{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:19:02Z","timestamp":1743013142323,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662549698"},{"type":"electronic","value":"9783662549704"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-662-54970-4_16","type":"book-chapter","created":{"date-parts":[[2017,5,16]],"date-time":"2017-05-16T02:02:55Z","timestamp":1494900175000},"page":"271-279","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Discrete Choice, Social Interaction, and Policy in Encryption Technology Adoption (Short Paper)"],"prefix":"10.1007","author":[{"given":"Tristan","family":"Caulfield","sequence":"first","affiliation":[]},{"given":"Christos","family":"Ioannidis","sequence":"additional","affiliation":[]},{"given":"David","family":"Pym","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,17]]},"reference":[{"issue":"2","key":"16_CR1","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1111\/1467-937X.00168","volume":"68","author":"WA Brock","year":"2001","unstructured":"Brock, W.A., Durlauf, S.N.: Discrete choice with social interactions. Rev. Econ. Stud. 68(2), 235\u2013260 (2001)","journal-title":"Rev. Econ. Stud."},{"key":"16_CR2","unstructured":"Google Online Security Blog: Making End-to-End Encryption Easier to Use (2014). http:\/\/googleonlinesecurity.blogspot.co.uk\/2014\/06\/making-end-to-end-encryption-easier-to.html. Visited 20 Sep 2015"},{"key":"16_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-03549-4_9","volume-title":"Financial Cryptography and Data Security","author":"C Ioannidis","year":"2009","unstructured":"Ioannidis, C., Pym, D., Williams, J.: Investments and trade-offs in the economics of information security. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 148\u2013166. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-03549-4_9"},{"key":"16_CR4","volume-title":"Decisions with Multiple Objectives: Preferences and Value Trade-offs","author":"RL Keeney","year":"1976","unstructured":"Keeney, R.L., Raiffa, H.: Decisions with Multiple Objectives: Preferences and Value Trade-offs. Wiley, Hoboken (1976)"},{"key":"16_CR5","unstructured":"Keybase (2015). https:\/\/keybase.io\/. Visited 20 Sep 2015"},{"key":"16_CR6","unstructured":"OpenPGP.org (2015). http:\/\/www.openpgp.org. Visited 30 Sep 2015"},{"issue":"7","key":"16_CR7","doi-asserted-by":"crossref","first-page":"542","DOI":"10.22610\/jebs.v6i7.515","volume":"6","author":"R Shambare","year":"2014","unstructured":"Shambare, R.: The adoption of WhatsApp: breaking the vicious cycle of technological poverty in South Africa. J. Econ. Behav. Stud. 6(7), 542\u2013550 (2014)","journal-title":"J. Econ. Behav. Stud."},{"key":"16_CR8","unstructured":"SKS Keyservers: History of Number of OpenPGP Keys (2015). https:\/\/sks-keyservers.net\/status\/key_development.php. Visited 30 Sep 2015"},{"key":"16_CR9","unstructured":"The Guardian: Snowden Implores Hackers to Focus on Protecting Users\u2019 Rights (2014). http:\/\/www.theguardian.com\/technology\/2014\/jul\/21\/edward-snowden-hackers-encryption-patriot. Visited 7 Oct 2015"},{"key":"16_CR10","unstructured":"The julia language (2015). http:\/\/julialang.org\/. Visited 30 Sep 2015"},{"key":"16_CR11","unstructured":"User-Focused Security: End-to-End Encryption Extension for Yahoo Mail (2015). http:\/\/yahoo.tumblr.com\/post\/113708033335\/user-focused-security-end-to-end-encryption. Visited 30 Sep 2015"},{"key":"16_CR12","unstructured":"Whitten, A., Tygar, J.D.: Why Johnny can\u2019t encrypt: a usability evaluation of PGP 5.0. In: Proceedings 8th Conference on USENIX Security Symposium, vol. 8, SSYM 1999, pp. 14\u201314. USENIX Association, Berkeley (1999)"},{"key":"16_CR13","unstructured":"Ozment, A., Schechter, S.E.: Bootstrapping the adoption of internet security protocols. In: WEIS (2006). http:\/\/www.econinfosec.org\/archive\/weis2006\/docs\/46.pdf. Visited 02 Jan 2016"},{"key":"16_CR14","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/1-4020-8090-5_18","volume-title":"Economics of Information Security","author":"N Rosasco","year":"2004","unstructured":"Rosasco, N., Larochelle, D.: How and why more secure technologies succeed in legacy markets: lessons from the success of SSH. In: Jean Camp, L., Lewis, S. (eds.) Economics of Information Security, pp. 247\u2013254. Kluwer, Boston (2004)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-54970-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,2]],"date-time":"2024-04-02T16:46:53Z","timestamp":1712076413000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-54970-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783662549698","9783662549704"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-54970-4_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"17 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Christ Church","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barbados","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 February 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 February 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/fc16.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}