Protecting One's Privacy: Insighs into the Views and Nature of the Early Adopters of Privacy Services

Protecting One's Privacy: Insighs into the Views and Nature of the Early Adopters of Privacy Services

Sarah Spiekermann (Humboldt University Berlin, Germany)
Copyright: © 2007 |Pages: 12
DOI: 10.4018/978-1-59904-268-8.ch004
OnDemand PDF Download:
$37.50

Abstract

Using privacy and security technology becomes increasingly important in many application areas, for companies as well as for consumers. However, the market for Privacy Enhancing Technologies (PETs) is still small, especially in the private consumer segment. Due to the nature of the technology per se, little is known and can be learned about the views and motivation of those who carefully protect their transactions on the Net. Are they a niche group? Or do they hold views and have traits that promise a wider-spread adoption of PETs in the long run? This paper gives an insight into the traits and views of 5037 customers of a popular German anonymity service called JAP (Java Anon Proxy). Due its high service reputation and unchanged questions posted on the service’s website for over 2 ½ years insights could be gained on PET users’ demographic and psychographic traits. Moreover, 482 free-text comments could be analyzed to provide a unique insight into the thoughts, feelings and motivations of PET users.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Chapter 1
Eileen M. Trauth, Lynette Kvasny, Anita Greenhill
In this chapter, we explore the methodological and epistemological implications of conducting feminist, gender research in the information systems... Sample PDF
Conduting Feminist Gender Research in the Information Systems Field
$37.50
Chapter 2
Ian F. Alexander
Systems engineers have often paid too little attention to the nature of the so-called “users” of products under development. These are better called... Sample PDF
A Taxonomy of Stakeholders: Human Roles in System Development
$37.50
Chapter 3
Susan E. George
This paper examines the development of 21st century virtual communities, focusing upon those communities that have emerged for virtual religion. It... Sample PDF
21st Century Religious Communities
$37.50
Chapter 4
Sarah Spiekermann
Using privacy and security technology becomes increasingly important in many application areas, for companies as well as for consumers. However, the... Sample PDF
Protecting One's Privacy: Insighs into the Views and Nature of the Early Adopters of Privacy Services
$37.50
Chapter 5
Peter Wright, John McCarthy, Lisa Meekison
In this paper we outline a relational approach to experience, which we have used to develop a practitioner-oriented framework for analysing user... Sample PDF
A Practioner-Centered Assessment of a User-Experience Framework
$37.50
Chapter 6
Charlie C. Chen, Albert L. Harris, Lorne Olfman
The continued and increasing use of online asynchronous learning (OAL) environments for training raises the question whether behavior modeling, the... Sample PDF
Impacts of Behavior Modeling in Online Asynchronous Learning Environments
$37.50
Chapter 7
Steve Sawyer, Andrea Tapia
In this paper we discuss the sociotechnical nature of mobile computing as used by three policing agencies within the United States. Mobile devices... Sample PDF
The Sociotechnical Nature of Mobile Computing Work: Evidence from a Study of Policing in the United States
$37.50
Chapter 8
Giuseppina Pellegrino
Sociotechnical action, as interpreted in this article, comprises a wide array of elements which shape technological artefacts as socio-material and... Sample PDF
Rhetoric, Practice, and Context-Sensitivity in Sociotechnical Action: The Compass Case
$37.50
Chapter 9
Göran Goldkuhl, Par J. Agerfalk
There are many attempts to explain success and failure in information systems. Many of these refer to a purported socio-technical gap. In this paper... Sample PDF
The Socio-Pragmatics of IT Artefacts: Reconciling the Pragmatic, Social, Semiotic, and Technical
$37.50
Chapter 10
Christian Clausen, Yutaka Yoshinaka
The chapter addresses how insights from the social shaping tradition and political process theory may contribute to an understanding of the... Sample PDF
Sociotechnical Spaces: Guiding Politics, Staging Design
$37.50
Chapter 11
Alistair Mutch
The case for ‘analytical dualism’ as a means of approaching sociotechnical action is presented as an alternative to accounts which tend to conflate... Sample PDF
Concerns with "Mutual Constitution": A Critical Realist Commentary
$37.50
Chapter 12
Jose Esteves, Joan Pastor, Josep Casanovas
In this chapter a framework for monitoring user involvement and participation within ERP implementation projects is proposed, by using the... Sample PDF
A Frameowrk for Monitoring User Involvement and Participation in ERP Implementation Projects
$37.50
Chapter 13
Laurence Brooks, Christopher J. Davis, Mark Lycett
Using Personal Construct Theory (PCT) as an underlying conceptual frame, this chapter explores the interdependence of organisations and information... Sample PDF
Investigating the Interdependence of Organisations and Information Systems
$37.50
Chapter 14
Margreet B. Michel-Verke, Roel W. Schuring, Ton A.M. Spil
Patients with Multiple Sclerosis (MS) visit various healthcare providers during the course of their disease. It was suggested that Information and... Sample PDF
USE IT to Create Patient Relation Management for Multiple Sclerosis Patients
$37.50
Chapter 15
Dick Stenmark
As a much needed quality in today’s businesses, creativity is an important area of research. Creativity is a complex and multi-faceted concept and... Sample PDF
Contextual Characteristics of Creativity: Effects on IT-Supported Organisational Brainstorming
$37.50
About the Editor
About the Authors