Skip to main content
Top

2020 | OriginalPaper | Chapter

Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App

Authors : Nissy Sombatruang, Tan Omiya, Daisuke Miyamoto, M. Angela Sasse, Youki Kadobayashi, Michelle Baddeley

Published in: Information and Communications Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A Virtual Private Network (VPN) helps to mitigate security and privacy risks of data transmitting on unsecured network such as public Wi-Fi. However, despite awareness of public Wi-Fi risks becoming increasingly common, the use of VPN when using public Wi-Fi is low. To increase adoption, understanding factors driving user decision to adopt a VPN app is an important first step. This study is the first to achieve this objective using discrete choice experiments (DCEs) to elicit individual preferences of specific attributes of a VPN app. The experiments were run in the United Kingdom (UK) and Japan (JP). We first interviewed participants (15 UK, 17 JP) to identify common attributes of a VPN app which they considered important. The results were used to design and run a DCE in each country. Participants (149 UK, 94 JP) were shown a series of two hypothetical VPN apps, varying in features, and were asked to choose one which they preferred. Customer review rating, followed by price of a VPN app, significantly affected the decision to choose which VPN app to download and install. A change from a rating of 3 to 4–5 stars increased the probability of choosing an app by 33% in the UK and 14% in Japan. Unsurprisingly, price was a deterrent. Recommendations by friends, source of product reviews, and the presence of in-app ads also played a role but to a lesser extent. To actually use a VPN app, participants considered Internet speed, connection stability, battery level on mobile devices, and the presence of in-app ads as key drivers. Participants in the UK and in Japan prioritized these attributes differently, suggesting possible influences from cultural differences.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
As of May 2020.
 
2
Along with Australia, Poland, Canada, Netherlands, and France.
 
3
Defined as \(\exp {(U)}/(\exp {(U)}+\exp {(U_{b})})\) where U is the utility for the current settings and \(U_{b}\) is the utility for the baseline settings; implies that the probability for the baseline settings is 0.5 [21].
 
4
Set as a free app ( https://static-content.springer.com/image/chp%3A10.1007%2F978-3-030-61078-4_13/MediaObjects/506009_1_En_13_Figg_HTML.gif 0), moderate app review rating, not referred by friends, had \({<}10,000\) download, and had an amateur-looking interface.
 
5
Set as a free app (¥0), moderate app review rating (based on info from App store), had \({<}1,000\) downloads, had in-app ads, and required \({<}5\) mins installation.
 
6
Set as 3–4 dropped connections/hr, 10–20% slower in Internet speed (when using VPN), manual VPN initiation, and there was 75–100% battery level left on a user’s mobile device.
 
7
Set as 3–4 dropped connections/hr, 10–20% slower in Internet speed (when using VPN), has in-app ads, manual VPN initiation, and there was 75–100% battery level on a user’s mobile.
 
