Indices
This title is listed in the following:
Close
Reference Hub
This research has been cited in:
Article
Explaining the Technology Use Behavior of Privacy-Enhancing Technologies: The Case of Tor and JonDonymProceedings on Privacy Enhancing Technologies10.2478/popets-2020-0020 Chapter
Privacy Enhanced Technologies: Methods – Markets – MisuseTrust, Privacy, and Security in Digital Business10.1007/11537878_1 Article
The price of anonymity: empirical evidence from a market for Bitcoin anonymizationJournal of Cybersecurity10.1093/cybsec/tyx007 Article
Risks, benefits, and control of information: Two studies of smart electric meter privacyJournal of the Association for Information Science and Technology10.1002/asi.24374 Chapter
Why Do People Pay for Privacy-Enhancing Technologies? The Case of Tor and JonDonymICT Systems Security and Privacy Protection10.1007/978-3-030-22312-0_18 Chapter
The Market Failure of Anonymity ServicesInformation Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices10.1007/978-3-642-12368-9_28 Chapter
Article
Hands off my data: users’ security concerns and intention to adopt privacy enhancing technologiesItalian Journal of Marketing10.1007/s43039-020-00017-2 Chapter
Facilitating the Adoption of Tor by Focusing on a Promising Target GroupIdentity and Privacy in the Internet Age10.1007/978-3-642-04766-4_2 Conference
Trained to accept?Proceedings of the SIGCHI Conference on Human Factors in Computing Systems10.1145/1753326.1753689 Article
Transformational Leaders Help Their Employees Overcome Their TechnophobiaInternational Journal of Technology and Human Interaction10.4018/IJTHI.2020070105
Close Top Results From Your Most Recent Search
Close