{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,31]],"date-time":"2022-03-31T00:12:26Z","timestamp":1648685546056},"reference-count":24,"publisher":"Springer Fachmedien Wiesbaden GmbH","issue":"1","license":[{"start":{"date-parts":[[2016,12,7]],"date-time":"2016-12-07T00:00:00Z","timestamp":1481068800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["HMD"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1365\/s40702-016-0280-3","type":"journal-article","created":{"date-parts":[[2016,12,7]],"date-time":"2016-12-07T13:55:50Z","timestamp":1481118950000},"page":"55-66","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Nutzer pr\u00e4ferieren den Schutz ihrer Daten"],"prefix":"10.1365","volume":"54","author":[{"given":"Christoph","family":"Buck","sequence":"first","affiliation":[]},{"given":"Florian","family":"Stadler","sequence":"additional","affiliation":[]},{"given":"Kristin","family":"Suckau","sequence":"additional","affiliation":[]},{"given":"Torsten","family":"Eymann","sequence":"additional","affiliation":[]}],"member":"93","published-online":{"date-parts":[[2016,12,7]]},"reference":[{"key":"280_CR1","volume-title":"Apple trademark list","author":"Apple Inc","year":"2016","unstructured":"Apple Inc (2016) Apple trademark list. http:\/\/www.apple.com\/legal\/intellectual-property\/trademark\/appletmlist.html . Zugegriffen: 5.12.2016"},{"key":"280_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-15249-8","volume-title":"Fortgeschrittene Multivariante Analysemethoden (in German). Eine anwendungsorientierte Einf\u00fchrung","author":"K Backhaus","year":"2011","unstructured":"Backhaus K, Erichson B, Weiber R (2011) Fortgeschrittene Multivariante Analysemethoden (in German). Eine anwendungsorientierte Einf\u00fchrung. Springer, Berlin"},{"key":"280_CR3","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/978-3-642-00754-5_1","volume-title":"Conjointanalyse: Methoden, Anwendungen, Praxisbeispiele (in German)","author":"D Baier","year":"2009","unstructured":"Baier D, Brusch M (2009) Erfassung von\u00a0Kundenpr\u00e4ferenzen f\u00fcr Produkte und Dienstleistungen (in German). In: Conjointanalyse: Methoden, Anwendungen, Praxisbeispiele (in German). Springer, Berlin, Heidelberg, S\u00a03\u201319"},{"key":"280_CR4","doi-asserted-by":"crossref","first-page":"129","DOI":"10.1007\/978-3-642-00754-5_9","volume-title":"Conjointanalyse: Methoden, Anwendungen, Praxisbeispiele (in German)","author":"I Balderjahn","year":"2009","unstructured":"Balderjahn I, Hedergott D, Peyer M (2009) Choice-Based Conjointanalyse (in German). In: Baier D, Brusch M (Hrsg) Conjointanalyse: Methoden, Anwendungen, Praxisbeispiele (in German). Springer, Berlin, Heidelberg, S 129\u2013146"},{"key":"280_CR5","doi-asserted-by":"crossref","first-page":"59","DOI":"10.1007\/978-3-642-00754-5_4","volume-title":"Conjointanalyse: Methoden, Anwendungen, Praxisbeispiele (in German)","author":"A Bichler","year":"2009","unstructured":"Bichler A, Trommsdorff V (2009) Pr\u00e4ferenzmodelle bei der Conjointanalyse (in German). In: Baier D, Brusch M (Hrsg) Conjointanalyse: Methoden, Anwendungen, Praxisbeispiele (in German). Springer, Berlin, Heidelberg, S\u00a059\u201372"},{"key":"280_CR6","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1007\/978-3-642-00754-5_7","volume-title":"Conjointanalyse: Methoden, Anwendungen, Praxisbeispiele (in German)","author":"H B\u00f6hler","year":"2009","unstructured":"B\u00f6hler H, Scigliano D (2009) Traditionelle Conjointanalyse (in German). In: Baier D, Brusch M (Hrsg) Conjointanalyse: Methoden, Anwendungen, Praxisbeispiele (in German). Springer, Berlin, Heidelberg, S\u00a0101\u2013112"},{"issue":"1","key":"280_CR7","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1365\/s11621-014-0318-2","volume":"31","author":"C Buck","year":"2014","unstructured":"Buck C, Horbel C, Kessler T, Germelmann CC (2014) Mobile consumer apps: big data brother is watching you. Mark Rev St Gallen 31(1):26","journal-title":"Mark Rev St Gallen"},{"key":"280_CR8","unstructured":"Buxmann P (2016) Der Preis des Kostenlosen \u2013 Was sind unsere Daten wert? http:\/\/www.peterbuxmann.de\/2016\/08\/15\/preis-des-kostenlosen . Zugegriffen: 5.12.2016"},{"key":"280_CR24","unstructured":"Cohen SH (1997) Perfect Union. CBCA marries the best of conjoint and discrete choice models. Marketing Research:12\u201317"},{"issue":"1","key":"280_CR9","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1287\/orsc.10.1.104","volume":"10","author":"MJ Culnan","year":"1999","unstructured":"Culnan MJ, Armstrong PK (1999) Information privacy concerns, procedural fairness, and impersonal trust: an empirical investigation. Organ Sci 10(1):104\u2013115","journal-title":"Organ Sci"},{"issue":"2","key":"280_CR10","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/BF00994929","volume":"6","author":"WS DeSarbo","year":"1995","unstructured":"DeSarbo WS, Ramaswamy V, Cohen SH (1995) Market segmentation with choice-based conjoint analysis. Mark