Abstract
The technology for anonymous communication has been thoroughly researched. But despite the existence of several protection services, a business model for anonymous web surfing has not emerged as of today. One possibility to stimulate adoption is to facilitate it in a specific subnet. The idea is to identify a promising target group which has a substantial benefit from adopting the technology and to facilitate the adoption within that target group. We examine the feasibility of this approach for anonymity services. We identify a potential target group – consumers of pornographic online material – and empirically validate their suitability by conducting a traffic analysis. We also discuss several business models for anonymity services. We argue that providers of anonymity services should try to generate revenue from content providers like adult entertainment distributors. The latter could benefit from offering anonymous access to their products by differentiating against competitors or by selling their products at a higher price over the anonymous channel.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Acquisti, A., Grossklags, J.: Privacy and Rationality in Individual Decision Making. IEEE Security & Privacy 3(1), 26–33 (2005)
Acquisti, A.: Privacy and Security of Personal Information: Economic Incentive and Technological Solutions. In: Camp, J., Lewis, R. (eds.) The Economics of Information Security, pp. 1–9. Kluwer, Dordrecht (2004)
Acquisti, A.: Privacy in Electronic Commerce and the Economics of Immediate Gratification. In: Proceedings of the EC 2004. ACM, New York (2004)
Ang, E.X.Y., Kwan, J.W.Y., Teo, J., Chua, C.E.H.: Why Do People Pay for Information Goods?: A Study of the Online Porn Industry. In: Proceedings of the Twelfth Americas Conference on Information Systems (AMCIS 2006), AIS, Acapulco, Mexico, pp. 73–77 (2006)
Angell, I.O.: Ethics and Morality: a business opportunity for the Amoral? Journal of Information System Security 3(1), 3–18 (2007)
Bazak, A., King, S.A.: The Two Faces of the Internet: Introduction to the Special Issue on the Internet and Sexuality. CyberPsychology & Behavior 3(4), 517–520 (2000)
Belanger, F., Hiller, J.S., Smith, W.J.: Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems (11), 245–270 (2002)
Berendt, B., Günther, O., Spiekermann, S.: Privacy in E-Commerce: Stated Preferences vs. Actual Behavior. Communications of the ACM 48(4), 101–106 (2005)
Berthold, O., Federrath, H., Köpsell, S.: Web MIXes: A system for anonymous and unobservable Internet access. In: Federrath, H. (ed.) Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pp. 115–129. Springer, Heidelberg (2000)
Brener, N.D., Billy, J.O.G., Grady, W.R.: Assessment of Factors Affecting the Validity of Self-Reported Health-Risk Behavior Among Adolescents: Evidence From the Scientific Literature. Journal of Adolescent Health 33, 436–457 (2003)
Böhme, R., Danezis, G., Díaz, C., Köpsell, S., Pfitzmann, A.: Mix Cascades vs. Peer-to-Peer: Is One Concept Superior. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 243–255. Springer, Heidelberg (2005)
Böhme, R., Koble, S.: Pricing Strategies in Electronic Marketplaces with Privacy-Enhancing Technologies. Wirtschaftsinformatik 49(1), 16–25 (2007)
Camenisch, J., Piveteau, J., Stadler, M.: An Efficient Fair Payment System. In: Proceedings of the 3rd ACM Conference on Computer and Communication Security (CCS 1996), New Dehli, India (1996)
Chatterjee, P., Hoffman, D.L., Novak, T.P.: Modeling the clickstream: Implications for web-based advertising efforts. Marketing Science 12(4), 520–541 (2003)
Chaum, D.: Blind Signatures for Untraceable Payments. In: Crypto 1982, pp. 199–203. Plenum, New York (1983)
Chaum, D.L.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 24(2), 84–88 (1981)
Clark, J., Van Oorschot, P.C., Adams, C.: Usability of anonymous web browsing: an examination of tor interfaces and deployability. In: Proceedings of the 3rd symposium on Usable privacy and security (SOUPS 2007), New York, NY, pp. 41–51 (2007)
Coopersmith, J.: Pornography. In: Technology and Progress, ICON, vol. 4, pp. 94–125 (1998)
Cronin, B., Davenport, E.: E-rogenous Zones: Positioning Pornography in the digital Economy. The Information Society 17(1) (2001)
Deselaers, T., Keysers, D., Ney, H.: Discriminative Training for Object Recognition using Image Patches. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2005), San Diego, CA, USA, pp. 157–162 (2005)
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium, San Diego, pp. 303–320 (2004)
Dingledine, R., Mathewson, N.: Anonymity loves company: Usability and the network effect. In: The Fifth Workshop on the Economics of Information Security (WEIS 2006), University of Cambridge (2006)
D’Orlando, F.: The Market for Pornography in Italy: Empirical Data and Theoretical Considerations (2008-04-25), http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1125129
