Skip to main content

Facilitating the Adoption of Tor by Focusing on a Promising Target Group

  • Conference paper
Identity and Privacy in the Internet Age (NordSec 2009)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 5838))

Included in the following conference series:

Abstract

The technology for anonymous communication has been thoroughly researched. But despite the existence of several protection services, a business model for anonymous web surfing has not emerged as of today. One possibility to stimulate adoption is to facilitate it in a specific subnet. The idea is to identify a promising target group which has a substantial benefit from adopting the technology and to facilitate the adoption within that target group. We examine the feasibility of this approach for anonymity services. We identify a potential target group – consumers of pornographic online material – and empirically validate their suitability by conducting a traffic analysis. We also discuss several business models for anonymity services. We argue that providers of anonymity services should try to generate revenue from content providers like adult entertainment distributors. The latter could benefit from offering anonymous access to their products by differentiating against competitors or by selling their products at a higher price over the anonymous channel.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Acquisti, A., Grossklags, J.: Privacy and Rationality in Individual Decision Making. IEEE Security & Privacy 3(1), 26–33 (2005)

    Article  Google Scholar 

  2. Acquisti, A.: Privacy and Security of Personal Information: Economic Incentive and Technological Solutions. In: Camp, J., Lewis, R. (eds.) The Economics of Information Security, pp. 1–9. Kluwer, Dordrecht (2004)

    Google Scholar 

  3. Acquisti, A.: Privacy in Electronic Commerce and the Economics of Immediate Gratification. In: Proceedings of the EC 2004. ACM, New York (2004)

    Google Scholar 

  4. Ang, E.X.Y., Kwan, J.W.Y., Teo, J., Chua, C.E.H.: Why Do People Pay for Information Goods?: A Study of the Online Porn Industry. In: Proceedings of the Twelfth Americas Conference on Information Systems (AMCIS 2006), AIS, Acapulco, Mexico, pp. 73–77 (2006)

    Google Scholar 

  5. Angell, I.O.: Ethics and Morality: a business opportunity for the Amoral? Journal of Information System Security 3(1), 3–18 (2007)

    Google Scholar 

  6. Bazak, A., King, S.A.: The Two Faces of the Internet: Introduction to the Special Issue on the Internet and Sexuality. CyberPsychology & Behavior 3(4), 517–520 (2000)

    Article  Google Scholar 

  7. Belanger, F., Hiller, J.S., Smith, W.J.: Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems (11), 245–270 (2002)

    Google Scholar 

  8. Berendt, B., Günther, O., Spiekermann, S.: Privacy in E-Commerce: Stated Preferences vs. Actual Behavior. Communications of the ACM 48(4), 101–106 (2005)

    Article  Google Scholar 

  9. Berthold, O., Federrath, H., Köpsell, S.: Web MIXes: A system for anonymous and unobservable Internet access. In: Federrath, H. (ed.) Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pp. 115–129. Springer, Heidelberg (2000)

    Google Scholar 

  10. Brener, N.D., Billy, J.O.G., Grady, W.R.: Assessment of Factors Affecting the Validity of Self-Reported Health-Risk Behavior Among Adolescents: Evidence From the Scientific Literature. Journal of Adolescent Health 33, 436–457 (2003)

    Article  Google Scholar 

  11. Böhme, R., Danezis, G., Díaz, C., Köpsell, S., Pfitzmann, A.: Mix Cascades vs. Peer-to-Peer: Is One Concept Superior. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 243–255. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  12. Böhme, R., Koble, S.: Pricing Strategies in Electronic Marketplaces with Privacy-Enhancing Technologies. Wirtschaftsinformatik 49(1), 16–25 (2007)

    Article  Google Scholar 

  13. Camenisch, J., Piveteau, J., Stadler, M.: An Efficient Fair Payment System. In: Proceedings of the 3rd ACM Conference on Computer and Communication Security (CCS 1996), New Dehli, India (1996)

