{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T23:14:20Z","timestamp":1725491660537},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540748526"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-74853-3_4","type":"book-chapter","created":{"date-parts":[[2007,9,13]],"date-time":"2007-09-13T17:10:31Z","timestamp":1189703431000},"page":"56-72","source":"Crossref","is-referenced-by-count":8,"title":["Privacy Enhancing Technologies for RFID in Retail- An Empirical Investigation"],"prefix":"10.1007","author":[{"given":"Sarah","family":"Spiekermann","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Fusaro, R.: None of Our Business. Harvard Business Review, 33\u201344 (2004)"},{"issue":"2","key":"4_CR2","doi-asserted-by":"publisher","first-page":"167","DOI":"10.2307\/249477","volume":"20","author":"J.H. Smith","year":"1996","unstructured":"Smith, J.H., Milberg, J., Burke, S.: Information Privacy: Measuring Individuals\u2019 Concerns About Organizational Practices. MIS Quarterly\u00a020(2), 167\u2013196 (1996)","journal-title":"MIS Quarterly"},{"key":"4_CR3","unstructured":"Jannasch, U., Spiekermann, S.: RFID: Technologie im Einzelhandel der Zukunft: Datenentstehung, Marketing Potentiale und Auswirkungen auf die Privatheit des Kunden, Lehrstuhl f\u00fcr Wirtschaftsinformatik, Humboldt Universit\u00e4t zu Berlin: Berlin (2004)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Berthold, O., Guenther, Spiekermann, S.: RFID Verbraucher\u00e4ngste und Verbraucherschutz. Wirtschaftsinformatik, Heft 6 (2005)","DOI":"10.1007\/BF03252655"},{"key":"4_CR5","unstructured":"FoeBuD e.V. (ed.): Positionspapier \u00fcber den Gebrauch von RFID auf und in Konsumg\u00fctern, FoeBuD e.V.: Bielefeld (2003)"},{"key":"4_CR6","volume-title":"Public Policy: Understanding Public Opinion, A.-I. Center","author":"H. Duce","year":"2003","unstructured":"Duce, H.: Public Policy: Understanding Public Opinion, A.-I. Center, Massachusetts Institute of Technology. MIT, Cambridge, USA (2003)"},{"key":"4_CR7","unstructured":"Auto-ID Center (ed.): 860 MHz \u2013 930 MHz Class 1 Radio Frequency (RF) Identification Tag Radio Frequency & Logical Communication Interface Specification, EPCGlobal, Cambridge, Massachusetts, USA (2004)"},{"key":"4_CR8","series-title":"Massachusetts Institute of Technology","volume-title":"RFID Systems, Security & Privacy Implications, A.-I. Center","author":"S. Sarma","year":"2002","unstructured":"Sarma, S., Weis, S., Engels, D.: RFID Systems, Security & Privacy Implications, A.-I. Center. Massachusetts Institute of Technology. MIT, Cambridge, USA (2002)"},{"key":"4_CR9","unstructured":"Auto-ID Center, (ed.): Technology Guide. Massachusetts Institute of Technology, MIT, Cambridge, USA (2002)"},{"key":"4_CR10","unstructured":"GCI (ed.): Global Commerce Initiative EPC Roadmap, G.C. Initiative and IBM (2003)"},{"key":"4_CR11","unstructured":"Auto-ID Center (ed.): EPC-256: The 256-bit Electronic Product Code Representation. Massachusetts Institute of Technology, MIT, Cambridge, USA (2003)"},{"key":"4_CR12","unstructured":"Auto-ID Center (ed.): EPC Information Service - Data Model and Queries. Massachusetts Institute of Technology, MIT, Cambridge, USA (2003)"},{"key":"4_CR13","unstructured":"Auto-ID Center (ed.): Auto-ID Object Name Service (ONS) 1.0. Massachusetts Institute of Technology, MIT, Cambridge, USA (2003)"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","volume-title":"Security in Pervasive Computing","author":"D. Engels","year":"2004","unstructured":"Engels, D.: Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems. In: Hutter, D., M\u00fcller, G., Stephan, W., Ullmann, M. (eds.) Security in Pervasive Computing. LNCS, vol.\u00a02802, Springer, Heidelberg (2004)"},{"key":"4_CR15","unstructured":"Engberg, S., Harning, M., Damsgaard, C.: Zero-knowledge Device Authentication: Privacy & Security Enhanced RFID preserving Business Value and Consumer Convenience. In: Proceedings of the Second Annual Conference on Privacy, Security and Trust, New Brunswick, Canada (2004)"},{"key":"4_CR16","unstructured":"Spiekermann, S., Berthold, O.: Maintaining privacy in RFID enabled environments - Proposal for a disable-model. In: Robinson, P., Vogt, H. (eds.) Privacy, Security and Trust within the Context of Pervasive Computing, Springer Verlag, Vienna, Austria (2004)"},{"key":"4_CR17","volume-title":"Proceedings of the RFID Privacy Workshop, Massachusetts Institute of Technology","author":"Y. Inoue","year":"2004","unstructured":"Inoue, Y.: RFID Privacy Using User-controllable Uniqueness. In: Proceedings of the RFID Privacy Workshop, Massachusetts Institute of Technology, MIT, Cambridge, MA, USA (2004)"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","volume-title":"Ubiquitous Computing Systems","author":"C. Floerkemeier","year":"2005","unstructured":"Floerkemeier, C., Schneider, R., Langheinrich, M.: Scanning with a Purpose - Supporting the Fair Information Principles in RFID Protocols. In: Murakami, H., Nakashima, H., Tokuda, H., Yasumura, M. (eds.) UCS 2004. LNCS, vol.\u00a03598, Springer, Heidelberg (2005)"},{"key":"4_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45809-3_19","volume-title":"UbiComp 2002: Ubiquitous Computing","author":"M. Langheinrich","year":"2002","unstructured":"Langheinrich, M.: A Privacy Awareness System for Ubiquitous Computing Environments. In: Borriello, G., Holmquist, L.E. (eds.) UbiComp 2002. LNCS, vol.