{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:25:33Z","timestamp":1761895533178},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642332432"},{"type":"electronic","value":"9783642332449"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33244-9_14","type":"book-chapter","created":{"date-parts":[[2012,9,25]],"date-time":"2012-09-25T21:16:29Z","timestamp":1348607789000},"page":"200-211","source":"Crossref","is-referenced-by-count":31,"title":["Critical Privacy Factors of Internet of Things Services: An Empirical Investigation with Domain Experts"],"prefix":"10.1007","author":[{"given":"Tobias","family":"Kowatsch","sequence":"first","affiliation":[]},{"given":"Wolfgang","family":"Maass","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"14_CR1","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1016\/0749-5978(91)90020-T","volume":"50","author":"I. Ajzen","year":"1991","unstructured":"Ajzen, I.: The theory of planned behavior. Organizational Behavior and Human Decision Processes\u00a050(2), 179\u2013211 (1991)","journal-title":"Organizational Behavior and Human Decision Processes"},{"key":"14_CR2","volume-title":"Understanding Attitudes and Predicting Social Behaviour","author":"I. Ajzen","year":"1980","unstructured":"Ajzen, I., Fishbein, M.: Understanding Attitudes and Predicting Social Behaviour. Prentice Hall, Inglewood Cliffs (1980)"},{"issue":"1","key":"14_CR3","doi-asserted-by":"crossref","first-page":"13","DOI":"10.2307\/25148715","volume":"30","author":"N.F. Awad","year":"2006","unstructured":"Awad, N.F., Krishnan, M.S.: The personalization Privacy Paradox: An Empirical Evaluation of Information Transparency and the Willingness to be Profiled Online for Personalization. MIS Quarterly\u00a030(1), 13\u201328 (2006)","journal-title":"MIS Quarterly"},{"issue":"2","key":"14_CR4","first-page":"285","volume":"2","author":"D. Barclay","year":"1995","unstructured":"Barclay, D., Thompson, R., Higgins, C.: The partial least squares (PLS) approach to causal modeling: Personal computer adoption and use an illustration. Technology Studies\u00a02(2), 285\u2013309 (1995)","journal-title":"Technology Studies"},{"issue":"4","key":"14_CR5","doi-asserted-by":"crossref","first-page":"1017","DOI":"10.2307\/41409971","volume":"35","author":"F. B\u00e9langer","year":"2011","unstructured":"B\u00e9langer, F., Crossler, R.E.: Privacy in the Digital Age: A Review of Information Privacy Research in Information Systems. MIS Quarterly\u00a035(4), 1017\u20131041 (2011)","journal-title":"MIS Quarterly"},{"key":"14_CR6","unstructured":"Chin, W.W.: Issues and Opinion on Structural Equation Modeling. MIS Quarterly 22(1), vii\u2013xvi (1998)"},{"issue":"3","key":"14_CR7","doi-asserted-by":"publisher","first-page":"319","DOI":"10.2307\/249008","volume":"13","author":"F.D. Davis","year":"1989","unstructured":"Davis, F.D.: Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology. MIS Quarterly\u00a013(3), 319\u2013339 (1989)","journal-title":"MIS Quarterly"},{"issue":"1","key":"14_CR8","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/TEM.2003.822468","volume":"51","author":"F.D. Davis","year":"2004","unstructured":"Davis, F.D., Venkatesh, V.: Toward preprototype user acceptance testing of new information systems: Implications for software project management. IEEE Trans. on Engineering Management\u00a051(1), 31\u201346 (2004)","journal-title":"IEEE Trans. on Engineering Management"},{"issue":"3","key":"14_CR9","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1111\/j.1365-2575.2006.00219.x","volume":"16","author":"G. Dhillon","year":"2006","unstructured":"Dhillon, G., Torkzadeh, G.: Value-focused assessment of information system security in organizations. Information Systems Journal\u00a016(3), 293\u2013314 (2006)","journal-title":"Information Systems Journal"},{"issue":"1","key":"14_CR10","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T. Dinev","year":"2006","unstructured":"Dinev, T., Hart, P.: An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research\u00a017(1), 61\u201380 (2006)","journal-title":"Information Systems Research"},{"issue":"7","key":"14_CR11","first-page":"1","volume":"7","author":"D. Gefen","year":"2000","unstructured":"Gefen, D., Straub, D., Boudreau, M.-C.: Structural Equation Modeling Techniques and Regression: Guidelines for Research Practice. Communications of the Association for Information Systems\u00a07(7), 1\u201378 (2000)","journal-title":"Communications of the Association for Information Systems"},{"key":"14_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"210","DOI":"10.1007\/978-3-642-13335-0_15","volume-title":"Global Perspectives on Design Science Research","author":"S. Janzen","year":"2010","unstructured":"Janzen, S., Kowatsch, T., Maass, W.: A Methodology for Content-Centered Design of Ambient Environments. In: Winter, R., Zhao, J.L., Aier, S. (eds.) DESRIST 2010. LNCS, vol.