{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T04:28:44Z","timestamp":1752985724675,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319186207"},{"type":"electronic","value":"9783319186214"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18621-4_4","type":"book-chapter","created":{"date-parts":[[2015,5,9]],"date-time":"2015-05-09T07:58:59Z","timestamp":1431158339000},"page":"39-53","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Privacy and Security Perceptions of European Citizens: A Test of the Trade-Off Model"],"prefix":"10.1007","author":[{"given":"Michael","family":"Friedewald","sequence":"first","affiliation":[]},{"given":"Marc","family":"van Lieshout","sequence":"additional","affiliation":[]},{"given":"Sven","family":"Rung","sequence":"additional","affiliation":[]},{"given":"Merel","family":"Ooms","sequence":"additional","affiliation":[]},{"given":"Jelmer","family":"Ypma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,10]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1007\/1-4020-8090-5_13","volume-title":"The Economics of Information Security","author":"A Acquisti","year":"2004","unstructured":"Acquisti, A., Grossklags, J.: Privacy attitudes and privacy behavior: losses, gains, and hyperbolic discounting. In: Camp, J.L., Lewis, S. (eds.) The Economics of Information Security, pp. 165\u2013178. Kluwer, Dordrecht (2004)"},{"key":"4_CR2","first-page":"173","volume-title":"The Handbook of Attitudes","author":"I Ajzen","year":"2005","unstructured":"Ajzen, I., Fishbein, M.: The influence of attitudes on behavior. In: Albarracin, D., Johnson, B.T., Zanna, M.P. (eds.) The Handbook of Attitudes, pp. 173\u2013221. Erlbaum, Mahwah (2005)"},{"key":"4_CR3","unstructured":"Clarke, R.: Introduction to Dataveillance and Information Privacy, and Definitions of Terms. Xamax Consultancy, Chapman (1997\u20132006). http:\/\/www.rogerclarke.com\/DV\/Intro.html"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-94-007-5170-5_1","volume-title":"European Data Protection: Coming of Age","author":"RL Finn","year":"2013","unstructured":"Finn, R.L., Wright, D., Friedewald, M.: Seven types of privacy. In: Gutwirth, S., Leenes, R., De Hert, P., Poullet, Y. (eds.) European Data Protection: Coming of Age, pp. 3\u201332. Springer, Dordrecht (2013)"},{"key":"4_CR5","unstructured":"European Council: the Stockholm programme - an open and secure Europe serving and protecting the citizens. Official Journal of the European Union C 115, 1\u201338 (2010)"},{"key":"4_CR6","unstructured":"Friedewald, M., van Lieshout, M., Rung, S., Ooms, M., Ypma, J.: Report on statistical analysis of survey results, PRISMS Deliverable 10.1 (2015). http:\/\/prismsproject.eu"},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1016\/j.clsr.2013.07.005","volume":"29","author":"R Gellert","year":"2013","unstructured":"Gellert, R., Gutwirth, S.: The legal construction of privacy and data protection. Comput. Law Secur. Rev. 29, 522\u2013530 (2013)","journal-title":"Comput. Law Secur. Rev."},{"key":"4_CR8","unstructured":"General Secretariat of the Council (ed.): Internal Security Strategy for the European Union: Towards a European Security Model. Publications Office of the European Union, Luxembourg (2010)"},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"263","DOI":"10.1016\/j.clsr.2012.03.005","volume":"28","author":"D Hallinan","year":"2012","unstructured":"Hallinan, D., Friedewald, M., McCarthy, P.: Citizens\u2019 perceptions of data protection and privacy. Comput. Law Secur. Rev. 28, 263\u2013272 (2012)","journal-title":"Comput. Law Secur. Rev."},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/s11206-005-1898-z","volume":"20","author":"DVS Kasper","year":"2005","unstructured":"Kasper, D.V.S.: The evolution (or devolution) of privacy. Sociol. Forum 20, 69\u201392 (2005)","journal-title":"Sociol. Forum"},{"key":"4_CR11","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1080\/13504620220145401","volume":"8","author":"A Kollmuss","year":"2002","unstructured":"Kollmuss, A., Agyeman, J.: Mind the gap: why do people act environmentally and what are the barriers to pro-environmental behaviour? Env. Edu. Res. 8, 239\u2013260 (2002)","journal-title":"Env. Edu. Res."},{"key":"4_CR12","first-page":"150","volume-title":"Surveillance in Europe","author":"R Kreissl","year":"2015","unstructured":"Kreissl, R., Norris, C., Krlic, M., Groves, L., Amicelle, A.: Surveillance: preventing and detecting crime and terrorism. In: Wright, D., Kreissl, R. (eds.) Surveillance in Europe, pp. 150\u2013210. Routledge, New York (2015)"},{"issue":"9","key":"4_CR13","first-page":"36","volume":"43","author":"M Lagazio","year":"2012","unstructured":"Lagazio, M.: The evolution of the concept of security. Thinker 43(9), 36\u201343 (2012)","journal-title":"Thinker"},{"key":"4_CR14","first-page":"119","volume-title":"Privacy and Security in the Digital Age","author":"M van Lieshout","year":"2014","unstructured":"van Lieshout, M., Friedewald, M., Wright, D., Gutwirth, S.: Reconciling privacy and security. In: Friedewald, M., Pohoryles, R.J. (eds.) Privacy and Security in the Digital Age, pp. 119\u2013132. Routledge, London (2014)"},{"key":"4_CR15","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1177\/0963662510376886","volume":"21","author":"V Pavone","year":"2012","unstructured":"Pavone, V., Esposti, S.D.: Public assessment of new surveillance-oriented security technologies: beyond the trade-off between privacy and security. Public Undestanding Sci. 21, 556\u2013572 (2012)","journal-title":"Public Undestanding Sci."},{"key":"4_CR16","unstructured":"Pavone, V., Esposti, S. D., Santiago, E.: Key factors affecting public acceptance and acceptability of SOSTs, SurPRISE Deliverable 2.4 (2015). http:\/\/surprise-project.eu\/"},{"key":"4_CR17","first-page":"745","volume":"44","author":"DJ Solove","year":"2008","unstructured":"Solove, D.J.: \u201cI\u2019ve got nothing to hide\u201d and other misunderstandings of privacy. St. Diego Law Rev. 44, 745\u2013772 (2008)","journal-title":"St. Diego Law Rev."},{"key":"4_CR18","series-title":"IFIP advances in information and communication technology","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/978-3-642-55137-6_7","volume-title":"Privacy and Identity Management for Emerging Services and Technologies","author":"B van Schoonhoven","year":"2014","unstructured":"van Schoonhoven, B., Roosendaal, A., Huijboom, N.: Privacy versus collective security. In: Hansen, M., Hoepman, J.-H., Leenes, R., Whitehouse, D. (eds.) Privacy and Identity 2013. IFIP AICT, vol. 421, pp. 93\u2013101. Springer, Heidelberg (2014)"},{"key":"4_CR19","volume-title":"Understanding Privacy","author":"DJ Solove","year":"2008","unstructured":"Solove, D.J.: Understanding Privacy. Harvard University Press, Cambridge (2008)"},{"key":"4_CR20","doi-asserted-by":"crossref","DOI":"10.4324\/9780203871133","volume-title":"Security","author":"L Zedner","year":"2009","unstructured":"Zedner, L.: Security. Routledge, London (2009)"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management for the Future Internet in the Age of Globalisation"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18621-4_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,8]],"date-time":"2023-02-08T12:55:38Z","timestamp":1675860938000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-18621-4_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319186207","9783319186214"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18621-4_4","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"10 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}