{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,21]],"date-time":"2026-01-21T15:39:18Z","timestamp":1769009958702,"version":"3.49.0"},"publisher-location":"Boston","reference-count":13,"publisher":"Kluwer Academic Publishers","isbn-type":[{"value":"1402080891","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/1-4020-8090-5_10","type":"book-chapter","created":{"date-parts":[[2006,1,14]],"date-time":"2006-01-14T08:04:14Z","timestamp":1137225854000},"page":"129-142","source":"Crossref","is-referenced-by-count":12,"title":["What Price Privacy?"],"prefix":"10.1007","author":[{"given":"Adam","family":"Shostack","sequence":"first","affiliation":[]},{"given":"Paul","family":"Syverson","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Acquisti, Alessandro (2004). Privacy in electronic commerce and the economics of immediate gratification. In Feigenbaum, Joan, editor, ACM Conference on Electronic Commerce(EC\u201904). ACM Press.","DOI":"10.1145\/988772.988777"},{"key":"10_CR2","unstructured":"CNN (Sept. 14, 2001). Web site passes anonymous tips to FBI. \n                  http:\/\/www.cnn.com\/2001\/TECH\/internet\/09\/14\/anonymous.tips\/\n                  \n                . Cf. also Secure Tips Online Program. www.anonymizer.com\/tips\/. Mailboxes, Etc. Mailbox services. www.mbe.com\/ps\/ms.html."},{"key":"10_CR3","unstructured":"FTC (2004). National and State Trends in Fraud & Identity Theft: January\u2013December 2003. Federal Trade Commission Report. \n                  http:\/\/www.consumer.gov\/sentinel\/pubs\/Top10Fraud2003.pdf\n                  \n                ."},{"key":"10_CR4","unstructured":"Krim, Jonathan (March 13, 2003). Spam\u2019s cost to Business Escalates. The Washington Post, page A01."},{"key":"10_CR5","unstructured":"Privacy Rights Clearinghouse (2002). Fact Sheet 17(g): Criminal Identity Theft. \n                  http:\/\/www.privacyrights.org\/fs\/fs17g-CrimIdTheft.htm\n                  \n                ."},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Schechter, Stuart E. and Smith, Michael D. (2003). How much security is enough to stop a thief? In Wright, Rebecca N., editor, Financial Cryptography, pages 122\u2013137. Springer-Verlag, LNCS 2742.","DOI":"10.1007\/978-3-540-45126-6_9"},{"key":"10_CR7","unstructured":"Schneier, Bruce (Feb 15, 2004). The economics of spam. Cryptogram Newsletter\n                  http:\/\/www.schneier.com\/crypto-gram-0402.html"},{"key":"10_CR8","unstructured":"Sullivan, Bob (March 9, 2003). The darkest side of ID theft. \n                  http:\/\/www.msnbc.com\/news\/877978.asp?0si=-&cp1=1\n                  \n                ."},{"key":"10_CR9","unstructured":"US Census Bureau (1999). Curtain and Drapery Mills, Economic Census Manufacturing Industry Series. Report EC97M-3141B, US Census Bureau."},{"key":"10_CR10","unstructured":"US Postal Service (1998). Pub. 201-Consumer\u2019s Guide to Postal Services & Products. \n                  http:\/\/www.usps.com\/cpim\/ftp\/pubs\/pub201\/pub201.htm#H1\n                  \n                ."},{"key":"10_CR11","unstructured":"US Postal Service (2001). Comprehensive Statement on Postal Operations. \n                  http:\/\/wwwusps.com\/financials\/"},{"key":"10_CR12","volume-title":"PRIVACY AND SELF-REGULATION IN THE INFORMATION AGE","author":"H. R. Varian","year":"1997","unstructured":"Varian, Hal R. (1997). Economic Aspects of Personal Privacy. In PRIVACY AND SELF-REGULATION IN THE INFORMATION AGE. National Telecommunications and Information Administration, Washington, DC."},{"key":"10_CR13","unstructured":"Westin, Alan (May 8, 2001). Opinion surveys: What consumers have to say about information privacy. Prepared Witness Testimony, The House Committee on Energy and Commerce."}],"container-title":["Advances in Information Security","Economics of Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/1-4020-8090-5_10.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T20:26:11Z","timestamp":1619555171000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/1-4020-8090-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["1402080891"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/1-4020-8090-5_10","relation":{},"subject":[]}}