{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:15:24Z","timestamp":1766578524869,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319417622"},{"type":"electronic","value":"9783319417639"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-41763-9_1","type":"book-chapter","created":{"date-parts":[[2016,7,6]],"date-time":"2016-07-06T07:21:44Z","timestamp":1467789704000},"page":"1-18","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Modelling the Relationship Between Privacy and Security Perceptions and the Acceptance of Surveillance Practices"],"prefix":"10.1007","author":[{"given":"Michael","family":"Friedewald","sequence":"first","affiliation":[]},{"given":"Marc","family":"van Lieshout","sequence":"additional","affiliation":[]},{"given":"Sven","family":"Rung","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,7]]},"reference":[{"key":"1_CR1","first-page":"173","volume-title":"The Handbook of Attitudes","author":"I Ajzen","year":"2005","unstructured":"Ajzen, I., Fishbein, M.: The influence of attitudes on behavior. In: Albarracin, D., et al. (eds.) The Handbook of Attitudes, pp. 173\u2013221. Erlbaum, Mahwah (2005)"},{"issue":"3","key":"1_CR2","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1093\/idpl\/ipt014","volume":"3","author":"D Barnard-Wills","year":"2013","unstructured":"Barnard-Wills, D.: Security, privacy and surveillance in european policy documents. International Data Priv. Law 3(3), 170\u2013180 (2013)","journal-title":"International Data Priv. Law"},{"key":"1_CR3","unstructured":"Barnard-Wills, D., et al.: Possible dual use of the decision support system. PRISMS Deliverable 10.3, June 2015"},{"key":"1_CR4","unstructured":"Blinkert, B.: Unsicherheitsbefindlichkeit als \u2018sozialer Tatbestand\u2019. Kriminalit\u00e4tsfurcht und die Wahrnehmung von Sicherheit und Unsicherheit in Europa. In: Erkundungen zur Zivilgesellschaft, pp. 119\u2013146. Lit-Verlag, M\u00fcnster (2013)"},{"issue":"1","key":"1_CR5","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1111\/j.2044-8317.1984.tb00789.x","volume":"37","author":"MW Browne","year":"1984","unstructured":"Browne, M.W.: Asymptotically distribution-free methods for the analysis of covariance structures. Br. J. Math. Stat. Psychol. 37(1), 62\u201383 (1984)","journal-title":"Br. J. Math. Stat. Psychol."},{"issue":"2","key":"1_CR6","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MTS.2014.2319897","volume":"33","author":"G Conti","year":"2014","unstructured":"Conti, G., et al.: Deconstructing the relationship between privacy and security. IEEE Technol. Soc. Mag. 33(2), 28\u201330 (2014)","journal-title":"IEEE Technol. Soc. Mag."},{"issue":"2","key":"1_CR7","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1111\/j.1468-5914.2005.00268.x","volume":"35","author":"AJ Cook","year":"2005","unstructured":"Cook, A.J., et al.: Taking a position: a reinterpretation of the theory of planned behaviour. J. Theory Soc. Behav. 35(2), 143\u2013154 (2005)","journal-title":"J. Theory Soc. Behav."},{"key":"1_CR8","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1002\/ejsp.2049","volume":"45","author":"T Dienlin","year":"2015","unstructured":"Dienlin, T., Trepte, S.: Is the privacy paradox a relic of the past? An in-depth analysis of privacy attitudes and privacy behaviors. Eur. J. Soc. Psychol. 45, 285\u2013297 (2015)","journal-title":"Eur. J. Soc. Psychol."},{"key":"1_CR9","doi-asserted-by":"crossref","first-page":"147","DOI":"10.1007\/978-1-349-16939-9_7","volume-title":"The Rules of Sociological Method","author":"Emile Durkheim","year":"1982","unstructured":"Durkheim, E.: The Rules of Sociological Method [1895]. Trans. by Lakes, S. The Free Press, New York et al. (1982)"},{"key":"1_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-94-007-5170-5_1","volume-title":"European Data Protection: Coming of Age","author":"RL Finn","year":"2013","unstructured":"Finn, R.L., et al.: Seven types of privacy. In: Gutwirth, S., et al. (eds.) European Data Protection: Coming of Age, pp. 3\u201332. Springer, Dordrecht (2013)"},{"key":"1_CR11","unstructured":"Fox, S., et al.: Trust and privacy online: Why Americans want to rewrite the rules. Washington, D.C.: Pew Internet & American Life Project, August 2001. http:\/\/www.pewinternet.org\/files\/old-media\/\/Files\/Reports\/2000\/PIP_Trust_Privacy_Report.pdf"},{"key":"1_CR12","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/978-3-319-18621-4_4","volume-title":"Privacy and Identity Management for the Future Internet in the Age of Globalisation","author":"M Friedewald","year":"2015","unstructured":"Friedewald, M., van Lieshout, M., Rung, S., Ooms, M., Ypma, J.: Privacy and security perceptions of european citizens: a test of the trade-off model. In: Camenisch, J., Fischer-H\u00fcbner, S., Hansen, M. (eds.) Privacy and Identity 2014. IFIP AICT, vol. 457, pp. 39\u201353. Springer, Heidelberg (2015)"},{"key":"1_CR13","unstructured":"Friedewald, M., et