{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T02:23:35Z","timestamp":1743042215315,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319250120"},{"type":"electronic","value":"9783319250137"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25013-7_10","type":"book-chapter","created":{"date-parts":[[2015,10,7]],"date-time":"2015-10-07T22:36:30Z","timestamp":1444257390000},"page":"119-132","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Understanding the Determinants of Privacy-ABC Technologies Adoption by Service Providers"],"prefix":"10.1007","author":[{"given":"Ahmad","family":"Sabouri","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,26]]},"reference":[{"unstructured":"Sabouri, A. (ed.): Architecture for attribute-based credential technologies - final version. Deliverable D2.2, The ABC4Trust EU Project (2014). \n                      https:\/\/abc4trust.eu\/download\/Deliverable_D2.2.pdf\n                      \n                    . Accessed 08 November 2014","key":"10_CR1"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-642-54069-1_7","volume-title":"Privacy Technologies and Policy","author":"Ronny Bjones","year":"2014","unstructured":"Bjones, Ronny, Krontiris, Ioannis, Paillier, Pascal, Rannenberg, Kai: Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication. In: Preneel, Bart, Ikonomou, Demosthenes (eds.) APF 2012. LNCS, vol. 8319, pp. 111\u2013124. Springer, Heidelberg (2014)"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-94-007-0641-5_15","volume-title":"Computers, Privacy and Data Protection: An Element of Choice","author":"JJ Borking","year":"2011","unstructured":"Borking, J.J.: Why adopting privacy enhancing technologies (pets) takes so much time. In: Gutwirth, S., Poullet, Y., de Hert, P., Leenes, R. (eds.) Computers, Privacy and Data Protection: An Element of Choice, pp. 309\u2013341. Springer, Netherlands (2011)"},{"key":"10_CR4","volume-title":"Advances in Cryptology - CRYPTO 1993","author":"S Brands","year":"1994","unstructured":"Brands, S.: Untraceable off-line cash in wallet with observers. In: Helleseth, T. (ed.) Advances in Cryptology - CRYPTO 1993, vol. 765. Springer, Heidelberg (1994)"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-28628-8_4","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"Jan L Camenisch","year":"2004","unstructured":"Camenisch, Jan L., Lysyanskaya, Anna: Signature Schemes and Anonymous Credentials from Bilinear Maps. In: Franklin, Matt (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56\u201372. Springer, Heidelberg (2004)"},{"key":"10_CR6","volume-title":"Privacy by Design: The 7 Foundational Principles","author":"A Cavoukian","year":"2009","unstructured":"Cavoukian, A., et al.: Privacy by Design: The 7 Foundational Principles. Information and Privacy Commissioner of Ontario, Canada (2009)"},{"issue":"2","key":"10_CR7","first-page":"13","volume":"50","author":"AYL Chong","year":"2009","unstructured":"Chong, A.Y.L., Ooi, K.B., Lin, B., Raman, M.: Factors affecting the adoption level of C-Commerce: an empirical study. J. Comput. Inf. Syst. 50(2), 13 (2009)","journal-title":"J. Comput. Inf. Syst."},{"issue":"2","key":"10_CR8","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/S0378-7206(98)00040-8","volume":"34","author":"CW Crook","year":"1998","unstructured":"Crook, C.W., Kumar, R.L.: Electronic data interchange: a multi-industry investigation using grounded theory. Inf. Manag. 34(2), 75\u201389 (1998)","journal-title":"Inf. Manag."},{"issue":"2","key":"10_CR9","doi-asserted-by":"publisher","first-page":"147","DOI":"10.2307\/2095101","volume":"48","author":"PJ DiMaggio","year":"1983","unstructured":"DiMaggio, P.J., Powell, W.W.: The iron cage revisited: institutional isomorphism and collective rationality in organizational fields. Am. Sociol. Rev. 48(2), 147\u2013160 (1983)","journal-title":"Am. Sociol. Rev."},{"key":"10_CR10","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1016\/S0742-3322(00)17003-2","volume":"17","author":"N Fligstein","year":"1985","unstructured":"Fligstein, N.: The spread of the multidivisional form among large firms, 1919\u20131979. Adv. Strat. Manag. 17, 55\u201378 (1985)","journal-title":"Adv. Strat. Manag."},{"issue":"1\u20132","key":"10_CR11","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1023\/A:1019112722593","volume":"1","author":"S Goode","year":"2000","unstructured":"Goode, S., Stevens, K.: An analysis of the business characteristics of adopters and non-adopters of world wide web technology. Inf. Technol. Manag. 1(1\u20132), 129\u2013154 (2000)","journal-title":"Inf. Technol. Manag."