{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,10]],"date-time":"2026-01-10T02:50:59Z","timestamp":1768013459727,"version":"3.49.0"},"reference-count":83,"publisher":"Privacy Enhancing Technologies Symposium Advisory Board","issue":"2","license":[{"start":{"date-parts":[[2022,3,3]],"date-time":"2022-03-03T00:00:00Z","timestamp":1646265600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/3.0"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,1]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>Browsing privacy tools can help people protect their digital privacy. However, tools which provide the strongest protections\u2014such as Tor Browser\u2014have struggled to achieve widespread adoption. This may be due to usability challenges, misconceptions, behavioral biases, or mere lack of awareness. In this study, we test the effectiveness of nudging interventions that encourage the adoption of Tor Browser. First, we test an informational nudge based on <jats:italic>protection motivation theory<\/jats:italic> (PMT), designed to raise awareness of Tor Browser and help participants form accurate perceptions of it. Next, we add an <jats:italic>action planning<\/jats:italic> implementation intention, designed to help participants identify opportunities for using Tor Browser. Finally, we add a <jats:italic>coping planning<\/jats:italic> implementation intention, designed to help participants overcome challenges to using Tor Browser, such as extreme website slowness. We test these nudges in a longitudinal field experiment with 537 participants. We find that our PMT-based intervention increased use of Tor Browser in both the short- and long-term. Our coping planning nudge also increased use of Tor Browser, but only in the week following our intervention. We did not find statistically significant evidence of our action planning nudge increasing use of Tor Browser. Our study contributes to a greater understanding of factors influencing the adoption of Tor Browser, and how nudges might be used to encourage the adoption of Tor Browser and similar privacy enhancing technologies.<\/jats:p>","DOI":"10.2478\/popets-2022-0040","type":"journal-article","created":{"date-parts":[[2022,3,5]],"date-time":"2022-03-05T04:35:23Z","timestamp":1646454923000},"page":"152-183","source":"Crossref","is-referenced-by-count":16,"title":["Increasing Adoption of Tor Browser Using Informational and Planning Nudges"],"prefix":"10.56553","volume":"2022","author":[{"given":"Peter","family":"Story","sequence":"first","affiliation":[{"name":"Department of Computer Science , Clark University"}]},{"given":"Daniel","family":"Smullen","sequence":"additional","affiliation":[{"name":"School of Computer Science , Carnegie Mellon University"}]},{"given":"Rex","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Computer Science , Carnegie Mellon University"}]},{"given":"Yaxing","family":"Yao","sequence":"additional","affiliation":[{"name":"Department of Information Systems , University of Maryland, Baltimore County"}]},{"given":"Alessandro","family":"Acquisti","sequence":"additional","affiliation":[{"name":"Heinz College of Information Systems and Public Policy , Carnegie Mellon University"}]},{"given":"Lorrie Faith","family":"Cranor","sequence":"additional","affiliation":[{"name":"School of Computer Science , Carnegie Mellon University"}]},{"given":"Norman","family":"Sadeh","sequence":"additional","affiliation":[{"name":"School of Computer Science , Carnegie Mellon University"}]},{"given":"Florian","family":"Schaub","sequence":"additional","affiliation":[{"name":"School