{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T18:09:32Z","timestamp":1774634972779,"version":"3.50.1"},"reference-count":59,"publisher":"Privacy Enhancing Technologies Symposium Advisory Board","issue":"1","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,1,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Virtual Private Networks (VPNs) can help people protect their privacy. Despite this, VPNs are not widely used among the public. In this survey study about the adoption and usage of VPNs, we investigate people\u2019s motivation to use VPNs and the barriers they encounter in adopting them. Using data from 90 technologically savvy participants, we find that while nearly all (98%; 88) of the participants have knowledge about what VPNs are, less than half (42%; 37) have ever used VPNs primarily as a privacy-enhancing technology. Of these, 18% (7) abandoned using VPNs while 81% (30) continue to use them to protect their privacy online. In a qualitative analysis of survey responses, we find that people who adopt and continue to use VPNs for privacy purposes are primarily motivated by <jats:italic>emotional<\/jats:italic> considerations, including the strong desire to protect their privacy online, wide fear of surveillance and data tracking not only from Internet service providers (ISPs) but also governments and Internet corporations such as Facebook and Google. In contrast, people who are mainly motivated by <jats:italic>practical<\/jats:italic> considerations are more likely to abandon VPNs, especially once their practical need no longer exists. These people cite their access to alternative technologies and the effort required to use a VPN as reasons for abandonment. We discuss implications of these findings and provide suggestions on how to maximize adoption of privacy-enhancing technologies such as VPNs, focusing on how to align them with people\u2019s interests and privacy risk evaluation.<\/jats:p>","DOI":"10.2478\/popets-2020-0006","type":"journal-article","created":{"date-parts":[[2020,1,8]],"date-time":"2020-01-08T09:30:36Z","timestamp":1578475836000},"page":"83-102","source":"Crossref","is-referenced-by-count":27,"title":["Emotional and Practical Considerations Towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing Technology"],"prefix":"10.56553","volume":"2020","author":[{"given":"Moses","family":"Namara","sequence":"first","affiliation":[{"name":"Clemson University"}]},{"given":"Daricia","family":"Wilkinson","sequence":"additional","affiliation":[{"name":"Clemson University"}]},{"given":"Kelly","family":"Caine","sequence":"additional","affiliation":[{"name":"Clemson University"}]},{"given":"Bart P.","family":"Knijnenburg","sequence":"additional","affiliation":[{"name":"Clemson University"}]}],"member":"35752","published-online":{"date-parts":[[2020,1,7]]},"reference":[{"key":"2022042923031331506_j_popets-2020-0006_ref_001_w2aab3b7c12b1b6b1ab1ab1Aa","doi-asserted-by":"crossref","unstructured":"[1] J. Penney, \u201cInternet surveillance, regulation, and chilling effects online: a comparative case study,\u201d 2017.10.14763\/2017.2.692","DOI":"10.14763\/2017.2.692"},{"key":"2022042923031331506_j_popets-2020-0006_ref_002_w2aab3b7c12b1b6b1ab1ab2Aa","doi-asserted-by":"crossref","unstructured":"[2] F. Schaub, \u201cThe implications of the fcc\u2019s net neutrality repeal,\u201d Media and Communication, vol. 6, no. 3, pp. 69\u201372, 