Emotional and Practical Considerations Towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing Technology

Page created by Rose Harvey
 
CONTINUE READING
Proceedings on Privacy Enhancing Technologies ; 2020 (1):83–102

Moses Namara*, Daricia Wilkinson, Kelly Caine, and Bart P. Knijnenburg

Emotional and Practical Considerations
Towards the Adoption and Abandonment of
VPNs as a Privacy-Enhancing Technology
Abstract: Virtual Private Networks (VPNs) can help
people protect their privacy. Despite this, VPNs are
                                                                 1 Introduction
not widely used among the public. In this survey study
                                                                      In recent years, increased levels of mass surveil-
about the adoption and usage of VPNs, we investigate
                                                                 lance and data collection have contributed to signifi-
people’s motivation to use VPNs and the barriers they
                                                                 cant privacy concerns from end-users worldwide [1]. In
encounter in adopting them. Using data from 90 tech-
                                                                 the United States, Congress enacted a Congressional
nologically savvy participants, we find that while nearly
                                                                 Review Act to repeal existing privacy rules that re-
all (98%; 88) of the participants have knowledge about
                                                                 quired Internet Service Providers (ISPs) to seek per-
what VPNs are, less than half (42%; 37) have ever used
                                                                 mission from its customers to collect and share per-
VPNs primarily as a privacy-enhancing technology. Of
                                                                 sonal information such as their browsing history [2, 3].
these, 18% (7) abandoned using VPNs while 81% (30)
                                                                 This has driven privacy advocates to motivate inter-
continue to use them to protect their privacy online. In
                                                                 net users to explore privacy-enhancing technologies such
a qualitative analysis of survey responses, we find that
                                                                 as Virtual Private Networks (VPNs) as a technology
people who adopt and continue to use VPNs for privacy
                                                                 that can provide an additional layer of privacy protec-
purposes are primarily motivated by emotional consid-
                                                                 tion and anonymity when using the Internet [4]. VPNs
erations, including the strong desire to protect their pri-
                                                                 are secure communication technologies that were orig-
vacy online, wide fear of surveillance and data tracking
                                                                 inally developed to connect remote sites or users to-
not only from Internet service providers (ISPs) but also
                                                                 gether over a public network [5]. They have evolved into
governments and Internet corporations such as Face-
                                                                 a consumer tool that is used to provide users with an
book and Google. In contrast, people who are mainly
                                                                 Internet Protocol (IP) address that is not subject to
motivated by practical considerations are more likely to
                                                                 the censorship rules of their geographical location, as
abandon VPNs, especially once their practical need no
                                                                 well as to hide users’ browsing behavior from surveil-
longer exists. These people cite their access to alterna-
                                                                 lance [6]. As a result, they are now widely marketed
tive technologies and the effort required to use a VPN
                                                                 as privacy-enhancing technologies (PETs) 1 that allow
as reasons for abandonment. We discuss implications of
                                                                 internet users obscure and protect their personal iden-
these findings and provide suggestions on how to max-
                                                                 tifiable information, including their online traffic, not
imize adoption of privacy-enhancing technologies such
                                                                 only from their ISP, but also from their governments,
as VPNs, focusing on how to align them with people’s
                                                                 and other online entities [7].
interests and privacy risk evaluation.
                                                                      Around the world, adoption and usage of VPNs is
Keywords: privacy, Virtual Private Networks (VPNs),              much higher in Asia-Pacific (i.e., 30% of internet users)
judgment and decision making, psychology, privacy-               and Latin America (i.e., 23% of internet users) primar-
enhancing technologies                                           ily as a technology to access restricted and censored
DOI 10.2478/popets-2020-0006
                                                                 content [8]. However, VPN adoption and usage remains
Received 2019-05-31; revised 2019-09-15; accepted 2019-09-16.    low (i.e., 18% of internet users) in Europe and North
                                                                 America regions where the main reasons for usage are
                                                                 to remotely connect to the network of one’s school in-
                                                                 stitution or employer and as a privacy-enhancing tech-
*Corresponding Author: Moses Namara: Clemson Uni-
versity, mosesn@clemson.edu                                      nology [8, 9]. According to a PEW research study [10],
Daricia Wilkinson: Clemson University, dari-
ciaw@clemson.edu
Kelly Caine: Clemson University, caine@clemson.edu
Bart P. Knijnenburg: Clemson University,
bartk@clemson.edu                                                1 e.g., https://mullvad.net/en/ and https://nordvpn.com/
Adoption and Abandonment of VPN as a PET           84

