{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T12:54:28Z","timestamp":1760100868519},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319314556"},{"type":"electronic","value":"9783319314563"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-31456-3_6","type":"book-chapter","created":{"date-parts":[[2016,3,9]],"date-time":"2016-03-09T13:16:18Z","timestamp":1457529378000},"page":"104-123","source":"Crossref","is-referenced-by-count":6,"title":["Privacy-ABCs as a Case for Studying the Adoption of PETs by Users and Service Providers"],"prefix":"10.1007","author":[{"given":"Ioannis","family":"Krontiris","sequence":"first","affiliation":[]},{"given":"Zinaida","family":"Benenson","sequence":"additional","affiliation":[]},{"given":"Anna","family":"Girard","sequence":"additional","affiliation":[]},{"given":"Ahmad","family":"Sabouri","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Rannenberg","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Schoo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,3,10]]},"reference":[{"issue":"2","key":"6_CR1","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MSP.2008.35","volume":"6","author":"A Acquisti","year":"2008","unstructured":"Acquisti, A.: Identity management, privacy, and price discrimination. IEEE Secur. Priv. 6(2), 46\u201350 (2008)","journal-title":"IEEE Secur. Priv."},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Acquisti, A.: The economics of personal data and the economics of privacy. Background Paper for OECD Joint WPISP-WPIE Roundtable 1 (2010)","DOI":"10.1007\/978-3-642-27739-9_1641-1"},{"key":"6_CR3","first-page":"24","volume":"2","author":"A Acquisti","year":"2005","unstructured":"Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Secur. Priv. 2, 24\u201330 (2005)","journal-title":"IEEE Secur. Priv."},{"key":"6_CR4","unstructured":"Benenson, Z., Girard, A., Krontiris, I.: User acceptance factors for anonymous credentials: an empirical investigation. In: Workshop on the Economics of Information Security (WEIS) (2015)"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"375","DOI":"10.1007\/978-3-319-07620-1_33","volume-title":"Human Aspects of Information Security, Privacy, and Trust","author":"Z Benenson","year":"2014","unstructured":"Benenson, Z., Girard, A., Krontiris, I., Liagkou, V., Rannenberg, K., Stamatiou, Y.: User acceptance of privacy-ABCs: an exploratory study. In: Tryfonas, T., Askoxylakis, I. (eds.) HAS 2014. LNCS, vol. 8533, pp. 375\u2013386. Springer, Heidelberg (2014)"},{"key":"6_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-642-54069-1_7","volume-title":"Privacy Technologies and Policy","author":"R Bjones","year":"2014","unstructured":"Bjones, R., Krontiris, I., Paillier, P., Rannenberg, K.: Integrating anonymous credentials with eIDs for privacy-respecting online authentication. In: Preneel, B., Ikonomou, D. (eds.) APF 2012. LNCS, vol. 8319, pp. 111\u2013124. Springer, Heidelberg (2014)"},{"key":"6_CR7","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5931.001.0001","volume-title":"Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy","author":"S Brands","year":"2000","unstructured":"Brands, S.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, Cambridge (2000)"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), pp. 21\u201330 (2002)","DOI":"10.1145\/586110.586114"},{"key":"6_CR9","unstructured":"Cameron, K., Posch, R., Rannenberg, K.: Proposal for a common identity framework: A User-Centric Identity Metasystem. In: Rannenberg, K., Royer, D., Deuker, A. (eds.) The Future of Identity in the Information Society - Opportunities and Challenges. Springer (2009)"},{"issue":"3","key":"6_CR10","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"FD Davis","year":"1989","unstructured":"Davis, F.D.: Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q. 13(3), 319\u2013340 (1989)","journal-title":"MIS Q."},{"issue":"2","key":"6_CR11","doi-asserted-by":"publisher","first-page":"147","DOI":"10.2307\/2095101","volume":"48","author":"PJ DiMaggio","year":"1983","unstructured":"DiMaggio, P.J., Powell, W.W.: The iron cage revisited: institutional isomorphism and collective rationality in organizational fields. Am. Sociol. Rev. 48(2), 147\u2013160 (1983)","journal-title":"Am. Sociol. Rev."