    Google Scholar 

  14. Chatterjee, P., Hoffman, D.L., Novak, T.P.: Modeling the clickstream: Implications for web-based advertising efforts. Marketing Science 12(4), 520–541 (2003)

    Article  Google Scholar 

  15. Chaum, D.: Blind Signatures for Untraceable Payments. In: Crypto 1982, pp. 199–203. Plenum, New York (1983)

    Google Scholar 

  16. Chaum, D.L.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 24(2), 84–88 (1981)

    Article  Google Scholar 

  17. Clark, J., Van Oorschot, P.C., Adams, C.: Usability of anonymous web browsing: an examination of tor interfaces and deployability. In: Proceedings of the 3rd symposium on Usable privacy and security (SOUPS 2007), New York, NY, pp. 41–51 (2007)

    Google Scholar 

  18. Coopersmith, J.: Pornography. In: Technology and Progress, ICON, vol. 4, pp. 94–125 (1998)

    Google Scholar 

  19. Cronin, B., Davenport, E.: E-rogenous Zones: Positioning Pornography in the digital Economy. The Information Society 17(1) (2001)

    Google Scholar 

  20. Deselaers, T., Keysers, D., Ney, H.: Discriminative Training for Object Recognition using Image Patches. In: Proceedings of IEEE Conference on Computer Vision and Pattern Recognition (CVPR 2005), San Diego, CA, USA, pp. 157–162 (2005)

    Google Scholar 

  21. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium, San Diego, pp. 303–320 (2004)

    Google Scholar 

  22. Dingledine, R., Mathewson, N.: Anonymity loves company: Usability and the network effect. In: The Fifth Workshop on the Economics of Information Security (WEIS 2006), University of Cambridge (2006)

    Google Scholar 

  23. D’Orlando, F.: The Market for Pornography in Italy: Empirical Data and Theoretical Considerations (2008-04-25), http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1125129

  24. Federrath, H., Jerichow, A., Kesdogan, D., Pfitzmann, A., Spaniol, O.: Mobilkommunikation ohne Bewegungsprofile. In: Pfitzmann, A., Müller, G. (eds.) Mehrseitige Sicherheit in der Kommunikationstechnik, pp. 169–180. Addison Wesley, Boston (1997)

    Google Scholar 

  25. Federrath, H.: Privacy Enhanced Technologies: Methods - Markets - Misuse. In: Katsikas, S.K., López, J., Pernul, G. (eds.) TrustBus 2005. LNCS, vol. 3592, pp. 1–9. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  26. Feigenbaum, J., Freedman, M., Sander, T., Shostack, A.: Economic barriers to the deployment of existing privacy technology. In: Proceedings of the Workshop on Economics and Information Security, Berkley, CA (2002)

    Google Scholar 

  27. FortConsult: Practical onion hacking: Finding the real address of tor clients (2006)

    Google Scholar 

  28. Fritsch, L., Roßnagel, H., Schwenke, M., Stadler, T.: Die Pflicht zum Angebot anonym nutzbarer Dienste: Eine technische und rechtliche Zumutbarkeitsbetrachtung. Datenschutz und Datensicherheit (DuD) 29(10), 592–596 (2005)

    Google Scholar 

  29. Galletta, D.F., Henry, R., McCoy, S., Polak, P.: Web site delays: How tolerant are users? Journal of the Association for Information Systems 5(1), 1–28 (2004)

    Google Scholar 

  30. Huberman, B.A., Adar, E., Fine, L.R.: Valuating Privacy. IEEE Security & Privacy 3(5), 22–25 (2005)

    Article  Google Scholar 

  31. JonDos GmbH: JonDoFox: Private and Secure Web Browsing (2.1.2), http://www.jondos.de/en/jondofox (accessed 2008-11-30)