of Information , University of Michigan"}]}],"member":"35752","published-online":{"date-parts":[[2022,3,3]]},"reference":[{"key":"2022060207213607394_j_popets-2022-0040_ref_001","doi-asserted-by":"crossref","unstructured":"[1] Henk Aarts, Ap Dijksterhuis, and Cees Midden. To plan or not to plan? Goal achievement or interrupting the performance of mundane behaviors. European Journal of Social Psychology, 29(8):971\u2013979, 1999.10.1002\/(SICI)1099-0992(199912)29:8<971::AID-EJSP963>3.0.CO;2-A","DOI":"10.1002\/(SICI)1099-0992(199912)29:8<971::AID-EJSP963>3.0.CO;2-A"},{"key":"2022060207213607394_j_popets-2022-0040_ref_002","doi-asserted-by":"crossref","unstructured":"[2] Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. Privacy and human behavior in the age of information. Science, 347(6221):509\u2013514, 2015.10.1126\/science.aaa1465","DOI":"10.1126\/science.aaa1465"},{"key":"2022060207213607394_j_popets-2022-0040_ref_003","doi-asserted-by":"crossref","unstructured":"[3] Alessandro Acquisti, Laura Brandimarte, and George Loewenstein. Secrets and likes: The drive for privacy and the difficulty of achieving it in the digital age. Journal of Consumer Psychology, 30(4):736\u2013758, 2020.","DOI":"10.1002\/jcpy.1191"},{"key":"2022060207213607394_j_popets-2022-0040_ref_004","doi-asserted-by":"crossref","unstructured":"[4] Alessandro Acquisti, Manya Sleeper, Yang Wang, Shomir Wilson, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, and Florian Schaub. Nudges for Privacy and Security. ACM Computing Surveys, 50(3):1\u201341, August 2017.10.1145\/3054926","DOI":"10.1145\/3054926"},{"key":"2022060207213607394_j_popets-2022-0040_ref_005","unstructured":"[5] Elham Al Qahtani, Mohamed Shehab, and Abrar Aljohani. The Effectiveness of Fear Appeals in Increasing Smartphone Locking Behavior among Saudi Arabians. SOUPS @ USENIX Security Symposium, 2018."},{"key":"2022060207213607394_j_popets-2022-0040_ref_006","unstructured":"[6] Yusuf Albayram, Mohammad Maifi Hasan Khan, Theodore Jensen, and Nhan Nguyen. \u201c...better to use a lock screen than to worry about saving a few seconds of time\u201d - Effect of Fear Appeal in the Context of Smartphone Locking Behavior. Symposium on Usable Privacy and Security, 2017."},{"key":"2022060207213607394_j_popets-2022-0040_ref_007","unstructured":"[7] Hazim Almuhimedi. Helping Smartphone Users Manage their Privacy through Nudges. Technical Report CMU-ISR-17-111, December 2017."},{"key":"2022060207213607394_j_popets-2022-0040_ref_008","doi-asserted-by":"crossref","unstructured":"[8] Hazim Almuhimedi, Florian Schaub, Norman Sadeh, Idris Adjerid, Alessandro Acquisti, Joshua Gluck, Lorrie Cranor, and Yuvraj Agarwal. Your location has been shared 5,398 times!: A field study on mobile app privacy nudging. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015.10.1145\/2702123.2702210","DOI":"10.1145\/2702123.2702210"},{"key":"2022060207213607394_j_popets-2022-0040_ref_009","doi-asserted-by":"crossref","unstructured":"[9] Mashael Alsabah and Ian Goldberg. Performance and Security Improvements for Tor: A Survey. ACM Computing Surveys, 49(2):1\u201336, November 2016. https:\/\/dl.acm.org\/doi\/10.1145\/2946802.10.1145\/2946802","DOI":"10.1145\/2946802"},{"key":"2022060207213607394_j_popets-2022-0040_ref_010","unstructured":"[10] arma. Bittorrent over Tor isn\u2019t a good idea, April 2010. https:\/\/blog.torproject.org\/bittorrent-over-tor-isnt-good-idea."