{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T19:25:03Z","timestamp":1743103503413,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031813245"},{"type":"electronic","value":"9783031813252"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-81325-2_21","type":"book-chapter","created":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T15:07:55Z","timestamp":1740409675000},"page":"295-312","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Modification of User Behavior Towards the Use of Privacy-Preserving Search Engines: Insights from an Experiment on Privacy"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6875-2047","authenticated-orcid":false,"given":"Andreas","family":"Skalkos","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6255-1922","authenticated-orcid":false,"given":"Spyros","family":"Kokolakis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,25]]},"reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Castell\u00e0-Roca, J., Viejo, A., Herrera-Joancomart\u00ed, J.: Preserving user\u2019s privacy in web search engines. Comput. Commun. 32(13\u201314), 1541\u20131551 (2009)","DOI":"10.1016\/j.comcom.2009.05.009"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Nagenborg, M.: The ethics of search engines. Int. Rev. Inform. Ethics 3 (2005)","DOI":"10.29173\/irie351"},{"key":"21_CR3","unstructured":"KPMG. Corporate Data Responsibility: Bridging the consumer trust gap. KPMG LLP (2022). https:\/\/advisory.kpmg.us\/articles\/2021\/bridging-the-trust-chasm.html. Retrieved 30 Jan 2023"},{"key":"21_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.chbr.2020.100034","volume":"2","author":"A Skalkos","year":"2020","unstructured":"Skalkos, A., Tsohou, A., Karyda, M., Kokolakis, S.: Identifying the values associated with users\u2019 behavior towards anonymity tools through means-end analysis. Comput. Hum. Behav. Reports 2, 100034 (2020)","journal-title":"Comput. Hum. Behav. Reports"},{"key":"21_CR5","doi-asserted-by":"publisher","unstructured":"Skalkos, A., Tsohou, A., Karyda, M., Kokolakis, S.: Exploring users\u2019 attitude towards privacy-preserving search engines: a protection motivation theory approach. Inform. Comput. Secur. ahead-of-print No. ahead-of-print (2023). https:\/\/doi.org\/10.1108\/ICS-08-2022-0142","DOI":"10.1108\/ICS-08-2022-0142"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Petit, A., Ben Mokhtar, S., Brunie, L., Kosch, H.: Towards efficient and accurate privacy preserving web search. In: Proceedings of the 9th Workshop on Middleware for Next Generation Internet Computing, pp. 1\u20136 (2014)","DOI":"10.1145\/2676733.2676734"},{"key":"21_CR7","unstructured":"\u00c7etin, G.S., Dai, W., Dor\u00f6z, Y., Martin, W.J., Sunar, B.: Blind Web Search: How far are we from a privacy preserving search engine?. Cryptology ePrint Archive (2016)"},{"issue":"3","key":"21_CR8","doi-asserted-by":"publisher","first-page":"396","DOI":"10.3390\/jcp3030020","volume":"3","author":"I Paspatis","year":"2023","unstructured":"Paspatis, I., Tsohou, A.: How to influence privacy behavior using cognitive theory and respective determinant factors. J. Cybersecur. Privacy 3(3), 396\u2013415 (2023)","journal-title":"J. Cybersecur. Privacy"},{"key":"21_CR9","unstructured":"Zimmermann, P. (2014). A survey and taxonomy on privacy enhancing technologies"},{"key":"21_CR10","unstructured":"Nissenbaum, H., Daniel, H.: TrackMeNot: Resisting surveillance in web search (2009)"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Maill\u00e9, P., Maudet, G., Simon, M., Tuffin, B.: Are search engines biased? Detecting and reducing bias using meta search engines. Electronic Commerce Research and Applications, p. 101132 (2022)","DOI":"10.1016\/j.elerap.2022.101132"},{"issue":"4","key":"21_CR12","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1162\/DAED_a_00113","volume":"140","author":"H Nissenbaum","year":"2011","unstructured":"Nissenbaum, H.: A contextual approach to privacy online. Daedalus 140(4), 32\u201348 (2011)","journal-title":"Daedalus"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Kamara, S.: Encrypted search. XRDS: crossroads. ACM Magaz. Stud. 21(3), 30\u201334 (2015)","DOI":"10.1145\/2730908"},{"issue":"1","key":"21_CR14","first-page":"1","volume":"1","author":"S Fischer-H\u00fcbner","year":"2011","unstructured":"Fischer-H\u00fcbner, S., Hoofnagle, C.J., Krontiris, I., Rannenberg, K., Waidner, M.: Online privacy: towards informational self-determination on the internet. Dagstuhl Manifestos 1(1), 1\u201320 (2011)","journal-title":"Dagstuhl Manifestos"},{"issue":"3","key":"21_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3054926","volume":"50","author":"A Acquisti","year":"2017","unstructured":"Acquisti, A., et al.: Nudges for privacy and security: understanding and assisting users\u2019 choices online. ACM Comput. Surv. 50(3), 1\u201341 (2017)","journal-title":"ACM Comput. Surv."