Skip to main content

Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App

  • Conference paper
  • First Online:
Information and Communications Security (ICICS 2020)

Abstract

A Virtual Private Network (VPN) helps to mitigate security and privacy risks of data transmitting on unsecured network such as public Wi-Fi. However, despite awareness of public Wi-Fi risks becoming increasingly common, the use of VPN when using public Wi-Fi is low. To increase adoption, understanding factors driving user decision to adopt a VPN app is an important first step. This study is the first to achieve this objective using discrete choice experiments (DCEs) to elicit individual preferences of specific attributes of a VPN app. The experiments were run in the United Kingdom (UK) and Japan (JP). We first interviewed participants (15 UK, 17 JP) to identify common attributes of a VPN app which they considered important. The results were used to design and run a DCE in each country. Participants (149 UK, 94 JP) were shown a series of two hypothetical VPN apps, varying in features, and were asked to choose one which they preferred. Customer review rating, followed by price of a VPN app, significantly affected the decision to choose which VPN app to download and install. A change from a rating of 3 to 4–5 stars increased the probability of choosing an app by 33% in the UK and 14% in Japan. Unsurprisingly, price was a deterrent. Recommendations by friends, source of product reviews, and the presence of in-app ads also played a role but to a lesser extent. To actually use a VPN app, participants considered Internet speed, connection stability, battery level on mobile devices, and the presence of in-app ads as key drivers. Participants in the UK and in Japan prioritized these attributes differently, suggesting possible influences from cultural differences.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    As of May 2020.

  2. 2.

    Along with Australia, Poland, Canada, Netherlands, and France.

  3. 3.

    Defined as \(\exp {(U)}/(\exp {(U)}+\exp {(U_{b})})\) where U is the utility for the current settings and \(U_{b}\) is the utility for the baseline settings; implies that the probability for the baseline settings is 0.5 [21].

  4. 4.

    Set as a free app ( 0), moderate app review rating, not referred by friends, had \({<}10,000\) download, and had an amateur-looking interface.

  5. 5.

    Set as a free app (¥0), moderate app review rating (based on info from App store), had \({<}1,000\) downloads, had in-app ads, and required \({<}5\) mins installation.

  6. 6.

    Set as 3–4 dropped connections/hr, 10–20% slower in Internet speed (when using VPN), manual VPN initiation, and there was 75–100% battery level left on a user’s mobile device.

  7. 7.

    Set as 3–4 dropped connections/hr, 10–20% slower in Internet speed (when using VPN), has in-app ads, manual VPN initiation, and there was 75–100% battery level on a user’s mobile.

References

  1. Ali, S., Osman, T., Mannan, M., Youssef, A.: On privacy risks of public WiFi captive portals. arXiv preprint arXiv:1907.02142 (2019)

  2. Appelbaum, J., Ray, M., Koscher, K., Finder, I.: vpwns: Virtual pwned networks. In: 2nd USENIX Workshop on Free and Open Communications on the Internet. USENIX Association (2012)

    Google Scholar 

  3. Baddeley, M.: Copycats & Contrarians: Why We Follow Others... and When We Don’t. Yale University Press (2018)

    Google Scholar 

  4. Chen, S., Wang, R., Wang, X., Zhang, K.: Side-channel leaks in web applications: a reality today, a challenge tomorrow. In: 2010 IEEE Symposium on Security and Privacy (SP), pp. 191–206. IEEE (2010)

    Google Scholar 

  5. F-Secure: The f-secure wi-fi experiment (2014). www.fsecureconsumer.files.wordpress.com/2014/09/wi-fi_report_2014_f-secure.pdf

  6. Ghaoui, N., et al.: Policy strategies for VPN for consumers in the Netherlands (2017)

    Google Scholar 

  7. Ikram, M., Vallina-Rodriguez, N., Seneviratne, S., Kaafar, M.A., Paxson, V.: An analysis of the privacy and security risks of Android VPN apps. In: Proceedings of the 2016 Internet Measurement Conference, pp. 349–364. ACM (2016)

    Google Scholar 

  8. Johnson, F.R., et al.: Constructing experimental designs for DCEs: report of the ISPOR conjoint analysis experimental design good research practices task force. Value Health 16(1), 3–13 (2013)

    Google Scholar 

  9. Kahneman, D., Knetsch, J.L., Thaler, R.H.: Anomalies: the endowment effect, loss aversion, and status quo bias. J. Econ. Perspect. 5(1), 193–206 (1991)

    Article  Google Scholar 

  10. Kaspersky: Kaspersky report: Fy2018 security awareness survey, Jan 2019. https://www.kaspersky.co.jp/about/press-releases/2019_vir22012019

  11. Khan, M.T., DeBlasio, J., Voelker, G.M., Snoeren, A.C., Kanich, C., Vallina-Rodriguez, N.: An empirical analysis of the commercial VPN ecosystem. In: Proceedings of the Internet Measurement Conference 2018, pp. 443–456. ACM (2018)

    Google Scholar 

  12. Kuhfeld, W.F.: Experimental design, efficiency, coding, and choice designs. Marketing research methods in SAS: Experimental design, choice, conjoint, and graphical techniques, pp. 47–97 (2005)