only 13% of online adults in the United States are aware    tent to which people find PET tools effective at improv-
that issues that defeat the concept of online privacy can   ing and safeguarding their online privacy. In interviews
be minimized by use of a VPN, while 70% of users are        with Chief Information Security Officers in the medical
not even sure what purpose a VPN serves.                    field, Johnson and Willey noted that “physicians work-
     Within the privacy research community, there is a      ing at home could use a virtual private network (VPN)
lack of an empirical understanding of the external fac-     to gain access to hospital systems, but sometimes found
tors that motivate or hinder users from adopting VPNs       it slow or cumbersome and chose to download the data
primarily as PETs. Likewise, there is no clarity on peo-    to their remote laptops instead”[11]. Likewise, adoption
ple’s personal considerations or perceptions that under-    could be thwarted by the lack of obvious tangible ben-
lie this adoption decision. As a step towards addressing    efits. Within corporations, for example, there is often
this, we conducted a survey targeting VPN users and         a positive business-related outcome and an economic
abandoners to investigate these external factors and per-   justification for their investments in PETs before a pos-
sonal considerations that motivated or hindered their       itive decision to adopt PETs is taken [12]. Note that
adoption and usage of VPNs as PETs. We find that            in contrast to these works, our current work focuses on
while both practical and emotional considerations mo-       VPN adoption by private individuals rather than cor-
tivate the adoption of VPNs as PETs, only emotional         porations.
considerations are a primary driver behind their sus-            Similarly, Caulfield et al. [13] used privacy at-
tained usage.                                               tributes i.e., context (the setting in which and the pur-
     In the following sections, we discuss related work     pose for which a given technology is used), requirement
regarding the adoption and use of PETs, as well as im-      (the level of privacy that the technology must provide
portant aspects of users’ judgment and decision-making      for a user to be willing to use the technology), belief (a
practices surrounding adoption. In Section 3, we discuss    user’s perception of the level of privacy provided by a
our survey methodology. Section 4 presents our results,     given technology in a given context), and relative value
and implications are discussed in Section 5. Section 6      of privacy (how much a user cares about privacy in this
covers our limitations and future work, followed by our     context and how willing they are to trade off privacy for
conclusion.                                                 other attributes) in an economic (rational) model to un-
                                                            derstand the adoption of PETs. Using this model, they
                                                            found that increased media coverage of Apple against
                                                            FBI [14] signaled to users that the iPhone was more
2 Related Work                                              privacy-enhancing than Android devices. Such a shift
                                                            in user belief would increase the adoption of the iPhone
    In this section we first cover related work on the
                                                            as a privacy-enhancing technology. Our work goes be-
adoption and acceptance of privacy-enhancing technolo-
                                                            yond the economic model proposed by Caulfield et al.
gies. We then discuss VPNs as PETs, and usability as a
                                                            by also covering emotional reasons for the adoption and
factor in the adoption of PETs, notably VPNs. We then
                                                            use of VPNs.
draw from the Technology Adoption Model (TAM) as
a useful adoption model that encompasses usability but
can also be used as a guideline to discuss other fac-
                                                            2.2 VPNs as PETs
tors that may relate to VPN adoption. Finally, we look
at decision-making psychology literature that highlights
                                                                 Using VPNs serves as one of the means through
the existence of both practical and emotional decision
                                                            which people can safeguard their privacy [15, 16]. How-
processes. We subsequently use this distinction to for-
                                                            ever, people can mistakenly perceive VPNs to com-
mulate our guiding research questions.
                                                            pletely protect their online privacy [17]. VPNs do not
                                                            fully guarantee user privacy based upon their own prac-
                                                            tices and those of the website(s) the user is accessing [6].
2.1 Adoption and Acceptance of PETs
                                                            Specifically, VPNs afford users privacy and anonymity
                                                            through the alteration and re-routing of the user’s IP
    Previous studies on privacy-enhancing technology
                                                            address through the VPN provider’s servers and encryp-
adoption found that PET adoption was impacted by
                                                            tion of all the data packets sent out from a user’s device
factors such as usability and usefulness [11–13]. In the
                                                            to the server through a secure “tunnel” (i.e., a private
context of PETs, usefulness refers to the belief and ex-
                                                            network) established by the VPN client installed on the
Adoption and Abandonment of VPN as a PET         85

device [18, 19]. Through this secure tunnel, the user’s      ple go through as they accept software and information
internet traffic is hidden from outside observers and pre-   technologies [29]. According to TAM, actual system us-
vents the websites being accessed from identifying the       age (i.e, the user’s behavioral response) is determined
user by their actual IP address. However, websites can       by the user’s behavioral intention (affective response)
still track and identify a user through other means such     towards whether or not they will use the system. Be-
as browser or device fingerprinting, logins and cookies      havioral intention, is in turn, influenced by the user’s
[20].                                                        cognitive (practical) response (i.e., ability to assess or
                                                             perceive the usefulness and usability of the system).
                                                             External stimuli such as the system’s design features
2.3 Usability as a Factor in PET Adoption                    and capabilities directly influence the user’s cognitive
                                                             response.
     With the rise of downloadable applications, software        TAM has been applied to successfully predict the
trials, and “freemium” pricing strategies, people are in-    end-user acceptance of many technologies from various
creasingly able to experience the usability of a tech-       domains such as the e-commerce [30], telemedicine [31]
nology before they commit to using it and/or spend-          and even employee adoption of information security [32].
ing any money on it [21]. Therefore, the usability of        In this paper, we use the TAM framework constructs
PETs is important, because people are more likely to         (external stimuli, user motivation and actual system us-
adopt them when they are usable. For example, a PET          age) to guide our understanding of the factors that mo-
like Tor2 , which guarantees user anonymity and pro-         tivate people to adopt and/or abandon using VPNs as
tects against network surveillance and traffic analysis,     PETs.
is not commonly used due to lack of usability [22]. Like-
wise, although Pretty Good Privacy (PGP) is an effec-
tive means to provide communication security through         2.5 Judgment and Decision Making
encryption, most tools implementing PGP have been
found to be unusable despite their attractive graphical           Researchers have criticized TAM for not ground-
user interfaces [23]. People have instead adopted those      ing the cognitive (practical) and affective (emotional)
secure communication applications which offer end-end        responses which underlie user motivation and attitude
encryption and are usable (e.g., WhatsApp, Signal and        in psychological theories that describe people’s decision
Telegram) [24].                                              processes [34]. TAM largely treats user motivation as a
     Extrapolating from these examples, one could ar-        function of the perceived consequences of a user’s target
gue that usability would be an important factor in the       behavior for using the system, multiplied by the evalu-
adoption and usage of VPNs. However, while most of           ation of those consequences [29]. This treatment is re-
the existing research focuses on technical capabilities of   lated to the “expected utility theory” in judgment and
VPNs [25, 26], usability of VPNs has not been studied.       decision making, which suggests that people make de-
In the current paper,we adopt the definition of PET          cisions by assessing the severity and likelihood of possi-
usability suggested by Whitten and Tygar [23] to de-         ble outcomes and then maximizing the expected value
fine “usability of VPNs” as the ability of users to re-      of the outcome [35]. In conventional sense this means
liably and successfully use VPNs whenever online, and        that when people evaluate risk cognitively (practical
are comfortable enough with the interface to continu-        consideration), they make a decision to alleviate such
ing using them. We, therefore, explore factors such as a     risk based on the premise of the consequences that will
VPN’s usability from an end-user perspective to learn        result from the choice they select or the activity they
of how they foster adoption and use [27, 28].                engage in. In the field of privacy, this principle is en-
                                                             coded in the “privacy calculus”, which argues that peo-
                                                             ple trade off the privacy risks and potential benefits of
2.4 The Technology Adoption Model                            engaging in a certain activity in a deliberate process
                                                             [36]. For example, as a response to this cognitive eval-
    The Technology Acceptance Model (TAM) was de-            uation, people could decide to use a VPN in order to
veloped with the goal of understanding the process peo-      protect their privacy by anonymously browsing the in-
                                                             ternet based on the severity of the consequences that
                                                             accrue with visiting the sites or activities they conduct
2 https://www.torproject.org/                                over the internet.
Adoption and Abandonment of VPN as a PET                   86

      Anticipated outcomes
      (including anticipated                      Cognitive Evaluation
            emotions)                           (Practical considerations)
                                                                                                                  Outcomes (incl,
                                                                                                                  emotions)
            Subjective
           probabilities                                                                 Behavior
                                                                                       (decision to use             ●     Continuous
                                                                                                                          use of VPNs
                                                                                           a VPN)
                                                                                                                    ●     Pause/Stop
                                                       Feelings                                                           use of VPNs

 Other factors e.g.,                           (Emotional considerations)
 vividness (of privacy risk),
 immediacy (of privacy risk),
 background mood

  Motivators                                        Considerations                         Decision                     Outcomes

 Fig. 1. The Risk-as-feelings perspective (adapted from [33]). The colored annotations represent our interpretation of the theory with
                                            regard to the decision to adopt VPNs as PETs.

