[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Investigating Security Folklore: A Case Study on the Tor over VPN Phenomenon

Published: 04 October 2023 Publication History

Abstract

Users face security folklore in their daily lives in the form of security advice, myths, and word-of-mouth stories. Using a VPN to access the Tor network, i.e., Tor over VPN, is an interesting example of security folklore because of its inconclusive security benefits and its occurrence in pop-culture media.
Following the Theory of Reasoned Action, we investigated the phenomenon with three studies: (1) we quantified the behavior on real-world Tor traffic and measured a prevalence of 6.23%; (2) we surveyed users' intentions and beliefs, discovering that they try to protect themselves from the Tor network or increase their general security; and (3) we analyzed online information sources, suggesting that perceived norms and ease-of-use play a significant role while behavioral beliefs about the purpose and effect are less crucial in spreading security folklore. We discuss how to communicate security advice effectively and combat security misinformation and misconceptions.

Supplemental Material

ZIP File
These supplemental materials are structured according to the three study parts of the paper: (1) measurement study to quantify Tor over VPN behavior on real-world Tor traffic; (2) user survey on intentions and beliefs behind the Tor over VPN behavior; and (3) qualitative analysis of the background information sources on Tor over VPN. The contained filetypes are: * .txt for lists of IP addresses * .pdf for the codebooks, questionnaires, and corpus material * .py program code for the VPN evaluation script * .zip files that contains a privcount-patched Tor version and a modified PrivCount version