},{"doi-asserted-by":"crossref","unstructured":"Hansen, M., Obersteller, H., Rannenberg, K., Veseli, F.: Establishment and prospects of Privacy-ABCs. In: Rannenberg, K., Camenisch, J., Sabouri, A. (eds.) Attribute-based Credentials for Trust, pp. 345\u2013360. Springer International Publishing, Switzerland (2015). \n                      http:\/\/dx.doi.org\/10.1007\/978-3-319-14439-9_11","key":"10_CR12","DOI":"10.1007\/978-3-319-14439-9_11"},{"issue":"3","key":"10_CR13","doi-asserted-by":"publisher","first-page":"472","DOI":"10.2307\/2393735","volume":"42","author":"PR Haunschild","year":"1997","unstructured":"Haunschild, P.R., Miner, A.S.: Modes of interorganizational imitation: the effects of outcome salience and uncertainty. Adm. Sci. Q. 42(3), 472\u2013500 (1997)","journal-title":"Adm. Sci. Q."},{"issue":"4","key":"10_CR14","doi-asserted-by":"publisher","first-page":"593","DOI":"10.2307\/2393338","volume":"38","author":"HA Haveman","year":"1993","unstructured":"Haveman, H.A.: Follow the leader: mimetic isomorphism and entry into new markets. Adm. Sci. Q. 38(4), 593\u2013627 (1993)","journal-title":"Adm. Sci. Q."},{"issue":"4","key":"10_CR15","doi-asserted-by":"publisher","first-page":"465","DOI":"10.2307\/249629","volume":"19","author":"CL Iacovou","year":"1995","unstructured":"Iacovou, C.L., Benbasat, I., Dexter, A.S.: Electronic data interchange and small organizations: adoption and impact of technology. MIS Q. 19(4), 465\u2013485 (1995)","journal-title":"MIS Q."},{"issue":"3","key":"10_CR16","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/S0963-8687(01)00048-8","volume":"10","author":"JD Kendall","year":"2001","unstructured":"Kendall, J.D., Tung, L.L., Chua, K.H., Ng, C.H.D., Tan, S.M.: Receptivity of singapore\u2019s SMEs to electronic commerce adoption. J. Strat. Inf. Syst. 10(3), 223\u2013242 (2001)","journal-title":"J. Strat. Inf. Syst."},{"issue":"8","key":"10_CR17","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1016\/S0378-7206(01)00073-8","volume":"38","author":"KK Kuan","year":"2001","unstructured":"Kuan, K.K., Chau, P.Y.: A perception-based model for edi adoption in small businesses using a technology-organization-environment framework. Inf. Manag. 38(8), 507\u2013521 (2001)","journal-title":"Inf. Manag."},{"issue":"4","key":"10_CR18","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.compedu.2003.08.007","volume":"42","author":"CB Martins","year":"2004","unstructured":"Martins, C.B., Steil, A.V., Todesco, J.L.: Factors influencing the adoption of the internet as a teaching tool at foreign language schools. Comput. Edu. 42(4), 353\u2013374 (2004)","journal-title":"Comput. Edu."},{"issue":"1","key":"10_CR19","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1111\/0447-2778.00007","volume":"39","author":"NJ Miller","year":"2001","unstructured":"Miller, N.J., McLeod, H., Ob, K.Y.: Managing family businesses in small communities. J. Small Bus. Manag. 39(1), 73\u201387 (2001)","journal-title":"J. Small Bus. Manag."},{"issue":"3","key":"10_CR20","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1287\/isre.2.3.192","volume":"2","author":"GC Moore","year":"1991","unstructured":"Moore, G.C., Benbasat, I.: Development of an instrument to measure the perceptions of adopting an information technology innovation. Inf. Syst. Res. 2(3), 192\u2013222 (1991)","journal-title":"Inf. Syst. Res."},{"unstructured":"Osterwalder, A., et al.: The business model ontology: a proposition in a design science approach (2004)","key":"10_CR21"},{"issue":"2","key":"10_CR22","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1057\/palgrave.ejis.3000260","volume":"6","author":"G Premkumar","year":"1997","unstructured":"Premkumar, G., Ramamurthy, K., Crum, M.: Determinants of EDI adoption in the transportation industry. Eur. J. Inf. Syst. 6(2), 107\u2013121 (1997)","journal-title":"Eur. J. Inf. Syst."},{"issue":"4","key":"10_CR23","doi-asserted-by":"publisher","first-page":"467","DOI":"10.1016\/S0305-0483(98)00071-1","volume":"27","author":"G Premkumar","year":"1999","unstructured":"Premkumar, G., Roberts, M.: Adoption of new information technologies in rural small businesses. Omega 27(4), 467\u2013484 (1999)","journal-title":"Omega"},{"key":"10_CR24","first-page":"409","volume-title":"Organizational Dynamics of Technology-Based Innovation: Diversifying the Research Agenda, IFIP International Federation for Information Processing","author":"B Ramdani","year":"2007","unstructured":"Ramdani, B., Kawalek, P.: SME adoption of enterprise systems in the Northwest of England. In: McMaster, T., Wastell, D., Ferneley, E., DeGross, J. (eds.) Organizational Dynamics of Technology-Based Innovation: Diversifying the Research Agenda, IFIP International Federation for Information Processing, vol. 235, pp. 409\u2013429. Springer, USA (2007)"},{"issue":"5","key":"10_CR25","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1108\/10662240110410363","volume":"11","author":"L Raymond","year":"2001","unstructured":"Raymond, L.: Determinants of web site implementation in small businesses. Internet Res. 11(5), 411\u2013424 (2001)","journal-title":"Internet Res."},{"key":"10_CR26","volume-title":"Diffusion of innovations","author":"E Rogers","year":"2003","unstructured":"Rogers, E.: Diffusion of innovations. Free Press, New York (2003)"},{"key":"10_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-642-32287-7_21","volume-title":"Trust, Privacy and Security in Digital Business","author":"A Sabouri","year":"2012","unstructured":"Sabouri, A., Krontiris, I., Rannenberg, K.: Attribute-Based Credentials for Trust (ABC4Trust). In: Fischer-H\u00fcbner, S., Katsikas, S., Quirchmayr, G. (eds.) TrustBus 2012. LNCS, vol. 7449, pp. 218\u2013219. Springer, Heidelberg (2012)"},{"key":"10_CR28","volume-title":"Institutions and Organizations (Foundations for Organizational Science)","author":"WR Scott","year":"2000","unstructured":"Scott, W.R.: Institutions and Organizations (Foundations for Organizational Science). SAGE Publications Inc., New York (2000)"},{"issue":"1","key":"10_CR29","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1109\/TEM.2007.912806","volume":"55","author":"A Soares-Aguiar","year":"2008","unstructured":"Soares-Aguiar, A.: Palma-dos Reis, A.: Why do firms adopt E-Procurement systems? using logistic regression to empirically test a conceptual model. IEEE Trans. Eng. Manag. 55(1), 120\u2013133 (2008)","journal-title":"IEEE Trans. Eng. Manag."},{"issue":"3","key":"10_CR30","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1109\/TEM.2006.878106","volume":"53","author":"TS Teo","year":"2006","unstructured":"Teo, T.S., Ranganathan, C., Dhaliwal, J.: Key dimensions of inhibitors for the deployment of web-based business-to-business electronic commerce. IEEE Trans. Eng. Manag. 53(3), 395\u2013411 (2006)","journal-title":"IEEE Trans. Eng. Manag."},{"issue":"2","key":"10_CR31","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1080\/10864415.1997.11518310","volume":"2","author":"TS Teo","year":"1997","unstructured":"Teo, T.S., Tan, M., Buk, W.K.: A contingency model of internet adoption in Singapore. Int. J. Electron. Commer. 2(2), 95\u2013118 (1997)","journal-title":"Int. J. Electron. Commer."},{"issue":"4","key":"10_CR32","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1080\/07421222.1999.11518227","volume":"15","author":"JY Thong","year":"1999","unstructured":"Thong, J.Y.: An integrated model of information systems adoption in small businesses. J. Manag. Inf. Syst. 15(4), 187\u2013214 (1999)","journal-title":"J. Manag. Inf. Syst."},{"unstructured":"Tornatzky, L.G., Fleischer, M., Chakrabarti, A.K.: Processes of technological innovation (1990)","key":"10_CR33"},{"key":"10_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-27585-2_1","volume-title":"Open Problems in Network Security","author":"E W\u00e4stlund","year":"2012","unstructured":"W\u00e4stlund, E., Angulo, J., Fischer-H\u00fcbner, S.: Evoking Comprehensive Mental Models of Anonymous Credentials. In: Camenisch, J., Kesdogan, D. (eds.) iNetSec 2011. LNCS, vol. 7039, pp. 1\u201314. Springer, Heidelberg (2012)"},{"doi-asserted-by":"crossref","unstructured":"Zafarani, R., Liu, H.: Connecting users across social media sites: a behavioral-modeling approach. In: The 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2013, Chicago, IL, USA, 11\u201314 August 2013, pp. 41\u201349 (2013)","key":"10_CR35","DOI":"10.1145\/2487575.2487648"},{"issue":"6","key":"10_CR36","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1057\/palgrave.ejis.3000650","volume":"15","author":"K Zhu","year":"2006","unstructured":"Zhu, K., Dong, S., Xu, S.X., Kraemer, K.L.: Innovation diffusion in global contexts: determinants of post-adoption digital transformation of european companies. Eur. J. Inf. Syst. 15(6), 601\u2013616 (2006)","journal-title":"Eur. J. Inf. Syst."}],"container-title":["Lecture Notes in Computer Science","Open and Big Data Management and Innovation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25013-7_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T20:07:25Z","timestamp":1570478845000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25013-7_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319250120","9783319250137"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25013-7_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"26 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}