Lett 6(2):137\u2013147","journal-title":"Mark Lett"},{"issue":"1","key":"280_CR11","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1287\/isre.1060.0080","volume":"17","author":"T Dinev","year":"2006","unstructured":"Dinev T, Hart P (2006) An extended privacy calculus model for e\u2011commerce transactions. Inf Syst Res 17(1):61\u201380","journal-title":"Inf Syst Res"},{"key":"280_CR12","first-page":"13","volume-title":"New horizons in environmental economics. The choice modelling approach to environmental valuation","author":"JJ Louviere","year":"2001","unstructured":"Louviere JJ (2001) Choice experiments: an overview of concepts and issues. In: Bennett J, Blamey RK (Hrsg) New horizons in environmental economics. The choice modelling approach to environmental valuation. Edward Elgar, Cheltenham, S\u00a013\u201336"},{"key":"280_CR13","volume-title":"Business model generation: a\u00a0handbook for visionaries, game changers, and challengers","author":"A Osterwalder","year":"2013","unstructured":"Osterwalder A, Pigneur Y (2013) Business model generation: a\u00a0handbook for visionaries, game changers, and challengers. John Wiley & Sons, Hoboken"},{"key":"280_CR14","volume-title":"The CBC\u00a0System for Choice-Based Conjoint Analysis: Version 8","author":"Sawtooth Software Inc","year":"2013","unstructured":"Sawtooth Software Inc (2013) The CBC\u00a0System for Choice-Based Conjoint Analysis: Version 8. Sawtooth Software Inc., Orem"},{"issue":"4","key":"280_CR15","doi-asserted-by":"crossref","first-page":"989","DOI":"10.2307\/41409970","volume":"35","author":"HJ Smith","year":"2011","unstructured":"Smith HJ, Dinev T, Xu H (2011) Information privacy research: an interdisciplonary review. MIS Q 35(4):989\u20131016","journal-title":"MIS Q."},{"issue":"2","key":"280_CR16","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/s12525-015-0191-0","volume":"25","author":"S Spiekermann","year":"2015","unstructured":"Spiekermann S, Acquisti A, B\u00f6hme R, Hui K\u2011L (2015a) The challenges of personal data markets and privacy. Electron Mark 25(2):161\u2013167. doi: 10.1007\/s12525-015-0191-0","journal-title":"Electron Mark"},{"issue":"2","key":"280_CR17","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/s12525-015-0190-1","volume":"25","author":"S Spiekermann","year":"2015","unstructured":"Spiekermann S, B\u00f6hme R, Acquisti A, Hui K\u2011L (2015b) Personal data markets. Electron Mark 25(2):91\u201393. doi: 10.1007\/s12525-015-0190-1","journal-title":"Electron Mark"},{"issue":"2","key":"280_CR18","first-page":"107","volume":"19","author":"R Weiber","year":"1997","unstructured":"Weiber R, Rosendahl T (1997) Anwendungsprobleme der Conjoint-Analyse: Die Eignung conjointanalytischer Untersuchungsans\u00e4tze zur Abbildung realer Entscheidungsprozesse. Marketing 19(2):107\u2013118","journal-title":"Marketing"},{"issue":"3","key":"280_CR19","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1038\/scientificamerican0991-94","volume":"265","author":"M Weiser","year":"1991","unstructured":"Weiser M (1991) The computer for the 21st century. Sci Am 265(3):94\u2013104","journal-title":"Sci. Am."},{"issue":"6","key":"280_CR20","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1365\/s35764-012-0189-8","volume":"3","author":"H Wenninger","year":"2012","unstructured":"Wenninger H, Widjaja T, Buxmann P, Gerlach J (2012) Der \u201ePreis des Kostenlosen\u201c. Wirtschaftsinform Manag 3(6):12\u201318","journal-title":"Wirtschaftsinform Manag"},{"key":"280_CR21","volume-title":"Privacy and freedom","author":"AF Westin","year":"1967","unstructured":"Westin AF (1967) Privacy and freedom. Atheneum, New York"},{"key":"280_CR22","unstructured":"Word Economic Forum (2011) Personal data: the emergence of a\u00a0new asset class. http:\/\/www3.weforum.org\/docs\/WEF_ITTC_PersonalDataNewAsset_Report_2011.pdf . Zugegriffen: 5.12.2016"},{"issue":"2","key":"280_CR23","doi-asserted-by":"crossref","first-page":"213","DOI":"10.2307\/20721425","volume":"34","author":"Y Yoo","year":"2010","unstructured":"Yoo Y (2010) Computing in everyday life: a\u00a0call for research on experiential computing. MIS Q 34(2):213\u2013231","journal-title":"MIS Q"}],"container-title":["HMD Praxis der Wirtschaftsinformatik"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-016-0280-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1365\/s40702-016-0280-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1365\/s40702-016-0280-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T09:11:58Z","timestamp":1568625118000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1365\/s40702-016-0280-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12,7]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["280"],"URL":"https:\/\/doi.org\/10.1365\/s40702-016-0280-3","relation":{},"ISSN":["1436-3011","2198-2775"],"issn-type":[{"value":"1436-3011","type":"print"},{"value":"2198-2775","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,12,7]]}}}