References

[1]
Ruba Abu-Salma and Benjamin Livshits. 2020. Evaluating the End-User Experience of Private Browsing Mode. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. ACM, Honolulu HI USA, 1--12. https://doi.org/10.1145/3313831.3376440
[2]
Ruba Abu-Salma, M. Angela Sasse, Joseph Bonneau, Anastasia Danilova, Alena Naiakshina, and Matthew Smith. 2017. Obstacles to the Adoption of Secure Communication Tools. In 2017 IEEE Symposium on Security and Privacy (SP ). IEEE, San Jose, CA, USA, 137--153. https://doi.org/10.1109/SP.2017.65
[3]
Alessandro Acquisti, Idris Adjerid, Rebecca Balebako, Laura Brandimarte, Lorrie Faith Cranor, Saranga Komanduri, Pedro Giovanni Leon, Norman Sadeh, Florian Schaub, Manya Sleeper, Yang Wang, and Shomir Wilson. 2017. Nudges for Privacy and Security : Understanding and Assisting Users ' Choices Online. Comput. Surveys, Vol. 50, 3 (Oct. 2017), 1--41. https://doi.org/10.1145/3054926
[4]
Omer Akgul, Richard Roberts, Moses Namara, Dave Levin, and Michelle L. Mazurek. 2022. Investigating Influencer VPN Ads on YouTube. In 2022 IEEE Symposium on Security and Privacy (SP ). IEEE, San Francisco, CA, USA, 876--892. https://doi.org/10.1109/SP46214.2022.9833633
[5]
Adam Beautement, M. Angela Sasse, and Mike Wonham. 2008. The Compliance Budget: Managing Security Behaviour in Organisations. In Proceedings of the 2008 New Security Paradigms Workshop (NSPW '08). ACM, Lake Tahoe, CA, USA, 47--58. https://doi.org/10.1145/1595676.1595684
[6]
Veroniek Binkhorst, Tobias Fiebig, Katharina Krombholz, Wolter Pieters, and Katsiaryna Labunets. 2022. Security at the End of the Tunnel : The Anatomy of VPN Mental Models Among Experts and Non-Experts in a Corporate Context. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, USA, 3433--3450. https://www.usenix.org/conference/usenixsecurity22/presentation/binkhorst
[7]
Alex Biryukov and Ivan Pustogarov. 2015. Bitcoin over Tor Isn't a Good Idea. In 2015 IEEE Symposium on Security and Privacy (SP ). IEEE, San Jose, CA, 122--134. https://doi.org/10.1109/SP.2015.15
[8]
Maia J. Boyd, Jamar L. Sullivan Jr., Marshini Chetty, and Blase Ur. 2021. Understanding the Security and Privacy Advice Given to Black Lives Matter Protesters. In Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems. ACM, Yokohama, Japan, 1--18. https://doi.org/10.1145/3411764.3445061
[9]
Virginia Braun and Victoria Clarke. 2006. Using Thematic Analysis in Psychology. Qualitative Research in Psychology, Vol. 3, 2 (Jan. 2006), 77--101. https://doi.org/10.1191/1478088706qp063oa
[10]
Jan Harold Brunvand. 1978. The Study of American Folklore : An Introduction second ed.). Norton, New York.
[11]
Robert B. Cialdini. 2009. Influence: Science and Practice. Pearson Education.
[12]
Sauvik Das, Tiffany Hyun-Jin Kim, Laura A Dabbish, and Jason I Hong. 2014a. The Effect of Social Influence on Security Sensitivity. In 10th Symposium On Usable Privacy and Security (SOUPS ). USENIX Association, 143--157.
[13]
Sauvik Das, Adam D.I. Kramer, Laura A. Dabbish, and Jason I. Hong. 2014b. Increasing Security Sensitivity With Social Proof : A Large-Scale Experimental Confirmation. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS ). ACM, Scottsdale Arizona USA, 739--749. https://doi.org/10.1145/2660267.2660271
[14]
Albese Demjaha, Jonathan Spring, Ingolf Becker, Simon Parkin, and Angela Sasse. 2018. Metaphors Considered Harmful? An Exploratory Study of the Effectiveness of Functional Metaphors for End-to-End Encryption. In Proceedings of the Workshop on Usable Security (USEC ). Internet Society, San Diego, CA, USA. https://doi.org/10.14722/usec.2018.23015
[15]
Roger Dingledine. 2012. [Tor-Talk] Tor plus VPN (Was Re: Hi All!). https://lists.torproject.org/pipermail/tor-talk/2012-January/022917.html Retrieved 2022--11--23 from
[16]
Roger Dingledine, Nicholas Hopper, George Kadianakis, and Nick Mathewson. 2014. One Fast Guard for Life (or 9 Months). In Proceedings of the 14th Privacy Enhancing Technologies (PETS ). Amsterdam, Netherlands. https://doi.org/10.1.1.645.7692
[17]
Roger Dingledine and Nick Mathewson. 2021. Tor Path Specification. https://github.com/torproject/torspec/blob/master/path-spec.txt Retrieved 2022--11--22 from
[18]
Agnieszka Dutkowska-Zuk, Austin Hounsel, Andre Xiong, Molly Roberts, Brandon Stewart, Marshini Chetty, and Nick Feamster. 2020. Understanding How and Why University Students Use Virtual Private Networks. arXiv. https://doi.org/10.48550/ARXIV.2002.11834 arxiv: 2002.11834
[19]
Edward Snowden [@Snowden]. 2016. Use Tor. Use Signal. https://t.co/VLvBsbVHKs. https://twitter.com/Snowden/status/778592275144314884 Retrieved 2022--11--22 from
[20]