  32. Lambiase, J.: Sex: Online and in Internet Advertising. Lawrence Erlbaum Associates, Mahwah (2003)

    Google Scholar 

  33. McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.C.: Shining light in dark places: Understanding the tor network. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 63–76. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  34. Murdoch, S.J.: Economics of Tor performance (2007-07-18 ), http://www.lightbluetouchpaper.org/2007/07/18/economics-of-tor-performance/

  35. Odlyzko, A.M.: The Case Against Micropayments. In: Wright, R.N. (ed.) FC 2003. LNCS, vol. 2742, pp. 77–83. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  36. Ozment, A., Schechter, S.E.: Bootstrapping the Adoption of Internet Security Protocols. In: Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006), Cambridge (2006)

    Google Scholar 

  37. Pfitzmann, A., Pfitzmann, B., Waidner, M.: ISDN-mixes: Untraceable communication with very small bandwith overhead. In: Proceedings of the GI/ITG Conference on Communication in Distributed Systems, pp. 451–463 (1991)

    Google Scholar 

  38. Pfitzmann, A., Waidner, M.: Networks without User Observability – Design Options. In: Pichler, F. (ed.) EUROCRYPT 1985. LNCS, vol. 219, pp. 245–253. Springer, Heidelberg (1986)

    Chapter  Google Scholar 

  39. Pitkow, J.E.: Summary of WWW characterizations. Computer Networks and ISDN Systems 30(1-7), 551–558 (1998)

    Article  Google Scholar 

  40. Rogers, E.M.: Diffusion of Innovations, vol. 5. Free Press, New York (2003)

    Google Scholar 

  41. Roßnagel, H.: Bootstrapping the Adoption of Privacy Enhancing Technology. In: Proceedings of the 1st IDIS Workshop, Arona, Italy (2008)

    Google Scholar 

  42. Schulze, H., Mochalski, K.: Internet Study 2007: The Impact of P2P File Sharing, Voice over IP, Skype, Joost, Instant Messaging, One-Click Hosting and Media Streaming such as YouTube on the Internet (2007), http://www.ipoque.com/resources/internet-studies/internet-study-2007

  43. Shostack, A.: People Won’t Pay For Privacy. In: Reconsidered, 2nd Annual Workshop Economics and Information Security, University of Maryland (2003)

    Google Scholar 

  44. Softonic: XeroBank Browser, http://xerobank-browser.softonic.de/ (accessed 2008-05-20)

  45. Spiekermann, S.: Die Konsumenten der Anonymität: Wer nutzt Anonymisierungsdienste? Datenschutz und Datensicherheit (DuD) 27(3), 150–154 (2003)

    Google Scholar 

  46. Spiekermann, S.: The desire for privacy: Insights into the views and nature of the early adopters of privacy services. International Journal of Technology and Human Interaction 1(1) (2004)

    Google Scholar 

  47. Syverson, P.: The Paradoxical Value of Privacy. In: 2nd Annual Workshop Economics and Information Security, University of Maryland (2003)

    Google Scholar 

  48. Top Ten Reviews: Internet Pornography Statistics (2009), http://internet-filter-review.toptenreviews.com/internet-pornography-statistics.html#anchor1

  49. Tsai, J., Egelman, S., Cranor, L., Acquisti, A.: The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. In: Proceedings of Workshop on the Economics of Information Security, Pittsburgh, PA (2007)

    Google Scholar 

  50. Videoload.de: Pastewka Videoload Peinliche Momente, http://www.youtube.com/watch?v=5rBK4AUljUg (accessed 2008-04-25)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Roßnagel, H., Zibuschka, J., Pimenides, L., Deselaers, T. (2009). Facilitating the Adoption of Tor by Focusing on a Promising Target Group. In: Jøsang, A., Maseng, T., Knapskog, S.J. (eds) Identity and Privacy in the Internet Age. NordSec 2009. Lecture Notes in Computer Science, vol 5838. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04766-4_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-04766-4_2

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-04765-7

  • Online ISBN: 978-3-642-04766-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics