{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:47:01Z","timestamp":1725551221262},"publisher-location":"Berlin, Heidelberg","reference-count":60,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642123672"},{"type":"electronic","value":"9783642123689"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12368-9_28","type":"book-chapter","created":{"date-parts":[[2010,4,7]],"date-time":"2010-04-07T10:30:40Z","timestamp":1270636240000},"page":"340-354","source":"Crossref","is-referenced-by-count":3,"title":["The Market Failure of Anonymity Services"],"prefix":"10.1007","author":[{"given":"Heiko","family":"Rossnagel","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-45126-6_7","volume-title":"Financial Cryptography","author":"A. Acquisti","year":"2003","unstructured":"Acquisti, A., Dingledine, R., Syverson, P.: On the economics of anonymity. In: Wright, R.N. (ed.) FC 2003. LNCS, vol.\u00a02742, pp. 84\u2013102. Springer, Heidelberg (2003)"},{"key":"28_CR2","unstructured":"Acquisti, A., Friedman, A., Telang, R.: Is There a Cost to Privacy Breaches?: An Event Study. In: Proceedings of the Twenty Seventh International Conference on Information Systems, Milwaukee, WI (2006)"},{"issue":"1","key":"28_CR3","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2005.22","volume":"3","author":"A. Acquisti","year":"2005","unstructured":"Acquisti, A., Grossklags, J.: Privacy and Rationality in Individual Decision Making. IEEE Security & Privacy\u00a03(1), 26\u201333 (2005)","journal-title":"IEEE Security & Privacy"},{"key":"28_CR4","first-page":"1","volume-title":"The Economics of Information Security","author":"A. Acquisti","year":"2004","unstructured":"Acquisti, A.: Privacy and Security of Personal Information: Economic Incentive and Technological Solutions. In: Camp, J., Lewis, R. (eds.) The Economics of Information Security, pp. 1\u20139. Kluwer, Dordrecht (2004)"},{"key":"28_CR5","volume-title":"Proceedings of the EC 2004","author":"A. Acquisti","year":"2004","unstructured":"Acquisti, A.: Privacy in Electronic Commerce and the Economics of Immediate Gratification. In: Proceedings of the EC 2004. ACM, New York (2004)"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Anderson, R., Boehme, R., Clayton, R., Moore, T.: Security Economics and the Internal Market (2008), http:\/\/www.enisa.europa.eu\/doc\/pdf\/report_sec_econ_&_int_mark_20080131.pdf","DOI":"10.1007\/978-0-387-09762-6_3"},{"issue":"3","key":"28_CR7","doi-asserted-by":"publisher","first-page":"488","DOI":"10.2307\/1879431","volume":"84","author":"G.A. Arkerlof","year":"1970","unstructured":"Arkerlof, G.A.: The Market for Lemmons: Quality, Uncertainty and the Market Mechanism. The Quaterly Journal of Economics\u00a084(3), 488\u2013500 (1970)","journal-title":"The Quaterly Journal of Economics"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Belanger, F., Hiller, J.S., Smith, W.J.: Trustworthiness in electronic commerce: the role of privacy, security, and site attributes. Journal of Strategic Information Systems\u00a0(11), 245\u2013270 (2002)","DOI":"10.1016\/S0963-8687(02)00018-5"},{"issue":"4","key":"28_CR9","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1145\/1053291.1053295","volume":"48","author":"B. Berendt","year":"2005","unstructured":"Berendt, B., Guenther, O., Spiekermann, S.: Privacy in E-Commerce: Stated Preferences vs. Actual Behavior. Communications of the ACM\u00a048(4), 101\u2013106 (2005)","journal-title":"Communications of the ACM"},{"key":"28_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1007\/3-540-44702-4_7","volume-title":"Designing Privacy Enhancing Technologies","author":"O. Berthold","year":"2001","unstructured":"Berthold, O., Federrath, H., K\u00f6psell, S.: Web MIXes: A System for Anonymous and Unobservable Internet Access. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol.\u00a02009, pp. 115\u2013129. Springer, Heidelberg (2001)"},{"key":"28_CR11","unstructured":"Cavoukian, A.: Privacy and Radical Pragmatism: Change the Paradigm. In: Information and Privacy Commisioner of Ontario, Canada, August 8 (2008)"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Cavoukian, A.: Privacy in the Clouds: Privacy and Digital Identity: Implications for the Internet, May 28 (2008)","DOI":"10.1007\/s12394-008-0005-z"},{"issue":"2","key":"28_CR13","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1145\/358549.358563","volume":"24","author":"D.L. Chaum","year":"1981","unstructured":"Chaum, D.L.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM\u00a024(2), 84\u201388 (1981)","journal-title":"Communications of the ACM"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Clark, J., Van Oorschot, P.C., Adams, C.: Usability of anonymous web browsing: an examination of tor interfaces and deployability. In: Proceedings of the 3rd symposium on Usable privacy and security, New York, NY, pp. 41\u201351 (2007)","DOI":"10.1145\/1280680.1280687"},{"key":"28_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/11957454_2","volume-title":"Privacy Enhancing Technologies","author":"R. Clayton","year":"2006","unstructured":"Clayton, R., Murdoch, S.J., Watson, R.N.M.: Ignoring the Great Firewall of China. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.\u00a04258, pp. 20\u201335. Springer, Heidelberg (2006)"},{"key":"28_CR16","first-page":"94","volume":"4","author":"J. Coopersmith","year":"1998","unstructured":"Coopersmith, J.: Pornography, Technology and Progress. ICON\u00a04, 94\u2013125 (1998)","journal-title":"ICON"},{"issue":"8","key":"28_CR17","doi-asserted-by":"publisher","first-page":"982","DOI":"10.1287\/mnsc.35.8.982","volume":"35","author":"F.D. Davis","year":"1989","unstructured":"Davis, F.D., Bagozzi, R.P., Warshaw, P.R.: User Acceptance of Computer Technology: A Comparison of Two Theoretical Models. Management Science\u00a035(8), 982\u20131003 (1989)","journal-title":"Management Science"},{"issue":"3","key":"28_CR18","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"F.D. Davis","year":"1989","unstructured":"Davis, F.D.: Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quaterly\u00a013(3), 319\u2013340 (1989)","journal-title":"MIS Quaterly"},{"key":"28_CR19","unstructured":"Diel, S.: Gestaltungsvorschl\u00e4ge zur Verteilung von Kosten und Nutzen qualifizierter elektronischer Signaturen, Master Thesis, Department of Business Administration and Economics, Goethe-University, Frankfurt am Main (2007)"},{"key":"28_CR20","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium, San Diego, pp. 303\u2013320 (2004)","DOI":"10.21236\/ADA465464"},{"key":"28_CR21","unstructured":"Dingledine, R., Mathewson, N.: Anonymity loves company: Usability and the network effect. In: The Fifth Workshop on the Economics of Information Security (WEIS 2006). University of Cambridge (2006)"},{"key":"28_CR22","first-page":"169","volume-title":"Mehrseitige Sicherheit in der Kommunikationstechnik","author":"H. Federrath","year":"1997","unstructured":"Federrath, H., Jerichow, A., Kesdogan, D., Pfitzmann, A., Spaniol, O.: Mobilkommunikation ohne Bewegungsprofile. In: Pfitzmann, A., Mueller, G. (eds.) Mehrseitige Sicherheit in der Kommunikationstechnik, pp. 169\u2013180. Addison Wesley, Boston (1997)"},{"key":"28_CR23","unstructured":"Feigenbaum, J., Freedman, M., Sander, T., Shostack, A.: Economic barriers to the deployment of existing privacy technology. In: Proceedings of the Workshop on Economics and Information Security, Berkley, CA (2002)"},{"key":"28_CR24","volume-title":"Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research","author":"M. Fishbein","year":"1975","unstructured":"Fishbein, M., Ajzen, I.: Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research. Addison-Wesley, Reading (1975)"},{"key":"28_CR25","first-page":"1","volume-title":"Sicherheit 2008","author":"L. Fritsch","year":"2008","unstructured":"Fritsch, L., Abie, H.: Towards a Research Road Map for the Management of Privacy Risks in Information Systems. In: Alkassar, A., Siekmann, J. (eds.) Sicherheit 2008, pp. 1\u201316. Koellen Druck + Verlag GmbH, Bonn (2008)"},{"issue":"10","key":"28_CR26","first-page":"592","volume":"29","author":"L. Fritsch","year":"2005","unstructured":"Fritsch, L., Rossnagel, H., Schwenke, M., Stadler, T.: Die Pflicht zum Angebot anonym nutzbarer Dienste: Eine technische und rechtliche Zumutbarkeitsbetrachtung. Datenschutz und Datensicherheit (DuD)\u00a029(10), 592\u2013596 (2005)","journal-title":"Datenschutz und Datensicherheit (DuD)"},{"issue":"1","key":"28_CR27","first-page":"1","volume":"5","author":"D.F. Galletta","year":"2004","unstructured":"Galletta, D.F., Henry, R., McCoy, S., Polak, P.: Web site delays: How tolerant are users? Journal of the AIS\u00a05(1), 1\u201328 (2004)","journal-title":"Journal of the AIS"},{"issue":"1","key":"28_CR28","doi-asserted-by":"crossref","first-page":"51","DOI":"10.2307\/30036519","volume":"27","author":"D. Gefen","year":"2003","unstructured":"Gefen, D., Karahanna, E., Straub, D.W.: Trust and TAM in Online Shopping: An Integrated Model. MIS Quaterly\u00a027(1), 51\u201390 (2003)","journal-title":"MIS Quaterly"},{"key":"28_CR29","doi-asserted-by":"crossref","unstructured":"Grantham, A., Tsekouras, G.: Diffusing Wireless Applications in a Mobile World. Technology in Society\u00a0(27), 85\u2013104 (2005)","DOI":"10.1016\/j.techsoc.2004.10.003"},{"issue":"5","key":"28_CR30","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MSP.2005.137","volume":"3","author":"B.A. Huberman","year":"2005","unstructured":"Huberman, B.A., Adar, E., Fine, L.R.: Valuating Privacy. IEEE Security & Privacy\u00a03(5), 22\u201325 (2005)","journal-title":"IEEE Security & Privacy"},{"issue":"1","key":"28_CR31","doi-asserted-by":"crossref","first-page":"19","DOI":"10.2307\/25148779","volume":"31","author":"H. Kai-Lung","year":"2007","unstructured":"Kai-Lung, H., Hock, H.T., Sang-Yong, T.L.: The Value of Privacy Assurance: An Exploratory Field Experiment. MIS Quaterly\u00a031(1), 19\u201333 (2007)","journal-title":"MIS Quaterly"},{"key":"28_CR32","unstructured":"Litfin, T.: Adoptionsfaktoren: Empirische Analyse am Beispiel eines innovativen Telekommunikationsdienstes, DUV, Wiesbaden (2000)"},{"key":"28_CR33","doi-asserted-by":"crossref","unstructured":"Mahler, A., Rogers, E.M.: The diffusion of interactive communication innovations and the critical mass: The adoption of telecommunication services by German banks. Telecommunications Policy (23), 719\u2013740 (1999)","DOI":"10.1016\/S0308-5961(99)00052-X"},{"key":"28_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1007\/978-3-540-70630-4_5","volume-title":"Privacy Enhancing Technologies","author":"D. McCoy","year":"2008","unstructured":"McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.C.: Shining Light in Dark Places: Understanding the Tor Network. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol.\u00a05134, pp. 63\u201376. Springer, Heidelberg (2008)"},{"issue":"3","key":"28_CR35","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1287\/isre.2.3.192","volume":"2","author":"G.C. Moore","year":"1991","unstructured":"Moore, G.C., Benbasat, I.: Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation. Information Systems Research\u00a02(3), 173\u2013191 (1991)","journal-title":"Information Systems Research"},{"issue":"12","key":"28_CR36","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/953460.953510","volume":"46","author":"T.T. Moores","year":"2003","unstructured":"Moores, T.T., Dhillon, G.: Do Privacy Seals in E-Commerce Really Work? Communications of the ACM\u00a046(12), 265\u2013271 (2003)","journal-title":"Communications of the ACM"},{"key":"28_CR37","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1282100.1282104","volume-title":"Proceedings of the ninth international conference on Electronic commerce","author":"A. Odlyzko","year":"2007","unstructured":"Odlyzko, A.: Privacy and the Clandestine Evolution of E-Commerce. In: Proceedings of the ninth international conference on Electronic commerce, pp. 3\u20136. ACM Press, Mineapolis (2007)"},{"issue":"2","key":"28_CR38","doi-asserted-by":"publisher","first-page":"467","DOI":"10.2307\/3003567","volume":"12","author":"S.S. Oren","year":"1981","unstructured":"Oren, S.S., Smith, S.A.: Critical Mass and Tariff Structure in Electronic Communications Markets. Bell Journal of Economics\u00a012(2), 467\u2013487 (1981)","journal-title":"Bell Journal of Economics"},{"key":"28_CR39","unstructured":"Ozment, A., Schechter, S.E.: Bootstrapping the Adoption of Internet Security Protocols. In: Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006), Cambridge (2006)"},{"issue":"3","key":"28_CR40","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1080\/10864415.2003.11044275","volume":"7","author":"P.A. Pavlou","year":"2003","unstructured":"Pavlou, P.A.: Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model. International Journal of Electronic Commerce\u00a07(3), 101\u2013134 (2003)","journal-title":"International Journal of Electronic Commerce"},{"key":"28_CR41","doi-asserted-by":"crossref","unstructured":"Pfitzmann, A., Pfitzmann, B., Waidner, M.: ISDN-mixes: Untraceable communication with very small bandwith overhead. In: Proceedings of the GI\/ITG Conference on Communication in Distributed Systems, pp. 451\u2013463 (1991)","DOI":"10.1007\/978-3-642-76462-2_32"},{"key":"28_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/3-540-39805-8_29","volume-title":"Advances in Cryptology - EUROCRYPT \u201985","author":"A. Pfitzmann","year":"1986","unstructured":"Pfitzmann, A., Waidner, M.: Networks Without User Observability \u2013 Design Options. In: Pichler, F. (ed.) EUROCRYPT 1985. LNCS, vol.\u00a0219, pp. 245\u2013253. Springer, Heidelberg (1986)"},{"key":"28_CR43","unstructured":"Rhee, H., Ryu, Y.U., Kim, C.: I Am Fine But You Are Not: Optimistic Bias and Illusion of Control on Information Security. In: Proceedings of the Twenty-Sixth International Conference on Information Systems (ICIS 2005), pp. 381\u2013394, AIS, Las Vegas, Nevada (2005)"},{"key":"28_CR44","volume-title":"Diffusion of Innovations","author":"E.M. Rogers","year":"2003","unstructured":"Rogers, E.M.: Diffusion of Innovations, 5th edn. Free Press, New York (2003)","edition":"5"},{"key":"28_CR45","doi-asserted-by":"crossref","unstructured":"Rossnagel, H., Zibuschka, J., Pimenidis, L., Deselaers, T.: Facilitating the Adoption of Tor by Focusing on a Promising Target Group. In: Proceedings of the 14th Nordic Workshop on Secure IT Systems, Oslo, Norway, pp. 15\u201327 (2009)","DOI":"10.1007\/978-3-642-04766-4_2"},{"key":"28_CR46","doi-asserted-by":"crossref","unstructured":"Rossnagel, H.: Mobile Qualifizierte Elektronische Signaturen: Analyse der Hemmnisfaktoren und Gestaltungsvorschlaege zur Einfuehrung, Gabler, Wiesbaden (2009)","DOI":"10.1007\/978-3-8349-8182-0"},{"key":"28_CR47","unstructured":"Ryan, B., Gross, N.C.: The Diffusion of Hybrid Seed Corn in Two Iowa Communities. Rural Sociology (8), 15\u201324 (1943)"},{"key":"28_CR48","volume-title":"Information Rules: A Strategic Guide to the Network Economy","author":"C. Shapiro","year":"1999","unstructured":"Shapiro, C., Varian, H.R.: Information Rules: A Strategic Guide to the Network Economy. Harvard Business School Press, Boston (1999)"},{"key":"28_CR49","unstructured":"Shostack, A.: \u2018People Won\u2019t Pay For Privacy,\u2019 Reconsidered. In: 2nd Annual Workshop \u2018Economics and Information Security\u2019, University of Maryland (2003)"},{"key":"28_CR50","unstructured":"Softonic: XeroBank Browser, http:\/\/xerobank-browser.softonic.de\/ (accessed 2008-05-20)"},{"issue":"3","key":"28_CR51","first-page":"150","volume":"27","author":"S. Spiekermann","year":"2003","unstructured":"Spiekermann, S.: Die Konsumenten der Anonymitaet: Wer nutzt Anonymisierungsdienste? Datenschutz und Datensicherheit (DuD)\u00a027(3), 150\u2013154 (2003)","journal-title":"Datenschutz und Datensicherheit (DuD)"},{"key":"28_CR52","doi-asserted-by":"crossref","unstructured":"Spiekermann, S.: The desire for privacy: Insights into the views and nature of the early adopters of privacy services. International Journal of Technology and Human Interaction\u00a01(1) (2004)","DOI":"10.4018\/jthi.2005010104"},{"key":"28_CR53","unstructured":"Syverson, P.: The Paradoxical Value of Privacy. In: 2nd Annual Workshop Economics and Information Security, University of Maryland (2003)"},{"issue":"2","key":"28_CR54","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1287\/isre.6.2.144","volume":"6","author":"S. Taylor","year":"1995","unstructured":"Taylor, S., Todd, P.A.: Understanding Information Technology Usage: A Test of Competing Models. Information Systems Research\u00a06(2), 144\u2013176 (1995)","journal-title":"Information Systems Research"},{"key":"28_CR55","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/TEM.1982.6447463","volume":"29","author":"L.G. Tornatzky","year":"1982","unstructured":"Tornatzky, L.G., Klein, K.J.: Innovation Characteristics and Innovation Adoption - Implementation: A Meta-Analysis of Findings. IEEE Transactions on Engineering Management\u00a029, 28\u201345 (1982)","journal-title":"IEEE Transactions on Engineering Management"},{"key":"28_CR56","unstructured":"Videoload.de: Pastewka Videoload Peinliche Momente, http:\/\/www.youtube.com\/watch?v=5rBK4AUljUg (accessed 2008-04-25)"},{"key":"28_CR57","doi-asserted-by":"crossref","unstructured":"Vila, T., Greenstadt, R., Molnar, D.: Why We Can\u2019t Be Bothered to Read Private Policies: Models of Privacy Economics as a Lemons Market. In: 2nd Annual Workshop \u2018Economics and Information Security\u2019, Maryland (2003)","DOI":"10.1145\/948005.948057"},{"key":"28_CR58","doi-asserted-by":"crossref","unstructured":"Weinstein, N.D.: Optimistic biases about personal risks. Science (24), 1232\u20131233 (1989)","DOI":"10.1126\/science.2686031"},{"issue":"6","key":"28_CR59","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1145\/1349026.1349043","volume":"51","author":"D.J. Weitzner","year":"2008","unstructured":"Weitzner, D.J., Abelson, H., Berners-Lee, T., Feigenbaum, J., Hendler, J., Sussman, G.J.: Information Accountability. Communications of the ACM\u00a051(6), 82\u201387 (2008)","journal-title":"Communications of the ACM"},{"key":"28_CR60","unstructured":"Westergren, T.: Pandora Internet Radio, http:\/\/www.pandora.com\/restricted (accessed 2008-05-21)"}],"container-title":["Lecture Notes in Computer Science","Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12368-9_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,25]],"date-time":"2021-10-25T16:30:48Z","timestamp":1635179448000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12368-9_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642123672","9783642123689"],"references-count":60,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12368-9_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}