Ellis Fenske, Akshaya Mani, Aaron Johnson, and Micah Sherr. 2017. Distributed Measurement with Private Set-Union Cardinality. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS ). ACM, Dallas, TX, USA, 2295--2312. https://doi.org/10.1145/3133956.3134034
[21]
Casey Fiesler and Nicholas Proferes. 2018. “Participant ” Perceptions of Twitter Research Ethics. Social Media Society, Vol. 4, 1 (Jan. 2018), 205630511876336. https://doi.org/10.1177/2056305118763366
[22]
Martin Fishbein and Icek Ajzen. 2010. Predicting and Changing Behavior: The Reasoned Action Approach. Psychology Press, New York. BF637.B4 F57 2010
[23]
George Forman. 2005. Counting Positives Accurately Despite Inaccurate Classification. In 16th European Conference on Machine Learning (ECML ), Jo ao Gama, Rui Camacho, Pavel B. Brazdil, Alípio Mário Jorge, and Luís Torgo (Eds.). Springer Berlin Heidelberg, Porto, Portugal, 564--575. https://doi.org/10.1007/11564096_55
[24]
Kevin Gallagher, Sameer Patil, and Nasir Memon. 2017. New Me : Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network. In Proceedings of the Thirteenth Symposium on Usable Privacy and Security (SOUPS ). USENIX Association, Santa Clara, CA, USA, 385--398. https://www.usenix.org/system/files/conference/soups2017/soups2017-gallagher.pdf
[25]
Xianyi Gao, Yulong Yang, Huiqing Fu, Janne Lindqvist, and Yang Wang. 2014. Private Browsing : An Inquiry on Usability and Privacy Protection. In Proceedings of the 13th Workshop on Privacy in the Electronic Society. ACM, Scottsdale Arizona USA, 97--106. https://doi.org/10.1145/2665943.2665953
[26]
Christine Geeng, Mike Harris, Elissa Redmiles, and Franziska Roesner. 2022. “Like Lesbians Walking the Perimeter ”: Experiences of U. S. LGBTQ Folks With Online Security, Safety, and Privacy Advice. In 31st USENIX Security Symposium (USENIX Security 22). USENIX Association, Boston, MA, USA, 305--322. https://www.usenix.org/conference/usenixsecurity22/presentation/geeng
[27]
Sarah Gilbert, Katie Shilton, and Jessica Vitak. 2023. When Research Is the Context: Cross-platform User Expectations for Social Media Data Reuse. Big Data & Society, Vol. 10, 1 (Jan. 2023), 205395172311641. https://doi.org/10.1177/20539517231164108
[28]
David C. Giles. 2002. Parasocial Interaction : A Review of the Literature and a Model for Future Research. Media Psychology, Vol. 4, 3 (Aug. 2002), 279--305. https://doi.org/10.1207/S1532785XMEP0403_04
[29]
David J. Gunkel. 2018. The Relational Turn : Third Wave HCI and Phenomenology. In New Directions in Third Wave Human-Computer Interaction : Volume 1 - Technologies, Michael Filimowicz and Veronika Tzankova (Eds.). Springer International Publishing, Cham, 11--24. https://doi.org/10.1007/978--3--319--73356--2_2
[30]
Hana Habib, Jessica Colnago, Vidya Gopalakrishnan, Sarah Pearman, Jeremy Thomas, Alessandro Acquisti, Nicolas Christin, and Lorrie Faith Cranor. 2018. Away From Prying Eyes : Analyzing Usage and Understanding of Private Browsing. In Proceedings of the Fourteenth Symposium on Usable Privacy and Security (SOUPS ). USENIX Association, Baltimore, MD, USA, 159--175. https://www.usenix.org/system/files/conference/soups2018/soups2018-habib-prying.pdf
[31]
David Harborth, Sebastian Pape, and Kai Rannenberg. 2020. Explaining the Technology Use Behavior of Privacy-Enhancing Technologies : The Case of Tor and JonDonym. Proceedings on Privacy Enhancing Technologies, Vol. 2020, 2 (April 2020), 111--128. https://doi.org/10.2478/popets-2020-0020
[32]
Amelia Hassoun, Ian Beacock, Sunny Consolvo, Beth Goldberg, Patrick Gage Kelley, and Daniel M. Russell. 2023. Practicing Information Sensibility: How Gen Z Engages with Online Information. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems (Hamburg, Germany) (CHI '23). Association for Computing Machinery, New York, NY, USA, Article 662, 17 pages. https://doi.org/10.1145/3544548.3581328
[33]
Muhammad Ikram, Narseo Vallina-Rodriguez, Suranga Seneviratne, Mohamed Ali Kaafar, and Vern Paxson. 2016. An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps. In Proceedings of the 2016 Internet Measurement Conference. ACM, Santa Monica, CA, USA, 349--364. https://doi.org/10.1145/2987443.2987471
[34]
Rob Jansen and Aaron Johnson. 2016. Safely Measuring Tor. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16). ACM, Vienna, Austria, 1553--1567. https://doi.org/10.1145/2976749.2978310
[35]
Ruogu Kang, Stephanie Brown, Laura Dabbish, and Sara Kiesler. 2014. Privacy Attitudes of Mechanical Turk Workers and the U. S. Public. In Proceedings of the Tenth Symposium On Usable Privacy and Security (SOUPS ). USENIX Association, Menlo Park, CA, USA, 37--49. https://doi.org/10.5555/3235838.3235842
[36]
Ruogu Kang, Laura Dabbish, Nathaniel Fruchter, and Sara Kiesler. 2015. "My Data Just Goes Everywhere": User Mental Models of the Internet and Implications for Privacy and Security. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015) (SOUPS ). USENIX Association, Ottawa, ON, Canada, 39--52. https://www.usenix.org/system/files/conference/soups2015/soups15-paper-kang.pdf
[37]
Mohammad Taha Khan, Joe DeBlasio, Geoffrey M. Voelker, Alex C. Snoeren, Chris Kanich, and Narseo Vallina-Rodriguez. 2018. An Empirical Analysis of the Commercial VPN Ecosystem. In Proceedings of the Internet Measurement Conference 2018 (IMC '18). ACM, Boston, MA, USA, 443--456. https://doi.org/10.1145/3278532.3278570
[38]
Alexandra Mai, Katharina Pfeffer, Matthias Gusenbauer, Edgar Weippl, and Katharina Krombholz. 2020. User Mental Models of Cryptocurrency Systems - A Grounded Theory Approach. In Sixteenth Symposium on Usable Privacy and Security (SOUPS 2020). USENIX Association, 341--358. https://www.usenix.org/conference/soups2020/presentation/mai
[39]
Akshaya Mani, T. Wilson-Brown, Rob Jansen, Aaron Johnson, and Micah Sherr. 2018. Understanding Tor Usage with Privacy-Preserving Measurement. In Proceedings of the Internet Measurement Conference 2018 (IMC ). ACM, Boston, MA, USA, 175--187. https://doi.org/10.1145/3278532.3278549
[40]
Mara Mather and Marcia K. Johnson. 2000. Choice-Supportive Source Monitoring: Do Our Decisions Seem Better to Us as We Age? Psychology and Aging, Vol. 15, 4 (2000), 596--606. https://doi.org/10.1037/0882--7974.15.4.596
[41]
Niels Raabjerg Mathiasen and Susanne Bødker. 2008. Threats or Threads: From Usable Security to Secure Experience?. In Proceedings of the 5th Nordic Conference on Human-Computer Interaction : Building Bridges (NordiCHI ). ACM, Lund, Sweden, 283--289. https://doi.org/10.1145/1463160.1463191
[42]
Nora McDonald, Sarita Schoenebeck, and Andrea Forte. 2019. Reliability and Inter-rater Reliability in Qualitative Research : Norms and Guidelines for CSCW and HCI Practice. Proceedings of the ACM on Human-Computer Interaction, Vol. 3, CSCW (Nov. 2019), 1--23. https://doi.org/10.1145/3359174
[43]
Know Your Meme. 2010. Good Luck, I 'm Behind 7 Proxies. https://knowyourmeme.com/memes/good-luck-im-behind-7-proxies Retrieved 2022--11--22 from
[44]
Rebecca Moody. 2020. VPN Market Report 2022: Who 's Got the Biggest VPN Market Share? https://www.comparitech.com/blog/vpn-privacy/vpn-market-share-report/ Retrieved 2022--11--22 from
[45]
Moses Namara, Daricia Wilkinson, Kelly Caine, and Bart P. Knijnenburg. 2020. Emotional and Practical Considerations Towards the Adoption and Abandonment of VPNs as a Privacy-Enhancing Technology. Proceedings on Privacy Enhancing Technologies, Vol. 2020, 1 (2020), 83--102. https://doi.org/10.2478/popets-2020-0006
[46]
Nic Newman, Richard Fletcher, Craig T Robertson, Kirsten Eddy, and Rasmus Kleis Nielsen. 2022. Reuters Institute Digital News Report 2022. Technical Report. 164 pages. https://reutersinstitute.politics.ox.ac.uk/sites/default/files/2022-06/Digital_News-Report_2022.pdf Retrieved 2022--11--22 from
[47]
nusenu. 2021. OrNetStats. https://nusenu.github.io/OrNetStats/ Retrieved 2021-07-05 from
[48]
Anna-Marie Ortloff, Matthias Fassl, Alexander Ponticello, Florin Martius, Anne Mertens, Katharina Krombholz, and Matthew Smith. 2023. Different Researchers, Different Results ? Analyzing the Influence of Researcher Experience and Data Type During Qualitative Analysis of an Interview and Survey Study on Security Advice. In Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems. ACM, Hamburg Germany, 1--21. https://doi.org/10.1145/3544548.3580766
[49]
Katharina Pfeffer, Alexandra Mai, Edgar Weippl, Emilee Rader, and Katharina Krombholz. 2022. Replication: Stories as Informal Lessons about Security. In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022). USENIX Association, Boston, MA, 1--18. https://www.usenix.org/conference/soups2022/presentation/pfeffer
[50]
Álex Pina, Esther Martínez Lobato, Javier Gómez Santander, Pablo Roa, Fernando Sancristóbal, Esther Morales, David Barrocal relax (Writers), and Javier Quintas relax (Director). 2017. Money Heist - A Matter of Efficiency (Season 2, Part 3). https://www.imdb.com/title/tt6851508/
[51]
Emilee Rader and Janine Slaker. 2017. The Importance of Visibility for Folk Theories of Sensor Data. In Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017). USENIX Association, Santa Clara, CA, 257--270. https://www.usenix.org/conference/soups2017/technical-sessions/presentation/rader
[52]
Emilee Rader, Rick Wash, and Brandon Brooks. 2012. Stories as Informal Lessons about Security. In Proceedings of the Eighth Symposium on Usable Privacy and Security (SOUPS '12). ACM, Washington D.C., USA. https://doi.org/10.1145/2335356.2335364
[53]