     A particular shortcoming of this treatment in TAM               this difference in determinants, it is not uncommon for
is that it ignores the separate roles that practical and             emotional responses to diverge from cognitive responses.
emotional considerations play in the adoption and ac-                When such divergence occurs, the emotional consider-
ceptance of technology [29, 34]. Even though research                ations often take the upper hand—they drive behavior
has shown that emotions (i.e., feelings that are usually             and result in different outcomes.
associated by an individual with a particular act, such                   Hence, in line with the risk-as-feelings theory [33],
as joy, sadness, depression, anger, disgust, fear, like, dis-        we make a distinction in the analysis of our study re-
like, or hate) are direct determinants of user behavior              sults between the emotional and cognitive evaluations
separate from practical considerations [37, 38], TAM                 of the external stimuli and internal motivations that
assumes that in the decision making process, practi-                 influence people’s decision to adopt and use VPNs as
cal considerations such as perceived usefulness and ease             PETs (we use the shorthand terms “emotional consid-
of use of the technology are made first—emotions are                 erations” and “practical considerations”, respectively,
only considered as a component of the expected con-                  see (Fig.1)). Our intent in doing this is to investigate
sequences of the decision, rather than being separately              whether there is indeed a difference in the adoption and
experienced [33]).                                                   usage of VPNs as PETs when these stimuli and motiva-
     In contrast, Loewenstein et al.’s [33] risk-as-feelings         tional factors are emotionally or cognitively evaluated. If
theory reveals that people’s responses to risky situations           so, this would confirm the risk-as-feelings assertion that
(including decision-making) are different when the sit-              when present, people’s emotional considerations exert a
uation is cognitively evaluated (i.e., practically consid-           separate, stronger, and more robust influence on their
ered) compared to when they are based on the feelings                behavior than their practical considerations.
associated with the situation, such as fear, worry, dread                 To apply this theory and offer a better understand-
or anxiety (i.e., emotionally considered).                           ing on how people adopt and use VPNs as a privacy-
     As illustrated in Figure 1, the risk-as-feelings per-           enhancing technology, we define emotional and practical
spective posits that people’s emotional responses to the             considerations as follows:
evaluation of risky situations independently inform de-              – Emotional considerations: The judgment and
cision making. While anticipated outcomes and their                       decision to use a VPN for privacy protection pur-
subjective probabilities may cause emotional responses                    poses primarily based on emotions, such as the fear
(albeit to a much lesser extent for cognitive evaluation                  of ISPs’ uncontrolled access to and misuse of per-
than emotional evaluation), these emotional responses                     sonal information, anger with surveillance by the
can also result from the evaluation of factors that are                   government, or dislike of websites’ large-scale track-
not considered during cognitive evaluations, such as the                  ing of web browsing activities.
vividness and immediacy of the risk. In part due to
Adoption and Abandonment of VPN as a PET          87

–   Practical considerations: The judgment and de-          ternal motivations that propel people to learn about,
    cision to use a VPN for privacy protection pur-         adopt, and use VPNs (as standalone applications) for
    poses based on an objective to accomplish a prac-       privacy protection purposes. Specifically, we queried re-
    tical task or need, such as obtaining secure and/or     spondents’ awareness of VPNs, their current use of
    anonymous access to entertainment content, web-         VPNs (i.e., never used, currently using, stopped/paused
    sites, social networks, remote files/machines, or the   use), their duration of use (i.e., since when and until
    Tor browser.                                            when, if applicable), their initial beliefs and values re-
                                                            garding VPNs including their motivations to start using
In summary, we pose the three following research ques-      VPNs (if applicable), the number of VPN applications
tions:                                                      they explored for use, the overall cost of their VPN use,
    RQ1: What factors motivate users to adopt VPNs          the perceived pros and cons of VPN use, and their gen-
as a privacy-enhancing technology?                          eral sentiments about VPNs.
    RQ2:What barriers do they encounter in adopting              To quantify their perceptions regarding VPNs, we
VPNs as a privacy-enhancing technology ?                    also asked respondents to state their agreement on a 5-
    RQ3: What are the differences in the adoption and       point Likert scale (1 = Strongly disagree, 5 = Strongly
usage of VPNs as a privacy-enhancing technology be-         agree) regarding a number of statements/items (see Ap-
tween users who mainly have practical considerations        pendix A). These survey items were adopted from Col-
versus those who mainly have emotional considerations?      nago et al.’s [39] survey and are related to the three
                                                            constructs detailed below. We provide the Cronbach’s
                                                            alpha for each of the constructs to demonstrate their
                                                            reliability [40]. Acceptable values of Cronbach’s alpha
3 Methodology                                               range from 0.70 (acceptable) to 0.95 (excellent) [40].
                                                            – Affordance of a VPN to protect user privacy
    The goal of this study is to explore how people
                                                                 (5 items, alpha: 0.7):
adopt and use VPNs specifically for privacy protection
                                                                 – Using VPNs helps me protect my privacy on-
purposes. We conducted a survey composed of closed-
                                                                      line.
ended, multiple-choice, 5-point Likert scale, and open-
                                                                 – It is worthwhile to put in the effort to start using
ended questions. To ensure that we asked the right ques-
                                                                      a VPN.
tions and improve the validity of the survey data col-
                                                                 – It is important to learn about the benefits of
lected, we pre-tested all our survey questions through
                                                                      using a VPN.
interviews with five VPN users and subjected it to an
                                                                 – It is important to learn about the drawbacks of
expert review by three human computer interaction ex-
                                                                      using a VPN.
perts. We elaborate on our survey design in Section 3.1.
                                                                 – I suggest that people should use a VPN at any
    Due to the low prevalence of VPN use in society [8–
                                                                      neccessary cost to protect their privacy online.
10], the resulting survey (which is fully listed in Ap-
                                                            – Difficulty of selection and installation of a
pendix A) was targeted to people with a high likelihood
                                                                 VPN application (4 items, alpha: 0.79):
of at least knowing about VPN. In particular, we dis-
                                                                 – I had a hard time deciding on the best VPN
tributed the survey to Reddit users (Redditors) of sev-
                                                                      application to use.
eral VPN sub-communities and to Computer Science
                                                                 – Installing a VPN was difficult.
students at Clemson University via email listservs. We
                                                                 – Installing a VPN was easy.
elaborate on our recruitment procedures in Section 3.2.
                                                                 – Installing a VPN was a lengthy process.
The survey was completed by 90 participants, whose
                                                            – Ease of use of a VPN application (3 items,
responses were coded and qualitatively analyzed (see
                                                                 alpha: 0.8):
Section 3.3). This study was approved by the Clemson
                                                                 – I had a hard time understanding how to use
University Institutional Review Board (IRB).
                                                                      VPNs.
                                                                 – I think that VPNs are easy to use.
                                                                 – I think that VPNs are difficult to use.
3.1 Survey Design
                                                            Additionally, we asked respondents’ different demo-
    The main objective of our survey was to gain a
                                                            graphic questions including their gender, age, nation-
deeper understanding of the external stimuli and in-
                                                            ality and current country of residence. To account for
Adoption and Abandonment of VPN as a PET         88

