et al.  Evaluating structural equation models with unobservable variables and measurement error. , 1981 .

[22]  J. R. Landis,et al.  The measurement of observer agreement for categorical data. , 1977, Biometrics.

[23]  Qing Hu,et al.  The Centrality of Awareness in the Formation of User Behavioral Intention toward Protective Information Technologies , 2007, J. Assoc. Inf. Syst..

[24]  Tamara Dinev,et al.  Internet privacy concerns and their antecedents - measurement validity and a regression model , 2004, Behav. Inf. Technol..

[25]  G. Loewenstein,et al.  Wouldn't it be nice? Predicting future feelings. , 1999 .

[26]  T. S. Ragu-Nathan,et al.  The Q-Sort Method: Assessing Reliability And Construct Validity Of Questionnaire Items At A Pre-Testing Stage , 2002 .

[27]  D. Kahneman,et al.  Well-being : the foundations of hedonic psychology , 1999 .

[28]  Naresh K. Malhotra,et al.  Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model , 2004, Inf. Syst. Res..