{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T02:35:03Z","timestamp":1772937303134,"version":"3.50.1"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2008,11,11]],"date-time":"2008-11-11T00:00:00Z","timestamp":1226361600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Pers Ubiquit Comput"],"published-print":{"date-parts":[[2009,8]]},"DOI":"10.1007\/s00779-008-0215-2","type":"journal-article","created":{"date-parts":[[2008,11,10]],"date-time":"2008-11-10T11:34:49Z","timestamp":1226316889000},"page":"423-434","source":"Crossref","is-referenced-by-count":16,"title":["RFID and privacy: what consumers really want and fear"],"prefix":"10.1007","volume":"13","author":[{"given":"Sarah","family":"Spiekermann","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,11,11]]},"reference":[{"issue":"12","key":"215_CR1","first-page":"33","volume":"82","author":"R Fusaro","year":"2004","unstructured":"Fusaro R (2004) None of our business. Harv Bus Rev 82(12):33\u201344","journal-title":"Harv Bus Rev"},{"key":"215_CR2","doi-asserted-by":"crossref","unstructured":"Smith H, Milberg J, Burke, J (1996) Information privacy: measuring individuals\u2019 concerns about organizational practices. MIS Q 20(2):167\u2013196","DOI":"10.2307\/249477"},{"key":"215_CR3","unstructured":"Jannasch U, Spiekermann S (2004) RFID Technologie im Einzelhandel der Zukunft: Datenentstehung, Marketing Potentiale und Auswirkungen auf die Privatheit des Kunden. Lehrstuhl f\u00fcr Wirtschaftsinformatik Humboldt Universit\u00e4t zu Berlin: Berlin, Germany"},{"issue":"6","key":"215_CR4","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1007\/BF03252655","volume":"47","author":"O Berthold","year":"2005","unstructured":"Berthold O, Guenther O, Spiekermann S (2005) RFID Verbraucher\u00e4ngste und Verbraucherschutz. Wirtschaftsinformatik 47(6):422\u2013430","journal-title":"Wirtschaftsinformatik"},{"key":"215_CR5","unstructured":"FoeBuD e.V (2003) Positionspapier \u00fcber den Gebrauch von RFID auf und in Konsumg\u00fctern http:\/\/www.foebud.org\/rfid\/positionspapier . 12 September 2007 [cited 14]"},{"key":"215_CR6","unstructured":"Duce H (2003) Public policy: understanding public opinion. In: A.-I. Center (ed.). Auto-ID Center, Massachusetts Institute of Technology (MIT), Cambridge"},{"key":"215_CR7","unstructured":"Auto-ID Center, 860\u00a0MHz \u2013 930\u00a0MHz Class 1 radio frequency (RF) identification tag radio frequency and logical communication interface specification, 2004. EPCGlobal, Cambridge"},{"key":"215_CR8","doi-asserted-by":"crossref","unstructured":"Sarma S, Weis S, Engels D (2002) RFID systems, security and privacy implications. In: A.-I. Center (ed.) Massachusetts Institute of Technology (MIT), Cambridge","DOI":"10.1007\/3-540-36400-5_33"},{"key":"215_CR9","unstructured":"Auto-ID Center, Technology Guide (2002) In: A.-I. Center (ed.) Massachusetts Institute of Technology (MIT), Cambridge"},{"key":"215_CR10","unstructured":"GCI (2003) G.C.I., Global Commerce initiative EPC roadmap. G.C. Initiative and IBM (eds) GCI, Metro Gruppe, IBM Inc., K\u00f6ln"},{"key":"215_CR11","unstructured":"Auto-ID Center (2003) EPC-256: the 256-bit electronic product code representation. A.-I. Center (ed) Massachusetts Institute of Technology (MIT), Cambridge"},{"key":"215_CR12","unstructured":"Auto-ID Center (2003) EPC information service\u2014data model and queries. A.-I. Center (ed) Massachusetts Institute of Technology (MIT), Cambridge"},{"key":"215_CR13","unstructured":"Auto-ID Center (2003) Auto-ID object name service (ONS) 1.0. Mealling M (ed) Auto-ID Center, Cambridge"},{"key":"215_CR14","unstructured":"Engels D et al (2003) Security and privacy aspects of low-cost radio frequency identification systems. In: First international conference on security in pervasive computing, SPC 2003. Springer, Boppard"},{"key":"215_CR15","unstructured":"Engberg S, Harning M, Damsgaard Jensen C (2004) Zero-knowledge device authentication: privacy and security enhanced RFID preserving business value and consumer convenience. In: Second annual conference on privacy, security and trust, New Brunswick, Canada"},{"key":"215_CR16","unstructured":"Spiekermann