},{"issue":"2","key":"6_CR12","doi-asserted-by":"publisher","first-page":"7","DOI":"10.2753\/JEC1086-4415100201","volume":"10","author":"T Dinev","year":"2006","unstructured":"Dinev, T., Hart, P.: Internet privacy concerns and social awareness as determinants of intention to transact. Int. J. Electron. Commer. 10(2), 7\u201329 (2006)","journal-title":"Int. J. Electron. Commer."},{"key":"6_CR13","unstructured":"Economics, L.: Study on the Economic Benefits of Privacy-enhancing Technologies (PETs): Final Report to The European Commission, DG Justice, Freedom and Security. London Economics (2010)"},{"key":"6_CR14","volume-title":"Discovering Statistics Using IBM SPSS Statistics","author":"A Field","year":"2013","unstructured":"Field, A.: Discovering Statistics Using IBM SPSS Statistics. Sage, London (2013)"},{"key":"6_CR15","unstructured":"Final Report to the European Commission DG Justice, Freedom and Security: Study on the economic benefits of privacy-enhancing technologies (PETs). Technical report, London Economics, July 2010"},{"issue":"1","key":"6_CR16","first-page":"1","volume":"1","author":"S Fischer-H\u00fcbner","year":"2011","unstructured":"Fischer-H\u00fcbner, S., Hoofnagle, C., Krontiris, I., Rannenberg, K., Waidner, M.: Online privacy: towards informational self-determination on the internet (Dagstuhl Perspectives Workshop 11061). Dagstuhl Manifestos 1(1), 1\u201320 (2011)","journal-title":"Dagstuhl Manifestos"},{"key":"6_CR17","first-page":"143","volume-title":"Attribute-based Credentials for Trust","author":"Marit Hansen","year":"2014","unstructured":"Hansen, M., Bieker, F., Deibler, D., Obersteller, H., Schlehahn, E., Zwingelberg, H.: Legal data protection considerations. In: Rannenberg, K., Camenisch, J., Sabouri, A. (eds.) Attribute-based Credentials for Trust, pp. 143\u2013161 (2015)"},{"issue":"1","key":"6_CR18","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1111\/j.1365-2575.2012.00420.x","volume":"24","author":"T Herath","year":"2014","unstructured":"Herath, T., Chen, R., Wang, J., Banjara, K., Wilbur, J., Rao, H.R.: Security services as coping mechanisms: an investigation into user intention to adopt an email authentication service. Inf. Syst. J. 24(1), 61\u201384 (2014)","journal-title":"Inf. Syst. J."},{"key":"6_CR19","doi-asserted-by":"publisher","first-page":"465","DOI":"10.2307\/249629","volume":"19","author":"CL Iacovou","year":"1995","unstructured":"Iacovou, C.L., Benbasat, I., Dexter, A.S.: Electronic data interchange and small organizations: adoption and impact of technology. MIS Q. 19, 465\u2013485 (1995)","journal-title":"MIS Q."},{"issue":"9","key":"6_CR20","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1145\/234215.234476","volume":"39","author":"KC Laudon","year":"1996","unstructured":"Laudon, K.C.: Markets and privacy. Commun. ACM 39(9), 92\u2013104 (1996)","journal-title":"Commun. ACM"},{"issue":"2","key":"6_CR21","first-page":"12","volume":"2","author":"DH McKnight","year":"2011","unstructured":"McKnight, D.H., Carter, M., Thatcher, J.B., Clay, P.F.: Trust in a specific technology: an investigation of its components and measures. ACM Trans. Manage. Inf. Syst. (TMIS) 2(2), 12 (2011)","journal-title":"ACM Trans. Manage. Inf. Syst. (TMIS)"},{"issue":"6","key":"6_CR22","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/s12599-014-0351-3","volume":"6","author":"M Nofer","year":"2014","unstructured":"Nofer, M., Hinz, O., Muntermann, J., Ro\u00dfnagel, H.: The economic impact of privacy violations and security breaches. Bus. Inf. Syst. Eng. 6(6), 339\u2013348 (2014)","journal-title":"Bus. Inf. Syst. Eng."},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Patil, S., Patruni, B., Lu, H., Dunkerley, F., Fox, J., Potoglou, D., Robinson, N.: Public perception of security and privacy: results of the comprehensive analysis of PACT\u2019s pan-european survey. Technical report, PACT EU Project Public Deliverable D4.2, June 2014","DOI":"10.7249\/RR704"},{"issue":"3","key":"6_CR24","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1080\/10864415.2003.11044275","volume":"7","author":"PA Pavlou","year":"2003","unstructured":"Pavlou, P.A.: Consumer acceptance of electronic commerce: integrating trust and risk with the technology acceptance model. Int. J. Electron. Commer. 7(3), 101\u2013134 (2003)","journal-title":"Int. J. Electron. Commer."