},{"key":"2022060207213607394_j_popets-2022-0040_ref_011","unstructured":"[11] Brooke Auxier, Lee Rainie, Monica Anderson, Andrew Perrin, Madhu Kumar, and Erica Turner. Americans and Privacy: Concerned, Confused and Feeling Lack of Control Over Their Personal Information: Pew Research Center. November 2019."},{"key":"2022060207213607394_j_popets-2022-0040_ref_012","doi-asserted-by":"crossref","unstructured":"[12] Ariane B\u00e9langer-Gravel, Gaston Godin, and Steve Amireault. A meta-analytic review of the effect of implementation intentions on physical activity. Health Psychology Review, 7(1):23\u201354, March 2013.10.1080\/17437199.2011.560095","DOI":"10.1080\/17437199.2011.560095"},{"key":"2022060207213607394_j_popets-2022-0040_ref_013","doi-asserted-by":"crossref","unstructured":"[13] Veronika Brandst\u00e4tter, Angelika Lengfelder, and Peter M Gollwitzer. Implementation Intentions and Efficient Action Initiation. Journal of personality and social psychology, 81(5):946, 2001.10.1037\/0022-3514.81.5.946","DOI":"10.1037\/0022-3514.81.5.946"},{"key":"2022060207213607394_j_popets-2022-0040_ref_014","doi-asserted-by":"crossref","unstructured":"[14] Virginia Braun and Victoria Clarke. Using thematic analysis in psychology. Qualitative Research in Psychology, 3(2):77\u2013101, January 2006.10.1191\/1478088706qp063oa","DOI":"10.1191\/1478088706qp063oa"},{"key":"2022060207213607394_j_popets-2022-0040_ref_015","doi-asserted-by":"crossref","unstructured":"[15] Yinzhi Cao, Song Li, and Erik Wijmans. (Cross-)Browser Fingerprinting via OS and Hardware Level Features. Network and Distributed System Security Symposium, March 2017.10.14722\/ndss.2017.23152","DOI":"10.14722\/ndss.2017.23152"},{"key":"2022060207213607394_j_popets-2022-0040_ref_016","unstructured":"[16] Cloudflare. Understanding Cloudflare Tor support and Onion Routing, February 2021. https:\/\/support.cloudflare.com\/hc\/en-us\/articles\/203306930-Understanding-Cloudflare-Tor-support-and-Onion-Routing."},{"key":"2022060207213607394_j_popets-2022-0040_ref_017","unstructured":"[17] Roger Dingledine and Steven J Murdoch. Performance Improvements on Tor or, Why Tor is slow and what we\u2019re going to do about it. Technical report, March 2009. https:\/\/svn-archive.torproject.org\/svn\/projects\/roadmaps\/2009-03-11-performance.pdf."},{"key":"2022060207213607394_j_popets-2022-0040_ref_018","doi-asserted-by":"crossref","unstructured":"[18] P. Dolan, M. Hallsworth, D. Halpern, D. King, R. Metcalfe, and I. Vlaev. Influencing behaviour: The mindspace way. Journal of Economic Psychology, 33(1):264\u2013277, February 2012. https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167487011001668.10.1016\/j.joep.2011.10.009","DOI":"10.1016\/j.joep.2011.10.009"},{"key":"2022060207213607394_j_popets-2022-0040_ref_019","unstructured":"[19] DuckDuckGo. A Study on Private Browsing: Consumer Usage, Knowledge, and Thoughts. Whitepaper, January 2017."},{"key":"2022060207213607394_j_popets-2022-0040_ref_020","unstructured":"[20] Jim Finkle. Web tools help protect human rights activists. Reuters, August 2009. https:\/\/www.reuters.com\/article\/us-column-pluggedin-idUSTRE57I4IE20090819."},{"key":"2022060207213607394_j_popets-2022-0040_ref_021","doi-asserted-by":"crossref","unstructured":"[21] Kevin Gallagher, Sameer Patil, Brendan Dolan-Gavitt, Damon McCoy, and Nasir Memon. Peeling the Onion\u2019s User Experience Layer. ACM SIGSAC Conference on Computer and Communications Security (CCS \u201918), October 2018.10.1145\/3243734.3243803","DOI":"10.1145\/3243734.3243803"},{"key":"2022060207213607394_j_popets-2022-0040_ref_022","unstructured":"[22] Kevin Gallagher, Sameer Patil, and Nasir D. Memon. New Me - Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network. Symposium on Usable Privacy and Security, 2017."