Reethika Ramesh, Leonid Evdokimov, Diwen Xue, and Roya Ensafi. 2022. VPNalyzer : Systematic Investigation of the VPN Ecosystem. In Proceedings 2022 Network and Distributed System Security Symposium. Internet Society, San Diego, CA, USA. https://doi.org/10.14722/ndss.2022.24285
[54]
Reethika Ramesh, Anjali Vyas, and Roya Ensafi. 2023. "All of Them Claim to Be the Best": Multi-perspective Study of VPN Users and VPN Providers. In 32nd USENIX Security Symposium (USENIX Security 23). USENIX Association, Anaheim, CA. https://www.usenix.org/conference/usenixsecurity23/presentation/ramesh
[55]
James Reason. 1990. The Contribution of Latent Human Failures to the Breakdown of Complex Systems. Philosophical Transactions of the Royal Society B 327 (1990), 475--484. https://doi.org/10.1098/rstb.1990.0090
[56]
Tor Reddit. 2021. FAQ : "Should I Use a VPN with Tor ?". https://old.reddit.com/r/TOR/wiki/index#wiki_should_i_use_a_vpn_with_tor.3F_tor_over_vpn.2C_or_vpn_over_tor.3F Retrieved 2022--11--22 from
[57]
Elissa M Redmiles, Sean Kross, and Michelle L Mazurek. 2016. How I Learned to Be Secure : A Census-Representative Survey of Security Advice Sources and Behavior. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS '16). ACM, Vienna, Austria, 666--677. https://doi.org/10.1145/2976749.2978307
[58]
Elissa M. Redmiles, Noel Warford, Amritha Jayanti, and Aravind Koneru. 2020. A Comprehensive Quality Evaluation of Security and Privacy Advice on the Web. In Proceedings of the 29th USENIX Security Symposium (USENIX Security 2020). USENIX Association, 89--108. https://www.usenix.org/conference/usenixsecurity20/presentation/redmiles
[59]
Robert W. Reeder, Iulia Ion, and Sunny Consolvo. 2017. 152 Simple Steps to Stay Safe Online : Security Advice for Non-Tech-Savvy Users. IEEE Security & Privacy, Vol. 15, 5 (2017), 55--64. https://doi.org/10.1109/msp.2017.3681050
[60]
Karen Renaud and Merrill Warkentin. 2017. Risk Homeostasis in Information Security : Challenges in Confirming Existence and Verifying Impact. In Proceedings of the 2017 New Security Paradigms Workshop (NSPW 2017). ACM, Santa Cruz, CA, USA, 57--69. https://doi.org/10.1145/3171533.3171534
[61]
Bruce Schneier. 2008. The Psychology of Security. In AFRICACRYPT. 30. https://doi.org/10.1007/978--3--540--68164--9_5
[62]
Peter Story, Daniel Smullen, Yaxing Yao, Alessandro Acquisti, Lorrie Faith Cranor, Norman Sadeh, and Florian Schaub. 2021. Awareness, Adoption, and Misconceptions of Web Privacy Tools. Proceedings on Privacy Enhancing Technologies, Vol. 2021, 3 (2021), 308--333. https://doi.org/10.2478/popets-2021-0049
[63]
Jenny Tang, Eleanor Birrell, and Ada Lerner. 2022. Replication: How Well Do My Results Generalize Now ? The External Validity of Online Privacy and Security Surveys. In Proceedings of the Eighteenth Symposium on Usable Privacy and Security (SOUPS ). USENIX Association, Boston, MA, USA. https://www.usenix.org/conference/soups2022/presentation/tang
[64]
TOP10VPN and globalwebindex. 2020. Global VPN Usage Report 2020: An Exploration of VPNs and Their Users around the World. Technical Report. 19 pages. https://www.top10vpn.com/assets/2020/03/Top10VPN-GWI-Global-VPN-Usage-Report-2020.pdf Retrieved 2022--11--22 from
[65]
TorProject Trac. 2022. Tor VPN. https://trac.torproject.org/projects/tor/wiki/doc/TorPlusVPN Retrieved 2022--11--22 from
[66]
Matt Traudt. 2016. VPN Tor : Not Necessarily a Net Gain. https://matt.traudt.xyz/posts/2016--11--12-vpn-tor-not-net-gain/ Retrieved 2022--11--22 from
[67]
Blase Ur, Fumiko Noma, Jonathan Bees, Sean M Segreti, Richard Shay, Lujo Bauer, Nicolas Christin, and Lorrie Faith Cranor. 2015. “I Added `!' At the End to Make It Secure ”: Observing Password Creation in the Lab. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). USENIX Association, Ottawa, ON, Canada, 123--140. https://www.usenix.org/conference/soups2015/proceedings/presentation/ur
[68]
Rick Wash. 2010. Folk Models of Home Computer Security. In Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS '10). ACM, Redmond, WA, USA, 1--16. https://doi.org/10.1145/1837110.1837125
[69]
Zachary Weinberg, Shinyoung Cho, Nicolas Christin, Vyas Sekar, and Phillipa Gill. 2018. How to Catch When Proxies Lie : Verifying the Physical Locations of Network Proxies with Active Geolocation. In Proceedings of the Internet Measurement Conference 2018. ACM, Boston MA USA, 203--217. https://doi.org/10.1145/3278532.3278551
[70]
Yixin Zou, Kevin Roundy, Acar Tamersoy, Saurabh Shintre, Johann Roturier, and Florian Schaub. 2020. Examining the Adoption and Abandonment of Security, Privacy, and Identity Theft Protection Practices. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems (CHI ). ACM, Honolulu, HI, USA, 1--15. https://doi.org/10.1145/3313831.3376570

