Christine Abdalla Mikhaeil, Raji Raman, Tabitha L. James, Viswanath Venkatesh
{"title":"天要塌了,太空站失败了!采用增强私隐技术的调查","authors":"Christine Abdalla Mikhaeil, Raji Raman, Tabitha L. James, Viswanath Venkatesh","doi":"10.1007/s10796-025-10607-0","DOIUrl":null,"url":null,"abstract":"<p>In the age of artificial intelligence (AI) and data-hungry applications, privacy-enhancing technologies (PETs) offer a way for individuals to limit data collection and processing by these applications. Yet, the adoption of PETs remains low and user-focused research on adoption predictors is limited. In this work, we use the unified theory of acceptance and use of technology 2 (UTAUT2) to study the adoption of five categories of personal PETs: private browsing, privacy-focused web browsers, privacy browser extensions, secure (encrypted) messaging, and secure (encrypted) email. Our results confirmed the significant role of social influence and habit as predictors of adoption of PETs but also showed that the adoption of these five categories of PETs was not driven by the same set of factors. These differences call for more contextualized research to study the adoption of PETs and raise the potential issue of the limits of the generalizability of UTAUT2. The discovery of the lack of support for such an established theory also creates the potential for breaking new ground through the development of new theories of adoption that are better suited to the emerging world of technologies including PETs.</p>","PeriodicalId":13610,"journal":{"name":"Information Systems Frontiers","volume":"133 1","pages":""},"PeriodicalIF":6.9000,"publicationDate":"2025-05-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The Sky is Falling, UTAUT Has Failed! An Investigation of the Adoption of Privacy-Enhancing Technologies (PETs)\",\"authors\":\"Christine Abdalla Mikhaeil, Raji Raman, Tabitha L. James, Viswanath Venkatesh\",\"doi\":\"10.1007/s10796-025-10607-0\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>In the age of artificial intelligence (AI) and data-hungry applications, privacy-enhancing technologies (PETs) offer a way for individuals to limit data collection and processing by these applications. Yet, the adoption of PETs remains low and user-focused research on adoption predictors is limited. In this work, we use the unified theory of acceptance and use of technology 2 (UTAUT2) to study the adoption of five categories of personal PETs: private browsing, privacy-focused web browsers, privacy browser extensions, secure (encrypted) messaging, and secure (encrypted) email. Our results confirmed the significant role of social influence and habit as predictors of adoption of PETs but also showed that the adoption of these five categories of PETs was not driven by the same set of factors. These differences call for more contextualized research to study the adoption of PETs and raise the potential issue of the limits of the generalizability of UTAUT2. The discovery of the lack of support for such an established theory also creates the potential for breaking new ground through the development of new theories of adoption that are better suited to the emerging world of technologies including PETs.</p>\",\"PeriodicalId\":13610,\"journal\":{\"name\":\"Information Systems Frontiers\",\"volume\":\"133 1\",\"pages\":\"\"},\"PeriodicalIF\":6.9000,\"publicationDate\":\"2025-05-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information Systems Frontiers\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://doi.org/10.1007/s10796-025-10607-0\",\"RegionNum\":3,\"RegionCategory\":\"管理学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Systems Frontiers","FirstCategoryId":"94","ListUrlMain":"https://doi.org/10.1007/s10796-025-10607-0","RegionNum":3,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
The Sky is Falling, UTAUT Has Failed! An Investigation of the Adoption of Privacy-Enhancing Technologies (PETs)
In the age of artificial intelligence (AI) and data-hungry applications, privacy-enhancing technologies (PETs) offer a way for individuals to limit data collection and processing by these applications. Yet, the adoption of PETs remains low and user-focused research on adoption predictors is limited. In this work, we use the unified theory of acceptance and use of technology 2 (UTAUT2) to study the adoption of five categories of personal PETs: private browsing, privacy-focused web browsers, privacy browser extensions, secure (encrypted) messaging, and secure (encrypted) email. Our results confirmed the significant role of social influence and habit as predictors of adoption of PETs but also showed that the adoption of these five categories of PETs was not driven by the same set of factors. These differences call for more contextualized research to study the adoption of PETs and raise the potential issue of the limits of the generalizability of UTAUT2. The discovery of the lack of support for such an established theory also creates the potential for breaking new ground through the development of new theories of adoption that are better suited to the emerging world of technologies including PETs.
期刊介绍:
The interdisciplinary interfaces of Information Systems (IS) are fast emerging as defining areas of research and development in IS. These developments are largely due to the transformation of Information Technology (IT) towards networked worlds and its effects on global communications and economies. While these developments are shaping the way information is used in all forms of human enterprise, they are also setting the tone and pace of information systems of the future. The major advances in IT such as client/server systems, the Internet and the desktop/multimedia computing revolution, for example, have led to numerous important vistas of research and development with considerable practical impact and academic significance. While the industry seeks to develop high performance IS/IT solutions to a variety of contemporary information support needs, academia looks to extend the reach of IS technology into new application domains. Information Systems Frontiers (ISF) aims to provide a common forum of dissemination of frontline industrial developments of substantial academic value and pioneering academic research of significant practical impact.