},{"key":"2022060207213607394_j_popets-2022-0040_ref_023","doi-asserted-by":"crossref","unstructured":"[23] Nina Gerber, Paul Gerber, and Melanie Volkamer. Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. Computers & Security, 77:226\u2013261, August 2018. https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167404818303031.10.1016\/j.cose.2018.04.002","DOI":"10.1016\/j.cose.2018.04.002"},{"key":"2022060207213607394_j_popets-2022-0040_ref_024","doi-asserted-by":"crossref","unstructured":"[24] Peter M. Gollwitzer. Implementation intentions: Strong effects of simple plans. American Psychologist, 54(7), 1999.10.1037\/0003-066X.54.7.493","DOI":"10.1037\/0003-066X.54.7.493"},{"key":"2022060207213607394_j_popets-2022-0040_ref_025","unstructured":"[25] Dan Goodin. Majority of Android VPNs can\u2019t be trusted to make users more secure | Ars Technica, January 2017. https:\/\/arstechnica.com\/information-technology\/2017\/01\/majority-of-android-vpns-cant-be-trusted-to-make-users-more-secure\/."},{"key":"2022060207213607394_j_popets-2022-0040_ref_026","unstructured":"[26] Google. Requests for User Information FAQs - Transparency Report Help Center, 2021. https:\/\/support.google.com\/transparencyreport\/answer\/9713961?hl=en."},{"key":"2022060207213607394_j_popets-2022-0040_ref_027","unstructured":"[27] Glenn Greenwald and Ewen MacAskill. NSA Prism program taps in to user data of Apple, Google and others. The Guardian, June 2013. https:\/\/www.theguardian.com\/world\/2013\/jun\/06\/us-tech-giants-nsa-data."},{"key":"2022060207213607394_j_popets-2022-0040_ref_028","unstructured":"[28] Ilya Grigorik. Networking 101: Transport Layer Security (TLS). In High Performance Browser Networking. O\u2019Reilly Media, Inc., 2013. https:\/\/hpbn.co\/transport-layer-security-tls\/."},{"key":"2022060207213607394_j_popets-2022-0040_ref_029","unstructured":"[29] Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, and Lorrie Faith Cranor. Away From Prying Eyes - Analyzing Usage and Understanding of Private Browsing. SOUPS @ USENIX Security Symposium, 2018."},{"key":"2022060207213607394_j_popets-2022-0040_ref_030","doi-asserted-by":"crossref","unstructured":"[30] Cormac Herley. So long, and no thanks for the externalities - the rational rejection of security advice by users. NSPW, pages 133\u2013144, 2009.10.1145\/1719030.1719050","DOI":"10.1145\/1719030.1719050"},{"key":"2022060207213607394_j_popets-2022-0040_ref_031","unstructured":"[31] Rae Hodge. Why you should be skeptical about a VPN\u2019s nologs claims, July 2020. https:\/\/www.cnet.com\/news\/why-you-should-be-skeptical-about-a-vpns-no-logs-claims\/."},{"key":"2022060207213607394_j_popets-2022-0040_ref_032","doi-asserted-by":"crossref","unstructured":"[32] Angelika Lengfelder and Peter M Gollwitzer. Reflective and Reflexive Action Control in Patients With Frontal Brain Lesions. Neuropsychology, 15(1):80, 2001.10.1037\/0894-4105.15.1.80","DOI":"10.1037\/0894-4105.15.1.80"},{"key":"2022060207213607394_j_popets-2022-0040_ref_033","unstructured":"[33] Johanna Catherine Maclean, John Buckell, and Joachim Marti. Information Source and Cigarettes: Experimental Evidence on the Messenger Effect. Technical Report w25632, National Bureau of Economic Research, Cambridge, MA, March 2019. http:\/\/www.nber.org\/papers\/w25632.pdf."},{"key":"2022060207213607394_j_popets-2022-0040_ref_034","unstructured":"[34] Mary Madden and L. Rainie. Americans\u2019 Attitudes about Privacy, Security and Surveillance. Pew Research Center, May 2015."