Federrath, H., Jerichow, A., Kesdogan, D., Pfitzmann, A., Spaniol, O.: Mobilkommunikation ohne Bewegungsprofile. In: Pfitzmann, A., Müller, G. (eds.) Mehrseitige Sicherheit in der Kommunikationstechnik, pp. 169–180. Addison Wesley, Boston (1997)
Federrath, H.: Privacy Enhanced Technologies: Methods - Markets - Misuse. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol. 3592, pp. 1–9. Springer, Heidelberg (2005)
Feigenbaum, J., Freedman, M., Sander, T., Shostack, A.: Economic barriers to the deployment of existing privacy technology. In: Proceedings of the Workshop on Economics and Information Security, Berkley, CA (2002)
FortConsult: Practical onion hacking: Finding the real address of tor clients (2006)
Fritsch, L., Roßnagel, H., Schwenke, M., Stadler, T.: Die Pflicht zum Angebot anonym nutzbarer Dienste: Eine technische und rechtliche Zumutbarkeitsbetrachtung. Datenschutz und Datensicherheit (DuD) 29(10), 592–596 (2005)
Galletta, D.F., Henry, R., McCoy, S., Polak, P.: Web site delays: How tolerant are users? Journal of the Association for Information Systems 5(1), 1–28 (2004)
Huberman, B.A., Adar, E., Fine, L.R.: Valuating Privacy. IEEE Security & Privacy 3(5), 22–25 (2005)
JonDos GmbH: JonDoFox: Private and Secure Web Browsing (2.1.2), http://www.jondos.de/en/jondofox (accessed 2008-11-30)
Lambiase, J.: Sex: Online and in Internet Advertising. Lawrence Erlbaum Associates, Mahwah (2003)
McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.C.: Shining light in dark places: Understanding the tor network. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 63–76. Springer, Heidelberg (2008)
Murdoch, S.J.: Economics of Tor performance (2007-07-18 ), http://www.lightbluetouchpaper.org/2007/07/18/economics-of-tor-performance/
Odlyzko, A.M.: The Case Against Micropayments. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 77–83. Springer, Heidelberg (2003)
Ozment, A., Schechter, S.E.: Bootstrapping the Adoption of Internet Security Protocols. In: Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006), Cambridge (2006)
Pfitzmann, A., Pfitzmann, B., Waidner, M.: ISDN-mixes: Untraceable communication with very small bandwith overhead. In: Proceedings of the GI/ITG Conference on Communication in Distributed Systems, pp. 451–463 (1991)
Pfitzmann, A., Waidner, M.: Networks without User Observability – Design Options. In: Pichler, F. (ed.) EUROCRYPT 1985. LNCS, vol. 219, pp. 245–253. Springer, Heidelberg (1986)
Pitkow, J.E.: Summary of WWW characterizations. Computer Networks and ISDN Systems 30(1-7), 551–558 (1998)
Rogers, E.M.: Diffusion of Innovations, vol. 5. Free Press, New York (2003)
Roßnagel, H.: Bootstrapping the Adoption of Privacy Enhancing Technology. In: Proceedings of the 1st IDIS Workshop, Arona, Italy (2008)
Schulze, H., Mochalski, K.: Internet Study 2007: The Impact of P2P File Sharing, Voice over IP, Skype, Joost, Instant Messaging, One-Click Hosting and Media Streaming such as YouTube on the Internet (2007), http://www.ipoque.com/resources/internet-studies/internet-study-2007
Shostack, A.: People Won’t Pay For Privacy. In: Reconsidered, 2nd Annual Workshop Economics and Information Security, University of Maryland (2003)
Softonic: XeroBank Browser, http://xerobank-browser.softonic.de/ (accessed 2008-05-20)
Spiekermann, S.: Die Konsumenten der Anonymität: Wer nutzt Anonymisierungsdienste? Datenschutz und Datensicherheit (DuD) 27(3), 150–154 (2003)
Spiekermann, S.: The desire for privacy: Insights into the views and nature of the early adopters of privacy services. International Journal of Technology and Human Interaction 1(1) (2004)
Syverson, P.: The Paradoxical Value of Privacy. In: 2nd Annual Workshop Economics and Information Security, University of Maryland (2003)
Top Ten Reviews: Internet Pornography Statistics (2009), http://internet-filter-review.toptenreviews.com/internet-pornography-statistics.html#anchor1
Tsai, J., Egelman, S., Cranor, L., Acquisti, A.: The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. In: Proceedings of Workshop on the Economics of Information Security, Pittsburgh, PA (2007)
Videoload.de: Pastewka Videoload Peinliche Momente, http://www.youtube.com/watch?v=5rBK4AUljUg (accessed 2008-04-25)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Roßnagel, H., Zibuschka, J., Pimenides, L., Deselaers, T. (2009). Facilitating the Adoption of Tor by Focusing on a Promising Target Group. In: Jøsang, A., Maseng, T., Knapskog, S.J. (eds) Identity and Privacy in the Internet Age. NordSec 2009. Lecture Notes in Computer Science, vol 5838. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04766-4_2
Download citation
DOI: https://doi.org/10.1007/978-3-642-04766-4_2
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04765-7
Online ISBN: 978-3-642-04766-4
eBook Packages: Computer ScienceComputer Science (R0)