{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:39:33Z","timestamp":1725799173484},"publisher-location":"Cham","reference-count":46,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319097695"},{"type":"electronic","value":"9783319097701"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09770-1_15","type":"book-chapter","created":{"date-parts":[[2014,8,19]],"date-time":"2014-08-19T07:25:20Z","timestamp":1408433120000},"page":"168-179","source":"Crossref","is-referenced-by-count":2,"title":["User Acceptance of Footfall Analytics with Aggregated and Anonymized Mobile Phone Data"],"prefix":"10.1007","author":[{"given":"Alfred","family":"Kobsa","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"15_CR1","unstructured":"Nandakumar, R., Rallapalli, S., Chintalapudi, K., Padmanabhan, V.N., Qiu, L., Ganesan, A., Guha, S., Aggarwal, D., Goenka, A.: Physical Analytics: A New Frontier for (Indoor) Location Research. MSR-TR-2013-107, Microsoft Research, Banglore, India (2013)"},{"key":"15_CR2","unstructured":"Experian: People Counting Cameras (2014), \n                    \n                      http:\/\/www.footfall.com\/people-counting"},{"key":"15_CR3","unstructured":"Telefonica: Smart Steps (2013), \n                    \n                      http:\/\/dynamicinsights.telefonica.com\/smart-steps"},{"key":"15_CR4","unstructured":"Euclid: Euclid Analytics (2014), \n                    \n                      http:\/\/euclidanalytics.com\/"},{"key":"15_CR5","unstructured":"Ruckus: Location Services (2014), \n                    \n                      http:\/\/www.ruckussecurity.com\/Location-Services.asp"},{"key":"15_CR6","unstructured":"Little, J., O\u2019Brien, B.: A Technical Review of Cisco\u2019s Wi-Fi-Based Location Analytics (2013), \n                    \n                      http:\/\/www.cisco.com\/c\/en\/us\/products\/collateral\/wireless\/mobility-services-engine\/white_paper_c11-728970.pdf"},{"key":"15_CR7","unstructured":"Biermann, K.: \u00dcberwachung: Telefonica will Handy-Bewegungsdaten an Werber verkaufen (2012), \n                    \n                      http:\/\/www.zeit.de\/digital\/datenschutz\/2012-10\/telefonica-smart-steps-vorratsdaten"},{"key":"15_CR8","unstructured":"Roman, D.: Telef\u00f3nica Goes a Little Bit \u201cBig Brother\u201d (2012), \n                    \n                      http:\/\/on.wsj.com\/WJh6jb"},{"key":"15_CR9","unstructured":"EU: Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the Protection of Individuals with Regard to the Processing of Personal Data etc. (1995)"},{"key":"15_CR10","unstructured":"White House: Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Economy. Washington, D.C. (2012)"},{"key":"15_CR11","unstructured":"BDSB: German Federal Commissioner for Data Protection and Freedom of Information - Wiki, \n                    \n                      http:\/\/www.bfdi.bund.de\/bfdi_wiki\/"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Mascetti, S., Monreale, A., Ricci, A., Gerino, A.: Anonymity: A Comparison Between the Legal and Computer Science Perspectives. In: Gutwirth, S., Leenes, R., de Hert, P., Poullet, Y. (eds.) European Data Protection: Coming of Age, pp. 85\u2013115. Springer (2013)","DOI":"10.1007\/978-94-007-5170-5_4"},{"key":"15_CR13","unstructured":"ICO: Anonymisation: managing data protection risk code of practice. Information Commissioner\u2019s Office, Wilmslow, Cheshire, U.K. (2012)"},{"key":"15_CR14","unstructured":"EU: Proposal for a directive of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data etc. (2012)"},{"key":"15_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/978-3-642-15838-4_24","volume-title":"Privacy in Statistical Databases","author":"R. Hall","year":"2010","unstructured":"Hall, R., Fienberg, S.E.: Privacy-Preserving Record Linkage. In: Domingo-Ferrer, J., Magkos, E. (eds.) PSD 2010. LNCS, vol.\u00a06344, pp. 269\u2013283. Springer, Heidelberg (2010)"},{"key":"15_CR16","first-page":"321","volume":"3","author":"V.S. Verykios","year":"2013","unstructured":"Verykios, V.S., Christen, P.: Privacy-preserving record linkage. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery\u00a03, 321\u2013332 (2013)","journal-title":"Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery"},{"key":"15_CR17","unstructured":"BBC: Telefonica hopes \u201cbig data\u201d arm will revive fortunes, \n                    \n                      http:\/\/www.bbc.co.uk\/news\/technology-19882647"},{"key":"15_CR18","unstructured":"DE-FDPA: German Federal Data Protection Act, as of 1 September 2009 (1990)"},{"key":"15_CR19","unstructured":"DE-TCA: German Telecommunications Act, as of 7 August 2013 (2004)"},{"key":"15_CR20","first-page":"7","volume":"7","author":"R. Mantz","year":"2013","unstructured":"Mantz, R.: Verwertung von Standortdaten und Bewegungsprofilen durch Telekommunikationsdiensteanbieter: Der Fall Telef\u00f3nica\/O2. Kommunikation und Recht.\u00a07, 7\u201311 (2013)","journal-title":"Kommunikation und Recht."},{"key":"15_CR21","first-page":"97","volume-title":"Expressions of Ethnography","author":"C.W. Stage","year":"2003","unstructured":"Stage, C.W., Mattson, M.: Ethnographic interviewing as contextualized conversation. In: Clair, R.P. (ed.) Expressions of Ethnography, pp. 97\u2013105. SUNY Press, Albany (2003)"},{"key":"15_CR22","unstructured":"Glaser, B.G.: Doing grounded theory: issues and discussions. Sociology Press (1998)"},{"key":"15_CR23","unstructured":"Kumaraguru, P., Cranor, L.F.: Privacy Indexes: A Survey of Westin\u2019s Studies. Institute for Software Res. Intern\u2019l, School of Comp. Sci. Carnegie Mellon Univ., Pittsburgh (2005)"},{"key":"15_CR24","unstructured":"Westin, A.F.: Privacy and Freedom. Atheneum, New York (1967)"},{"key":"15_CR25","first-page":"393","volume":"12","author":"R.A. Posner","year":"1977","unstructured":"Posner, R.A.: The Right of Privacy. Georgia Law Review\u00a012, 393\u2013422 (1977)","journal-title":"Georgia Law Review"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Rule, J., Hunter, L.: Towards Property Rights in Personal Data. In: Grant, R.A., Bennett, C.J. (eds.) Visions of Privacy: Policy Choices for the Digital Age. Univ. Toronto Pr. (1999)","DOI":"10.3138\/9781442683105-010"},{"key":"15_CR27","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1145\/234215.234476","volume":"39","author":"K.C. Laudon","year":"1996","unstructured":"Laudon, K.C.: Markets and privacy. Communications of the ACM\u00a039, 92\u2013104 (1996)","journal-title":"Communications of the ACM"},{"key":"15_CR28","doi-asserted-by":"publisher","first-page":"2056","DOI":"10.2307\/4093335","volume":"117","author":"P.M. Schwartz","year":"2003","unstructured":"Schwartz, P.M.: Property, Privacy, and Personal Data. Harv. L. Rev.\u00a0117, 2056 (2003)","journal-title":"Harv. L. Rev."},{"key":"15_CR29","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1287\/isre.1090.0260","volume":"22","author":"J.Y. Tsai","year":"2011","unstructured":"Tsai, J.Y., Egelman, S., Cranor, L., Acquisti, A.: The Effect of Online Privacy Information on Purchasing Behavior: An Experimental Study. Info. Sys. Research.\u00a022, 254\u2013268 (2011)","journal-title":"Info. Sys. Research."},{"key":"15_CR30","unstructured":"Jentzsch, N., Preibusch, S., Harasser, A.: Study on monetising privacy. An economic model for pricing personal information. Deliverable February 27, 2012, ENISA (2012)"},{"key":"15_CR31","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s10660-013-9130-3","volume":"13","author":"S. Preibusch","year":"2013","unstructured":"Preibusch, S., K\u00fcbler, D., Beresford, A.R.: Price versus privacy: An experiment into the competitive advantage of collecting less personal information. Electron Com. Res.\u00a013, 423\u2013455 (2013)","journal-title":"Electron Com. Res."