Usage Patterns of Privacy-Enhancing Technologies

09/22/2020
by   Kovila P. L. Coopamootoo, et al.
0

The steady reports of privacy invasions online paints a picture of the Internet growing into a more dangerous place. This is supported by reports of the potential scale for online harms facilitated by the mass deployment of online technology and the data-intensive web. While Internet users often express concern about privacy, some report taking actions to protect their privacy online. We investigate the methods and technologies that individuals employ to protect their privacy online. We conduct two studies, of N=180 and N=907, to elicit individuals' use of privacy methods online, within the US, the UK and Germany. We find that non-technology methods are among the most used methods in the three countries. We identify distinct groupings of privacy methods usage in a cluster map. The map shows that together with non-technology methods of privacy protection, simple PETs that are integrated in services, form the most used cluster, whereas more advanced PETs form a different, least used cluster. We further investigate user perception and reasoning for mostly using one set of PETs in a third study with N=183 participants. We do not find a difference in perceived competency in protecting privacy online between advanced and simpler PETs users. We compare use perceptions between advanced and simpler PETs and report on user reasoning for not using advanced PETs, as well as support needed for potential use. This paper contributes to privacy research by eliciting use and perception of use across 43 privacy methods, including 26 PETs across three countries and provides a map of PETs usage. The cluster map provides a systematic and reliable point of reference for future user-centric investigations across PETs. Overall, this research provides a broad understanding of use and perceptions across a collection of PETs, and can lead to future research for scaling use of PETs.

READ FULL TEXT

page 7

page 8

research
03/19/2020

Dis-Empowerment Online: An Investigation of Privacy-Sharing Perceptions Method Preferences

While it is often claimed that users are empowered via online technologi...
research
10/19/2020

Saudi Arabian Parents' Perception of Online Marital Matchmaking Technologies

Finding a date or a spouse online is usually considered an individualist...
research
11/23/2018

Protecting User Privacy: An Approach for Untraceable Web Browsing History and Unambiguous User Profiles

The overturning of the Internet Privacy Rules by the Federal Communicati...
research
07/23/2021

User Perception of Privacy with Ubiquitous Devices

Privacy is important for all individuals in everyday life. With emerging...
research
05/05/2023

"Un-Equal Online Safety?" A Gender Analysis of Security and Privacy Protection Advice and Behaviour Patterns

There are indications in literature that women do not engage with securi...
research
12/10/2018

The Effectiveness of Privacy Enhancing Technologies against Fingerprinting

We measure how effective Privacy Enhancing Technologies (PETs) are at pr...

Please sign up or login with your details

Forgot password? Click here to reset