\u00a06105, pp. 210\u2013225. Springer, Heidelberg (2010)"},{"issue":"1","key":"14_CR13","doi-asserted-by":"crossref","first-page":"159","DOI":"10.2307\/25148832","volume":"32","author":"A. Kamis","year":"2008","unstructured":"Kamis, A., Koufaris, M., Stern, T.: Using an Attribute-Based Decision Support System for User-Customized Products Online: An Experimental Investigation. MIS Quarterly\u00a032(1), 159\u2013177 (2008)","journal-title":"MIS Quarterly"},{"issue":"4","key":"14_CR14","doi-asserted-by":"crossref","first-page":"941","DOI":"10.2307\/25148760","volume":"30","author":"S.Y.X. Komiak","year":"2006","unstructured":"Komiak, S.Y.X., Benbasat, I.: The Effects of Personalization and Familiarity on Trust and Adoption of Recommendation Agents. MIS Quarterly\u00a030(4), 941\u2013960 (2006)","journal-title":"MIS Quarterly"},{"key":"14_CR15","unstructured":"Kowatsch, T., Maass, W., Weber, R., Weber, R.: The Internet of Things Initiative (IOT-I) Deliverable 2.2: Initial Social Acceptance and Impact Evaluation, FP7 ICT project, contract number: 257565 (2011)"},{"issue":"3","key":"14_CR16","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1111\/j.1540-4560.1977.tb01880.x","volume":"33","author":"R.S. Laufer","year":"1977","unstructured":"Laufer, R.S., Wolfe, M.: Privacy as a concept and a social issue: A multidimensional developmental theory. J. Soc. Issues\u00a033(3), 22\u201342 (1977)","journal-title":"J. Soc. Issues"},{"issue":"3","key":"14_CR17","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1287\/isre.2.3.192","volume":"2","author":"G.C. Moore","year":"1991","unstructured":"Moore, G.C., Benbasat, I.: Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research\u00a02(3), 192\u2013222 (1991)","journal-title":"Information Systems Research"},{"key":"14_CR18","volume-title":"Psychometric Theory","author":"J.C. Nunnally","year":"1967","unstructured":"Nunnally, J.C.: Psychometric Theory. McGraw-Hill, New York (1967)"},{"key":"14_CR19","unstructured":"Presser, M., Krco, S.: The Internet of Things Initiative (IOT-I) Deliverable 2.1: Initial report on IoT applications of strategic interest, FP7 ICT project, contract number: 257565 (2011)"},{"issue":"4","key":"14_CR20","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1177\/009207002236917","volume":"30","author":"R.T. Rust","year":"2002","unstructured":"Rust, R.T., Kannan, P.K., Peng, N.: The Customer Economics of Internet Privacy. Journal of the Academy of Marketing Science\u00a030(4), 455\u2013464 (2002)","journal-title":"Journal of the Academy of Marketing Science"},{"issue":"7","key":"14_CR21","doi-asserted-by":"crossref","first-page":"445","DOI":"10.17705\/1jais.00095","volume":"7","author":"M.T. Siponen","year":"2006","unstructured":"Siponen, M.T., Iivari, J.: IS Security Design Theory Framework and Six Approaches to the Application of IS Security Policies and Guidelines. Journal of the Association for Information Systems\u00a07(7), 445\u2013472 (2006)","journal-title":"Journal of the Association for Information Systems"},{"issue":"3","key":"14_CR22","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/30036540","volume":"27","author":"V. Venkatesh","year":"2003","unstructured":"Venkatesh, V., Morris, M.G., Davis, G.B., Davis, F.D.: User acceptance of information technology: Toward a unified view. MIS Quarterly\u00a027(3), 425\u2013478 (2003)","journal-title":"MIS Quarterly"},{"issue":"1","key":"14_CR23","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1016\/j.clsr.2009.11.008","volume":"23","author":"R. Weber","year":"2010","unstructured":"Weber, R.: Internet of Things - New security and privacy challenges. Computer Law & Security\u00a023(1), 23\u201330 (2010)","journal-title":"Computer Law & Security"},{"issue":"1","key":"14_CR24","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1287\/isre.1050.0042","volume":"16","author":"B.H. Wixom","year":"2005","unstructured":"Wixom, B.H., Todd, P.A.: A Theoretical Integration of User Satisfaction and Technology Acceptance. Information Systems Research\u00a016(1), 85\u2013102 (2005)","journal-title":"Information Systems Research"}],"container-title":["Lecture Notes in Business Information Processing","Knowledge and Technologies in Innovative Information Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33244-9_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,7]],"date-time":"2019-05-07T18:08:13Z","timestamp":1557252493000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33244-9_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642332432","9783642332449"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33244-9_14","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2012]]}}}