{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,30]],"date-time":"2026-03-30T10:30:49Z","timestamp":1774866649536,"version":"3.50.1"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319144382","type":"print"},{"value":"9783319144399","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,12,21]],"date-time":"2014-12-21T00:00:00Z","timestamp":1419120000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,12,21]],"date-time":"2014-12-21T00:00:00Z","timestamp":1419120000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-14439-9_7","type":"book-chapter","created":{"date-parts":[[2014,12,20]],"date-time":"2014-12-20T13:59:49Z","timestamp":1419083989000},"page":"197-239","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Course Evaluation in Higher Education: the Patras Pilot of ABC4Trust"],"prefix":"10.1007","author":[{"given":"Yannis","family":"Stamatiou","sequence":"first","affiliation":[]},{"given":"Zinaida","family":"Benenson","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Girard","sequence":"additional","affiliation":[]},{"given":"Ioannis","family":"Krontiris","sequence":"additional","affiliation":[]},{"given":"Vasiliki","family":"Liagkou","sequence":"additional","affiliation":[]},{"given":"Apostolos","family":"Pyrgelis","sequence":"additional","affiliation":[]},{"given":"Welderufael","family":"Tesfay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,21]]},"reference":[{"key":"7_CR1","unstructured":"Joerg Abendroth, Vasiliki Liagkou, Apostolos Pyrgelis, Christoforos Raptopoulos, Ahmad Sabouri, Eva Schlehahn, Yannis Stamatiou, and Harald Zwingelberg. D7.1 application description for students, 2012. https:\/\/abc4trust.eu\/download\/ABC4Trust-D7.1-Application-Description-Students.pdf."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Anick Bosmans and Hans Baumgartner. Goal-relevant emotional information: When extraneous affect leads to persuasion and when it does not. Journal of Consumer Research, 32(3):424\u2013434, 2005.","DOI":"10.1086\/497554"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Zinaida Benenson, Anna Girard, Ioannis Krontiris, Vassia Liagkou, Kai Rannenberg, and Yannis Stamatiou. User acceptance of privacy-abcs: An exploratory study. In HCI International: Human Aspects of Information Security, Privacy and Trust, 2014. (to appear).","DOI":"10.1007\/978-3-319-07620-1_33"},{"key":"7_CR4","unstructured":"Souheil Bcheri, Norbert G\u00f6tze, Vasiliki Liagkou, Apostolos Pyrgelis, Christoforos Raptopoulos, Yannis Stamatiou, Katalin Storf, Peder W\u00e4ngmark, and Harald Zwingelberg. D5.1 scenario definition for both pilots, 2012. https:\/\/abc4trust.eu\/download\/ABC4Trust-D5.1-Scenario-Definition.pdf."},{"key":"7_CR5","unstructured":"John Brooke. SUS - A quick and dirty usability scale. Usability evaluation in industry, 189:194, 1996."},{"key":"7_CR6","unstructured":"Lorrie Faith Cranor and Simson Garfinkel. Security and Usability: Designing Secure Systems that People Can Use. O\u2019Reilly, 2005."},{"key":"7_CR7","unstructured":"Jacob Cohen. Statistical power analysis for the behavioral sciences. Lawrence Erlbaum Associates, Inc, 1988."},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Fred D. Davis. Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS quarterly, pages 319\u2013340, 1989.","DOI":"10.2307\/249008"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Fred D. Davis. User acceptance of information technology: system characteristics, user perceptions and behavioral impacts. International Journal of Man-Machine Studies, 38(3):475\u2013487, 1993.","DOI":"10.1006\/imms.1993.1022"},{"key":"7_CR10","unstructured":"Daniel Deibler, Malte Engeler, Ioannis Krontiris, Vasiliki Liagkou, Apostolos Pyrgelis, Eva Schlehahn, Yannis Stamatiou, Welderufaelr Tesfay, and Harald Zwingelberg. D7.3 evaluation of the student pilot, 2014. https:\/\/abc4trust.eu\/index.php\/pub\/deliverables."},{"key":"7_CR11","unstructured":"Kasper Damgaard, Hamza Ghani, Norbert G\u00f6tze, Anja Lehmann, Vasiliki Liagkou, Jesus Luna, Gert L\u00e6ss\u00f8e Mikkelsen, Apostolos Pyrgelis, and Yannis Stamatiou. D7.2 necessary hardware and software package for the student pilot deployment, 2012. https:\/\/abc4trust.eu\/download\/ABC4Trust-D7.2.Hard-and-Software-Package-for-Student-Pilot.pdf."},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Tamara Dinev and Paul Hart. Internet privacy concerns and social awareness as determinants of intention to transact. International Journal of Electronic Commerce, 10(2):7\u201329, 2006.","DOI":"10.2753\/JEC1086-4415100201"},{"key":"7_CR13","unstructured":"Andy Field. Discovering statistics using IBM SPSS statistics. Sage, 2013."