2018.10.17645\/mac.v6i3.1560","DOI":"10.17645\/mac.v6i3.1560"},{"key":"2022042923031331506_j_popets-2020-0006_ref_003_w2aab3b7c12b1b6b1ab1ab3Aa","unstructured":"[3] J. Gillula, \u201cFive creepy things your isp could do if congress repeals the fcc\u2019s privacy protections,\u201d Mar 2017. [Online]. Available: https:\/\/www.eff.org\/deeplinks\/2017\/03\/five-creepy-things-your-isp-could-do-if-congress-repeals-fccs-privacy-protections"},{"key":"2022042923031331506_j_popets-2020-0006_ref_004_w2aab3b7c12b1b6b1ab1ab4Aa","unstructured":"[4] A. Kalia, \u201cHere\u2019s how to protect your privacy from your internet service provider,\u201d 3rd Apr 2017. [Online]. Available: https:\/\/www.eff.org\/deeplinks\/2017\/04\/heres-how-protect-your-privacy-your-internet-service-provider"},{"key":"2022042923031331506_j_popets-2020-0006_ref_005_w2aab3b7c12b1b6b1ab1ab5Aa","unstructured":"[5] P. Ferguson and G. Huston, \u201cWhat is a vpn?\u201d Tech. Rep., 1st June 1998. [Online]. Available: https:\/\/www.cisco.com\/c\/en\/us\/about\/press\/internet-protocol-journal\/back-issues\/table-contents-18\/what-is-a-vpn.html"},{"key":"2022042923031331506_j_popets-2020-0006_ref_006_w2aab3b7c12b1b6b1ab1ab6Aa","doi-asserted-by":"crossref","unstructured":"[6] M. T. Khan, J. DeBlasio, G. M. Voelker, A. C. Snoeren, C. Kanich, and N. Vallina-Rodriguez, \u201cAn empirical analysis of the commercial vpn ecosystem,\u201d in Proceedings of the Internet Measurement Conference 2018. ACM, 2018, pp. 443\u2013456.10.1145\/3278532.3278570","DOI":"10.1145\/3278532.3278570"},{"key":"2022042923031331506_j_popets-2020-0006_ref_007_w2aab3b7c12b1b6b1ab1ab7Aa","doi-asserted-by":"crossref","unstructured":"[7] A. Acquisti, L. Brandimarte, and G. Loewenstein, \u201cPrivacy and human behavior in the age of information,\u201d Science, vol. 347, no. 6221, pp. 509\u2013514, 2015.","DOI":"10.1126\/science.aaa1465"},{"key":"2022042923031331506_j_popets-2020-0006_ref_008_w2aab3b7c12b1b6b1ab1ab8Aa","unstructured":"[8] O. Valentine, \u201cVpn usage and trends around the world in 2018 - globalwebindex,\u201d 2nd Jul 2018. [Online]. Available: https:\/\/blog.globalwebindex.com\/chart-of-theday\/vpn-usage-2018\/"},{"key":"2022042923031331506_j_popets-2020-0006_ref_009_w2aab3b7c12b1b6b1ab1ab9Aa","unstructured":"[9] R. Marvin, \u201cBreaking down vpn usage around the world,\u201d 21st Sep 2018. [Online]. Available: https:\/\/www.pcmag.com\/news\/363869\/breaking-down-vpn-usage-around-the-world"},{"key":"2022042923031331506_j_popets-2020-0006_ref_010_w2aab3b7c12b1b6b1ab1ac10Aa","unstructured":"[10] A. Smith and A. Smith, \u201cWhat americans knows about cybersecurity,\u201d Tech. Rep., 22nd Mar 2017. [Online]. Available: http:\/\/www.pewinternet.org\/2017\/03\/22\/what-the-public-knows-about-cybersecurity\/"},{"key":"2022042923031331506_j_popets-2020-0006_ref_011_w2aab3b7c12b1b6b1ab1ac11Aa","doi-asserted-by":"crossref","unstructured":"[11] M. E. Johnson and N. Willey, \u201cUsability failures and healthcare data hemorrhages,\u201d IEEE Security & Privacy, vol. 9, no. 2, pp. 35\u201342, 2011.10.1109\/MSP.2010.196","DOI":"10.1109\/MSP.2010.196"},{"key":"2022042923031331506_j_popets-2020-0006_ref_012_w2aab3b7c12b1b6b1ab1ac12Aa","doi-asserted-by":"crossref","unstructured":"[12] J. J. Borking, \u201cWhy adopting privacy enhancing technologies (pets) takes so much time,\u201d in Computers, privacy and data protection: an element of choice. Springer, 2011, pp. 