R. Bjones, I. Krontiris, P. Paillier, and K. Rannenberg, Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication, Privacy Technologies and Policy, pp.111-124, 2014.
DOI : 10.1007/978-3-642-54069-1_7

J. J. Borking, Why Adopting Privacy Enhancing Technologies (PETs) Takes so Much Time, pp.309-341, 2011.
DOI : 10.1007/978-94-007-0641-5_15

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.193.9657

S. Brands, Untraceable Off-line Cash in Wallet with Observers, Advances in Cryptology ? CRYPTO'93, pp.302-318, 1994.
DOI : 10.1007/3-540-48329-2_26

J. Camenisch and A. Lysyanskaya, Signature Schemes and Anonymous Credentials from Bilinear Maps, Advances in Cryptology ? CRYPTO, pp.56-72, 2004.
DOI : 10.1007/978-3-540-28628-8_4

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.64.2381

A. Cavoukian, Privacy by Design, Canada, 2009.
DOI : 10.4018/978-1-61350-501-4.ch007

A. Y. Chong, K. B. Ooi, B. Lin, and M. Raman, Factors affecting the adoption level of c-commerce: An empirical study, Journal of Computer Information Systems, vol.50, issue.2, p.13, 2009.

C. W. Crook and R. L. Kumar, Electronic data interchange: a multi-industry investigation using grounded theory, Information & Management, vol.34, issue.2, pp.75-89, 1998.
DOI : 10.1016/S0378-7206(98)00040-8

P. J. Dimaggio and W. W. Powell, The Iron Cage Revisited: Institutional Isomorphism and Collective Rationality in Organizational Fields, American Sociological Review, vol.48, issue.2, pp.147-160, 1983.
DOI : 10.2307/2095101

N. Fligstein, The spread of the multidivisional form among large firms, 1919-1979 Advances in Strategic Management, pp.55-78, 1985.

S. Goode and K. Stevens, An analysis of the business characteristics of adopters and non-adopters of world wide web technology, INFORMATION TECHNOLOGY AND MANAGEMENT, vol.1, issue.1/2, pp.129-154, 2000.
DOI : 10.1023/A:1019112722593

M. Hansen, H. Obersteller, K. Rannenberg, and F. Veseli, Establishment and prospects of privacy-abcs Attribute-based Credentials for Trust, pp.345-360978, 2015.

P. R. Haunschild and A. S. Miner, Modes of interorganizational imitation: The effects of outcome salience and uncertainty. Administrative science quarterly pp, pp.472-500, 1997.

H. A. Haveman, Follow the leader: Mimetic isomorphism and entry into new markets . Administrative science quarterly pp, pp.593-627, 1993.
DOI : 10.2307/2393338

C. L. Iacovou, I. Benbasat, and A. S. Dexter, Electronic data interchange and small organizations: adoption and impact of technology. MIS quarterly pp, pp.465-485, 1995.

J. D. Kendall, L. L. Tung, K. H. Chua, C. H. Ng, and S. M. Tan, Receptivity of Singapore's SMEs to electronic commerce adoption, The Journal of Strategic Information Systems, vol.10, issue.3, pp.223-242, 2001.
DOI : 10.1016/S0963-8687(01)00048-8

K. K. Kuan and P. Y. Chau, A perception-based model for EDI adoption in small businesses using a technology???organization???environment framework, Information & Management, vol.38, issue.8, pp.507-521, 2001.
DOI : 10.1016/S0378-7206(01)00073-8

C. B. Martins, A. V. Steil, and J. L. Todesco, Factors influencing the adoption of the Internet as a teaching tool at foreign language schools, Computers & Education, vol.42, issue.4, pp.353-374, 2004.
DOI : 10.1016/j.compedu.2003.08.007

N. J. Miller, H. Mcleod, Y. Ob, and K. , Managing Family Businesses in Small Communities, Journal of Small Business Management, vol.39, issue.1, pp.73-87, 2001.
DOI : 10.1111/0447-2778.00007

G. C. Moore and I. Benbasat, Development of an Instrument to Measure the Perceptions of Adopting an Information Technology Innovation, Information Systems Research, vol.2, issue.3, pp.192-222, 1991.
DOI : 10.1287/isre.2.3.192

G. Moore, Crossing the chasm : marketing and selling disruptive products to mainstream customers. HarperBusiness Essentials, 2002.

A. Osterwalder, The business model ontology: A proposition in a design science approach, 2004.

G. Premkumar, K. Ramamurthy, and M. Crum, Determinants of EDI adoption in the transportation industry, European Journal of Information Systems, vol.6, issue.2, pp.107-121, 1997.
DOI : 10.1057/palgrave.ejis.3000260

G. Premkumar and M. Roberts, Adoption of new information technologies in rural small businesses, Omega, vol.27, issue.4, pp.467-484, 1999.
DOI : 10.1016/S0305-0483(98)00071-1

B. Ramdani and P. Kawalek, SME Adoption of Enterprise Systems in the Northwest of England, Organizational Dynamics of Technology-Based Innovation: Diversifying the Research Agenda, IFIP International Federation for Information Processing, pp.409-429, 2007.
DOI : 10.1007/978-0-387-72804-9_27

L. Raymond, Determinants of Web site implementation in small businesses, Internet Research, vol.11, issue.5, pp.411-424, 2001.
DOI : 10.1108/10662240110410363

E. Rogers, Diffusion of innovations, 2003.

A. Sabouri, I. Krontiris, and K. Rannenberg, Attribute-Based Credentials for Trust (ABC4Trust), Trust, Privacy and Security in Digital Business -9th International Conference Proceedings. pp, pp.218-219, 2012.
DOI : 10.1007/978-3-642-32287-7_21

W. R. Scott, Institutions and Organizations (Foundations for Organizational Science ), 2000.

A. Soares-aguiar and A. Palma-dos-reis, Why do firms adopt e-procurement systems? using logistic regression to empirically test a conceptual model. Engineering Management, IEEE Transactions on, vol.55, issue.1, pp.120-133, 2008.

T. S. Teo, C. Ranganathan, and J. Dhaliwal, Key dimensions of inhibitors for the deployment of web-based business-to-business electronic commerce. Engineering Management, IEEE Transactions on, vol.53, issue.3, pp.395-411, 2006.

T. S. Teo, M. Tan, and W. K. Buk, A Contingency Model of Internet Adoption in Singapore, International Journal of Electronic Commerce, vol.6, issue.1, pp.95-118, 1997.
DOI : 10.1287/mnsc.30.6.727

J. Y. Thong, An Integrated Model of Information Systems Adoption in Small Businesses, Journal of Management Information Systems, vol.59, issue.4, pp.187-214, 1999.
DOI : 10.1287/mnsc.28.12.1421

E. Wästlund, J. Angulo, and S. Fischer-hübner, Evoking comprehensive mental models of anonymous credentials, Open Problems in Network Security, pp.1-14, 2012.

R. Zafarani and H. Liu, Connecting users across social media sites, Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '13, pp.41-49, 2013.
DOI : 10.1145/2487575.2487648

K. Zhu, S. Dong, S. X. Xu, and K. L. Kraemer, Innovation diffusion in global contexts: determinants of post-adoption digital transformation of European companies, European Journal of Information Systems, vol.52, issue.10, pp.601-616, 2006.
DOI : 10.1287/mnsc.1050.0487