cultural variations in privacy attitudes and behaviors            used them primarily as privacy-enhancing technolo-
[8, 41, 42], we also asked how long each respondent had           gies for some period of time in the past, but have
lived in the country of current residence and whether             currently momentarily or completely stopped using
their current country of residence was different from             them.
their nationality.
                                                              These categories helped us better structure the survey,
                                                              as it allowed us to ask specific questions for each of
3.1.1 Survey Development and Refinement                       the user categories (groups) to better contextualize their
                                                              adoption and usage experiences. For example, abstain-
     We pre-tested the initial set of survey questions with   ers would be asked about their perceptions of VPN,
five participants who reported that they were VPN users       while adopters and abandoners would be asked about
[43]. The purpose of the pre-test was to assess the clar-     their perceptions as well as their actual experiences us-
ity, appropriateness and necessity of each of the ques-       ing VPN (Appendix A indicates which questions were
tions to ensure that the collected data would allow us        shown to which user group(s)).
to answer our research questions [44].                            Moreover, the pre-test demonstrated that some
     During the 30 minute think-aloud walk-through of         of our initial questions were too long. Subsequently,
the survey, the interviewer read each question aloud and      we rewrote those questions to make them more brief
asked pre-test participants to respond verbally to each       and understandable. We also added five questions that
question. Beyond that, participants were asked whether        specifically sought respondents’ perceptions regarding
the question was easy for them to comprehend, whether         the privacy protection affordances of VPNs, as well as
they felt comfortable responding to the question, and         additional demographic items such as nationality.
how valuable they found the question to be. In response,
some participants also volunteered other questions and
answer choices that we could consider adding to the           3.1.2 Expert Review
survey.
     Overall, the pre-test interviews provided insights           After the pre-test, three human computing expert
into how respondents would interpret and respond to           reviewers with domain knowledge on survey method-
the survey questions. Moreover, the pre-test also helped      ology and usable privacy reviewed our updated survey
us identify the different categories of VPN users that        questions to ensure that they were correctly worded and
we were likely to encounter in our sample. Notably, we        adequate enough to uncover valuable insights from re-
learned that despite knowing about VPNs, all five par-        spondents. They helped us remove technical words that
ticipants did not constantly use them—at least not for        our respondents would not easily comprehend thereby
privacy purposes. Based on this finding, we explored the      making it possible to have the respondents self-report
literature around stages of technology acceptance (see        as accurately as possible [45].
Section 2.4). This adoption literature (cf. [29]), in con-
cert with the VPN user types that we identified and
hypothesized based on our insights from the pre-test          3.1.3 Pilot Test
interviews, led us to come up with the following four
categories of adoption and usage of VPNs as PETs:                  Subsequently, we pilot-tested the survey with seven
– Unaware (Non-Adopters): Respondents who do                  participants to understand how long it would take to
     not know about VPNs.                                     complete the survey, to ensure correct branching for
– Never used for privacy (Abstainers): Respon-                each of the identified adoption categories, and to en-
     dents who know about VPNs but either have never          sure that collected data was correct and in the expected
     used them at all or currently use / have used them       format. Based on time it took for the participants to
     for purposes other than protecting their privacy         complete the survey (at most 15 minutes), and compre-
     (e.g. remotely accessing a work or school network).      hension of the questions, we updated a number of our
– Currently use for privacy (Adopters): Respon-               questions, the design aesthetics, and the branching logic
     dents who know about VPNs and are currently us-          of the survey, until no additional questionnaire problems
     ing them primarily to protect their online privacy.      remained.
– Paused/Stopped use for privacy (Abandon-
     ers): Respondents who know about VPNs, have
Adoption and Abandonment of VPN as a PET          89

