A. Acquisti, R. Dingledine, and P. Syverson, On the Economics of Anonymity, p.3, 2003.
DOI : 10.1007/978-3-540-45126-6_7

A. Acquisti, A. Friedman, and R. Telang, Is There a Cost to Privacy Breaches?: An Event Study, Proceedings of the Twenty Seventh International Conference on Information Systems, 2006.

A. Acquisti and J. Grossklags, Privacy and rationality in individual decision making, IEEE Security and Privacy Magazine, vol.3, issue.1, pp.26-33, 2005.
DOI : 10.1109/MSP.2005.22

A. Acquisti, Privacy and Security of Personal Information, pp.1-9, 2004.
DOI : 10.1007/1-4020-8090-5_14

A. Acquisti, Privacy in electronic commerce and the economics of immediate gratification, Proceedings of the 5th ACM conference on Electronic commerce , EC '04, 2004.
DOI : 10.1145/988772.988777

R. Anderson, R. Boehme, R. Clayton, and T. Moore, Security Economics and the Internal Market, 2008.

G. A. Arkerlof, The Market for "Lemons": Quality Uncertainty and the Market Mechanism, The Quarterly Journal of Economics, vol.84, issue.3, pp.488-500, 1970.
DOI : 10.2307/1879431

F. Belanger, J. S. Hiller, and W. J. Smith, Trustworthiness in electronic commerce: the role of privacy, security, and site attributes, The Journal of Strategic Information Systems, vol.11, issue.3-4, pp.245-270, 2002.
DOI : 10.1016/S0963-8687(02)00018-5

B. Berendt, O. Guenther, and S. Spiekermann, Privacy in e-commerce, Communications of the ACM, vol.48, issue.4, pp.101-106, 2005.
DOI : 10.1145/1053291.1053295

O. Berthold, H. Federrath, and S. Koepsell, Web MIXes: A System for Anonymous and Unobservable Internet Access, Proceedings of Designing Privacy Enhancing Technologies, pp.115-129, 2000.
DOI : 10.1007/3-540-44702-4_7

A. Cavoukian, Privacy and Radical Pragmatism: Change the Paradigm, Information and Privacy Commisioner of, pp.2008-2016

A. Cavoukian, Privacy in the clouds, Identity in the Information Society, vol.1, issue.1, pp.2008-2013
DOI : 10.1007/s12394-008-0005-z

D. L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.24, issue.2, pp.84-88, 1981.
DOI : 10.1145/358549.358563

J. Clark, P. C. Van-oorschot, and C. Adams, Usability of anonymous web browsing, Proceedings of the 3rd symposium on Usable privacy and security, SOUPS '07, pp.41-51, 2007.
DOI : 10.1145/1280680.1280687

R. Clayton, S. J. Murdoch, and R. N. Watson, Ignoring the Great Firewall of China, Proceedings of the 6th Workshop on Privacy Enhancing Technologies, 2006.
DOI : 10.1007/11957454_2

J. Coopersmith, Pornography, Technology and Progress, ICON, vol.4, pp.94-125, 1998.

F. D. Davis, R. P. Bagozzi, and P. R. Warshaw, User Acceptance of Computer Technology: A Comparison of Two Theoretical Models, Management Science, vol.35, issue.8, pp.982-1003, 1989.
DOI : 10.1287/mnsc.35.8.982

F. D. Davis, Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology, MIS Quarterly, vol.13, issue.3, pp.319-340, 1989.
DOI : 10.2307/249008

S. Diel, Gestaltungsvorschlge zur Verteilung von Kosten und Nutzen qualifizierter elektronischer Signaturen, 2007.

R. Dingledine, N. Mathewson, and P. Syverson, Tor: The Second-Generation Onion Router, Proceedings of the 13th USENIX Security Symposium, pp.303-320, 2004.

R. Dingledine and N. Mathewson, Anonymity loves company: Usability and the network effect, The Fifth Workshop on the Economics of Information Security, 2006.

H. Federrath, A. Jerichow, D. Kesdogan, A. Pfitzmann, and O. Spaniol, Mobilkommunikation ohne Bewegungsprofile, Mehrseitige Sicherheit in der Kommunikationstechnik, pp.169-180, 1997.

J. Feigenbaum, M. Freedman, T. Sander, and A. Shostack, Economic barriers to the deployment of existing privacy technology, Proceedings of the Workshop on Economics and Information Security, 2002.

M. Fishbein and I. Ajzen, Belief, Attitude, Intention, and Behavior: An Introduction to Theory and Research, 1975.

L. Fritsch and H. Abie, Towards a Research Road Map for the Management of Privacy Risks in Information Systems, Sicherheit, pp.1-16, 2008.

L. Fritsch, H. Rossnagel, M. Schwenke, and T. Stadler, Die Pflicht zum Angebot anonym nutzbarer Dienste: Eine technische und rechtliche Zumutbarkeitsbetrachtung, Datenschutz und Datensicherheit (DuD), issue.10, pp.29-592, 2005.

D. F. Galletta, R. Henry, S. Mccoy, and P. Polak, Web site delays: How tolerant are users, Journal of the AIS, vol.5, issue.1, pp.1-28, 2004.

D. Gefen, E. Karahanna, and D. W. Straub, Trust and TAM in Online Shopping: An Integrated Model, pp.51-90, 2003.

A. Grantham and G. Tsekouras, Diffusing wireless applications in a mobile world, Technology in Society, vol.27, issue.1, pp.85-104, 2005.
DOI : 10.1016/j.techsoc.2004.10.003

B. A. Huberman, E. Adar, and L. R. Fine, Valuating Privacy, IEEE Security and Privacy Magazine, vol.3, issue.5, pp.22-25, 2005.
DOI : 10.1109/MSP.2005.137

H. Kai-lung, H. T. Hock, and T. L. Sang-yong, The Value of Privacy Assurance: An Exploratory Field Experiment, MIS Quaterly, issue.1, pp.31-50, 2007.