Literature
1.
2.
go back to reference Appelbaum, J., Ray, M., Koscher, K., Finder, I.: vpwns: Virtual pwned networks. In: 2nd USENIX Workshop on Free and Open Communications on the Internet. USENIX Association (2012) Appelbaum, J., Ray, M., Koscher, K., Finder, I.: vpwns: Virtual pwned networks. In: 2nd USENIX Workshop on Free and Open Communications on the Internet. USENIX Association (2012)
3.
go back to reference Baddeley, M.: Copycats & Contrarians: Why We Follow Others... and When We Don’t. Yale University Press (2018) Baddeley, M.: Copycats & Contrarians: Why We Follow Others... and When We Don’t. Yale University Press (2018)
4.
go back to reference Chen, S., Wang, R., Wang, X., Zhang, K.: Side-channel leaks in web applications: a reality today, a challenge tomorrow. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 191–206. IEEE (2010) Chen, S., Wang, R., Wang, X., Zhang, K.: Side-channel leaks in web applications: a reality today, a challenge tomorrow. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 191–206. IEEE (2010)
6.
go back to reference Ghaoui, N., et al.: Policy strategies for VPN for consumers in the Netherlands (2017) Ghaoui, N., et al.: Policy strategies for VPN for consumers in the Netherlands (2017)
7.
go back to reference Ikram, M., Vallina-Rodriguez, N., Seneviratne, S., Kaafar, M.A., Paxson, V.: An analysis of the privacy and security risks of Android VPN apps. In: Proceedings of the 2016 Internet Measurement Conference, pp. 349–364. ACM (2016) Ikram, M., Vallina-Rodriguez, N., Seneviratne, S., Kaafar, M.A., Paxson, V.: An analysis of the privacy and security risks of Android VPN apps. In: Proceedings of the 2016 Internet Measurement Conference, pp. 349–364. ACM (2016)
8.
go back to reference Johnson, F.R., et al.: Constructing experimental designs for DCEs: report of the ISPOR conjoint analysis experimental design good research practices task force. Value Health 16(1), 3–13 (2013) Johnson, F.R., et al.: Constructing experimental designs for DCEs: report of the ISPOR conjoint analysis experimental design good research practices task force. Value Health 16(1), 3–13 (2013)
9.
go back to reference Kahneman, D., Knetsch, J.L., Thaler, R.H.: Anomalies: the endowment effect, loss aversion, and status quo bias. J. Econ. Perspect. 5(1), 193–206 (1991)CrossRef Kahneman, D., Knetsch, J.L., Thaler, R.H.: Anomalies: the endowment effect, loss aversion, and status quo bias. J. Econ. Perspect. 5(1), 193–206 (1991)CrossRef
11.
go back to reference Khan, M.T., DeBlasio, J., Voelker, G.M., Snoeren, A.C., Kanich, C., Vallina-Rodriguez, N.: An empirical analysis of the commercial VPN ecosystem. In: Proceedings of the Internet Measurement Conference 2018, pp. 443–456. ACM (2018) Khan, M.T., DeBlasio, J., Voelker, G.M., Snoeren, A.C., Kanich, C., Vallina-Rodriguez, N.: An empirical analysis of the commercial VPN ecosystem. In: Proceedings of the Internet Measurement Conference 2018, pp. 443–456. ACM (2018)
12.
go back to reference Kuhfeld, W.F.: Experimental design, efficiency, coding, and choice designs. Marketing research methods in SAS: Experimental design, choice, conjoint, and graphical techniques, pp. 47–97 (2005) Kuhfeld, W.F.: Experimental design, efficiency, coding, and choice designs. Marketing research methods in SAS: Experimental design, choice, conjoint, and graphical techniques, pp. 47–97 (2005)
13.
go back to reference Lancaster, K.J.: A new approach to consumer theory. J. Polit. Econ. 74(2), 132–157 (1966)CrossRef Lancaster, K.J.: A new approach to consumer theory. J. Polit. Econ. 74(2), 132–157 (1966)CrossRef
14.
go back to reference Baddeley, M.: Behavioural Economics: A Very Short Introduction, vol. 505. Oxford University Press (2017) Baddeley, M.: Behavioural Economics: A Very Short Introduction, vol. 505. Oxford University Press (2017)
15.
go back to reference McFadden, D., et al.: Conditional logit analysis of qualitative choice behavior (1973) McFadden, D., et al.: Conditional logit analysis of qualitative choice behavior (1973)
16.
go back to reference Nolan, J.M., Schultz, P.W., Cialdini, R.B., Goldstein, N.J., Griskevicius, V.: Normative social influence is underdetected. Pers. Soc. Psychol. Bull. 34(7), 913–923 (2008)CrossRef Nolan, J.M., Schultz, P.W., Cialdini, R.B., Goldstein, N.J., Griskevicius, V.: Normative social influence is underdetected. Pers. Soc. Psychol. Bull. 34(7), 913–923 (2008)CrossRef
18.
go back to reference Perta, V.C., Barbera, M.V., Tyson, G., Haddadi, H., Mei, A.: A glance through the VPN looking glass: IPv6 leakage and DNS Hijacking in commercial VPN clients. Proc. Privacy Enhancing Technol. 2015(1), 77–91 (2015)CrossRef Perta, V.C., Barbera, M.V., Tyson, G., Haddadi, H., Mei, A.: A glance through the VPN looking glass: IPv6 leakage and DNS Hijacking in commercial VPN clients. Proc. Privacy Enhancing Technol. 2015(1), 77–91 (2015)CrossRef
20.
22.
go back to reference Sombatruang, N., Kadobayashi, Y., Sasse, M.A., Baddeley, M., Miyamoto, D.: The continued risks of unsecured public Wi-Fi and why users keep using it. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp. 1–11. IEEE (2018) Sombatruang, N., Kadobayashi, Y., Sasse, M.A., Baddeley, M., Miyamoto, D.: The continued risks of unsecured public Wi-Fi and why users keep using it. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp. 1–11. IEEE (2018)
23.
go back to reference Sombatruang, N., Sasse, M.A., Baddeley, M.: Why do people use unsecure public Wi-Fi? In: Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, pp. 61–72. ACM (2016) Sombatruang, N., Sasse, M.A., Baddeley, M.: Why do people use unsecure public Wi-Fi? In: Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, pp. 61–72. ACM (2016)
25.
go back to reference Vaniea, K., Rashidi, Y.: Tales of software updates: the process of updating software. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 3215–3226. ACM (2016) Vaniea, K., Rashidi, Y.: Tales of software updates: the process of updating software. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 3215–3226. ACM (2016)
Metadata
Title
Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App
Authors
Nissy Sombatruang
Tan Omiya
Daisuke Miyamoto
M. Angela Sasse
Youki Kadobayashi
Michelle Baddeley
Copyright Year
2020
DOI
https://doi.org/10.1007/978-3-030-61078-4_13

Premium Partner