3.1.4 Final Survey and Administration                       3.3 Coding and Analysis

     The final survey instrument was administered via           At the end of the study period (November 2018),
the Qualtrics web-based survey tool [46], which allows      the survey responses were downloaded from Qualtrics
for a branching survey. For example, the first question     for coding and analysis. After removing incomplete re-
asked whether respondents knew what a VPN is, and           sponses, the responses of the remaining 90 participants
the response to this question determined the next set of    were organized based on the VPN use and adoption cat-
questions. This ensured that respondents only saw and       egory they belonged to (see Section 3.1.1).
responded to questions relevant to their situation. As          Two researchers qualitatively analyzed [48] the re-
our study was targeted to individuals who are likely to     sponses to all the open-ended questions in the survey
use VPN (students, users on VPN forums), the most de-       to learn of the respondents’ attitudes regarding VPNs
tailed questions were administered only to participants     and their experience using VPNs. Thereafter, the re-
who indeed (previously or currently) used VPNs for pri-     searchers did a content analysis [49] to code the re-
vacy protection purposes.                                   sponses of the adopters and abandoners to the two ques-
                                                            tions that were specifically focused on the factors that
                                                            motivated them to use a VPN as a PET: “How did you
3.2 Recruitment and Respondents                             finally end up using a VPN for personal privacy protec-
                                                            tion purposes?” and “Upon learning about VPNs, what
    We conducted our survey between September and           sparked your desire to actually use them for personal
November of 2018. Our recruitment goal was to find          privacy protection?” Specifically, based on Loewenstein
respondents who primarily use VPNs as a privacy-            et al.’s [33] risk-as-feelings theory, the answers to these
enhancing technology (PET). While the use of VPN to         questions were coded as either emotional and practical
remotely accessing a work or school network is fairly       considerations. The code was assigned based on whether
common [47], its use for privacy protection purposes re-    the answer demonstrated an emotional need (e.g., “I re-
mains low [8, 9]. Considering that participants who do      ally dislike the idea of being followed about online. [...]
not know what VPNs are would not provide many rele-         To me, that’s not okay.”) or a practical need (e.g., “I
vant insights for our study, we decided to forego random    was on a network that restricted access to websites I
sampling from the population at large as a recruitment      needed access to.”) The inter-rater reliability (Cohen’s
strategy. Instead, we specifically targeted people who      Kappa) of the raw agreement between the two indepen-
were at least aware of what VPNs are, using two re-         dent coders [50] was 0.65. A kappa above 0.6 is usually
cruitment methods. First, we posted recruitment posts       considered satisfactory [51].
on a number of Reddit sub-communities about VPN:                We did not find any qualitative response differences
r/VPN3 , r/VPNTorrents4 and r/Privacy5 . Second, we         between Redditors and students. We therefore merged
sent recruitment emails via email listservs of Computer     these samples in our further analysis and in the discus-
Science students at Clemson University. Our survey in-      sion below. For clarity purposes, however, we will use
strument captured where the responses came from based       R and S to distinguish the quotes from these different
on the two distribution avenues (i.e., posts on Reddit      samples.
and email listservs). This recruitment method resulted
in a sample size of 90 respondents: 39 Redditors and 51
students (Fig. 2). Respondents were entered into a raffle
to win a $50 Amazon e-gift as incentive to complete the
survey.
                                                            4 Results
                                                            4.1 Quantitative Survey Results

                                                                Among the 90 respondents (39 Redditors and 51
                                                            students) who took the survey, the vast majority (88)
                                                            reported knowing what a VPN is (Fig. 2). Among those,
                                                            49 used it primarily to serve other needs that did not
3 https://www.reddit.com/r/VPN/
                                                            include protecting their privacy online and 2 had not
4 https://www.reddit.com/r/VPNTorrents/
5 https://www.reddit.com/r/Privacy/
                                                            used it despite knowing about it. The remaining 37
Adoption and Abandonment of VPN as a PET        90

            Fig. 2. A breakdown of the respondents in our sample by VPN use and adoption category (see Section 3.1.1).

                                   VPN User Groups
                                                                  as PETs (adopters; shown in green in Fig. 2) while 7
                   Total        Abandoners     Adopters           of them reported having temporarily or permanently
                  N=(37)         N =(7)        N =(30)            stopped using VPNs as PETs (abandoners; shown in
   Gender                                                         orange in Fig. 2). These 37 respondents are the main
   Male              25              6               19           basis of our results and findings, since they allow us to
  Female              6              1               5            learn how people come to adopt and use VPNs as a
 Unknown              6              0               6            privacy-enhancing technology. Their demographics are
    Age                                                           shown in Table 1.
  18-24              21              6               15               For these 37 participants, we examined the quan-
  25-34               4              1               3
                                                                  titative data (perception scales) and qualitative data
  35-44               3              -               3
  45-54               2              -               2
                                                                  (open-ended questions) from the survey to examine the
  55-64               2              -               2            motivations and external stimuli that influence people’s
  65-74               1              -               1            adoption and use of VPNs as PETs. We report the re-
 Unknown              4              -               4            sults of this analysis using the TAM framework con-
  Nationality                                                     structs as a guiding framework, using external stimuli,
    USA              28              7               21           user motivation, actual system usage, and hindrances
 Azerbaijan           1              -               1            as the main structure of our result section. Note that
  Canada             1               -               1
                                                                  “hindrances” constitute the performance impacts con-
   Cyprus            1               -               1
   Gabon              1              -               1            cept that was originally conceived as part of TAM but
  Germany             1              -               1            was later removed [29].
Great Britain        1               -                1               For each of these aspects, we show the similarities
  Portugal           1               -               1            and differences between adopters and abandoners. We
   Russia            1               -                1
                                                                  provide quotes (labeled with S for students and R for
  Slovakia           1               -                1
                                                                  Redditors) to support our observations. Under the user
 Table 1. Demographic data : Gender, Age and Nationality of the   motivation section (Section 4.2), quotes are also labelled
   main respondents in the study categorized by the VPN user      as either Emotional Reasoning or Practical Reasoning,
              groups (Abandoners and Adopters.)
                                                                  based on how they were coded.

reported using VPNs to specifically protect their pri-
vacy online; 30 of them reported currently using VPNs
Adoption and Abandonment of VPN as a PET        91

