{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T12:55:26Z","timestamp":1760100926999},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319474120"},{"type":"electronic","value":"9783319474137"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47413-7_11","type":"book-chapter","created":{"date-parts":[[2016,10,4]],"date-time":"2016-10-04T16:20:15Z","timestamp":1475598015000},"page":"175-194","source":"Crossref","is-referenced-by-count":5,"title":["On the Adoption of Privacy-enhancing Technologies"],"prefix":"10.1007","author":[{"given":"Tristan","family":"Caulfield","sequence":"first","affiliation":[]},{"given":"Christos","family":"Ioannidis","sequence":"additional","affiliation":[]},{"given":"David","family":"Pym","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"key":"11_CR1","unstructured":"Acquisti, A.: Protecting privacy with economics: economic incentives for preventive technologies in ubiquitous computing environments. In: Proceeding of Workshop on Socially-informed Design of Privacy-enhancing Solutions, 4th UBICOMP (2002)"},{"issue":"1","key":"11_CR2","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1109\/MSP.2005.22","volume":"3","author":"A Acquisti","year":"2005","unstructured":"Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Secur. Priv. 3(1), 26\u201333 (2005)","journal-title":"IEEE Secur. Priv."},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Acquisti, A., Taylor, C., Wagman, L.: The economics of privacy. http:\/\/ssrn.com\/abstract=2580411 . Accessed 02 Mar 2016","DOI":"10.2139\/ssrn.2580411"},{"key":"11_CR4","unstructured":"FBI\u2013Apple encryption dispute. https:\/\/en.wikipedia.org\/wiki\/FBI-Apple_encryption_dispute . Accessed 13 Apr 2016"},{"issue":"2","key":"11_CR5","doi-asserted-by":"crossref","first-page":"235","DOI":"10.1111\/1467-937X.00168","volume":"68","author":"WA Brock","year":"2001","unstructured":"Brock, W.A., Durlauf, S.N.: Discrete choice with social interactions. Rev. Econ. Stud. 68(2), 235\u2013260 (2001)","journal-title":"Rev. Econ. Stud."},{"issue":"2","key":"11_CR6","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1257\/000282802320189438","volume":"92","author":"WA Brock","year":"2002","unstructured":"Brock, W.A., Durlauf, S.N.: A multinomial-choice model of neighborhood effects. Am. Econ. Rev. 92(2), 298\u2013303 (2002)","journal-title":"Am. Econ. Rev."},{"key":"11_CR7","unstructured":"Caulfield, T., Ioannidis, C., Pym, D.: Discrete choice, social interaction, and policy in encryption technology adoption [Short Paper]. In: Grossklags, J., Preneel, B. (eds.) Proceedings of Financial Cryptography and Data Security 2016, Lecture Notes in Computer Science (2016, forthcoming). http:\/\/fc16.ifca.ai\/program.html . http:\/\/fc16.ifca.ai\/preproceedings\/16_Caulfield.pdf"},{"key":"11_CR8","unstructured":"ENISA. Study on monetising privacy: an economic model for pricing personal information (2012). https:\/\/www.enisa.europa.eu\/activities\/identity-and-trust\/library\/deliverables\/monetising-privacy . Accessed 04 Mar 2016"},{"key":"11_CR9","unstructured":"Harris, L., Westin, A.: The equifax Canada report on consumers and privacy in the information age. Technical Report (1992)"},{"key":"11_CR10","unstructured":"IDC: Smartphone OS Market Share 2015, 2014, 2013, and 2012. http:\/\/www.idc.com\/prodserv\/smartphone-os-market-share.jsp . Accessed 04 Mar 2016"},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-03549-4_9","volume-title":"Financial Cryptography and Data Security","author":"C Ioannidis","year":"2009","unstructured":"Ioannidis, C., Pym, D., Williams, J.: Investments and trade-offs in the economics of information security. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 148\u2013166. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-03549-4_9"},{"key":"11_CR12","unstructured":"The julia language. http:\/\/julialang.org\/ . Accessed 30 Sept 2015"},{"key":"11_CR13","volume-title":"Decisions with Multiple Objectives: Preferences and Value Trade-offs","author":"RL Keeney","year":"1976","unstructured":"Keeney, R.L., Raiffa, H.: Decisions with Multiple Objectives: Preferences and Value Trade-offs. Wiley, New York (1976)"},{"key":"11_CR14","unstructured":"Kumaraguru, P., Cranor, L.F.: Privacy indexes: a survey of westins studiestechnical report, institute for software research, Carnegie Mellon University (2005). http:\/\/www.cs.cmu.edu\/~ponguru\/CMU-ISRI-05-138.pdf"},{"issue":"3","key":"11_CR15","first-page":"393","volume":"2","author":"RA Posner","year":"1978","unstructured":"Posner, R.A.: The right of privacy. Georgia Law Rev. 2(3), 393\u2013422 (1978)","journal-title":"Georgia Law Rev."},{"issue":"2","key":"11_CR16","first-page":"405","volume":"71","author":"RA Posner","year":"1981","unstructured":"Posner, R.A.: The economics of privacy. Am. Econ. Rev. 71(2), 405\u2013409 (1981)","journal-title":"Am. Econ. Rev."},{"key":"11_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/978-3-319-12601-2_14","volume-title":"Decision and Game Theory for Security","author":"Yu Pu","year":"2014","unstructured":"Pu, Yu., Grossklags, J.: An economic model and simulation results of app adoption decisions on networks with interdependent privacy consequences. In: Poovendran, R., Saad, W. (eds.) GameSec 2014. LNCS, vol. 8840, pp. 246\u2013265. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-12601-2_14"},{"key":"11_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1007\/978-3-662-45472-5_5","volume-title":"Financial Cryptography and Data Security","author":"F Roesner","year":"2014","unstructured":"Roesner, F., Gill, B.T., Kohno, T.: Sex, lies, or kittens? investigating the use of snapchat\u2019s self-destructing messages. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 64\u201376. Springer, Heidelberg (2014). doi: 10.1007\/978-3-662-45472-5_5"},{"issue":"4","key":"11_CR19","doi-asserted-by":"crossref","first-page":"623","DOI":"10.1086\/467657","volume":"9","author":"GJ Stigler","year":"1980","unstructured":"Stigler, G.J.: An introduction to privacy in economics and politics. J. Legal Stud. 9(4), 623\u2013644 (1980)","journal-title":"J. Legal Stud."},{"key":"11_CR20","unstructured":"Varian, H.R.: Economic aspects of personal privacy. In: Privacy and Self-regulation in the Information Age, US Department of Commerce (1997)"},{"key":"11_CR21","volume-title":"Privacy and Freedom","author":"A Westin","year":"1967","unstructured":"Westin, A.: Privacy and Freedom. Atheneum Publishers, New York (1967)"}],"container-title":["Lecture Notes in Computer Science","Decision and Game Theory for Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47413-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T03:56:37Z","timestamp":1568433397000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47413-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319474120","9783319474137"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47413-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}