},{"key":"2022060207213607394_j_popets-2022-0040_ref_035","doi-asserted-by":"crossref","unstructured":"[35] James E Maddux and Ronald W Rogers. Protection motivation and self-efficacy: A revised theory of fear appeals and attitude change. Journal of experimental social psychology, 19(5):469\u2013479, 1983.","DOI":"10.1016\/0022-1031(83)90023-9"},{"key":"2022060207213607394_j_popets-2022-0040_ref_036","unstructured":"[36] Salvatore S. Mangiafico. Kruskal\u2013wallis test, Feb 2020. https:\/\/rcompanion.org\/handbook\/F_08.html."},{"key":"2022060207213607394_j_popets-2022-0040_ref_037","doi-asserted-by":"crossref","unstructured":"[37] Akshaya Mani, T. Wilson-Brown, Rob Jansen, Aaron Johnson, and Micah Sherr. Understanding Tor Usage with Privacy-Preserving Measurement. In Proceedings of the Internet Measurement Conference, pages 175\u2013187, Boston MA USA, October 2018. ACM. https:\/\/dl.acm.org\/doi\/10.1145\/3278532.3278549.10.1145\/3278532.3278549","DOI":"10.1145\/3278532.3278549"},{"key":"2022060207213607394_j_popets-2022-0040_ref_038","unstructured":"[38] Jonathan R. Mayer and John C. Mitchell. Third-Party Web Tracking: Policy and Technology. IEEE Symposium on Security and Privacy, 2012."},{"key":"2022060207213607394_j_popets-2022-0040_ref_039","doi-asserted-by":"crossref","unstructured":"[39] Georg Merzdovnik, Markus Huber, Damjan Buhov, Nick Nikiforakis, Sebastian Neuner, Martin Schmiedecker, and Edgar Weippl. Block Me If You Can: A Large-Scale Study of Tracker-Blocking Tools. IEEE European Symposium on Security and Privacy (EuroS&P), March 2017.10.1109\/EuroSP.2017.26","DOI":"10.1109\/EuroSP.2017.26"},{"key":"2022060207213607394_j_popets-2022-0040_ref_040","unstructured":"[40] Chance Miller. iOS 13 cracks down on location permission settings, June 2019. https:\/\/9to5mac.com\/2019\/06\/08\/ios-13-location-permissions\/."},{"key":"2022060207213607394_j_popets-2022-0040_ref_041","doi-asserted-by":"crossref","unstructured":"[41] Sarah Milne, Sheina Orbell, and Paschal Sheeran. Combining motivational and volitional interventions to promote exercise participation: Protection motivation theory and implementation intentions. British Journal of Health Psychology, 7(2):163\u2013184, May 2002.10.1348\/13591070216942014596707","DOI":"10.1348\/135910702169420"},{"key":"2022060207213607394_j_popets-2022-0040_ref_042","doi-asserted-by":"crossref","unstructured":"[42] Sarah Milne, Paschal Sheeran, and Sheina Orbell. Prediction and Intervention in Health-Related Behavior: A Meta-Analytic Review of Protection Motivation Theory. Journal of Applied Social Psychology, 30(1):106\u2013143, January 2000.10.1111\/j.1559-1816.2000.tb02308.x","DOI":"10.1111\/j.1559-1816.2000.tb02308.x"},{"key":"2022060207213607394_j_popets-2022-0040_ref_043","unstructured":"[43] Chris Morran. House Votes To Allow Internet Service Providers To Sell, Share Your Personal Information, March 2017. https:\/\/www.consumerreports.org\/consumerist\/house-votes-to-allow-internet-service-providers-to-sell-share-your-personal-information\/."},{"key":"2022060207213607394_j_popets-2022-0040_ref_044","doi-asserted-by":"crossref","unstructured":"[44] Greg Norcie, Jim Blythe, Kelly Caine, and L. Jean Camp. Why Johnny Can\u2019t Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems. Workshop on Usable Security, February 2014.10.14722\/usec.2014.23022","DOI":"10.14722\/usec.2014.23022"},{"key":"2022060207213607394_j_popets-2022-0040_ref_045","doi-asserted-by":"crossref","unstructured":"[45] Gabriele Oettingen and Gaby Ho. Effective self-regulation of goal attainment. International journal of educational research, pages 705\u2013732, 2000.10.1016\/S0883-0355(00)00046-X","DOI":"10.1016\/S0883-0355(00)00046-X"},{"key":"2022060207213607394_j_popets-2022-0040_ref_046","unstructured":"[46] Office of the Privacy Commissioner of Canada. What an IP Address Can Reveal About You, May 2013. https:\/\/www.priv.gc.ca\/en\/opc-actions-and-decisions\/research\/explore-privacy-research\/2013\/ip_201305."