T. Litfin, Adoptionsfaktoren: Empirische Analyse am Beispiel eines innovativen Telekommunikationsdienstes, DUV, 2000.

A. Mahler and E. M. Rogers, The diffusion of interactive communication innovations and the critical mass: the adoption of telecommunications services by German banks, Telecommunications Policy, vol.23, issue.10-11, pp.719-740, 1999.
DOI : 10.1016/S0308-5961(99)00052-X

D. Mccoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker, Shining Light in Dark Places: Understanding the Tor Network, Proceedings of the 8th Privacy Enhancing Technologies Symposium, pp.63-76, 2008.
DOI : 10.1007/978-3-540-70630-4_5

G. C. Moore and I. Benbasat, Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation, Information Systems Research, vol.2, issue.3, pp.173-191, 1991.
DOI : 10.1287/isre.2.3.192

T. T. Moores and G. Dhillon, Do privacy seals in e-commerce really work?, Communications of the ACM, vol.46, issue.12, pp.265-271, 2003.
DOI : 10.1145/953460.953510

A. Odlyzko, Privacy and the clandestine evolution of e-commerce, Proceedings of the ninth international conference on Electronic commerce, ICEC '07, pp.3-6, 2007.
DOI : 10.1145/1282100.1282104

S. S. Oren and S. A. Smith, Critical Mass and Tariff Structure in Electronic Communications Markets, The Bell Journal of Economics, vol.12, issue.2, pp.467-487, 1981.
DOI : 10.2307/3003567

A. Ozment and S. E. Schechter, Bootstrapping the Adoption of Internet Security Protocols, Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 06), 2006.

P. A. Pavlou, Consumer Acceptance of Electronic Commerce: Integrating Trust and Risk with the Technology Acceptance Model, International Journal of Electronic Commerce, vol.7, issue.3, pp.101-134, 2003.

A. Pfitzmann, B. Pfitzmann, and M. Waidner, ISDN-Mixes: Untraceable Communication with Very Small Bandwidth Overhead, Proceedings of the GI/ITG Conference on Communication in Distributed Systems, pp.451-463, 1991.
DOI : 10.1007/978-3-642-76462-2_32

A. Pfitzmann and M. Waidner, Networks without user observability, Computers & Security, vol.6, issue.2, p.245, 1986.
DOI : 10.1016/0167-4048(87)90087-3

H. Rhee, Y. U. Ryu, and C. Kim, I Am Fine But You Are Not: Optimistic Bias and Illusion of Control on Information Security, Proceedings of the Twenty- Sixth International Conference on Information Systems (ICIS 05), pp.381-394, 2005.

E. M. Rogers, Diffusion of Innovations, 2003.

H. Rossnagel, J. Zibuschka, L. Pimenidis, and T. Deselaers, Facilitating the Adoption of Tor by Focusing on a Promising Target Group, Proceedings of the 14th Nordic Workshop on Secure IT Systems, pp.15-27, 2009.
DOI : 10.1016/S0169-7552(98)00066-X

H. Rossnagel, Mobile Qualifizierte Elektronische Signaturen: Analyse der Hemmnisfaktoren und Gestaltungsvorschlaege zur Einfuehrung, 2009.
DOI : 10.1007/978-3-8349-8182-0

B. Ryan and N. C. Gross, The Diffusion of Hybrid Seed Corn in Two Iowa Communities, Rural Sociology, issue.8, pp.15-24, 1943.

C. Shapiro and H. R. Varian, Information Rules: A Strategic Guide to the Network Economy, 1999.

A. Shostack, People Won't Pay For Privacy,' Reconsidered, 2nd Annual Workshop 'Economics and Information Security, 2003.

S. Spiekermann, Die Konsumenten der Anonymitaet: Wer nutzt Anonymisierungsdienste? Datenschutz und Datensicherheit (DuD, pp.150-154, 2003.

S. Spiekermann, The desire for privacy: Insights into the views and nature of the early adopters of privacy services, International Journal of Technology and Human Interaction, issue.11, 2004.

P. Syverson, The Paradoxical Value of Privacy, 2nd Annual Workshop 'Economics and Information Security, 2003.

S. Taylor and P. A. Todd, Understanding Information Technology Usage: A Test of Competing Models, Information Systems Research, vol.6, issue.2, pp.144-176, 1995.
DOI : 10.1287/isre.6.2.144

L. G. Tornatzky and K. J. Klein, Innovation characteristics and innovation adoption-implementation: A meta-analysis of findings, IEEE Transactions on Engineering Management, vol.29, issue.1, pp.28-45, 1982.
DOI : 10.1109/TEM.1982.6447463

. Videoload and . De, Pastewka Videoload Peinliche Momente

T. Vila, R. Greenstadt, and D. Molnar, Why We Can't Be Bothered to Read Private Policies: Models of Privacy Economics as a Lemons Market, 2nd Annual Workshop 'Economics and Information Security, p.Maryland, 2003.

N. D. Weinstein, Optimistic biases about personal risks, Science, vol.246, issue.4935, pp.1232-1233, 1989.
DOI : 10.1126/science.2686031

D. J. Weitzner, H. Abelson, T. Berners-lee, J. Feigenbaum, J. Hendler et al., Information accountability, Communications of the ACM, vol.51, issue.6, pp.82-87, 2008.
DOI : 10.1145/1349026.1349043