{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T05:42:12Z","timestamp":1673588532294},"reference-count":14,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2015,4,30]],"date-time":"2015-04-30T00:00:00Z","timestamp":1430352000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1007\/s11623-015-0417-5","type":"journal-article","created":{"date-parts":[[2015,4,29]],"date-time":"2015-04-29T18:16:25Z","timestamp":1430331385000},"page":"303-307","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Pr\u00e4diktoren sicherheitsrelevanten Verhaltens bei jugendlichen Computernutzern"],"prefix":"10.1007","volume":"39","author":[{"given":"Flavius","family":"Kehr","sequence":"first","affiliation":[]},{"given":"Tobias","family":"Rothmund","sequence":"additional","affiliation":[]},{"given":"Wendy","family":"F\u00fcllgraf","sequence":"additional","affiliation":[]},{"given":"Mario","family":"Gollwitzer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,30]]},"reference":[{"key":"417_CR1","unstructured":"Bundeskriminalamt: Cybercrime Bundeslagebild 2013. Wiesbaden: Bundeskriminalamt."},{"key":"417_CR2","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1057\/palgrave.ejis.3000590","volume":"4","author":"T. Dinev","year":"2006","unstructured":"T. Dinev, M. Bellotto, P. Hart, V. Russo, I. Serra, C. Colautti: Privacy calculus model in e-commerce\u2013a study of Italy and the United States. European Journal of Information Systems 4\/2006a, 389\u2013402.","journal-title":"European Journal of Information Systems"},{"key":"417_CR3","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"1","author":"T. Dinev","year":"2006","unstructured":"T. Dinev, P. Hart: An Extended Privacy Calculus Model for E-Commerce Transactions. Information Systems Research 1\/2006b, 61\u201380.","journal-title":"Information Systems Research"},{"key":"417_CR4","doi-asserted-by":"crossref","unstructured":"F. Kehr, T. Kowatsch, D. Wentzel, E. Fleisch: Blissfully ignorant: The Effects of General Privacy Concerns, General Institutional Trust, and Affect in the Privacy Calculus. Information Systems Journal Special Issue on: Reframing Privacy in a Networked World in press","DOI":"10.1111\/isj.12062"},{"key":"417_CR5","first-page":"513","volume":"6","author":"L. A. Kienfie","year":"2005","unstructured":"L. A. Kienfie, A. Khoo, Ang, P. H.: Factors influencing Adolescents Engagement in Risky Internet Behavior. CyberPsychology & Behavior 6\/2005, 513\u2013520.","journal-title":"CyberPsychology & Behavior"},{"key":"417_CR6","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.dss.2011.09.002","volume":"2","author":"F. Lai","year":"2012","unstructured":"F. Lai, D. Li, C.-T. Hsieh: Fighting Identity Theft: The coping perspective. Decision Support Systems 2\/2012, 353\u2013363.","journal-title":"Decision Support Systems"},{"key":"417_CR7","first-page":"75","volume-title":"International Journal of Electronic Commerce","author":"M. K. O. Lee","year":"2001","unstructured":"M. K. O. Lee, E. Turban: A Trust Model for Consumer Internet Shopping. International Journal of Electronic Commerce 2001, 75\u201392."},{"key":"417_CR8","doi-asserted-by":"publisher","first-page":"709","DOI":"10.5465\/amr.1995.9508080335","volume":"3","author":"R. C. Mayer","year":"1995","unstructured":"R. C. Mayer, J. H. Davis, D. Schoorman: An Integrative Model of Organizational Trust. The Academy of Management Review 3\/1995, 709\u2013734.","journal-title":"The Academy of Management Review"},{"key":"417_CR9","first-page":"215","volume":"2","author":"Y. J. Park","year":"2011","unstructured":"Y. J. Park: Digital Literacy and Privacy Behavior Online. Communication Research 2\/2011, 215\u2013236.","journal-title":"Communication Research"},{"key":"417_CR10","first-page":"651","volume-title":"Journal of Personality","author":"J. B. Rotter","year":"1967","unstructured":"J. B. Rotter: A new scale for the measurement of interpersonal trust. Journal of Personality 1967, 651\u2013665."},{"key":"417_CR11","unstructured":"Telekom: Sicherheitsreport 2014. Deutsche Telekom AG."},{"key":"417_CR12","unstructured":"T. Yamagishi: Trust as a form of social intelligence. In: K. S. Cook (Ed.): Trust in Society, New York, Russell Sage Foundation, 121\u2013147."},{"key":"417_CR13","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1111\/j.1745-6606.2008.00113.x","volume":"3","author":"S. Youn","year":"2008","unstructured":"S. Youn: Parental Influence and Teens\u2019 Attitude toward Online Privacy Protection. Journal of Consumer Affairs 3\/2008, 362\u2013388.","journal-title":"Journal of Consumer Affairs"},{"key":"417_CR14","doi-asserted-by":"publisher","first-page":"389","DOI":"10.1111\/j.1745-6606.2009.01146.x","volume":"3","author":"S. Youn","year":"2009","unstructured":"S. Youn: Determinants of Online Privacy Concern and Its Influence on Privacy Protection Behaviors among Young Adolescents. Journal of Consumer Affairs 3\/2009, 389\u2013418.","journal-title":"Journal of Consumer Affairs"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-015-0417-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-015-0417-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-015-0417-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-015-0417-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T18:22:45Z","timestamp":1559413365000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-015-0417-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,30]]},"references-count":14,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2015,5]]}},"alternative-id":["417"],"URL":"https:\/\/doi.org\/10.1007\/s11623-015-0417-5","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,30]]}}}