},{"key":"2022060207213607394_j_popets-2022-0040_ref_047","doi-asserted-by":"crossref","unstructured":"[47] Eyal Peer, Laura Brandimarte, Sonam Samat, and Alessandro Acquisti. Beyond the Turk: Alternative platforms for crowdsourcing behavioral research. Journal of Experimental Social Psychology, 70(C):153\u2013163, May 2017.10.1016\/j.jesp.2017.01.006","DOI":"10.1016\/j.jesp.2017.01.006"},{"key":"2022060207213607394_j_popets-2022-0040_ref_048","unstructured":"[48] Jonathon W. Penney. Chilling Effects: Online Surveillance and Wikipedia Use. Berkeley Technology Law Journal, 31(1):117\u2013182, 2016. https:\/\/papers.ssrn.com\/sol3\/papers.cfm?abstract_id=2769645."},{"key":"2022060207213607394_j_popets-2022-0040_ref_049","unstructured":"[49] Mike Perry, Erinn Clark, Steven Murdoch, and Georg Koppen. The Design and Implementation of the Tor Browser, June 2018. https:\/\/2019.www.torproject.org\/projects\/torbrowser\/design\/."},{"key":"2022060207213607394_j_popets-2022-0040_ref_050","unstructured":"[50] Nathaniel Popper. The Tax Sleuth Who Took Down a Drug Lord. The New York Times, December 2015. https:\/\/www.nytimes.com\/2015\/12\/27\/business\/dealbook\/the-unsung-tax-agent-who-put-a-face-on-the-silk-road.html."},{"key":"2022060207213607394_j_popets-2022-0040_ref_051","unstructured":"[51] Prolific Support Team. Ineligibility issues, April 2021. https:\/\/www.reddit.com\/r\/ProlificAc\/comments\/ms114h\/ineligibility_issues\/."},{"key":"2022060207213607394_j_popets-2022-0040_ref_052","unstructured":"[52] Prolific Support Team. Ineligibility issues: Fix update, April 2021. https:\/\/www.reddit.com\/r\/ProlificAc\/comments\/n0f1me\/ineligibility_issues_fix_update\/."},{"key":"2022060207213607394_j_popets-2022-0040_ref_053","doi-asserted-by":"crossref","unstructured":"[53] Elissa M. Redmiles, Sean Kross, and Michelle L. Mazurek. How Well Do My Results Generalize? Comparing Security and Privacy Survey Results from MTurk, Web, and Telephone Samples. IEEE SP, 2019.10.1109\/SP.2019.00014","DOI":"10.1109\/SP.2019.00014"},{"key":"2022060207213607394_j_popets-2022-0040_ref_054","doi-asserted-by":"crossref","unstructured":"[54] Ronald W Rogers. A Protection Motivation Theory of Fear Appeals and Attitude Change. The Journal of Psychology, 91(1):93\u2013114, 1975.10.1080\/00223980.1975.991580328136248","DOI":"10.1080\/00223980.1975.9915803"},{"key":"2022060207213607394_j_popets-2022-0040_ref_055","unstructured":"[55] Ronald W Rogers and Steven Prentice-Dunn. Protection motivation theory. 1997."},{"key":"2022060207213607394_j_popets-2022-0040_ref_056","unstructured":"[56] Choe Sang-Hun. In Reporting on North Korea, Tech Helps Break Through Secrecy. The New York Times, July 2017. https:\/\/www.nytimes.com\/2017\/07\/05\/technology\/personaltech\/in-reporting-on-north-korea-tech-helps-break-through-secrecy.html."},{"key":"2022060207213607394_j_popets-2022-0040_ref_057","unstructured":"[57] Paschal Sheeran, Sarah Milne, Thomas L. Webb, and Peter M. Gollwitzer. Implementation Intentions and Health Behaviour. 2005."