    Google Scholar 

  13. Lancaster, K.J.: A new approach to consumer theory. J. Polit. Econ. 74(2), 132–157 (1966)

    Article  Google Scholar 

  14. Baddeley, M.: Behavioural Economics: A Very Short Introduction, vol. 505. Oxford University Press (2017)

    Google Scholar 

  15. McFadden, D., et al.: Conditional logit analysis of qualitative choice behavior (1973)

    Google Scholar 

  16. Nolan, J.M., Schultz, P.W., Cialdini, R.B., Goldstein, N.J., Griskevicius, V.: Normative social influence is underdetected. Pers. Soc. Psychol. Bull. 34(7), 913–923 (2008)

    Article  Google Scholar 

  17. Norton: Public Wi-Fi security? Here’s why you should use a VPN. (2016). https://uk.norton.com/norton-blog/2016/10/public_wi-fi_securit.html

  18. Perta, V.C., Barbera, M.V., Tyson, G., Haddadi, H., Mei, A.: A glance through the VPN looking glass: IPv6 leakage and DNS Hijacking in commercial VPN clients. Proc. Privacy Enhancing Technol. 2015(1), 77–91 (2015)

    Article  Google Scholar 

  19. Ryan, M., Gerard, K., Amaya-Amaya, M.: Using Discrete Choice Experiments to Value Health and Health Care, vol. 11. Springer, Heidelberg (2007). https://doi.org/10.1007/978-1-4020-5753-3

  20. Ryan, M., Gerard, K., Amaya-Amaya, M.: Discrete choice experiments in a nutshell. In: Ryan, M., Gerard, K., Amaya-Amaya, M. (eds.) Using Discrete Choice Experiments to Value Health and Health Care, pp. 13–46. Springer, Heidelberg (2008). https://doi.org/10.1007/978-1-4020-5753-3_1

  21. SAS: Jmp 14.0 consumer research (2018). https://support.sas.com/documentation/onlinedoc/jmp/14.0/Consumer-Research.pdf

  22. Sombatruang, N., Kadobayashi, Y., Sasse, M.A., Baddeley, M., Miyamoto, D.: The continued risks of unsecured public Wi-Fi and why users keep using it. In: 2018 16th Annual Conference on Privacy, Security and Trust (PST), pp. 1–11. IEEE (2018)

    Google Scholar 

  23. Sombatruang, N., Sasse, M.A., Baddeley, M.: Why do people use unsecure public Wi-Fi? In: Proceedings of the 6th Workshop on Socio-Technical Aspects in Security and Trust, pp. 61–72. ACM (2016)

    Google Scholar 

  24. Symantec: Wi-fi risk report (2017). www.symantec.com/content/dam/symantec/docs/reports/2017-norton-wifi-risk-report-global-results-summary-en.pdf

  25. Vaniea, K., Rashidi, Y.: Tales of software updates: the process of updating software. In: Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems, pp. 3215–3226. ACM (2016)

    Google Scholar 

  26. VPNMentor: Vpn use and data privacy stats for 2019 (2019). https://www.vpnmentor.com/blog/vpn-use-data-privacy-stats. Accessed 24 Aug 2019

  27. YouGov: Almost half of VPN users are accessing region-based content, May 2017. https://yougov.co.uk/topics/politics/articles-reports/2017/05/17/almost-half-vpn-users-are-accessing-region-based-c

  28. Zhang, Q., Li, J., Zhang, Y., Wang, H., Gu, D.: Oh-Pwn-VPN! security analysis of OpenVPN-based Android apps. In: Capkun, S., Chow, S.S.M. (eds.) CANS 2017. LNCS, vol. 11261, pp. 373–389. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-02641-7_17

    Chapter  Google Scholar 

Download references

Acknowledgement

This work was funded by the ICS-CoE Core Human Resources Development Program and the EU TEAM Erasmus Mundus scholarship. We thank Caroline Wardle, Kuniko Kumano, Takahashi Hideaki, Shane Johnson, and iPLab members for their help, and Lyn Lua and Yvette Vermeer for reviewing the paper.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nissy Sombatruang .

Editor information

Editors and Affiliations

Appendix

Appendix

Table 4. Demographic of participants in the interviews
Table 5. Demographic of participants in the DCE
Fig. 3.
figure 3

The main effects’ marginal probability and utility for the uptake decisions

Fig. 4.
figure 4

The main effects’ marginal probability and utility for the decisions to use a VPN app

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sombatruang, N., Omiya, T., Miyamoto, D., Sasse, M.A., Kadobayashi, Y., Baddeley, M. (2020). Attributes Affecting User Decision to Adopt a Virtual Private Network (VPN) App. In: Meng, W., Gollmann, D., Jensen, C.D., Zhou, J. (eds) Information and Communications Security. ICICS 2020. Lecture Notes in Computer Science(), vol 12282. Springer, Cham. https://doi.org/10.1007/978-3-030-61078-4_13

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-61078-4_13

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-61077-7

  • Online ISBN: 978-3-030-61078-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics