Amulets, boxers, and cybersecurity: influencer metaphors in VPN advertising and the communication of cybersecurity risk

Authors

  • Yu-Wen Huang National Taiwan University
  • Yu-Jie Lin National Taiwan University
  • Kai-Hsiang Chou National Taiwan University
  • An-Jie Li Eidgenössische Technische Hochschule
  • Tsai-Hsuan Hsieh Georgia Institute of Technology
  • Li-Fei Kung National Institute of Cyber Security
  • Wie Jeng National Taiwan University

DOI:

https://doi.org/10.47989/ir31iConf64145

Keywords:

Cybersecurity, VPN advertisements, Qualitative analysis, Science communication, Metaphor

Abstract

Introduction. VPNs primarily establish encrypted tunnels for network traffic and mask users’ IP addresses; they do not inherently block malware, phishing, or denial-of-service attacks. Yet advertising content often portray VPNs as comprehensive security solutions, blurring public understandings of what these tools can and cannot do. This exploratory study examines how YouTube influencers in Taiwan frame VPNs in sponsored content and communicate cybersecurity risks.

Method. This study employs qualitative content analysis of sponsored VPN videos published by top Taiwanese YouTube influencers. Data include 20 videos and 99 close-watching observation notes documenting narrative strategies in promotional contexts.

Analysis. Using open coding and iterative qualitative analysis, we examine influencer narratives across four analytical dimensions informed by risk communication frameworks: technical accuracy, risk translation, metaphorical strategies, and audience engagement.

Results. This study identifies several recurring strategies in VPN-sponsored videos, including simplifying technical descriptions, reframing risks as consumer disadvantages, and using metaphors or everyday scenarios to make VPNs more relatable. While these tactics increased accessibility and entertainment value, they also risked obscuring the conditional and limited scope of VPNs.

Conclusion. The findings show how vernacular metaphors and promotional framings shape public understandings of digital security, extending cybersecurity communication research beyond news or policy discourse.

References

Akgul, O., Roberts, R., Namara, M., Levin, D., & Mazurek, M. L. (2022). Investigating influencer VPN ads on YouTube. 2022 IEEE Symposium on Security and Privacy (SP), 876–892. https://doi.org/10.1109/SP46214.2022.9833633

Akgul, O., Roberts, R., Shroyer, E., Levin, D., & Mazurek, M. L. (2024). As advertised? Understanding the impact of influencer VPN ads. arXiv. https://doi.org/10.48550/arXiv.2406.13017

Almansoori, A., Al-Emran, M., & Shaalan, K. (2023). Exploring the frontiers of cybersecurity behavior: A systematic review of studies and theories. Applied Sciences, 13(9), 5700. https://doi.org/10.3390/app13095700

Álvarez-Monzoncillo, J. M. (Ed.). (2023). The dynamics of influencer marketing: A multidisciplinary approach. Routledge. https://doi.org/10.4324/9781003134176

Bada, S., Sasse, M. A., & Nurse, J. R. C. (2015, February). Cyber security awareness campaigns: Why do they fail to change behaviour? In International Conference on Cyber Security for Sustainable Society (CSSS 2015).

Chen, W.-N., Huang, P.-P., Huang, Y.-W., Lin, Y.-J., & Jeng, W. (2025). Decoding cybersecurity for civic defense: Exploring real-world cybersecurity metaphors from digital frontlines [Conference poster]. iConference 2025 Proceedings. iSchools. https://hdl.handle.net/2142/126203

Das, S., Faklaris, C., Hong, J. I., & Dabbish, L. A. (2022). The security & privacy acceptance framework (SPAF). Foundations and Trends® in Privacy and Security, 5(1–2), 1–143.

Fischhoff, B. (1995). Risk perception and communication unplugged: Twenty years of process. Risk Analysis, 15(2), 137–145. https://doi.org/10.1111/j.1539-6924.1995.tb00308.x

Goldhammer, J. (2015, March 16). Cybersecurity metaphors: How they shape national cyber policy, technical research and the future of US national security. Lawrence Livermore National Laboratory, California, U.S. https://www.youtube.com/watch?v=yrGLGqB6y9U

Hsieh, T.-H., Lin, Y.-J., Huang, Y.-W., Chou, K.-H., Li, A.-J., Kung, L.-F. and Jeng, W. (2025), Conversations Reimagined: Human-AI Collaboration in Analyzing How Creators Explain Security and Privacy Tools. Proceedings of the Association for Information Science and Technology, 62: 1478-1480. https://doi.org/10.1002/pra2.1440

Internet World Stats. (2020, March 31). Top ten Internet languages in the world – Internet statistics (Number of Internet users by language). Retrieved August 31, 2025, from https://www.internetworldstats.com/stats7.htm

Malcolm, J., Hodkinson, P., & Colley, H. (2003). The interrelationships between informal and formal learning. Journal of Workplace Learning. https://doi.org/10.1108/13665620310504783

Ministry of Digital Affairs. (2024). National Cyber Security Status Report 2023. Ministry of Digital Affairs, Taiwan. https://moda.gov.tw

Nurse, J. R. C., Creese, S., Goldsmith, M., & Lamberts, K. (2011, September). Trustworthy and effective communication of cybersecurity risks: A review. In 2011 International Conference on Availability, Reliability and Security (pp. 19–26). IEEE. https://doi.org/10.1109/ARES.2011.11

Ollis, T. (2011). Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning, 51(2), 248–268.

Redmiles, E. M., Kross, S., & Mazurek, M. L. (2016). How I learned to be secure: A census-representative survey of security advice sources and behavior. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS ’16) (pp. 666–677). Association for Computing Machinery. https://doi.org/10.1145/2976749.2978307

Reuters. (2025, January 6). Chinese cyberattacks on Taiwan government averaged 2.4 mln a day in 2024, report says. Reuters. https://www.reuters.com/technology/cybersecurity/chinese-cyberattacks-taiwan-government-averaged-24-mln-day-2024-report-says-2025-01-06

Strauss, A., & Corbin, J. M. (1990). Basics of qualitative research: Grounded theory procedures and techniques. Sage Publications, Inc.

Wash, R. (2010). Folk models of home computer security. In Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS ’10) (pp. 1–16). Association for Computing Machinery. https://doi.org/10.1145/1837110.1837125

Yuan, Y., Du, Y., Yao, F., Zhu, Y., & Lv, Z. (2020). Influencers in intercultural communication: Analysis of opportunities and risks. Frontiers in Economics and Management, 1(12), 52–57.

Downloads

Published

2026-03-20

How to Cite

Huang, Y.-W., Lin, Y.-J., Chou, K.-H., Li, A.-J., Hsieh, T.-H., Kung, L.-F., & Jeng, W. (2026). Amulets, boxers, and cybersecurity: influencer metaphors in VPN advertising and the communication of cybersecurity risk. Information Research an International Electronic Journal, 31(iConf), 871–885. https://doi.org/10.47989/ir31iConf64145

Issue

Section

Conference proceedings

Similar Articles

1 2 3 4 5 6 7 8 9 10 > >> 

You may also start an advanced similarity search for this article.