309\u2013341.10.1007\/978-94-007-0641-5_15","DOI":"10.1007\/978-94-007-0641-5_15"},{"key":"2022042923031331506_j_popets-2020-0006_ref_013_w2aab3b7c12b1b6b1ab1ac13Aa","doi-asserted-by":"crossref","unstructured":"[13] T. Caulfield, C. Ioannidis, and D. Pym, \u201cOn the adoption of privacy-enhancing technologies,\u201d in International Conference on Decision and Game Theory for Security. Springer, 2016, pp. 175\u2013194.10.1007\/978-3-319-47413-7_11","DOI":"10.1007\/978-3-319-47413-7_11"},{"key":"2022042923031331506_j_popets-2020-0006_ref_014_w2aab3b7c12b1b6b1ab1ac14Aa","unstructured":"[14] R. Knight, \u201cNational security or consumer privacy a question even siri couldn\u2019t answer,\u201d IPCLJ, vol. 1, pp. 1\u201311, 2016."},{"key":"2022042923031331506_j_popets-2020-0006_ref_015_w2aab3b7c12b1b6b1ab1ac15Aa","doi-asserted-by":"crossref","unstructured":"[15] R. W. Reeder, I. Ion, and S. Consolvo, \u201c152 simple steps to stay safe online: Security advice for non-tech-savvy users,\u201d IEEE Security Privacy, vol. 15, no. 5, pp. 55\u201364, 2017.10.1109\/MSP.2017.3681050","DOI":"10.1109\/MSP.2017.3681050"},{"key":"2022042923031331506_j_popets-2020-0006_ref_016_w2aab3b7c12b1b6b1ab1ac16Aa","doi-asserted-by":"crossref","unstructured":"[16] M. G. Maceli, \u201cEncouraging patron adoption of privacy-protection technologies:: Challenges for public libraries,\u201d IFLA Journal, vol. 44, no. 3, pp. 195\u2013202, 2018. [Online]. Available: https:\/\/doi.org\/10.1177\/034003521877378610.1177\/0340035218773786","DOI":"10.1177\/0340035218773786"},{"key":"2022042923031331506_j_popets-2020-0006_ref_017_w2aab3b7c12b1b6b1ab1ac17Aa","doi-asserted-by":"crossref","unstructured":"[17] M. D. Molina, A. Gambino, and S. S. Sundar, \u201cOnline privacy in public places: How do location, terms and conditions and vpn influence disclosure?\u201d in Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, ser. CHI EA \u201819. New York, NY, USA: ACM, 2019, pp. LBW2616:1\u2013LBW2616:6. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/3290607.331293210.1145\/3290607.3312932","DOI":"10.1145\/3290607.3312932"},{"key":"2022042923031331506_j_popets-2020-0006_ref_018_w2aab3b7c12b1b6b1ab1ac18Aa","doi-asserted-by":"crossref","unstructured":"[18] R. Venkateswaran, \u201cVirtual private networks,\u201d IEEE Potentials, vol. 20, no. 1, pp. 11\u201315, Feb 2001.10.1109\/45.913204","DOI":"10.1109\/45.913204"},{"key":"2022042923031331506_j_popets-2020-0006_ref_019_w2aab3b7c12b1b6b1ab1ac19Aa","doi-asserted-by":"crossref","unstructured":"[19] N. P. Hoang and D. Pishva, \u201cAnonymous communication and its importance in social networking,\u201d in 16th International Conference on Advanced Communication Technology. IEEE, 2014, pp. 34\u201339.10.1109\/ICACT.2014.6778917","DOI":"10.1109\/ICACT.2014.6778917"},{"key":"2022042923031331506_j_popets-2020-0006_ref_020_w2aab3b7c12b1b6b1ab1ac20Aa","doi-asserted-by":"crossref","unstructured":"[20] S. Englehardt and A. Narayanan, \u201cOnline tracking: A 1-million-site measurement and analysis,\u201d in Proceedings of the 2016 ACM SIGSAC conference on computer and communications security. ACM, 2016, pp. 1388\u20131401.10.1145\/2976749.2978313","DOI":"10.1145\/2976749.2978313"},{"key":"2022042923031331506_j_popets-2020-0006_ref_021_w2aab3b7c12b1b6b1ab1ac21Aa","unstructured":"[21] J. Nielsen, Designing Web Usability: The Practice of Simplicity. Thousand Oaks, CA, USA: New Riders Publishing, 1999."