S, Berthold O (2004) Maintaining privacy in RFID enabled environments\u2014proposal for a disable-model. In: Robinson P, Vogt H, Wagealla W (eds) Privacy, security and trust within the context of pervasive computing. Springer, Vienna"},{"key":"215_CR17","volume-title":"RFID privacy using user-controllable uniqueness. In: RFID privacy workshop","author":"S Inoue","year":"2004","unstructured":"Inoue S, Yasuura H (2004) RFID privacy using user-controllable uniqueness. In: RFID privacy workshop. Massachusetts Institute of Technology (MIT), Cambridge"},{"key":"215_CR18","doi-asserted-by":"crossref","unstructured":"Floerkemeier C, Schneider R, Langheinrich M (2004) Scanning with a purpose\u2014supporting the fair information principles in RFID protocols. In: Murakami H et al (eds) Ubiquitious computing systems. Springer, Tokyo","DOI":"10.1007\/11526858_17"},{"key":"215_CR19","doi-asserted-by":"crossref","unstructured":"Langheinrich M (2003) A privacy awareness system for ubiquitous computing environments. In: Fourth international conference on ubiquitous computing, UbiComp2002. Springer, G\u00f6teborg","DOI":"10.1007\/3-540-45809-3_19"},{"key":"215_CR20","unstructured":"Christian M et al (2007) Making radio frequency identification visible\u2014a watchdog tag. In: Fifth annual IEEE international conference on pervasive computing and communications, New York, USA"},{"key":"215_CR21","doi-asserted-by":"crossref","DOI":"10.1002\/0470848693","volume-title":"Security for ubiquitous computing","author":"F Stajano","year":"2002","unstructured":"Stajano F (2002) Security for ubiquitous computing. Wiley, Chichester"},{"key":"215_CR22","doi-asserted-by":"crossref","unstructured":"Cranor LF (2003) P3P: making privacy policies more useful. In: IEEE security and privacy, pp 50\u201355","DOI":"10.1109\/MSECP.2003.1253568"},{"key":"215_CR23","doi-asserted-by":"crossref","unstructured":"Juels A, Rivest R, Szydlo M (2003) The blocker tag: selective blocking of RFID tags for consumer privacy. In: 10th ACM conference on computers and communications security (CCS 2003), Washington, USA","DOI":"10.1145\/948109.948126"},{"key":"215_CR24","volume-title":"Disabling RFID tags with visible confirmation: clipped tags are silenced. In: ACM workshop on privacy in the electronic society","author":"G Karjoth","year":"2005","unstructured":"Karjoth G, Moskowitz PA (2005) Disabling RFID tags with visible confirmation: clipped tags are silenced. In: ACM workshop on privacy in the electronic society. ACM Press, Alexandria"},{"issue":"11","key":"215_CR25","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM (CACM) 22(11):612\u2013613","journal-title":"Commun ACM (CACM)"},{"key":"215_CR26","volume-title":"Belief, attitude, intention and behavior: an introduction to theory and research","author":"M Fishbein","year":"1975","unstructured":"Fishbein M, Ajzen I (1975) Belief, attitude, intention and behavior: an introduction to theory and research. Addison-Wesley, Reading"},{"key":"215_CR27","doi-asserted-by":"crossref","unstructured":"Ajzen I (1985) From intentions to actions: a theory of planned behavior. In: Kuhi J, Beckmann J (eds) Action-control: from cognition to behavior. Springer, Heidelberg, pp 11\u201339","DOI":"10.1007\/978-3-642-69746-3_2"},{"key":"215_CR28","unstructured":"Ajzen I, Fishbein M (2005) The influence of attitudes on behavior. In: Albarracin D, Johnson BT, Zanna MP (eds) The handbook of attitudes on behavior. Erlbaum, Mahwah, pp 173\u2013221"},{"key":"215_CR29","volume-title":"Diffusion of innovations","author":"E Rogers","year":"2003","unstructured":"Rogers E (2003) Diffusion of innovations, 4th edn. The Free Press, New York","edition":"4"},{"issue":"4","key":"215_CR30","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1287\/isre.11.4.342.11872","volume":"11","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh V (2000) Determinants of perceived ease of use: integrating control, intrinsic motivation, and emotion into the technology acceptance model. Inf Syst Res 11(4):342\u2013365","journal-title":"Inf Syst Res"},{"key":"215_CR31","volume-title":"Kontroll\u00fcberzeugungen im Umgang mit Technik: Ein