},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Leonard, T.C.: Richard H. Thaler, Cass R. Sunstein, Nudge: improving decisions about health, wealth, and happiness, 293 pp. Yale University Press, New Haven, CT (2008)","DOI":"10.1007\/s10602-008-9056-2"},{"key":"21_CR17","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1016\/j.ijhcs.2018.05.011","volume":"120","author":"K Renaud","year":"2018","unstructured":"Renaud, K., Zimmermann, V.: Ethical guidelines for nudging in information security & privacy. Int. J. Hum Comput Stud. 120, 22\u201335 (2018)","journal-title":"Int. J. Hum Comput Stud."},{"key":"21_CR18","unstructured":"Almuhimedi, H.: Helping smartphone users manage their privacy through nudges. Institute for Software Research (2017)"},{"key":"21_CR19","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.chb.2018.01.028","volume":"83","author":"S Mamonov","year":"2018","unstructured":"Mamonov, S., Benbunan-Fich, R.: The impact of information security threat awareness on privacy-protective behaviors. Comput. Hum. Behav. 83, 32\u201344 (2018)","journal-title":"Comput. Hum. Behav."},{"key":"21_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jebo.2017.03.024","volume":"140","author":"H Marreiros","year":"2017","unstructured":"Marreiros, H., Tonin, M., Vlassopoulos, M., Schraefel, M.C.: \u201cNow that you mention it\u201d: a survey experiment on information, inattention and online privacy. J. Econ. Behav. Organ. 140, 1\u201317 (2017)","journal-title":"J. Econ. Behav. Organ."},{"issue":"4","key":"21_CR21","first-page":"566","volume":"13","author":"JR Mu\u00f1oz-Torres","year":"2012","unstructured":"Mu\u00f1oz-Torres, J.R.: Truth and objectivity in journalism: anatomy of an endless misunderstanding. J. Stud. 13(4), 566\u2013582 (2012)","journal-title":"J. Stud."},{"key":"21_CR22","unstructured":"Vemou, \u039a., Mousa, G., Karyda, M.: On the low diffusion of privacy enhancing technologies in social networking: Results of an empirical investigation. In: European, Mediterranean & Middle eastern conference on information systems 2015 (EMCIS2015), 1st\u2013 2nd June 2015, Athens, Greece (2015). http:\/\/www.icsd.aegean.gr\/publication_files\/Conference\/492112265.pdf. Accessed 20 Jan 2024"},{"key":"21_CR23","unstructured":"Bang, J., Buschman, A.C., Gates, J., Kuc, R.D., Navarro, V.: Panic! at the search engine. Commun. Compl. (2021)"},{"issue":"2","key":"21_CR24","first-page":"111","volume":"2020","author":"D Harborth","year":"2020","unstructured":"Harborth, D., Pape, S., Rannenberg, K.: Explaining the technology use behavior of privacy-enhancing technologies: the case of tor and JonDonym. Proc. Priv. Enhanc. Technol. 2020(2), 111\u2013128 (2020)","journal-title":"Proc. Priv. Enhanc. Technol."},{"issue":"1","key":"21_CR25","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1177\/0145482X20901378","volume":"114","author":"RW Emerson","year":"2020","unstructured":"Emerson, R.W.: Bonferroni correction and type I error. J. Visual Impair. Blind. 114(1), 77\u201378 (2020)","journal-title":"J. Visual Impair. Blind."},{"key":"21_CR26","unstructured":"Napierala, M.A.: What is the Bonferroni correction?. Aaos Now, pp. 40\u201341 (2012)"}],"container-title":["Lecture Notes in Business Information Processing","Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-81325-2_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,24]],"date-time":"2025-02-24T15:08:01Z","timestamp":1740409681000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-81325-2_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031813245","9783031813252"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-81325-2_21","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"25 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EMCIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European, Mediterranean, and Middle Eastern Conference on Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Athens","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 September 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"emcis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/emcis.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}