4.2 People’s Motivation to Adopt VPNs                               ing; “For the most part, I just hold my privacy in a
                                                                    higher regard than many other people these days. I
     Considering the quantiative results of the measured            know just how much data can be collected about you
perception scales, both adopters and abandoners report              and how easy it is to use ‘anonymous’ data to iden-
finding it easy to select and install (Mabandoners = 2.60,          tify specific people.” S, Emotional Reasoning ). Ad-
SDabandoners = 0.33, Madopters = 2.38, SDadopters =                 ditionally, some respondents reported actually being
0.09), and use (Mabandoners = 1.90, SDabandoners =                  hacked in the past, so they used VPNs as PETs to
0.33, Madopters = 1.82, SDadopters = 0.09) VPNs. They               better safeguard their online privacy (“I have been
also expect and perceive VPNs to protect their privacy              hacked a couple times and it piqued my interest in
by default (Mabandoners = 3.66, SDabandoners = 0.33,                cyber security. VPNs are one of the things I found
Madopters = 4.17, SDadopters = 0.09). While our sam-                online that I could implement easily.” S, Emotional
ple of especially abandoners is not sufficiently large to           Reasoning).
make statistical comparisons, at the surface level, these       –   Fear of Internet surveillance: Thirteen respon-
results seem to suggest that adopters and abandoners                dents are wary of their ISP or their government
are initially about equally motivated to adopt and use              covertly monitoring their online activities. As such,
VPNs.                                                               they reported being compelled to use VPNs to safe-
     However, considering our qualitative analysis, we              guard their privacy and also to quell their fears of
find that the considerations underlying users’ motiva-              online surveillance (“I wanted to be safer from gov-
tions to use VPNs as PETs are rather different between              ernment and ISPs level logging and profiling, and
adopters and abandoners. Below, we elaborate on these               disliked the impingement on my privacy and free-
qualitative findings and demonstrate how adopters de-               doms. Snowden and the UK ‘Snooper’s Charter’
cide to use VPNs as PETs primarily based upon an emo-               firmed this resolve.” R, Emotional Reasoning; “I do
tional consideration to protect their privacy, whereas              not like when my data is tracked.” R, Emotional
abandoners initially decide to use VPNs as PETs based               Reasoning, “[I used a VPN for] Privacy from ISP
upon a practical consideration to protect their privacy             and forums.” R, Emotional Reasoning)
(i.e., to support an online activity that fulfills a specific   –   Dislike of the lack of or unfavorable change
need).                                                              of privacy legislature: Five respondents reported
                                                                    being upset with constant changes in legislature
                                                                    that lead to less privacy protections, or the lack
4.2.1 Adopters’ Motivation                                          of legislature that protects people’s online privacy.
                                                                    This compelled them to start using VPNs to take
    Among the adopters, we found that their motivation              matters into their own hands to protect their on-
to adopt VPNs as PETs was primarily based on emo-                   line privacy (“Introduction of SOPA-type bills in
tional considerations, such as the fear induced by past             congress” S, Emotional Reasoning); “Snowden / As-
breaches of their private information, or their dislike of          sange [revelations of US government spying pro-
perceived violations of their privacy. In our thematic              grams].” R, Emotional Reasoning). A prominent ex-
analysis we categorized these emotional considerations              ample that was often mentioned was the Congres-
along the following lines:                                          sional Review Act, which repealed privacy rules de-
– Heightened privacy concerns: Ten respondents                      veloped by the Federal Communications Commis-
    reported having little control over how their per-              sion in March 2017.
    sonal information is collected, accessed, and used
                                                                –   Media Attention: Two respondents reported that
    by various online entities. In particular, they were
                                                                    their privacy concerns are fueled and amplified, in
    concerned about third parties tracking and access-
                                                                    part, by concentrated media attention on privacy
    ing their data without their explicit consent or even
                                                                    breach incidents such as the Target and Sony com-
    their awareness. As a result, they were motivated to
                                                                    pany hacks (“The media reported on data breaches
    use VPNs as an online tool to help safeguard and ad-
                                                                    and misuse of personal data, prompting me to take
    dress these privacy concerns (“[I want to use a VPN]
                                                                    action to prevent this from affecting me. One of the
    just for privacy concerns” R, Emotional Reasoning;
                                                                    actions I took was to use a VPN. Protecting my
    “Constant breeches of personal consumer informa-
                                                                    personal information.” S, Emotional Reasoning).
    tion like credit card numbers and addresses at major
    firms like Target and Sony.” S, Emotional Reason-
Adoption and Abandonment of VPN as a PET            92

4.2.2 Abandoners’ Motivation                                    4.3 External Stimuli: How People Learn
                                                                    About VPN
    Among the abandoners, we found that their mo-
tivation to adopt and use VPNs as PETs was mostly                    Both adopters and abandoners reported using
based on practical considerations. Such practical con-          Google searches, expert blogs and VPN application web-
siderations usually involved a practical need to over-          sites to learn about and determine which VPN applica-
come a specific barrier or to attain a specific goal. Like      tions to use. Most users selected a VPN based upon its
emotional considerations, these practical considerations        user reviews, expert or friend recommendation, capabil-
manifested themselves as privacy concerns. But whereas          ities and features such as server vantage points, privacy
emotional considerations were driven by a subjective            logging policies, and/or the jurisdiction in which it was
fear of negative outcomes that might result from a loss         located. As discussed below, the external stimuli were
of privacy, these practical considerations were driven by       mostly similar for both adopters and abandoners, with
a desire to fulfill a practical goal while objectively avoid-   only a few interesting differences.
ing the negative privacy outcomes of pursuing that goal
(e.g., the desire to anonymously download content from
the internet whilst safeguarding their identity). In our        4.3.1 External Stimuli of Adopters
thematic analysis we categorized these practical consid-
erations along the following lines:                                  Just over half of the adopters (18/30) learned about
– Task requirement: Three respondents mentioned                 VPN’s features and capabilities through information
    that to access and conduct particular institutional         they found online, such as reviews. They accessed these
    objectives such as the submission of documents that         reviews by conducting simple Google searches (“A quick
    contain highly sensitive private personal informa-          Google search for ’Best VPN 2018’.” S), or through of-
    tion, they were required to use VPNs to securely            ficial VPN application websites and VPN expert blogs.
    access the institution’s network and accomplish the         These websites provide reviews and recommendations
    task. (“For school it is necessary to be on a uni-          on the “best” VPN applications to use. Based on
    versity VPN to access some university features.” S,         such recommendations, adopters formed an opinion and
    Practical Reasoning).                                       subsequent decision regarding which VPN to use (“I
–   Need for anonymity: Based on their online                   watched a ton of reviews and decided on the most
    browsing habits, two respondents reported the need          trusted/used.” R), “I found the cheapest provider that
    to obscure their identity online as a reason for the        had good reviews and a good reputation. I ended up
    adoption and use of a VPN (“I used to pirate movies         buying a one-year subscription for private internet ac-
    and TV shows a lot, so I was pretty much just               cess.” S).
    looking to cover my own ass.” S, Practical Reason-               In contrast, eight adopters learned about VPN
    ing; “I was browsing the internet for certain con-          through recommendations from online social networks
    tent that is possibly a gray area in terms of legal-        (“Privacy advocates on Twitter recommended one.” R),
    ity such as streaming movies from "illegal" websites        whereas one started to use a VPN application that was
    and so I wanted to find a way to create some type           recommended by their school (“Clemson University pro-
    of anonymity or at least mask my identity.” S, Prac-        vided it. I will likely ask friends in the future when I lose
    tical Reasoning).                                           access.” S). Other adopters selected a VPN application
–   Privacy concerns regarding specific actions:                to use based on their own personal accrued knowledge
    Two respondents mentioned that they sought out              on VPNs (“I worked in computer information systems
    VPN as a PET to obscure their traffic, personal in-         for the Marine Corps before coming to school at Clem-
    formation such as web browsing history from ISPs            son University so I had some background knowledge
    especially when they needed to accesses certain sites       that suggested always using a VPN - especially when
    (“When accessing some sites I felt more comfortable         connecting to sites like financial institutions [...] I would
    security wise accessing them through a VPN to pro-          rather sit behind a VPN, even when connected over eth-
    tect my privacy.” S, Practical Reasoning; “I wanted         ernet at home.” S; “[It was through] luck and gambling.
    to be able to pirate software without receiving copy-       Still better than no VPN.” S).
    right infringement notices from my isp.” R, Practical            Finally, two adopters reported building their own
    Reasoning),                                                 VPN applications due to a lack of trust in the existing
                                                                VPN choices (“I looked a bit at public VPN providers,
Adoption and Abandonment of VPN as a PET         93

