{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T16:07:43Z","timestamp":1774195663941,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642121883","type":"print"},{"value":"9783642121890","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12189-0_9","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T22:11:05Z","timestamp":1270073465000},"page":"93-106","source":"Crossref","is-referenced-by-count":7,"title":["Information Privacy in Smart Office Environments: A Cross-Cultural Study Analyzing the Willingness of Users to Share Context Information"],"prefix":"10.1007","author":[{"given":"Carsten","family":"R\u00f6cker","sequence":"first","affiliation":[]}],"member":"297","reference":[{"issue":"1","key":"9_CR1","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2005.22","volume":"3","author":"A. Acquisti","year":"2005","unstructured":"Acquisti, A., Grossklags, J.: Privacy and Rationality in Individual Decision Making. IEEE Security and Privacy\u00a03(1), 26\u201333 (2005)","journal-title":"IEEE Security and Privacy"},{"issue":"2","key":"9_CR2","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1111\/j.1540-5915.1999.tb01614.x","volume":"30","author":"R. Agarwal","year":"1999","unstructured":"Agarwal, R., Prasad, J.: Are Individual Differences Germane to the Acceptance of New Information Technologies? Decision Sciences\u00a030(2), 361\u2013391 (1999)","journal-title":"Decision Sciences"},{"issue":"4","key":"9_CR3","first-page":"164","volume":"19","author":"K. Alshare","year":"2004","unstructured":"Alshare, K., Grandon, E., Miller, D.: Antecedents of Computer Technology Usage: Considerations of the Technology Acceptance Model in the Academic Environment. Journal of Computing Sciences in Colleges\u00a019(4), 164\u2013180 (2004)","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"9_CR4","volume-title":"Cognition","author":"M.H. Ashcraft","year":"2002","unstructured":"Ashcraft, M.H.: Cognition. Prentice Hall, Upper Saddle River (2002)"},{"issue":"11","key":"9_CR5","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/948383.948384","volume":"46","author":"S.J. Barnes","year":"2003","unstructured":"Barnes, S.J., Huff, S.L.: Rising Sun: iMode and The Wireless Internet. Communications of the ACM\u00a046(11), 78\u201384 (2003)","journal-title":"Communications of the ACM"},{"issue":"1","key":"9_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/227005.227006","volume":"17","author":"H.C. Benham","year":"1996","unstructured":"Benham, H.C., Raymond, B.C.: Information Technology Adoption: Evidence from a Voice Mail Introduction. ACM SIGCPR Computer Personnel\u00a017(1), 3\u201325 (1996)","journal-title":"ACM SIGCPR Computer Personnel"},{"key":"9_CR7","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1016\/S0278-2626(02)00510-9","volume":"50","author":"S. Brigman","year":"2002","unstructured":"Brigman, S., Cherry, K.E.: Age and Skilled Performance: Contributions of Working Memory and Processing Speed. Brain and Cognition\u00a050, 242\u2013256 (2002)","journal-title":"Brain and Cognition"},{"issue":"12","key":"9_CR8","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/163298.163309","volume":"36","author":"E. Brynjolfsson","year":"1993","unstructured":"Brynjolfsson, E.: The Productivity Paradox of Information Technology. Communications of the ACM\u00a036(12), 66\u201377 (1993)","journal-title":"Communications of the ACM"},{"issue":"4","key":"9_CR9","doi-asserted-by":"publisher","first-page":"541","DOI":"10.1287\/mnsc.42.4.541","volume":"42","author":"E. Brynjolfsson","year":"1996","unstructured":"Brynjolfsson, E., Hitt, L.: Paradox Lost? Firm-Level Evidence on the Returns to Information Systems Spending. Management Science\u00a042(4), 541\u2013558 (1996)","journal-title":"Management Science"},{"issue":"2","key":"9_CR10","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1145\/1066149.1066155","volume":"36","author":"A. Burton-Jones","year":"2005","unstructured":"Burton-Jones, A., Hubona, G.: Individual Differences and Usage Behavior: Revisiting a Technology Acceptance Model Assumption. ACM SIGMIS Database\u00a036(2), 58\u201377 (2005)","journal-title":"ACM SIGMIS Database"},{"issue":"2-3","key":"9_CR11","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1007\/s10799-005-5879-y","volume":"6","author":"R.K. Chellappa","year":"2005","unstructured":"Chellappa, R.K., Sin, R.: Personalization versus Privacy: An Empirical Examination of the Online Consumer\u2019s Dilemma. Inform. Techn. and Management\u00a06(2-3), 181\u2013202 (2005)","journal-title":"Inform. Techn. and Management"},{"issue":"1","key":"9_CR12","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/0378-7206(94)90099-X","volume":"27","author":"R.B. Cooper","year":"1994","unstructured":"Cooper, R.B.: The Inertial Impact of Culture on IT Implementation. Information & Management\u00a027(1), 17\u201331 (1994)","journal-title":"Information & Management"},{"issue":"2","key":"9_CR13","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1287\/mnsc.36.2.123","volume":"36","author":"R.B. Cooper","year":"1990","unstructured":"Cooper, R.B., Zmud, R.W.: Information Technology Implementation Research: A Technological Diffusion Approach. Management Science\u00a036(2), 123\u2013139 (1990)","journal-title":"Management Science"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Cvrcek, D., Kumpost, M., Matyas, V., Danezis, G.: A Study on the Value of Location Privacy. In: Proc. of the Fifth Workshop on Privacy in the Electronic Society, pp. 109\u2013118 (2006)","DOI":"10.1145\/1179601.1179621"},{"issue":"12","key":"9_CR15","doi-asserted-by":"publisher","first-page":"1660","DOI":"10.1287\/mnsc.43.12.1660","volume":"43","author":"S. Dewan","year":"1997","unstructured":"Dewan, S., Min, C.: The Substitution of Information Technology for Other Factors of Production: A Firm Level Analysis. Management Science\u00a043(12), 1660\u20131675 (1997)","journal-title":"Management Science"},{"key":"9_CR16","unstructured":"Friedewald, M., Vildjiounaite, E., Wright, D.: The Brave New World of Ambient Intelligence: A State-of-the-Art Review. Deliverable D1 of the SWAMI consortium to the European Commission under contract 006507 (2006)"},{"issue":"4","key":"9_CR17","doi-asserted-by":"publisher","first-page":"389","DOI":"10.2307\/249720","volume":"21","author":"D. Gefen","year":"1997","unstructured":"Gefen, D., Straub, D.: Gender Differences in the Perception and Use of E-Mail: An Extension to the Technology Acceptance Model. MIS Quarterly\u00a021(4), 389\u2013400 (1997)","journal-title":"MIS Quarterly"},{"key":"9_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1207\/s15327051hci0201_1","volume":"2","author":"L.M. Gomez","year":"1986","unstructured":"Gomez, L.M., Egan, D.E., Bowers, C.: Learning to Use a Text Editor: Some Learner Characteristics that Predict Success. Human Computer Interaction\u00a02, 1\u201323 (1986)","journal-title":"Human Computer Interaction"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Hann, I.-H., Hui, K.-L., Lee, T.S., Png, I.P.L.: The Value of Online Information Privacy: Evidence from the USA and Singapore. Paper presented at the International Conference on Information Systems (2002)","DOI":"10.2139\/ssrn.391993"},{"issue":"1","key":"9_CR20","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1080\/10580539208906858","volume":"9","author":"A.W. Harrison","year":"1992","unstructured":"Harrison, A.W., Rainer, R.K.: The Influence of Individual Differences on Skill in End-User Computing. Journal of Management Information Systems\u00a09(1), 93\u2013111 (1992)","journal-title":"Journal of Management Information Systems"},{"key":"9_CR21","series-title":"Institutions and Organizations Across Nations","volume-title":"Culture\u2019s Consequences \u2013 Comparing Values","author":"G. Hofstede","year":"2001","unstructured":"Hofstede, G.: Culture\u2019s Consequences \u2013 Comparing Values, 2nd edn. Institutions and Organizations Across Nations. Sage, London (2001)","edition":"2"},{"issue":"3","key":"9_CR22","doi-asserted-by":"publisher","first-page":"373","DOI":"10.1177\/014920638901500302","volume":"15","author":"M. Igbaria","year":"1989","unstructured":"Igbaria, M., Parsuraman, S.: A Path Analytic Study of Individual Characteristics, Computer Anxiety, and Attitudes Towards Microcomputers. Journal of Management\u00a015(3), 373\u2013388 (1989)","journal-title":"Journal of Management"},{"issue":"3","key":"9_CR23","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1145\/1047671.1047705","volume":"48","author":"S. Lahlou","year":"2005","unstructured":"Lahlou, S., Langheinrich, M., R\u00f6cker, C.: Privacy and Trust Issues with Invisible Computers. Communications of the ACM\u00a048(3), 59\u201360 (2005)","journal-title":"Communications of the ACM"},{"issue":"2-3","key":"9_CR24","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/1161345.1161351","volume":"37","author":"E. Mao","year":"2006","unstructured":"Mao, E., Palvia, P.: Testing an Extended Model of IT Acceptance in the Chinese Cultural Context. ACM SIGMIS Database\u00a037(2-3), 20\u201332 (2006)","journal-title":"ACM SIGMIS Database"},{"issue":"3","key":"9_CR25","doi-asserted-by":"crossref","first-page":"86","DOI":"10.1145\/506724.506730","volume":"32","author":"K. Mathieson","year":"2001","unstructured":"Mathieson, K., Peacock, E., Chin, W.W.: Extending the Technology Acceptance Model: The Influence of Perceived User Resources. The DATA BASE for Advances in Information Systems\u00a032(3), 86\u2013112 (2001)","journal-title":"The DATA BASE for Advances in Information Systems"},{"key":"9_CR26","first-page":"145","volume-title":"E-Merging Media \u2013 Communication and the Media Economy of the Future","author":"F. Mattern","year":"2005","unstructured":"Mattern, F.: Ubiquitous Computing: Scenarios From an Informatised World. In: Zerdick, A., et al. (eds.) E-Merging Media \u2013 Communication and the Media Economy of the Future, pp. 145\u2013163. Springer, Heidelberg (2005)"},{"issue":"2","key":"9_CR27","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1080\/08874417.2003.11647086","volume":"43","author":"J.M. Pearson","year":"2002","unstructured":"Pearson, J.M., Crosby, L., Bahmanziari, T., Conrad, E.: An Empirical Investigation into the Relationship between Organizational Culture and Computer Efficacy as Moderated by Age and Gender. Journal of Computer Information Systems\u00a043(2), 58\u201370 (2002)","journal-title":"Journal of Computer Information Systems"},{"issue":"2-3","key":"9_CR28","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1145\/217278.217284","volume":"26","author":"M.B. Prescott","year":"1995","unstructured":"Prescott, M.B., Conger, S.A.: Information Technology Innovations: A Classification by IT Locus of Impact and Research Approach. ACM SIGMIS Database Archive\u00a026(2-3), 20\u201341 (1995) Special Double Issue: Diffusion of Technological Innovation","journal-title":"ACM SIGMIS Database Archive"},{"issue":"2","key":"9_CR29","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1016\/0305-0483(94)90074-4","volume":"22","author":"A. Rai","year":"1994","unstructured":"Rai, A., Howard, G.S.: Propagating CASE Usage for Software Development: An Empirical Investigation of Key Organizational Correlates. OMEGA: The International Journal of Management Science\u00a022(2), 133\u2013247 (1994)","journal-title":"OMEGA: The International Journal of Management Science"},{"issue":"1","key":"9_CR30","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1287\/isre.7.1.93","volume":"7","author":"D. Robey","year":"1996","unstructured":"Robey, D., Sahay, S.: Transforming Work through Information Technology: A Comparative Case Study of Geographic Information Systems in County Government. Information Systems Research\u00a07(1), 93\u2013110 (1996)","journal-title":"Information Systems Research"},{"key":"9_CR31","unstructured":"R\u00f6cker, C.: Services and Applications for Smart Office Environments - A Survey of State-of-the-Art Usage Scenarios. Paper submitted to: International Conference on Computer and Information Technology (ICCIT 2010), Cape Town, South Africa, January 27-29 (2010) (submitted)"},{"key":"9_CR32","unstructured":"R\u00f6cker, C.: Ambient Intelligence in the Production and Retail Sector: Emerging Opportunities and Potential Pitfalls. In: Proceedings of the International Conference on Innovation, Management and Technology (ICIMT 2009), pp. 1393\u20131404 (2009)"},{"key":"9_CR33","unstructured":"R\u00f6cker, C.: Toward Smart Office Environments - Benefits and Drawbacks of Using Ambient Intelligence Technologies in Knowledge-Based Enterprises. In: Proc. of the Intern. Conference on Economics, Business, Management and Marketing (EBMM 2009), pp. 17\u201321 (2009)"},{"key":"9_CR34","doi-asserted-by":"crossref","unstructured":"R\u00f6cker, C., Janse, M., Portolan, N., Streitz, N.A.: User Requirements for Intelligent Home Environments: A Scenario-Driven Approach and Empirical Cross-Cultural Study. In: Proceedings of the International Conference on Smart Objects & Ambient Intelligence (sOc-EUSAI 2005), Grenoble, France, October 12 - 14, pp. 111\u2013116 (2005)","DOI":"10.1145\/1107548.1107581"},{"key":"9_CR35","volume-title":"The Impact of Computer-Supported Technologies on Information Systems Development","author":"N.L. Russo","year":"1992","unstructured":"Russo, N.L., Kumar, K.: Studying the Impact of Information Technology Innovations in Organizations: The Influence of Individual Characteristics, Innovation Characteristics, and the Innovation Introduction Process. In: Kendall, K.E., et al. (eds.) The Impact of Computer-Supported Technologies on Information Systems Development. Elsevier Science Publications, Minneapolis (1992)"},{"key":"9_CR36","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/501158.501163","volume-title":"Proceedings of the ACM Conference on Electronic Commerce (EC 2001)","author":"S. Spiekermann","year":"2001","unstructured":"Spiekermann, S., Grossklags, J., Berendt, B.: E-Privacy in Second Generation E-Commerce: Privacy Preferences versus Actual Behavior. In: Proceedings of the ACM Conference on Electronic Commerce (EC 2001), pp. 38\u201347. ACM Press, New York (2001)"},{"issue":"1","key":"9_CR37","doi-asserted-by":"publisher","first-page":"115","DOI":"10.2307\/3250981","volume":"24","author":"V. Venkatesh","year":"2000","unstructured":"Venkatesh, V., Morris, M.: Why Don\u2019t Men Ever Stop to Ask for Directions? Gender, Social Influence, and their Role in Technology Acceptance and Usage Behavior. MIS Quarterly\u00a024(1), 115\u2013139 (2000)","journal-title":"MIS Quarterly"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2010"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12189-0_9.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,19]],"date-time":"2025-02-19T20:14:01Z","timestamp":1739996041000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12189-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642121883","9783642121890"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12189-0_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}