{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T11:11:30Z","timestamp":1768821090483,"version":"3.49.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319067483","type":"print"},{"value":"9783319067490","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06749-0_6","type":"book-chapter","created":{"date-parts":[[2014,5,14]],"date-time":"2014-05-14T20:43:14Z","timestamp":1400100194000},"page":"86-100","source":"Crossref","is-referenced-by-count":5,"title":["TAM-VS: A Technology Acceptance Model for Video Surveillance"],"prefix":"10.1007","author":[{"given":"Erik","family":"Krempel","sequence":"first","affiliation":[]},{"given":"J\u00fcrgen","family":"Beyerer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"McCahill, M., Norris, C.: Cctv in london. Report deliverable of UrbanEye project (2002)"},{"key":"6_CR2","first-page":"10","volume":"42","author":"G. Gerrard","year":"2011","unstructured":"Gerrard, G., Thompson, R.: Two million cameras in the uk. CCTV Image\u00a042, 10\u201312 (2011)","journal-title":"CCTV Image"},{"key":"6_CR3","unstructured":"Zelniker, E., Gong, S., Xiang, T., et al.: Global abnormal behaviour detection using a network of cctv cameras. In: The Eighth International Workshop on Visual Surveillance-VS(2008)"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Monari, E., Maerker, J., Kroschel, K.: A robust and efficient approach for human tracking in multi-camera systems. In: Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance, AVSS 2009, pp. 134\u2013139. IEEE (2009)","DOI":"10.1109\/AVSS.2009.16"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Mo\u00dfgraber, J., Reinert, F., Vagts, H.: An architecture for a task-oriented surveillance system: A service-and event-based approach. In: 2010 Fifth International Conference on Systems (ICONS), pp. 146\u2013151. IEEE (2010)","DOI":"10.1109\/ICONS.2010.32"},{"key":"6_CR6","unstructured":"Hempel, L., T\u00f6pfer, E.: Cctv in europe. final report. Urbaneye WorNing Paper\u00a0(15) (2004)"},{"key":"6_CR7","unstructured":"Senior, A., Pankanti, S., Hampapur, A., Brown, L., Tian, Y.L., Ekin, A.: Blinkering surveillance: Enabling video privacy through computer vision. Technical report, IBM (August 2003)"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Senior, A., et al.: Enabling video privacy through computer vision. In: Security & Privacy, 3rd edn. pp. 50\u201357. IEEE (June 2005)","DOI":"10.1109\/MSP.2005.65"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Vagts, H., Krempel, E., Beyerer, J.: User-centric protection and privacy in smart surveillance systems. In: Future Security - Security Research Conference 2012 (Future Security 2012), Bonn, Germany (September 2012)","DOI":"10.1007\/978-3-642-33161-9_36"},{"key":"6_CR10","unstructured":"Vagts, H., Beyerer, J.: Enhancing the acceptance of technology for civil security and surveillance by using privacy enhancing technology. In: Future Security: 6th Security Research Conference. Fraunhofer Verlag (2011)"},{"key":"6_CR11","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"F.D. Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly\u00a013, 319\u2013340 (1989)","journal-title":"MIS quarterly"},{"key":"6_CR12","unstructured":"Fishbein, M.: A theory of reasoned action: Some applications and implications. Nebraska Symposium on Motivation (1979)"},{"issue":"1","key":"6_CR13","first-page":"53","volume":"12","author":"Y. Lee","year":"2003","unstructured":"Lee, Y., Kozar, K., Larsen, K.: The technology acceptance model: Past, present, and future. The Communications of the Association for Information Systems\u00a012(1), 53 (2003)","journal-title":"The Communications of the Association for Information Systems"},{"issue":"2","key":"6_CR14","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"46","author":"V. Venkatesh","year":"2000","unstructured":"Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: Four longitudinal field studies. Management science\u00a046(2), 186\u2013204 (2000)","journal-title":"Management science"},{"key":"6_CR15","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V. Venkatesh","year":"2003","unstructured":"Venkatesh, V., Morris, M., Davis, G., Davis, F.: User acceptance of information technology: Toward a unified view. MIS quarterly\u00a027, 425\u2013478 (2003)","journal-title":"MIS quarterly"},{"key":"6_CR16","unstructured":"Spiekermann, S.: User control in ubiquitous computing: Design alternatives and user acceptance. Shaker Verlag (2008)"},{"key":"6_CR17","unstructured":"St, E.L.L., Ronald, D.: An Assessment of Formative and Reflective Constructs in IS Research. In: 15th European Conference on Information Systems, University of St. Gallen (2007)"},{"key":"6_CR18","unstructured":"Chin, W.: The partial least squares approach for structural equation modeling. Modern Methods for Business Research, 295\u2013336 (1998)"},{"issue":"2","key":"6_CR19","doi-asserted-by":"publisher","first-page":"139","DOI":"10.2753\/MTP1069-6679190202","volume":"19","author":"J. Hair","year":"2011","unstructured":"Hair, J., Ringle, C., Sarstedt, M.: PLS-SEM: Indeed a silver bullet. The Journal of Marketing Theory and Practice\u00a019(2), 139\u2013152 (2011)","journal-title":"The Journal of Marketing Theory and Practice"},{"key":"6_CR20","unstructured":"Ringle, C.M., Wende, S., Will, A.: SmartPLS 2.0 (M3) Beta (2005)"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Fornell, C., Larcker, D.: Evaluating structural equation models with unobservable variables and measurement error. Journal of marketing research, 39\u201350 (1981)","DOI":"10.1177\/002224378101800104"},{"key":"6_CR22","unstructured":"Schwaiger, M., Meyer, A.: Theorien und Methoden der Betriebswirtschaft: Handbuch f\u00fcr Wissenschaftler und Studierende. Vahlen (2011)"},{"key":"6_CR23","unstructured":"Sellin, N., Keeves, J.: Path analysis with latent variables. International encyclopedia of education, 4352\u20134359 (1994)"}],"container-title":["Lecture Notes in Computer Science","Privacy Technologies and Policy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06749-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T17:03:04Z","timestamp":1558890184000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06749-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319067483","9783319067490"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06749-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}