},{"key":"6_CR25","volume-title":"Diffusion of Innovations","author":"M Rogers Everett","year":"1995","unstructured":"Rogers Everett, M.: Diffusion of Innovations. Free Press, New York (1995)"},{"key":"6_CR26","first-page":"1409","volume":"26","author":"IS Rubinstein","year":"2011","unstructured":"Rubinstein, I.S.: Regulating privacy by design. Berkeley Technol. Law J. 26, 1409 (2011)","journal-title":"Berkeley Technol. Law J."},{"key":"6_CR27","unstructured":"Sabouri, A.: Understanding the determinants of privacy-ABC technologies adoption by service providers. In: Proceedings of 14th IFIP WG 6.11 Conference on e-Business, e-Services, and e-Society, I3E 2015 Open and Big Data Management and Innovation, Delft, The Netherlands, 13\u201315 October 2015, vol. 9373 (2015)"},{"key":"6_CR28","volume-title":"User Control in Ubiquitous Computing: Design Alternatives and User Acceptance","author":"S Spiekermann","year":"2008","unstructured":"Spiekermann, S.: User Control in Ubiquitous Computing: Design Alternatives and User Acceptance. Shaker, Aachen (2008)"},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Stamatiou, Y., Benenson, Z., Girard, A., Krontiris, I., Liagkou, V., Pyrgelis, A., Tesfay, W.: Course evaluation in higher education: the patras pilot of ABC4Trust. In: Rannenberg, K., Camenisch, J., Sabouri, A. (eds.) Attribute-based Credentials for Trust, pp. 197\u2013239. Springer International Publishing (2015)","DOI":"10.1007\/978-3-319-14439-9_7"},{"key":"6_CR30","doi-asserted-by":"crossref","unstructured":"Sun, S.T., Pospisil, E., Muslukhov, I., Dindar, N., Hawkey, K., Beznosov, K.: What makes users refuse web single sign-on?: an empirical investigation of OpenID. In: Proceedings of the Seventh Symposium on Usable Privacy and Security, p. 4. ACM (2011)","DOI":"10.1145\/2078827.2078833"},{"key":"6_CR31","volume-title":"Processes of Technological Innovation","author":"LG Tornatzky","year":"1990","unstructured":"Tornatzky, L.G., Fleischer, M., Chakrabarti, A.K.: Processes of Technological Innovation. Lexington Books, Lexington (1990)"},{"issue":"2","key":"6_CR32","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1111\/j.1540-5915.2008.00192.x","volume":"39","author":"V Venkatesh","year":"2008","unstructured":"Venkatesh, V., Bala, H.: Technology acceptance model 3 and a research agenda on interventions. Decis. Sci. 39(2), 273\u2013315 (2008)","journal-title":"Decis. Sci."},{"issue":"2","key":"6_CR33","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"46","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh, V., Davis, F.D.: A theoretical extension of the technology acceptance model: four longitudinal field studies. Manage. Sci. 46(2), 186\u2013204 (2000)","journal-title":"Manage. Sci."},{"key":"6_CR34","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V Venkatesh","year":"2003","unstructured":"Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: toward a unified view. MIS Q. 27, 425\u2013478 (2003)","journal-title":"MIS Q."},{"issue":"1","key":"6_CR35","doi-asserted-by":"crossref","first-page":"157","DOI":"10.2307\/41410412","volume":"36","author":"V Venkatesh","year":"2012","unstructured":"Venkatesh, V., Thong, J.Y., Xu, X.: Consumer acceptance and use of information technology: extending the unified theory of acceptance and use of technology. MIS Q. 36(1), 157\u2013178 (2012)","journal-title":"MIS Q."},{"key":"6_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-27585-2_1","volume-title":"Open Problems in Network Security","author":"E W\u00e4stlund","year":"2012","unstructured":"W\u00e4stlund, E., Angulo, J., Fischer-H\u00fcbner, S.: Evoking comprehensive mental models of anonymous credentials. In: Camenisch, J., Kesdogan, D. (eds.) iNetSec 2011. LNCS, vol. 7039, pp. 1\u201314. Springer, Heidelberg (2012)"},{"key":"6_CR37","doi-asserted-by":"crossref","unstructured":"W\u00e4stlund, E., Wolkerstorfer, P., K\u00f6ffel, C.: PET-USES: Privacy-enhancing technology-users self-estimation scale. In: Privacy and Identity Management for Life, pp. 266\u2013274. Springer (2010)","DOI":"10.1007\/978-3-642-14282-6_22"}],"container-title":["Lecture Notes in Computer Science","Privacy Technologies and Policy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-31456-3_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T19:59:41Z","timestamp":1655236781000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-31456-3_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319314556","9783319314563"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-31456-3_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}