},{"key":"2022042923031331506_j_popets-2020-0006_ref_022_w2aab3b7c12b1b6b1ab1ac22Aa","unstructured":"[22] G. Norcie, K. Caine, and L. J. Camp, \u201cEliminating stop-points in the installation and use of anonymity systems: a usability evaluation of the tor browser bundle,\u201d in 5th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETS). Citeseer, 2012."},{"key":"2022042923031331506_j_popets-2020-0006_ref_023_w2aab3b7c12b1b6b1ab1ac23Aa","unstructured":"[23] A. Whitten and J. D. Tygar, \u201cWhy johnny can\u2019t encrypt: A usability evaluation of pgp 5.0.\u201d in USENIX Security Symposium, vol. 348, 1999."},{"key":"2022042923031331506_j_popets-2020-0006_ref_024_w2aab3b7c12b1b6b1ab1ac24Aa","doi-asserted-by":"crossref","unstructured":"[24] R. Abu-Salma, M. A. Sasse, J. Bonneau, A. Danilova, A. Naiakshina, and M. Smith, \u201cObstacles to the adoption of secure communication tools,\u201d in 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 2017, pp. 137\u2013153.10.1109\/SP.2017.65","DOI":"10.1109\/SP.2017.65"},{"key":"2022042923031331506_j_popets-2020-0006_ref_025_w2aab3b7c12b1b6b1ab1ac25Aa","doi-asserted-by":"crossref","unstructured":"[25] A. Alshalan, S. Pisharody, and D. Huang, \u201cA survey of mobile vpn technologies,\u201d IEEE Communications Surveys & Tutorials, vol. 18, no. 2, pp. 1177\u20131196, 2016.","DOI":"10.1109\/COMST.2015.2496624"},{"key":"2022042923031331506_j_popets-2020-0006_ref_026_w2aab3b7c12b1b6b1ab1ac26Aa","unstructured":"[26] H. Hamed, E. Al-Shaer, and W. Marrero, \u201cModeling and verification of ipsec and vpn security policies,\u201d in 13th IEEE International Conference on Network Protocols (ICNP\u201905). IEEE, 2005, pp. 1\u201310."},{"key":"2022042923031331506_j_popets-2020-0006_ref_027_w2aab3b7c12b1b6b1ab1ac27Aa","doi-asserted-by":"crossref","unstructured":"[27] W. Quesenbery, \u201cThe five dimensions of usability,\u201d in Content and complexity. Routledge, 2014, pp. 93\u2013114.10.4324\/9781410607409-11","DOI":"10.4324\/9781410607409-11"},{"key":"2022042923031331506_j_popets-2020-0006_ref_028_w2aab3b7c12b1b6b1ab1ac28Aa","doi-asserted-by":"crossref","unstructured":"[28] P. Lew, L. Olsina, and L. Zhang, \u201cQuality, quality in use, actual usability and user experience as key drivers for web application evaluation,\u201d in International Conference on Web Engineering. Springer, 2010, pp. 218\u2013232.10.1007\/978-3-642-13911-6_15","DOI":"10.1007\/978-3-642-13911-6_15"},{"key":"2022042923031331506_j_popets-2020-0006_ref_029_w2aab3b7c12b1b6b1ab1ac29Aa","unstructured":"[29] F. D. Davis, \u201cA technology acceptance model for empirically testing new end-user information systems: Theory and results,\u201d Ph.D. dissertation, Massachusetts Institute of Technology, 1985."},{"key":"2022042923031331506_j_popets-2020-0006_ref_030_w2aab3b7c12b1b6b1ab1ac30Aa","doi-asserted-by":"crossref","unstructured":"[30] L. R. Vijayasarathy, \u201cPredicting consumer intentions to use on-line shopping: the case for an augmented technology acceptance model,\u201d Information & management, vol. 41, no. 6, pp. 747\u2013762, 2004.10.1016\/j.im.2003.08.011","DOI":"10.1016\/j.im.2003.08.011"},{"key":"2022042923031331506_j_popets-2020-0006_ref_031_w2aab3b7c12b1b6b1ab1ac31Aa","doi-asserted-by":"crossref","unstructured":"[31] P. J. Hu, P. Y. Chau, O. R. L. Sheng, and K. Y. Tam, \u201cExamining the technology acceptance model using physician acceptance of