Amulets, boxers, and cybersecurity: influencer metaphors in VPN advertising and the communication of cybersecurity risk
DOI:
https://doi.org/10.47989/ir31iConf64145Keywords:
Cybersecurity, VPN advertisements, Qualitative analysis, Science communication, MetaphorAbstract
Introduction. VPNs primarily establish encrypted tunnels for network traffic and mask users’ IP addresses; they do not inherently block malware, phishing, or denial-of-service attacks. Yet advertising content often portray VPNs as comprehensive security solutions, blurring public understandings of what these tools can and cannot do. This exploratory study examines how YouTube influencers in Taiwan frame VPNs in sponsored content and communicate cybersecurity risks.
Method. This study employs qualitative content analysis of sponsored VPN videos published by top Taiwanese YouTube influencers. Data include 20 videos and 99 close-watching observation notes documenting narrative strategies in promotional contexts.
Analysis. Using open coding and iterative qualitative analysis, we examine influencer narratives across four analytical dimensions informed by risk communication frameworks: technical accuracy, risk translation, metaphorical strategies, and audience engagement.
Results. This study identifies several recurring strategies in VPN-sponsored videos, including simplifying technical descriptions, reframing risks as consumer disadvantages, and using metaphors or everyday scenarios to make VPNs more relatable. While these tactics increased accessibility and entertainment value, they also risked obscuring the conditional and limited scope of VPNs.
Conclusion. The findings show how vernacular metaphors and promotional framings shape public understandings of digital security, extending cybersecurity communication research beyond news or policy discourse.
References
Akgul, O., Roberts, R., Namara, M., Levin, D., & Mazurek, M. L. (2022). Investigating influencer VPN ads on YouTube. 2022 IEEE Symposium on Security and Privacy (SP), 876–892. https://doi.org/10.1109/SP46214.2022.9833633
Akgul, O., Roberts, R., Shroyer, E., Levin, D., & Mazurek, M. L. (2024). As advertised? Understanding the impact of influencer VPN ads. arXiv. https://doi.org/10.48550/arXiv.2406.13017
Almansoori, A., Al-Emran, M., & Shaalan, K. (2023). Exploring the frontiers of cybersecurity behavior: A systematic review of studies and theories. Applied Sciences, 13(9), 5700. https://doi.org/10.3390/app13095700
Álvarez-Monzoncillo, J. M. (Ed.). (2023). The dynamics of influencer marketing: A multidisciplinary approach. Routledge. https://doi.org/10.4324/9781003134176
Bada, S., Sasse, M. A., & Nurse, J. R. C. (2015, February). Cyber security awareness campaigns: Why do they fail to change behaviour? In International Conference on Cyber Security for Sustainable Society (CSSS 2015).
Chen, W.-N., Huang, P.-P., Huang, Y.-W., Lin, Y.-J., & Jeng, W. (2025). Decoding cybersecurity for civic defense: Exploring real-world cybersecurity metaphors from digital frontlines [Conference poster]. iConference 2025 Proceedings. iSchools. https://hdl.handle.net/2142/126203
Das, S., Faklaris, C., Hong, J. I., & Dabbish, L. A. (2022). The security & privacy acceptance framework (SPAF). Foundations and Trends® in Privacy and Security, 5(1–2), 1–143.
Fischhoff, B. (1995). Risk perception and communication unplugged: Twenty years of process. Risk Analysis, 15(2), 137–145. https://doi.org/10.1111/j.1539-6924.1995.tb00308.x
Goldhammer, J. (2015, March 16). Cybersecurity metaphors: How they shape national cyber policy, technical research and the future of US national security. Lawrence Livermore National Laboratory, California, U.S. https://www.youtube.com/watch?v=yrGLGqB6y9U
Hsieh, T.-H., Lin, Y.-J., Huang, Y.-W., Chou, K.-H., Li, A.-J., Kung, L.-F. and Jeng, W. (2025), Conversations Reimagined: Human-AI Collaboration in Analyzing How Creators Explain Security and Privacy Tools. Proceedings of the Association for Information Science and Technology, 62: 1478-1480. https://doi.org/10.1002/pra2.1440
Internet World Stats. (2020, March 31). Top ten Internet languages in the world – Internet statistics (Number of Internet users by language). Retrieved August 31, 2025, from https://www.internetworldstats.com/stats7.htm
Malcolm, J., Hodkinson, P., & Colley, H. (2003). The interrelationships between informal and formal learning. Journal of Workplace Learning. https://doi.org/10.1108/13665620310504783
Ministry of Digital Affairs. (2024). National Cyber Security Status Report 2023. Ministry of Digital Affairs, Taiwan. https://moda.gov.tw
Nurse, J. R. C., Creese, S., Goldsmith, M., & Lamberts, K. (2011, September). Trustworthy and effective communication of cybersecurity risks: A review. In 2011 International Conference on Availability, Reliability and Security (pp. 19–26). IEEE. https://doi.org/10.1109/ARES.2011.11
Ollis, T. (2011). Learning in social action: The informal and social learning dimensions of circumstantial and lifelong activists. Australian Journal of Adult Learning, 51(2), 248–268.
Redmiles, E. M., Kross, S., & Mazurek, M. L. (2016). How I learned to be secure: A census-representative survey of security advice sources and behavior. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (CCS ’16) (pp. 666–677). Association for Computing Machinery. https://doi.org/10.1145/2976749.2978307
Reuters. (2025, January 6). Chinese cyberattacks on Taiwan government averaged 2.4 mln a day in 2024, report says. Reuters. https://www.reuters.com/technology/cybersecurity/chinese-cyberattacks-taiwan-government-averaged-24-mln-day-2024-report-says-2025-01-06
Strauss, A., & Corbin, J. M. (1990). Basics of qualitative research: Grounded theory procedures and techniques. Sage Publications, Inc.
Wash, R. (2010). Folk models of home computer security. In Proceedings of the Sixth Symposium on Usable Privacy and Security (SOUPS ’10) (pp. 1–16). Association for Computing Machinery. https://doi.org/10.1145/1837110.1837125
Yuan, Y., Du, Y., Yao, F., Zhu, Y., & Lv, Z. (2020). Influencers in intercultural communication: Analysis of opportunities and risks. Frontiers in Economics and Management, 1(12), 52–57.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2026 Yu-Wen Huang, Yu-Jie Lin, Kai-Hsiang Chou, An-Jie Li, Tsai-Hsuan Hsieh, Li-Fei Kung, Wie Jeng

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