},{"key":"15_CR32","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.econlet.2012.04.077","volume":"117","author":"A.R. Beresford","year":"2012","unstructured":"Beresford, A.R., K\u00fcbler, D., Preibusch, S.: Unwillingness to pay for privacy: A field experiment. Economics Letters\u00a0117, 25\u201327 (2012)","journal-title":"Economics Letters"},{"key":"15_CR33","unstructured":"Danezis, G., Lewis, S., Anderson, R.: How Much is Location Privacy Worth? In: Fourth Workshop on the Economics of Information Security, Cambridge, MA (2005)"},{"key":"15_CR34","first-page":"109","volume-title":"Proc. ACM WPES","author":"D. Cvrcek","year":"2006","unstructured":"Cvrcek, D., Kumpost, M., Matyas, V., Danezis, G.: A study on the value of location privacy. In: Proc. ACM WPES, pp. 109\u2013118. ACM, Alexandria (2006)"},{"key":"15_CR35","doi-asserted-by":"crossref","unstructured":"Matyas, V., Kumpost, M.: Location Privacy Pricing and Motivation. In: 2007 International Conference on Mobile Data Management, pp. 263\u2013267. Mannheim, Germany (2007)","DOI":"10.1109\/MDM.2007.55"},{"key":"15_CR36","unstructured":"Hann, I.-H., Hui, K.-L., Lee, T.S., Png, I.P.L.: Online Information Privacy: Measuring the Cost-Benefit Tradeoff. In: Proc. ICIS, Barcelona, Spain, pp. 1\u201310 (2002)"},{"key":"15_CR37","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MSP.2005.137","volume":"3","author":"B.A. Huberman","year":"2005","unstructured":"Huberman, B.A., Adar, E., Fine, L.A.: Valuating privacy. IEEE Sec. & Priv.\u00a03, 22\u201325 (2005)","journal-title":"IEEE Sec. & Priv."},{"key":"15_CR38","unstructured":"Rose, J., Rehse, O., R\u00f6ber, B.: The Value of our Digital Identity. Boston Cons. Gr. (2012)"},{"key":"15_CR39","doi-asserted-by":"publisher","first-page":"1124","DOI":"10.1126\/science.185.4157.1124","volume":"185","author":"A. Tversky","year":"1974","unstructured":"Tversky, A., Kahneman, D.: Judgment under Uncertainty: Heuristics and Biases. Science\u00a0185, 1124\u20131131 (1974)","journal-title":"Science"},{"key":"15_CR40","unstructured":"EC: Attitudes on Data Protection and Electronic Identity in the European Union. Special Eurobarometer 359, European Commission, Brussels, Belgium (2011)"},{"key":"15_CR41","unstructured":"Pepitone, J.: What your wireless carrier knows about you - and what they\u2019re selling (2013), \n                    \n                      http:\/\/money.cnn.com\/2013\/12\/16\/technology\/mobile\/wireless-carrier-sell-data\/"},{"key":"15_CR42","unstructured":"Troianovski, A.: Phone Firms Sell Data on Customers. WSJ. com (2013), \n                    \n                      http:\/\/online.wsj.com\/news\/articles\/SB10001424127887323463704578497153556847658"},{"key":"15_CR43","unstructured":"OECD: Exploring the Economics of Personal Data: A Survey of Methodologies for Measuring Monetary Value. Report 220, OECD, Paris (2013)"},{"key":"15_CR44","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1111\/j.1745-6606.2006.00070.x","volume":"41","author":"P.A. Norberg","year":"2007","unstructured":"Norberg, P.A., Horne, D.R., Horne, D.A.: The Privacy Paradox: Personal Information Disclosure Intentions versus Behaviors. Journal of Consumer Affairs\u00a041, 100\u2013126 (2007)","journal-title":"Journal of Consumer Affairs"},{"key":"15_CR45","unstructured":"Rivenbark, D.: Experimentally Elicited Beliefs Explain Privacy Behavior. Univ. of Central Florida, Dept. Economics (2011), \n                    \n                      http:\/\/EconPapers.repec.org\/RePEc:cfl:wpaper:2010-09"},{"key":"15_CR46","doi-asserted-by":"publisher","first-page":"1133","DOI":"10.1016\/j.ijhcs.2013.09.002","volume":"71","author":"S. Preibusch","year":"2013","unstructured":"Preibusch, S.: Guide to measuring privacy concern: Review of survey and observational instruments. International Journal of Human-Computer Studies\u00a071, 1133\u20131143 (2013)","journal-title":"International Journal of Human-Computer Studies"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy, and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09770-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T16:41:04Z","timestamp":1558975264000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-09770-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319097695","9783319097701"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09770-1_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}