telemedicine technology,\u201d Journal of management information systems, vol. 16, no. 2, pp. 91\u2013112, 1999.10.1080\/07421222.1999.11518247","DOI":"10.1080\/07421222.1999.11518247"},{"key":"2022042923031331506_j_popets-2020-0006_ref_032_w2aab3b7c12b1b6b1ab1ac32Aa","unstructured":"[32] C. M. Jones, R. V. McCarthy, L. Halawi, and B. Mujtaba, \u201cUtilizing the technology acceptance model to assess the employee adoption of information systems security measures,\u201d Issues in Information Systems, vol. 11, no. 1, pp. 9\u201316, 2010."},{"key":"2022042923031331506_j_popets-2020-0006_ref_033_w2aab3b7c12b1b6b1ab1ac33Aa","doi-asserted-by":"crossref","unstructured":"[33] G. F. Loewenstein, E. U. Weber, C. K. Hsee, and N. Welch, \u201cRisk as feelings.\u201d Psychological bulletin, vol. 127, no. 2, pp. 267\u2013286, 2001.10.1037\/0033-2909.127.2.26711316014","DOI":"10.1037\/0033-2909.127.2.267"},{"key":"2022042923031331506_j_popets-2020-0006_ref_034_w2aab3b7c12b1b6b1ab1ac34Aa","doi-asserted-by":"crossref","unstructured":"[34] R. P. Bagozzi, \u201cThe legacy of the technology acceptance model and a proposal for a paradigm shift.\u201d Journal of the association for information systems, vol. 8, no. 4, pp. 243\u2013254, 2007.10.17705\/1jais.00122","DOI":"10.17705\/1jais.00122"},{"key":"2022042923031331506_j_popets-2020-0006_ref_035_w2aab3b7c12b1b6b1ab1ac35Aa","unstructured":"[35] P. J. Schoemaker, \u201cThe expected utility model: Its variants, purposes, evidence and limitations,\u201d Journal of economic literature, pp. 529\u2013563, 1982."},{"key":"2022042923031331506_j_popets-2020-0006_ref_036_w2aab3b7c12b1b6b1ab1ac36Aa","doi-asserted-by":"crossref","unstructured":"[36] R. S. Laufer and M. Wolfe, \u201cPrivacy as a concept and a social issue: A multidimensional developmental theory,\u201d Journal of social Issues, vol. 33, no. 3, pp. 22\u201342, 1977.10.1111\/j.1540-4560.1977.tb01880.x","DOI":"10.1111\/j.1540-4560.1977.tb01880.x"},{"key":"2022042923031331506_j_popets-2020-0006_ref_037_w2aab3b7c12b1b6b1ab1ac37Aa","doi-asserted-by":"crossref","unstructured":"[37] R. L. Thompson, C. A. Higgins, and J. M. Howell, \u201cPersonal computing: toward a conceptual model of utilization,\u201d MIS quarterly, pp. 125\u2013143, 1991.10.2307\/249443","DOI":"10.2307\/249443"},{"key":"2022042923031331506_j_popets-2020-0006_ref_038_w2aab3b7c12b1b6b1ab1ac38Aa","unstructured":"[38] H. C. Triandis, \u201cValues, attitudes, and interpersonal behavior.\u201d in Nebraska symposium on motivation. University of Nebraska Press, 1979."},{"key":"2022042923031331506_j_popets-2020-0006_ref_039_w2aab3b7c12b1b6b1ab1ac39Aa","doi-asserted-by":"crossref","unstructured":"[39] J. Colnago, S. Devlin, M. Oates, C. Swoopes, L. Bauer, L. Cranor, and N. Christin, \u201c\u201cit\u2019s not actually that horrible\u201d: Exploring adoption of two-factor authentication at a university,\u201d in Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, ser. CHI \u201818. New York, NY, USA: ACM, 2018, pp. 456:1\u2013456:11. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/3173574.317403010.1145\/3173574.3174030","DOI":"10.1145\/3173574.3174030"},{"key":"2022042923031331506_j_popets-2020-0006_ref_040_w2aab3b7c12b1b6b1ab1ac40Aa","doi-asserted-by":"crossref","unstructured":"[40] M. Tavakol and R. Dennick, \u201cMaking sense of cronbach\u2019s alpha,\u201d International journal of medical education, vol. 2, pp. 53\u201355, 2011.10.5116\/ijme.4dfb.8dfd420551128029643","DOI":"10.5116\/ijme.4dfb.8dfd"},{"key":"2022042923031331506_j_popets-2020-0006_ref_041_w2aab3b7c12b1b6b1ab1ac41Aa","doi-asserted-by":"crossref","unstructured":"[41] H. Cho, B. Knijnenburg, A. Kobsa, and Y. Li, \u201cCollective privacy management in social media: A cross-cultural validation,\u201d ACM Transactions on Computer-Human Interaction (TOCHI), vol. 25, no. 3, pp. 17\u201335, 2018.10.1145\/3193120","DOI":"10.1145\/3193120"},{"key":"2022042923031331506_j_popets-2020-0006_ref_042_w2aab3b7c12b1b6b1ab1ac42Aa","doi-asserted-by":"crossref","unstructured":"[42] M. Namara, D. Wilkinson, B. M. Lowens, B. P. Knijnenburg, R. Orji, and R. L. Sekou, \u201cCross-cultural perspectives on ehealth privacy in africa,\u201d in Proceedings of the Second African Conference for Human Computer Interaction: Thriving Communities, ser. AfriCHI \u201818. New York, NY, USA: ACM, 2018, pp. 7:1\u20137:11. [Online]. Available: http:\/\/doi.acm.org\/10.1145\/3283458.328347210.1145\/3283458.3283472","DOI":"10.1145\/3283458.3283472"},{"key":"2022042923031331506_j_popets-2020-0006_ref_043_w2aab3b7c12b1b6b1ab1ac43Aa","unstructured":"[43] J. S. Dumas, J. S. Dumas, and J. Redish, A practical guide to usability testing. Intellect books, 1999."},{"key":"2022042923031331506_j_popets-2020-0006_ref_044_w2aab3b7c12b1b6b1ab1ac44Aa","unstructured":"[44] K. Baxter, C. Courage, and K. Caine, Understanding your users: a practical guide to user research methods. Morgan Kaufmann, 2015."},{"key":"2022042923031331506_j_popets-2020-0006_ref_045_w2aab3b7c12b1b6b1ab1ac45Aa","unstructured":"[45] E. M. Redmiles, Y. Acar, S. Fahl, and M. L. Mazurek, \u201cA summary of survey methodology best practices for security and privacy researchers,\u201d Tech. Rep., 2017."},{"key":"2022042923031331506_j_popets-2020-0006_ref_046_w2aab3b7c12b1b6b1ab1ac46Aa","unstructured":"[46] \u201cQualtrics: The leading research & experience software.\u201d [Online]. Available: https:\/\/www.qualtrics.com\/"},{"key":"2022042923031331506_j_popets-2020-0006_ref_047_w2aab3b7c12b1b6b1ab1ac47Aa","unstructured":"[47] S. E. McGregor, E. A. Watkins, M. N. Al-Ameen, K. Caine, and F. Roesner, \u201cWhen the weakest link is strong: Secure collaboration in the case of the panama papers,\u201d in 26th {USENIX} Security Symposiumy (2017), 2017, pp. 505\u2013522."},{"key":"2022042923031331506_j_popets-2020-0006_ref_048_w2aab3b7c12b1b6b1ab1ac48Aa","unstructured":"[48] M. B. Miles, A. M. Huberman, and J. Saldana, Qualitative data analysis: A methods sourcebook. Sage, 2014."},{"key":"2022042923031331506_j_popets-2020-0006_ref_049_w2aab3b7c12b1b6b1ab1ac49Aa","doi-asserted-by":"crossref","unstructured":"[49] M. Vaismoradi, H. Turunen, and T. Bondas, \u201cContent analysis and thematic analysis: Implications for conducting a qualitative descriptive study,\u201d Nursing & health sciences, vol. 15, no. 3, pp. 398\u2013405, 2013.10.1111\/nhs.1204823480423","DOI":"10.1111\/nhs.12048"},{"key":"2022042923031331506_j_popets-2020-0006_ref_050_w2aab3b7c12b1b6b1ab1ac50Aa","doi-asserted-by":"crossref","unstructured":"[50] J. Cohen, \u201cA coefficient of agreement for nominal scales,\u201d Educational and psychological measurement, vol. 20, no. 1, pp. 37\u201346, 1960.10.1177\/001316446002000104","DOI":"10.1177\/001316446002000104"},{"key":"2022042923031331506_j_popets-2020-0006_ref_051_w2aab3b7c12b1b6b1ab1ac51Aa","doi-asserted-by":"crossref","unstructured":"[51] M. L. McHugh, \u201cInterrater