},{"key":"2022060207213607394_j_popets-2022-0040_ref_058","doi-asserted-by":"crossref","unstructured":"[58] Paschal Sheeran, Thomas L. Webb, and Peter M. Gollwitzer. The Interplay Between Goal Intentions and Implementation Intentions. Personality and Social Psychology Bulletin, 31(1):87\u201398, January 2005. https:\/\/doi.org\/10.1177\/0146167204271308.10.1177\/014616720427130815574664","DOI":"10.1177\/0146167204271308"},{"key":"2022060207213607394_j_popets-2022-0040_ref_059","unstructured":"[59] Signal. Signal Messenger, 2021. https:\/\/signal.org\/."},{"key":"2022060207213607394_j_popets-2022-0040_ref_060","doi-asserted-by":"crossref","unstructured":"[60] Falko F. Sniehotta, Ralf Schwarzer, Urte Scholz, and Benjamin Sch\u00fcz. Action planning and coping planning for long-term lifestyle change: Theory and assessment. European Journal of Social Psychology, 35(4):565\u2013576, 2005.","DOI":"10.1002\/ejsp.258"},{"key":"2022060207213607394_j_popets-2022-0040_ref_061","doi-asserted-by":"crossref","unstructured":"[61] Daniel J Solove. The Myth of the Privacy Paradox. George Washington Law Review, 89:52, 2021.10.2139\/ssrn.3536265","DOI":"10.2139\/ssrn.3536265"},{"key":"2022060207213607394_j_popets-2022-0040_ref_062","unstructured":"[62] steph. How Has Tor Helped You? Send Us Your Story., February 2019. https:\/\/blog.torproject.org\/how-has-tor-helped-you-send-us-your-story."},{"key":"2022060207213607394_j_popets-2022-0040_ref_063","unstructured":"[63] Peter Story. Tor browser study: Preregistration, Mar 2020. https:\/\/osf.io\/bc42h."},{"key":"2022060207213607394_j_popets-2022-0040_ref_064","unstructured":"[64] Peter Story. Tor browser study: Study page, Mar 2020. https:\/\/osf.io\/t7qe2."},{"key":"2022060207213607394_j_popets-2022-0040_ref_065","unstructured":"[65] Peter Story. Switch from POST to GET for DDG Searches, January 2021. https:\/\/gitlab.torproject.org\/tpo\/applications\/tor-browser\/-\/issues\/40287."},{"key":"2022060207213607394_j_popets-2022-0040_ref_066","unstructured":"[66] Peter Story, Daniel Smullen, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, and Florian Schaub. From Intent to Action - Nudging Users Towards Secure Mobile Payments. SOUPS @ USENIX Security Symposium, 2020."},{"key":"2022060207213607394_j_popets-2022-0040_ref_067","doi-asserted-by":"crossref","unstructured":"[67] Peter Story, Daniel Smullen, Yaxing Yao, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, and Florian Schaub. Awareness, Adoption, and Misconceptions of Web Privacy Tools. Proceedings on Privacy Enhancing Technologies, 2021(3):308\u2013333, July 2021. https:\/\/www.sciendo.com\/article\/10.2478\/popets-2021-0049.10.2478\/popets-2021-0049","DOI":"10.2478\/popets-2021-0049"},{"key":"2022060207213607394_j_popets-2022-0040_ref_068","doi-asserted-by":"crossref","unstructured":"[68] Gail M. Sullivan and Richard Feinn. Using Effect Size\u2014or Why the PValue Is Not Enough. Journal of Graduate Medical Education, 4(3):279\u2013282, September 2012.10.4300\/JGME-D-12-00156.1344417423997866","DOI":"10.4300\/JGME-D-12-00156.1"},{"key":"2022060207213607394_j_popets-2022-0040_ref_069","unstructured":"[69] Richard H Thaler and Cass R Sunstein. Nudge: Improving Decisions About Health, Wealth, and Happiness. J. Wiley and Sons, 2008."},{"key":"2022060207213607394_j_popets-2022-0040_ref_070","unstructured":"[70] The Monero Project. Monero - secure, private, untraceable, 2021. https:\/\/www.getmonero.org\/\/index.html."},{"key":"2022060207213607394_j_popets-2022-0040_ref_071","unstructured":"[71] The Tor Project. Overview, April 2020. https:\/\/2019.www.torproject.org\/about\/overview.html.en."