{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T12:51:17Z","timestamp":1760100677545,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319076195"},{"type":"electronic","value":"9783319076201"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07620-1_33","type":"book-chapter","created":{"date-parts":[[2014,6,10]],"date-time":"2014-06-10T12:55:03Z","timestamp":1402404903000},"page":"375-386","source":"Crossref","is-referenced-by-count":15,"title":["User Acceptance of Privacy-ABCs: An Exploratory Study"],"prefix":"10.1007","author":[{"given":"Zinaida","family":"Benenson","sequence":"first","affiliation":[]},{"given":"Anna","family":"Girard","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Krontiris","sequence":"additional","affiliation":[]},{"given":"Vassia","family":"Liagkou","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Rannenberg","sequence":"additional","affiliation":[]},{"given":"Yannis","family":"Stamatiou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","unstructured":"ABC4Trust: Attribute-based Credentials for Trust. EU-funded research and development project (accessed on April 26, 2013)"},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Brands, S.A.: Rethinking public key infrastructures and digital certificates: building in privacy. The MIT Press (2000)","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"33_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology - EUROCRYPT 2001","author":"J.L. Camenisch","year":"2001","unstructured":"Camenisch, J.L., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol.\u00a02045, pp. 93\u2013118. Springer, Heidelberg (2001)"},{"key":"33_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-28628-8_4","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"J. Camenisch","year":"2004","unstructured":"Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol.\u00a03152, pp. 56\u201372. Springer, Heidelberg (2004)"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM\u00a028(10) (October 1985)","DOI":"10.1145\/4372.4373"},{"key":"33_CR6","unstructured":"Cranor, L.F., Garfinkel, S.: Security and Usability: Designing Secure Systems that People Can Use. O\u2019Reilly (2008)"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 319\u2013340 (1989)","DOI":"10.2307\/249008"},{"issue":"3","key":"33_CR8","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1006\/imms.1993.1022","volume":"38","author":"F.D. Davis","year":"1993","unstructured":"Davis, F.D.: User acceptance of information technology: system characteristics, user perceptions and behavioral impacts. International Journal of Man-Machine Studies\u00a038(3), 475\u2013487 (1993)","journal-title":"International Journal of Man-Machine Studies"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Graf, C., Wolkerstorfer, P., Hochleitner, C., W\u00e4stlund, E., Tscheligi, M.: HCI for PrimeLife Prototypes. In: Camenisch, J., Fischer-H\u00fcbner, S., Rannenberg, K. (eds.) Privacy and Identity Management for Life, ch.\u00a011, pp. 221\u2013232. Springer (2011)","DOI":"10.1007\/978-3-642-20317-6_11"},{"key":"33_CR10","unstructured":"IBM Research Zurich. Idemix, \n                    \n                      http:\/\/www.zurich.ibm.com\/security\/idemix"},{"issue":"6","key":"33_CR11","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1016\/j.im.2006.05.003","volume":"43","author":"W.R. King","year":"2006","unstructured":"King, W.R., He, J.: A meta-analysis of the technology acceptance model. Information & Management\u00a043(6), 740\u2013755 (2006)","journal-title":"Information & Management"},{"key":"33_CR12","unstructured":"Kumaraguru, P., Cranor, L.F.: Privacy indexes: A survey of Westin\u2019s studies. Institute for Software Research. Paper 856 (2005)"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Mayer, J., Mitchell, J.: Third-party web tracking: Policy and technology. In: 2012 IEEE Symposium on Security and Privacy, SP (2012)","DOI":"10.1109\/SP.2012.47"},{"issue":"2","key":"33_CR14","first-page":"12","volume":"2","author":"D.H. Mcknight","year":"2011","unstructured":"Mcknight, D.H., Carter, M., Thatcher, J.B., Clay, P.F.: Trust in a specific technology: An investigation of its components and measures. ACM Transactions on Management Information Systems (TMIS)\u00a02(2), 12 (2011)","journal-title":"ACM Transactions on Management Information Systems (TMIS)"},{"key":"33_CR15","unstructured":"Microsoft Research. U-Prove, \n                    \n                      http:\/\/research.microsoft.com\/en-us\/projects\/u-prove"},{"issue":"3","key":"33_CR16","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1080\/10864415.2003.11044275","volume":"7","author":"P.A. Pavlou","year":"2003","unstructured":"Pavlou, P.A.: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. International Journal of Electronic Commerce\u00a07(3), 101\u2013134 (2003)","journal-title":"International Journal of Electronic Commerce"},{"key":"33_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-74853-3_4","volume-title":"UbiComp 2007: Ubiquitous Computing","author":"S. Spiekermann","year":"2007","unstructured":"Spiekermann, S.: Privacy enhancing technologies for RFID in retail- an empirical investigation. In: Krumm, J., Abowd, G.D., Seneviratne, A., Strang, T. (eds.) UbiComp 2007. LNCS, vol.\u00a04717, pp. 56\u201372. Springer, Heidelberg (2007)"},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"Spiekermann, S., Cranor, L.: Engineering privacy. IEEE Transactions on Software Engineering\u00a035(1) (2009)","DOI":"10.1109\/TSE.2008.88"},{"key":"33_CR19","doi-asserted-by":"crossref","unstructured":"Sun, S.-T., Pospisil, E., Muslukhov, I., Dindar, N., Hawkey, K., Beznosov, K.: What makes users refuse web single sign-on?: an empirical investigation of OpenID. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, p. 4. ACM (2011)","DOI":"10.1145\/2078827.2078833"},{"key":"33_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-27585-2_1","volume-title":"Open Problems in Network Security","author":"E. W\u00e4stlund","year":"2012","unstructured":"W\u00e4stlund, E., Angulo, J., Fischer-H\u00fcbner, S.: Evoking comprehensive mental models of anonymous credentials. In: Camenisch, J., Kesdogan, D. (eds.) iNetSec 2011. LNCS, vol.\u00a07039, pp. 1\u201314. Springer, Heidelberg (2012)"},{"key":"33_CR21","doi-asserted-by":"crossref","unstructured":"W\u00e4stlund, E., Fischer-H\u00fcbner, S.: The users\u2019 mental models\u2019 effect on their comprehension of anonymous credentials. In: Camenisch, J., Fischer-H\u00fcbner, S., Rannenberg, K. (eds.) Privacy and Identity Management for Life, ch. 12, pp. 233\u2013244. Springer (2011)","DOI":"10.1007\/978-3-642-20317-6_12"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07620-1_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,2,22]],"date-time":"2020-02-22T23:11:33Z","timestamp":1582413093000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-07620-1_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076195","9783319076201"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07620-1_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}