reliability: the kappa statistic,\u201d Biochemia medica: Biochemia medica, vol. 22, no. 3, pp. 276\u2013282, 2012.10.11613\/BM.2012.031","DOI":"10.11613\/BM.2012.031"},{"key":"2022042923031331506_j_popets-2020-0006_ref_052_w2aab3b7c12b1b6b1ab1ac52Aa","doi-asserted-by":"crossref","unstructured":"[52] Z. Bauman, D. Bigo, P. Esteves, E. Guild, V. Jabri, D. Lyon, and R. Walker, \u201cAfter snowden: Rethinking the impact of surveillance,\u201d International Political Sociology, vol. 8, no. 2, pp. 121\u2013144, 2014.10.1111\/ips.12048","DOI":"10.1111\/ips.12048"},{"key":"2022042923031331506_j_popets-2020-0006_ref_053_w2aab3b7c12b1b6b1ab1ac53Aa","unstructured":"[53] I. P. Act, \u201cParliament uk. retrieved 12 january 2017,\u201d 2016."},{"key":"2022042923031331506_j_popets-2020-0006_ref_054_w2aab3b7c12b1b6b1ab1ac54Aa","unstructured":"[54] D. Lee, \u201c\u2018netflix for piracy\u2019popcorn time saved by fans,\u201d BBC News\u2013Technology, vol. 17, 2014."},{"key":"2022042923031331506_j_popets-2020-0006_ref_055_w2aab3b7c12b1b6b1ab1ac55Aa","doi-asserted-by":"crossref","unstructured":"[55] N. Manworren, J. Letwat, and O. Daily, \u201cWhy you should care about the target data breach,\u201d Business Horizons, vol. 59, no. 3, pp. 257\u2013266, 2016.10.1016\/j.bushor.2016.01.002","DOI":"10.1016\/j.bushor.2016.01.002"},{"key":"2022042923031331506_j_popets-2020-0006_ref_056_w2aab3b7c12b1b6b1ab1ac56Aa","doi-asserted-by":"crossref","unstructured":"[56] T. Sharp, \u201cTheorizing cyber coercion: The 2014 north korean operation against sony,\u201d Journal of Strategic Studies, vol. 40, no. 7, pp. 898\u2013926, 2017.10.1080\/01402390.2017.1307741","DOI":"10.1080\/01402390.2017.1307741"},{"key":"2022042923031331506_j_popets-2020-0006_ref_057_w2aab3b7c12b1b6b1ab1ac57Aa","unstructured":"[57] C. Fennell and R. Wash, \u201cDo stories help people adopt two-factor authentication?\u201d Studies, vol. 1, no. 2, p. 3."},{"key":"2022042923031331506_j_popets-2020-0006_ref_058_w2aab3b7c12b1b6b1ab1ac58Aa","unstructured":"[58] A. M. McDonald and L. F. Cranor, \u201cThe cost of reading privacy policies,\u201d Isjlp, vol. 4, p. 543, 2008."},{"key":"2022042923031331506_j_popets-2020-0006_ref_059_w2aab3b7c12b1b6b1ab1ac59Aa","doi-asserted-by":"crossref","unstructured":"[59] R. Tourangeau and T. Yan, \u201cSensitive questions in surveys.\u201d Psychological bulletin, vol. 133, no. 5, pp. 859\u2013883, 2007.10.1037\/0033-2909.133.5.85917723033","DOI":"10.1037\/0033-2909.133.5.859"}],"container-title":["Proceedings on Privacy Enhancing Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/content.sciendo.com\/view\/journals\/popets\/2020\/1\/article-p83.xml","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.sciendo.com\/pdf\/10.2478\/popets-2020-0006","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T16:30:44Z","timestamp":1658334644000},"score":1,"resource":{"primary":{"URL":"https:\/\/petsymposium.org\/popets\/2020\/popets-2020-0006.php"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,1]]},"references-count":59,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2020,1,7]]},"published-print":{"date-parts":[[2020,1,1]]}},"alternative-id":["10.2478\/popets-2020-0006"],"URL":"https:\/\/doi.org\/10.2478\/popets-2020-0006","relation":{},"ISSN":["2299-0984"],"issn-type":[{"value":"2299-0984","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,1,1]]}}}