but a lot of them seemed sketchy or had questionable       anything important.” S; “I heard about it [VPN] and
business models (i.e., they seemed like they would sell    started to take my privacy seriously.” R; “[I] read the
my data to advertisers). As such, I decided to set up my   privacytools.io 6 and got serious concerns of my privacy,
own VPN server on amazon web services.” R). However,       [besides I] travel a lot and using VPN, it makes me feel
they reported this being an extremely long process with    safe and good” R).
lots of trial and error.                                        Additionally, four respondents reported they felt
                                                           protected against internet surveillance when using a
                                                           VPN. This quelled their fears about their online activi-
4.3.2 External Stimuli of Abandoners                       ties being monitored by ISPs (“I didn’t want my history
                                                           to be seen by my ISP/controller, and I wanted to access
     Roughly similar to adopters, just under half of the   sites that demand privacy to be upheld.” S), government
abandoners (3/7) learned VPN’s features and capabil-       agencies (“[Awareness of the] Dragnet surveillance by
ities through information they found online, e.g. via      the United States government.”R), and corporate orga-
Google, expert blogs, and various VPN forums. But          nizations (“The repeal of net neutrality had me bugging
whereas adopters’ search focused on finding the high-      hard, and I needed to keep the government out of my
est quality VPN, abandoners focused on price (“I just      dark webzz bizness” R; “I didn’t want the government
googled the best and cheapest options.” S; “Whatever       to possibly look at my [web] history. I wasn’t [going to]
was free and had good reviews was enough for me.” S).      give that data to them willingly (like using a normal
     Four other abandoners reported relying on friends (   browser [without a VPN]).” S).
“I think the one recommended by a friend” S) and social         Furthermore, four respondents reported they felt
media for recommendations (“I did research online and      more comfort in the anonymity provided by their VPN.
got a lot of recommendations from people on various        This comfort allowed them to express their ideas and
forums” S) on which VPN application to use.                opinions without fear, thus avoiding self-censorship
                                                           (“Mostly just wanted to be on a secured connection
                                                           while browsing. I play games online and sometimes peo-
4.4 Actual VPN Usage                                       ple will pull your IP then boot you offline and a VPN
                                                           prevents that” S; “You need [VPN] to be connected to
     Both adopters and abandoners on average tried         the TOR network to access TOR sites, it is free, it is
out more than two VPN applications before ulti-            completely private, I trust the tech because it was orig-
mately selecting one which they were comfortable us-       inally a DARPA project, and my continued use further
ing. Adopters, driven by an emotional need to protect      anonymizes other users.” S).
their privacy, had used their current VPN for a period          Many adopters put a great amount of trust in their
of time that ranged from several months to several years   selected VPN application—14 of them reported not
by the time of the study. Most abandoners, on the other    reading their VPN’s privacy policy and terms of service
hand, had used their selected VPN for a much shorter       before installation. The other 16 of them did read the
period of time—ranging from as little as a week to about   privacy policy, though, and some even reported chang-
a year at most—before completely abandoning the ap-        ing their mind about installing and using the VPN ap-
plication. In our qualitative analysis we observed that    plication when they found that this privacy policy did
their abandonment was usually caused by the fact that      not align with their privacy preferences on issues such as
the practical need that had lead them to initially adopt   logging practices and server locations. Moreover, 8 re-
VPN no longer existed. In other words, their practical     spondents reported making changes to the default con-
considerations turned VPN usage into a temporally lim-     figuration of their VPN application to align its settings
ited endeavor.                                             to their preferences (“Adjusting some settings to match
                                                           my use. For example, I changed the default location
                                                           [where] to connect to.” S). This was usually done with
4.4.1 Adopters’ VPN Usage                                  the purpose of making their VPN connection more pri-
                                                           vate (“[The] kill switch lets me stop all connections even
    A majority of adopters (20) reported that they felt    when the VPN stops working, so I turned that on.” S),
safer online when using a VPN (“Having some informa-
tion taken from me, which I assume was based on my
IP, made me feel insecure without a VPN when doing         6 https://www.privacytools.io/
Adoption and Abandonment of VPN as a PET          94

increasing obfuscation (“[adjust the VPN to my] per-              VPN applications (“Laziness stopped me from re-
sonal preference and increase obfuscation” R), and/or             newing.” R).
getting faster connection speeds (“I needed to tinker         –   Usability: Three Abandoners were turned off by
with it to get better speeds.” S).                                the usability issues of the VPN application, such as
                                                                  pop ups (“I think I didn’t see the point of it, or
                                                                  maybe it had pop-ups.” S), convoluted documenta-
4.4.2 Abandoners’ VPN Usage                                       tion (“The documentation was unclear” S), slowness
                                                                  and lagging of the connection (“Slowness and lag”
     Whereas adopters used VPNs to generally feel more            S) and unnecessary requests for personal informa-
private, abandoners reported using VPNs to engage in              tion such as credit card information.
specific behaviors that required them to be private. For      –   Cost: Five abandoners reported using free VPNs
example, they reported using VPNs to access online con-           and were not willing to subscribe for a paid VPN
tent without negative legal repercussions (“I wanted to           service due to the lack of immediate and apparent
be able to pirate software without receiving copyright            benefits of using a paid VPN (“I was not willing
infringement notices from my ISP.” R; “I was browsing             to pay, but wanted some [anonymity] effects” S; “I
the internet for certain content that is possibly a gray          wasn’t ready to pay” S; “I’m cheap” S; “Money.” S).
area in terms of legality such as streaming movies from           Whereas students’ and Redditors’ responses were
illegal websites and so I wanted to find a way to create          otherwise similar, this hindrance was more common
some type of anonymity or at least mask my identity.”             among students than among Redditors. These aban-
S). The use of a VPN as a PET was conditional upon                doners were also more apprehensive about divulging
the practical activity they were engaging in, and the us-         their credit card information as part of the subscrip-
age would continue for as long as they were engaging in           tion process, in part due to their lack of trust in
the activity.                                                     the VPN providers themselves (“I do not want to
                                                                  spend money or give my credit card information to
                                                                  a company I’m not sure about.” S). This is despite
4.5 Hindrances to Using VPNs                                      the fact, that some perceive free VPN applications
                                                                  to be risky to use (“Lots of options, difficult to find
     Both adopters and abandoners reported on factors             which ones are credible and which are not, especially
that hindered their use of VPNs as PETs. But whereas              when free” S; “Some ended up being obvious scams
for abandoners these hindrances caused them to eventu-            with massive amounts of ads and malware.” S). In
ally pause or stop using the VPN application, adopters            parallel, one respondent reported having paid for
generally overcame, avoided, or simply discounted these           the VPN after the trial period, as they still needed
hindrances in an effort to continue using VPNs. Below,            access to certain sites (“I needed to keep using [it],
we elaborate on these factors which led to distinct usage         because, at the time, I was still downloading movies
patterns between adopters and abandoners.                         and TV shows left and right.” S).