},{"key":"2022060207213607394_j_popets-2022-0040_ref_072","unstructured":"[72] The Tor Project. Am I totally anonymous if I use Tor?, 2021. https:\/\/support.torproject.org\/faq\/staying-anonymous\/."},{"key":"2022060207213607394_j_popets-2022-0040_ref_073","unstructured":"[73] The Tor Project. Anonymity Online, 2021. https:\/\/torproject.org."},{"key":"2022060207213607394_j_popets-2022-0040_ref_074","unstructured":"[74] The Tor Project. Download, 2021. https:\/\/www.torproject.org\/download\/."},{"key":"2022060207213607394_j_popets-2022-0040_ref_075","unstructured":"[75] The Tor Project. GitLab, 2021. https:\/\/gitlab.torproject.org\/tpo\/team."},{"key":"2022060207213607394_j_popets-2022-0040_ref_076","unstructured":"[76] The Tor Project. Relay Operations, 2021. https:\/\/community.torproject.org\/relay\/."},{"key":"2022060207213607394_j_popets-2022-0040_ref_077","unstructured":"[77] The Tor Project. Should I install a new add-on or extension in Tor Browser, like AdBlock Plus or uBlock Origin?, 2021. https:\/\/support.torproject.org\/tbb\/tbb-14\/."},{"key":"2022060207213607394_j_popets-2022-0040_ref_078","unstructured":"[78] Maciej Tomczak and Ewa Tomczak. The need to report effect size estimates revisited. An overview of some recommended measures of effect size. Trends in Sport Sciences, pages 19\u201325, July 2014."},{"key":"2022060207213607394_j_popets-2022-0040_ref_079","doi-asserted-by":"crossref","unstructured":"[79] Thomas L. Webb and Paschal Sheeran. Identifying good opportunities to act: Implementation intentions and cue discrimination. European Journal of Social Psychology, 34(4):407\u2013419, 2004. https:\/\/onlinelibrary.wiley.com\/doi\/abs\/10.1002\/ejsp.205.10.1002\/ejsp.205","DOI":"10.1002\/ejsp.205"},{"key":"2022060207213607394_j_popets-2022-0040_ref_080","unstructured":"[80] WhatIsMyIPAddress.com. How does geolocation work?, November 2020. https:\/\/whatismyipaddress.com\/geolocation."},{"key":"2022060207213607394_j_popets-2022-0040_ref_081","unstructured":"[81] Wikipedia. Web tracking. Wikipedia, May 2021. https:\/\/en.wikipedia.org\/w\/index.php?title=Web_tracking&oldid=020976696."},{"key":"2022060207213607394_j_popets-2022-0040_ref_082","doi-asserted-by":"crossref","unstructured":"[82] Kim Witte and Mike Allen. A meta-analysis of fear appeals: Implications for effective public health campaigns. Personality and Social Psychology Review, 27(5):591\u2013615, 2000.","DOI":"10.1177\/109019810002700506"},{"key":"2022060207213607394_j_popets-2022-0040_ref_083","doi-asserted-by":"crossref","unstructured":"[83] Yixin Zou, Kevin Roundy, Acar Tamersoy, Saurabh Shintre, Johann Roturier, and Florian Schaub. Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices. CHI, pages 1\u201315, April 2020.10.1145\/3313831.3376570","DOI":"10.1145\/3313831.3376570"}],"container-title":["Proceedings on Privacy Enhancing Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.sciendo.com\/pdf\/10.2478\/popets-2022-0040","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,20]],"date-time":"2022-07-20T16:32:02Z","timestamp":1658334722000},"score":1,"resource":{"primary":{"URL":"https:\/\/petsymposium.org\/popets\/2022\/popets-2022-0040.php"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,3,3]]},"references-count":83,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2022,3,3]]},"published-print":{"date-parts":[[2022,4,1]]}},"alternative-id":["10.2478\/popets-2022-0040"],"URL":"https:\/\/doi.org\/10.2478\/popets-2022-0040","relation":{},"ISSN":["2299-0984"],"issn-type":[{"value":"2299-0984","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,3,3]]}}}