Lachlan Moore, Tatsuya Mori (Waseda University, NICT)

This study delves into the utilization patterns, perceptions, and misconceptions surrounding Virtual Private Networks (VPNs) among users in Canada and Japan. We administered a comprehensive survey to 234 VPN users in these two countries, aiming to elucidate the motivations behind VPN usage, users’ comprehension of VPN functionality, and prevalent misconceptions. A distinctive feature of our research lies in its cross-cultural comparison, a departure from previous studies predominantly centered on users within a Western context. Our findings underscore noteworthy distinctions among participant groups. Specifically, Japanese users predominantly employ VPNs for security purposes, whereas Canadian users leverage VPNs for a more diverse array of services, encompassing privacy and access to region-specific content. Furthermore, disparities in VPN understanding emerged, with Canadians demonstrating a superior grasp of VPN applications despite limited technical knowledge, while Japanese participants exhibited a more profound understanding of VPNs, particularly in relation to encrypting transmitted traffic. Notably, both groups exhibited a constrained awareness regarding the data logging practices associated with VPNs. This research significantly contributes to the broader comprehension of VPN usage and sheds light on the cultural intricacies that shape VPN adoption and perceptions, offering valuable insights into the diverse motivations and behaviors of users in Canada and Japan.

View More Papers

Vision: “AccessFormer”: Feedback-Driven Access Control Policy

Sakuna Harinda Jayasundara, Nalin Asanka Gamagedara Arachchilage, Giovanni Russello (University of Auckland)

Read More

Enhance Stealthiness and Transferability of Adversarial Attacks with Class...

Hui Xia (Ocean University of China), Rui Zhang (Ocean University of China), Zi Kang (Ocean University of China), Shuliang Jiang (Ocean University of China), Shuo Xu (Ocean University of China)

Read More

Analyzing and Creating Malicious URLs: A Comparative Study on...

Vincent Drury (IT-Security Research Group, RWTH Aachen University), Rene Roepke (Learning Technologies Research Group, RWTH Aachen University), Ulrik Schroeder (Learning Technologies Research Group, RWTH Aachen University), Ulrike Meyer (IT-Security Research Group, RWTH Aachen University)

Read More

AdvCAPTCHA: Creating Usable and Secure Audio CAPTCHA with Adversarial...

Hao-Ping (Hank) Lee (Carnegie Mellon University), Wei-Lun Kao (National Taiwan University), Hung-Jui Wang (National Taiwan University), Ruei-Che Chang (University of Michigan), Yi-Hao Peng (Carnegie Mellon University), Fu-Yin Cherng (National Chung Cheng University), Shang-Tse Chen (National Taiwan University)

Read More