al.: Report on the analysis of the PRISMS survey. PRISMS Deliverable 10.1. PRISMS project, October 2015. http:\/\/prismsproject.eu"},{"key":"1_CR14","unstructured":"Hummelsheim, D.: Subjektive Unsicherheit Lebenszufriedenheit in Deutschland: Empirische Ergebnisse einer repr\u00e4sentativen Bev\u00f6lkerungsbefragung. In: Zoche, P., et al. (ed.) Sichere Zeiten? Gesellschaftliche Dimensionen der Sicherheitsforschung, pp. 67\u201389. Lit Verlag, M\u00fcnster (2015)"},{"key":"1_CR15","volume-title":"Structural Equation Modeling: Foundations and Extensions","author":"D Kaplan","year":"2000","unstructured":"Kaplan, D.: Structural Equation Modeling: Foundations and Extensions. SAGE, Thousand Oaks (2000)"},{"issue":"3","key":"1_CR16","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1080\/13504620220145401","volume":"8","author":"A Kollmuss","year":"2002","unstructured":"Kollmuss, A., Agyeman, J.: Mind the Gap: why do people act environmentally and what are the barriers to pro-environmental behavior? Environ. Educ. Res. 8(3), 239\u2013260 (2002)","journal-title":"Environ. Educ. Res."},{"key":"1_CR17","first-page":"150","volume-title":"Surveillance in Europe","author":"R Kreissl","year":"2015","unstructured":"Kreissl, R., et al.: Surveillance: preventing and detecting crime and terrorism. In: Wright, D., Kreissl, R. (eds.) Surveillance in Europe, pp. 150\u2013210. Routledge, London (2015)"},{"issue":"9","key":"1_CR18","first-page":"36","volume":"43","author":"M Lagazio","year":"2012","unstructured":"Lagazio, M.: The evolution of the concept of security. Thinker 43(9), 36\u201343 (2012)","journal-title":"Thinker"},{"key":"1_CR19","unstructured":"van Lieshout, M., et al.: The PRISMS Decision Support System. PRISMS Deliverable 11.3, July 2015. http:\/\/prismsproject.eu"},{"key":"1_CR20","doi-asserted-by":"crossref","unstructured":"Morton, A.: Measuring inherent privacy concern and desire for privacy: a pilot survey study of an instrument to measure dispositional privacy concern. In: Proceedings of the 2013 ASE\/IEEE International Conference on Social Computing, 8\u201314 September 2013, pp. 468\u2013477. IEEE Computer Society, Washington, D.C. (2013)","DOI":"10.1109\/SocialCom.2013.73"},{"key":"1_CR21","unstructured":"Patil, S., et al.: Public Perception of Security and Privacy: Results ofthe comprehensive analysis of PACT\u2019s pan-European Survey. PACT Deliverable 4.2. RAND Corporation, June 2014. http:\/\/www.rand.org\/content\/dam\/rand\/pubs\/research_reports\/RR700\/RR704\/RAND_RR704.pdf"},{"key":"1_CR22","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1515\/9780773591042-005","volume-title":"Surveillance, Privacy, and the Globalization of Personal Information: International Comparisons","author":"A Pavlov","year":"2010","unstructured":"Pavlov, A.: Application of the vignette approach to analyzing cross-cultural incompatibilities in attitudes to privacy of personal data and security checks at airports. In: Zureik, E., et al. (eds.) Surveillance, Privacy, and the Globalization of Personal Information: International Comparisons, pp. 31\u201345. McGill-Queen\u2019s University Press, Montreal (2010)"},{"issue":"5","key":"1_CR23","doi-asserted-by":"publisher","first-page":"556","DOI":"10.1177\/0963662510376886","volume":"21","author":"V Pavone","year":"2012","unstructured":"Pavone, V., Degli Esposti, S.: Public assessment of new surveillance-oriented security technologies: beyond the trade-off between privacy and security. Public Underst. Sci. 21(5), 556\u2013572 (2012)","journal-title":"Public Underst. Sci."},{"key":"1_CR24","unstructured":"Pavone, V., et al.: Key factors affecting public acceptance and acceptability of SOSTs. SurPRISE Deliverable 2.4. SurPRISE project, January 2015. http:\/\/surprise-project.eu\/wp-content\/uploads\/2015\/02\/SurPRISE-D24-Key-Factors-affecting-public-acceptance-and-acceptability-of-SOSTs-c.pdf"},{"key":"1_CR25","volume-title":"Understanding Privacy","author":"DJ Solove","year":"2008","unstructured":"Solove, D.J.: Understanding Privacy. Harvard University Press, Cambridge (2008)"},{"key":"1_CR26","doi-asserted-by":"publisher","unstructured":"TNS Opinion & Social, Europeans\u2019 attitudes towards Security, Special Eurobarometer 432. doi: 10.2837\/41650 . http:\/\/ec.europa.eu\/public_opinion\/archives\/ebs\/ebs_432_en.pdf","DOI":"10.2837\/41650"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management. Time for a Revolution?"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-41763-9_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,19]],"date-time":"2023-08-19T04:12:13Z","timestamp":1692418333000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-41763-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319417622","9783319417639"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-41763-9_1","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"7 July 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}