Data underlying the research of VPN Mental Models Among Experts and Non-Experts in a Corporate Context
doi:10.4121/17118491.v1
The doi above is for this specific version of this dataset, which is currently the latest. Newer versions may be published in the future.
For a link that will always point to the latest version, please use
doi: 10.4121/17118491
doi: 10.4121/17118491
Datacite citation style:
Binkhorst, Veroniek; Fiebig, Tobias; Krombholz, Katharina; Pieters, Wolter; Labunets, Kate (2021): Data underlying the research of VPN Mental Models Among Experts and Non-Experts in a Corporate Context. Version 1. 4TU.ResearchData. dataset. https://doi.org/10.4121/17118491.v1
Other citation styles (APA, Harvard, MLA, Vancouver, Chicago, IEEE) available at Datacite
Dataset
usage stats
1622
views
132
downloads
geolocation
The Netherlands
time coverage
June-July 2020
licence
CC BY-NC-ND 4.0
This dataset contains the summary of demographic information, anonymized semi-structured interview transcripts, and drawings resulting from our study on mental models or VPN technology among experts and non-experts in a professional service firm in the Netherlands. The interviews were conducted in June and July 2020. We conducted semi-structured interviews with eleven experts and seven non-experts. We also asked our participants to complete a drawing exercise to help participants to think aloud about how the VPN is organized and functions. Five interviews were conducted in English, and thirteen were in Dutch.
The interview questions were focused on the following topics:1) What a VPN is? 2) For what purpose a VPN is used? 3) What the technical infrastructure of a VPN looks like? 3) What the security benefits and/or risks of using a VPN are? 4) What changes occur in the threat landscape when using a VPN?5) What the impact of a possible attack could be when using a VPN.
This research project was reviewed and approved by the Human Research Ethics Committee of the Delft University of Technology (reference number: 55223).
The interview questions were focused on the following topics:1) What a VPN is? 2) For what purpose a VPN is used? 3) What the technical infrastructure of a VPN looks like? 3) What the security benefits and/or risks of using a VPN are? 4) What changes occur in the threat landscape when using a VPN?5) What the impact of a possible attack could be when using a VPN.
This research project was reviewed and approved by the Human Research Ethics Committee of the Delft University of Technology (reference number: 55223).
history
- 2021-12-07 first online, published, posted
publisher
4TU.ResearchData
format
application/msword, application/msexcel, application/paint, application/zip
language
nl
organizations
TU Delft, Faculty of Technology, Policy and Management
DATA
files (1)
- 4,300,828 bytesMD5:
8ff2e831c378399a1ea1ad0152d5e14c
data.zip -
download all files (zip)
4,300,828 bytes unzipped