\u00a02498, Springer, Heidelberg (2002)"},{"key":"4_CR20","unstructured":"Christian, M., Floerkemeier, C.: Making Radio Frequency Identification Visible \u2013 A Watchdog Tag. In: Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications, New York (2007)"},{"key":"4_CR21","doi-asserted-by":"crossref","DOI":"10.1002\/0470848693","volume-title":"Security for Ubiquitous Computing","author":"F. Stajano","year":"2002","unstructured":"Stajano, F.: Security for Ubiquitous Computing. John Wiley & Sons, Chichester, UK (2002)"},{"key":"4_CR22","unstructured":"Platform for Privacy Preferences (P3P) Project, W3C (2006)"},{"key":"4_CR23","volume-title":"Proceedings of the 10th Annual ACM CCS","author":"A. Juels","year":"2003","unstructured":"Juels, A., Rivest, R., Szydlo, M.: The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy. In: Proceedings of the 10th Annual ACM CCS, ACM Press, New York (2003)"},{"key":"4_CR24","volume-title":"Proceedings of the ACM Workshop on Privacy in the Electronic Society","author":"G. Karjoth","year":"2005","unstructured":"Karjoth, G., Moskowitz, P.A.: Disabling RFID Tags with Visible Confirmation: Clipped Tags are Silenced. In: Proceedings of the ACM Workshop on Privacy in the Electronic Society, ACM Press, Alexandria, VA, USA (2005)"},{"key":"4_CR25","volume-title":"Digital Privacy: Theory, Technologies and Practices","author":"S. Spiekermann","year":"2007","unstructured":"Spiekermann, S.: Perceived Control: Scales for Privacy in Ubiquitous Computing. In: Acquisti, A., De Capitani di Vimercati, S., Gritzalis, S., Lambrinoudakis, C. (eds.) Digital Privacy: Theory, Technologies and Practices, Taylor and Francis, New York (2007)"},{"key":"4_CR26","volume-title":"Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research","author":"M. Fishbein","year":"1975","unstructured":"Fishbein, M., Ajzen, I.: Belief, Attitude, Intention and Behavior: An Introduction to Theory and Research. Addison-Wesley, Reading, MA, USA (1975)"},{"key":"4_CR27","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/978-3-642-69746-3_2","volume-title":"Action - control: From cognition to behavior","author":"I. Ajzen","year":"1985","unstructured":"Ajzen, I.: From intentions to actions: A theory of planne behavior. In: Kuhi, J., Beckmann, J. (eds.) Action - control: From cognition to behavior, pp. 11\u201339. Springer, Heidelberg (1985)"},{"key":"4_CR28","first-page":"173","volume-title":"The Handbook of Attitudes on Behavior","author":"I. Ajzen","year":"2005","unstructured":"Ajzen, I., Fishbein, M.: The Influence of Attitudes on Behavir. In: Albarracin, D., Johnson, B.T., Zanna, M.P. (eds.) The Handbook of Attitudes on Behavior, pp. 173\u2013221. Erlbaum, Mahwah, New York (2005)"},{"key":"4_CR29","volume-title":"Diffusion of Innovations","author":"E. Rogers","year":"1995","unstructured":"Rogers, E.: Diffusion of Innovations. The Free Press, New York (1995)"},{"issue":"1","key":"4_CR30","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1086\/208674","volume":"4","author":"H.H. Kassarjian","year":"1977","unstructured":"Kassarjian, H.H.: Content Analysis in Consumer Research. Journal of Consumer Research\u00a04(1), 8\u201318 (1977)","journal-title":"Journal of Consumer Research"},{"key":"4_CR31","unstructured":"W3C, (ed.): Web Security Experience, Indicators and Trust: Scope and Use Cases, W3C Working Draft (25 May 2007)"},{"issue":"12","key":"4_CR32","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A. Adams","year":"1999","unstructured":"Adams, A., Sasse, A.: Users are not the enemy - Why users compromise computer security mechanisms and how to take remedial measures. Communications of the ACM\u00a042(12), 40\u201346 (1999)","journal-title":"Communications of the ACM"},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Berendt, B., Guenther, O., Spiekermann, S.: Privacy in E-Commerce: Stated Preferences vs. Actual Behavior. Communications of the ACM\u00a048(4) (2005)","DOI":"10.1145\/1053291.1053295"},{"key":"4_CR34","first-page":"1","volume-title":"European Review of Social Psychology","author":"P. Sheeran","year":"2002","unstructured":"Sheeran, P.: Intention-behavior relations: A conceptual and empirical review. In: Stroebe, W., Hewstone, M. (eds.) European Review of Social Psychology, pp. 1\u201336. Wiley, Chichester, UK (2002)"},{"key":"4_CR35","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1348\/014466602165081","volume":"41","author":"D. Trafimow","year":"2002","unstructured":"Trafimow, D.: Evidence that perceived behavioural control is a multidimensional construct: Perceived control and perceived difficulty. British Journal of Social Psychology\u00a041, 101\u2013121 (2002)","journal-title":"British Journal of Social Psychology"}],"container-title":["Lecture Notes in Computer Science","UbiComp 2007: Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-74853-3_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:42:58Z","timestamp":1619520178000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-74853-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540748526"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-74853-3_4","relation":{},"subject":[]}}