},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Chin-Lung Hsu and Hsi-Peng Lu. Why do people play on-line games? An extended tam with social influences and flow experience. Information & Management, 41(7):853\u2013868, 2004.","DOI":"10.1016\/j.im.2003.08.014"},{"key":"7_CR15","unstructured":"ISO\/IEC. 9241-11 Ergonomic requirements for office work with visual display terminals (VDT)s - Part 11 Guidance on usability. 1998:ISO\/IEC 9241-11: 1998 (E)."},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"James R. Lewis. IBM computer usability satisfaction questionnaires: psychometric evaluation and instructions for use. International Journal of Human-Computer Interaction, 7(1):57\u201378, 1995.","DOI":"10.1080\/10447319509526110"},{"key":"7_CR17","unstructured":"Rensis Likert. A technique for the measurement of attitudes. Archives of psychology, 1932."},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"James R. Lewis, Brian S. Utesch, and Deborah E. Maher. UMUXLITE: when there\u2019s no time for the SUS. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pages 2099\u20132102. ACM, 2013.","DOI":"10.1145\/2470654.2481287"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"D. Harrison McKnight, Michelle Carter, Jason Bennett Thatcher, and Paul F. Clay. Trust in a specific technology: An investigation of its components and measures. ACM Transactions on Management Information Systems (TMIS), 2(2):12, 2011.","DOI":"10.1145\/1985347.1985353"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Paul A. Pavlou. Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. International journal of electronic commerce, 7(3):101\u2013134, 2003.","DOI":"10.1080\/10864415.2003.11044275"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Georg Regal, Marc Busch, Stephanie Deutsch, Christina Hochleitner, Martin Lugmayr, and Manfred Tscheligi. Money on the move workload, usability and technology acceptance of second-screen atminteractions. In Proceedings of the 15th international conference on Human-computer interaction with mobile devices and services, pages 281\u2013284. ACM, 2013.","DOI":"10.1145\/2493190.2493211"},{"key":"7_CR22","doi-asserted-by":"crossref","unstructured":"Sarah Spiekermann and Lorrie Faith Cranor. Engineering privacy. Software Engineering, IEEE Transactions on, 35(1), 2009.","DOI":"10.1109\/TSE.2008.88"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Sarah Spiekermann. Privacy enhancing technologies for RFID in retail \u2013 an empirical investigation. In UbiComp 2007: Ubiquitous Computing, pages 56\u201372. Springer, 2007.","DOI":"10.1007\/978-3-540-74853-3_4"},{"key":"7_CR24","unstructured":"Sarah Spiekermann. User control in ubiquitous computing: design alternatives and user acceptance. Shaker, 2008."},{"key":"7_CR25","unstructured":"San-Tsai Sun, Eric Pospisil, Ildar Muslukhov, Nuray Dindar, Kirstie Hawkey, and Konstantin Beznosov. What makes users refuse web single sign-on?: an empirical investigation of OpenID. In Proceedings of the Seventh Symposium on Usable Privacy and Security, page 4. ACM, 2011."},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Viswanath Venkatesh and Hillol Bala. Technology acceptance model 3 and a research agenda on interventions. Decision sciences, 39(2):273\u2013315, 2008.","DOI":"10.1111\/j.1540-5915.2008.00192.x"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Viswanath Venkatesh and Fred D. Davis. A theoretical extension of the technology acceptance model: four longitudinal field studies. Management science, 46(2):186\u2013204, 2000.","DOI":"10.1287\/mnsc.46.2.186.11926"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Erik W\u00e4stlund, Julio Angulo, and Simone Fischer-H\u00fcbner. Evoking comprehensive mental models of anonymous credentials. In Open Problems in Network Security, pages 1\u201314. Springer, 2012.","DOI":"10.1007\/978-3-642-27585-2_1"}],"container-title":["Attribute-based Credentials for Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-14439-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T08:36:41Z","timestamp":1675845401000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-14439-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,21]]},"ISBN":["9783319144382","9783319144399"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-14439-9_7","relation":{},"subject":[],"published":{"date-parts":[[2014,12,21]]},"assertion":[{"value":"21 December 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}