Cited By

View all
  • (2024)A First Look into Fake Profiles on Social Media through the Lens of Victim's ExperiencesCompanion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing10.1145/3678884.3681889(444-450)Online publication date: 11-Nov-2024
  • (2024)Selling Satisfaction: A Qualitative Analysis of Cybersecurity Awareness Vendors' PromisesProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690196(2666-2680)Online publication date: 2-Dec-2024

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Proceedings of the ACM on Human-Computer Interaction
Proceedings of the ACM on Human-Computer Interaction  Volume 7, Issue CSCW2
CSCW
October 2023
4055 pages
EISSN:2573-0142
DOI:10.1145/3626953
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 04 October 2023
Published in PACMHCI Volume 7, Issue CSCW2

Permissions

Request permissions for this article.

Check for updates

Badges

  • Honorable Mention

Author Tags

  1. VPN
  2. beliefs
  3. secure experience
  4. security advice
  5. theory of reasoned action
  6. tor
  7. tor over VPN

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)210
  • Downloads (Last 6 weeks)8
Reflects downloads up to 18 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A First Look into Fake Profiles on Social Media through the Lens of Victim's ExperiencesCompanion Publication of the 2024 Conference on Computer-Supported Cooperative Work and Social Computing10.1145/3678884.3681889(444-450)Online publication date: 11-Nov-2024
  • (2024)Selling Satisfaction: A Qualitative Analysis of Cybersecurity Awareness Vendors' PromisesProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690196(2666-2680)Online publication date: 2-Dec-2024

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media