4.5.1 Hindrances for Abandoners                               4.5.2 (Lack of) Hindrances for Adopters

     Abandoners, and especially those who no longer had           Whereas the cost of a VPN service was found to
the need to use VPNs due to a change in their goals           be a hindrance to abandoners, it compelled adopters
and social context (“I graduated” S; “I stopped pirat-        to sustain their usage of VPNs as PETs. Particularly,
ing things, so I no longer needed it.” S), reported the       we observed that sixteen respondents either out-rightly
following hindrances that led them to pause or quit the       paid for a VPN service or paid for it after the trial pe-
use of VPNs once their practical needs no longer existed:     riod. This was mainly due to:
– Effort to use/renew: Three abandoners found it              – Affordability: Adopters found the actual subscrip-
     cognitively burdensome to always engage a VPN in             tion value affordable and thus chose to pay for
     order to use it (“[I] didn’t always need it.” S; “[It]       the VPN application (“Good price, right timing[...]”
     seemed like a pain for no good reason” S). Likewise,         R; “The pricing seemed reasonable and the perfor-
     some would forego the burden of paying for their             mance was adequate.” R).
Adoption and Abandonment of VPN as a PET          95

–   Capability and usability: The VPN’s speed and            their emotional consideration of the risk to their online
    capabilities (e.g., multiple vantage points or server    privacy. As a result, their adoption is more resilient com-
    locations, clear and transparent terms and services      pared to abandoners, who largely used VPNs to serve
    such as the “no-logs” policy, and security features      a particular practical purpose. Interestingly, such emo-
    such as a “kill-switch” that would prevent traffic       tional considerations are not a major construct in TAM
    leakage in case of tunnel failure) compelled adopters    [29], which arguably makes this model insufficient for
    to pay for a VPN subscription rather than using a        the study of PET adoption. Complementing TAM with
    free one (“[VPN Name] provides an excellent ser-         the risk-as-feelings theory gave us a better framework to
    vice. It has fast speeds and plentiful geo-regional      understand the differences between adopters and aban-
    servers.” R; “Some cool features. Namely, you can        doners. We suggest that researchers interested in the
    specify which type you want and get double encryp-       adoption of PETs consider using this framework in their
    tion and pick from a list of servers. You can find a     studies.
    table online that ranks the servers in real time.” R).        What causes adopters to be emotionally invested in
–   Personal beliefs and a lack of alternatives:             VPNs? Their emotions, such as fear and worry about
    Most adopters failed to find reliable free VPNs that     online privacy, were usually induced by high-profile pri-
    would offer features similar to those in paid VPNs       vacy violations, such as the discovery of surveillance pro-
    (“No reliable free services were available.” R). More-   grams (e.g. Dragnet and other surveillance program of
    over, most of them believed that free VPNs were not      the United States governement, uncovered by Edward
    safe and thus decided to pay for a VPN service in-       Snowden, that provided concrete evidence that govern-
    stead. This would guarantee their privacy, since the     ments spy on the communications of their citizens [52]),
    VPN would not have to use their data to earn in-         and privacy-eroding legislative efforts (e.g. the Investi-
    come (“If you aren’t paying for the service, you are     gatory Powers Act 2016 [53] which comprehensively set
    the product” R).                                         out to expand the electronic surveillance powers of the
                                                             United Kingdom government, and the recent repeal of
                                                             US rules that would have required ISPs to seek permis-
                                                             sion from people to collect and share sensitive personal
5 Discussion                                                 information such as their internet browsing history [2]).
                                                                  On the other hand, abandoners do not have the
     To our best knowledge, our study is the first to ex-    same profound emotions to sustain a continous use of
plore from an end-user perspective the adoption and us-      VPNs as PETs. Instead, their adoption and usage of a
age of VPNs as PETs. Our findings showcase the distinct      VPN is largely driven by the need to accomplish a prac-
roles that privacy risk-related emotional (affective) and    tical online activity (e.g. by-passing geofilters, or down-
practical (cognitive) considerations play in the judg-       loading movies and music (this could be either “legal” or
ment and decision making process towards the adoption        “illegal” [54]), accessing web content, sites and services)
of VPNs.                                                     while avoiding consequences (e.g. receiving a copyright
     We did not find a pattern of over or underestima-       infringement notice from ISPs or being hacked). Once
tion about the overall workings and benefits of VPN          these practical needs no longer exist or alternatives are
usage as both adopters and abandoners appeared to            found (e.g. use of legal streaming services like Netflix to
have a good understanding (i.e., mental model) of how        watch movies or Spotify to listen to music), they tend
VPNs work. However, one abandoner had a faulty men-          to abandon the use of VPNs.
tal model as indicated by the false interchangeability of         In the section below, we reiterate the main take-
VPNs for other privacy protection tools (“I don’t need       aways of our study and derive design recommendations
a VPN anymore because now I use browser extensions           that can bolster the adoption and use of VPNs as PETs.
like Ghostery and AdBlockPlus.” R) — these two mech-
anisms are not interchange-able as they protect different
issues. This highlights the importance for researchers       5.1 Duration of VPN Use
and practitioners to always consider the fact that peo-
ple might at times have faulty mental models of VPNs              Our findings reveal that abandoners use VPNs for
(see Section 2.2).                                           a relatively short amount of time because once they
     Specifically, we find that adopters largely embarked    achieve their practical goal, they no longer have a strong
upon the usage of VPNs as PETs primarily based on            intrinsic motivation for the continued use of VPNs. As
You can also read