Pers\u00f6nlichkeitsmerkmal mit Relevanz f\u00fcr die Gestaltung technischer Systeme, in Institute of Psychology","author":"G Baier","year":"2004","unstructured":"Baier G (2004) Kontroll\u00fcberzeugungen im Umgang mit Technik: Ein Pers\u00f6nlichkeitsmerkmal mit Relevanz f\u00fcr die Gestaltung technischer Systeme, in Institute of Psychology. Humboldt University, Berlin"},{"key":"215_CR32","doi-asserted-by":"crossref","unstructured":"Spiekermann S, Grossklags J, Berendt B (2001) E-privacy in 2nd generation E-commerce. In: Proceedings of the 3rd ACM conference on electronic commerce EC\u201901. ACM Press, Tampa","DOI":"10.1145\/501158.501163"},{"issue":"4","key":"215_CR33","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1145\/1053291.1053295","volume":"48","author":"B Berendt","year":"2005","unstructured":"Berendt B, Guenther O, Spiekermann S (2005) Privacy in E-commerce: stated preferences vs. actual behavior. Commun ACM 48(4):101\u2013106","journal-title":"Commun ACM"},{"issue":"1","key":"215_CR34","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1086\/208674","volume":"4","author":"HH Kassarjian","year":"1977","unstructured":"Kassarjian HH (1977) Content analysis in consumer research. J Consumer Res 4(1):8\u201318","journal-title":"J Consumer Res"},{"issue":"6","key":"215_CR35","doi-asserted-by":"crossref","first-page":"783","DOI":"10.1016\/S1071-5819(03)00043-0","volume":"58","author":"S Grabner-Kr\u00e4uter","year":"2003","unstructured":"Grabner-Kr\u00e4uter S, Kaluscha EA (2003) Empirical research in on-line trust: a review and critical assessment. Int J Hum Comput Stud 58(6):783\u2013812","journal-title":"Int J Hum Comput Stud"},{"issue":"2\u20133","key":"215_CR36","doi-asserted-by":"crossref","first-page":"303","DOI":"10.1023\/A:1022962631249","volume":"4","author":"SC Chen","year":"2003","unstructured":"Chen SC, Dhillon GS (2003) Interpreting dimensions of consumer trust in E-commerce. Inf Technol Manage 4(2\u20133):303\u2013318","journal-title":"Inf Technol Manage"},{"key":"215_CR37","unstructured":"Patrick AS, Briggs P, Marsh S (2005) Designing systems that people will trust. In: Cranor LF, Garfinkel S (eds) Security and usability. O\u2019REILLY, Sebastopol, pp 75\u201399"},{"issue":"12","key":"215_CR38","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A Adams","year":"1999","unstructured":"Adams A, Sasse A (1999) Users are not the enemy\u2014why users compromise computer security mechanisms and how to take remedial measures. Commun ACM 42(12):40\u201346","journal-title":"Commun ACM"},{"key":"215_CR39","unstructured":"Maes P, Wexelblat A (1997) Issues for software agent UI. MIT Media Lab, Cambridge"},{"key":"215_CR40","doi-asserted-by":"crossref","unstructured":"Sheeran P (2002) Intention\u2013behavior relations: a conceptual and empirical review. In: Stroebe W, Hewstone M (eds) European review of social psychology. Wiley, Chichester, pp 1\u201336","DOI":"10.1080\/14792772143000003"},{"key":"215_CR41","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1348\/014466602165081","volume":"41","author":"D Trafimow","year":"2002","unstructured":"Trafimow D et al (2002) Evidence that perceived behavioural control is a multidimensional construct: perceived control and perceived difficulty. Br J Soc Psychol 41:101\u2013121","journal-title":"Br J Soc Psychol"}],"container-title":["Personal and Ubiquitous Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-008-0215-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00779-008-0215-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00779-008-0215-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,2]],"date-time":"2025-02-02T16:15:45Z","timestamp":1738512945000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00779-008-0215-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,11,11]]},"references-count":41,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2009,8]]}},"alternative-id":["215"],"URL":"https:\/\/doi.org\/10.1007\/s00779-008-0215-2","relation":{},"ISSN":["1617-4909","1617-4917"],"issn-type":[{"value":"1617-4909","type":"print"},{"value":"1617-4917","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008,11,11]]}}}