{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:47:07Z","timestamp":1742946427683,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030021306"},{"type":"electronic","value":"9783030021313"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-02131-3_15","type":"book-chapter","created":{"date-parts":[[2018,10,11]],"date-time":"2018-10-11T12:58:46Z","timestamp":1539262726000},"page":"150-163","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Implementation of Information Security in the EU Information Systems"],"prefix":"10.1007","author":[{"given":"Maris","family":"J\u00e4rvsoo","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Norta","sequence":"additional","affiliation":[]},{"given":"Valentyna","family":"Tsap","sequence":"additional","affiliation":[]},{"given":"Ingrid","family":"Pappel","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Draheim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,12]]},"reference":[{"issue":"2","key":"15_CR1","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1007\/s12027-010-0158-8","volume":"11","author":"D Alonso Blas","year":"2010","unstructured":"Alonso Blas, D.: Ensuring effective data protection in the field of police and judicialactivities: some considerations to achieve security, justice and freedom. ERA Forum 11(2), 233\u2013250 (2010)","journal-title":"ERA Forum"},{"key":"15_CR2","unstructured":"Aus, J.: Supranational governance in an area of freedom, security and justice \u2013eurodac and the politics of biometric control. Technical Report DEI Working Paper, no. 72, Sussex University Institute (2003)"},{"issue":"6","key":"15_CR3","first-page":"1","volume":"10","author":"J Aus","year":"2006","unstructured":"Aus, J.: Eurodac \u2013 a solution looking for a problem? Eur. Integr. OnlinePapers 10(6), 1\u201326 (2006)","journal-title":"Eur. Integr. OnlinePapers"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Boehm, F.: Information Sharing and Data Protection in the Area of Freedom, Security and Justice \u2013 Towards Harmonised Data Protection Principles for Information Exchange at EU-level. Springer (2012)","DOI":"10.1007\/978-3-642-22392-1"},{"issue":"2","key":"15_CR5","first-page":"231","volume":"4","author":"E Brouwer","year":"2002","unstructured":"Brouwer, E.: Eurodac: Its limitations and temptations. Eur. J. Migr. Law 4(2), 231\u2013247 (2002)","journal-title":"Eur. J. Migr. Law"},{"key":"15_CR6","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik (BSI): IT Security Guidelines\u2013 IT-Grundschutz in brief. BSI, Bonn (2007)"},{"key":"15_CR7","unstructured":"Commission Staff Working Paper: First annual report to the Council and the European Parliament on the activities of the EURODAC Central Unit. Commission of the European Communities, Brussels (2004)"},{"key":"15_CR8","unstructured":"Conventions signed between Member States: CONVENTION determining theState responsible for examining applications for asylum lodged in one of the Member States of the European Communities. Offi. J. Eur. Union (L 254), 1\u201312 (1997)"},{"key":"15_CR9","unstructured":"Council of the European Union: SIRENE Manual. Off. J. Eur. Union (L 38), 1\u201324 (2003)"},{"key":"15_CR10","unstructured":"European Commission: COMMISSION IMPLEMENTING DECISION (EU) 2015\/219 of 29 January 2015 replacing the Annex to Implementing Decision 2013\/115\/EU on the Sirene Manual and other implementing measures for the second generation Schengen Information System (SIS II). Off. J. Eur. Union (L 44), 75\u2013116 (2015)"},{"key":"15_CR11","unstructured":"European Commission: COMMISSION DECISION (EU, Euratom) 2017\/46 of 10 January 2017 on the security of communication and information systems in the European Commission. Off. J. Eur. Union (L 6), 40\u201351 (2017)"},{"key":"15_CR12","unstructured":"European Council: COUNCIL REGULATION (EC) No 2725\/2000 of 11 December2000 concerning the establishment of \u2018Eurodac\u2019 for the comparison of fingerprints for the effective application of the Dublin Convention. Off. J. Eur. Union (L 316), 1\u201310 (2000)"},{"key":"15_CR13","unstructured":"European Data Protection Supervisor: DECLARATION. In: Spring Conference of European Data Protection Authorities, pp. 1\u20132. Krakow (2005)"},{"key":"15_CR14","unstructured":"European Data Protection Supervisor: Eurodac Supervision Coordination Group Second Inspection Report. Secretariat of the Eurodac Supervision Coordination Group, Brussels (2009)"},{"key":"15_CR15","unstructured":"European Parliament and Council: REGULATION (EC) No 1987\/2006 of 20 December 2006 on the establishment, operation and use of the second generation Schengen Information System (SIS II). Off. J. Eur. Union (L 381), 4\u201323 (2006)"},{"key":"15_CR16","unstructured":"European Parliament and Council: REGULATION (EC) No 767\/2008 of 9 July2008 concerning the Visa Information System (VIS) and the exchange of data between Member States on short-stay visas (VIS Regulation). Off. J. Eur. Union (L 218), 60\u201381 (2008)"},{"key":"15_CR17","unstructured":"European Parliament and Council: REGULATION (EU) No 603\/2013 of 26 June2013 on the establishment of \u2018Eurodac\u2019 for the comparison of fingerprints for the effective application of Regulation (EU) No 604\/2013. Off. J. Eur. Union (L 180), 1\u201330 (2013)"},{"key":"15_CR18","unstructured":"European Parliament and Council: DIRECTIVE (EU) 2016\/1148 of 6 July 2016 concerning measures for a high common level of security of network and information systems across the Union. Off. J. Eur. Union (L 194), 1\u201330 (2016)"},{"key":"15_CR19","unstructured":"European Parliament and Council: DIRECTIVE (EU) 2016\/680 of 27 April 2016 on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and on the free movement of such data, and repealing Council Framework Decision 2008\/977\/JHA. Off. J. Eur. Union (L 119), 89\u2013131 (2016)"},{"key":"15_CR20","unstructured":"European Parliament and Council: REGULATION (EU) 2016\/679 of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Off. J. Eur. Union (L 119), 1\u201388 (2016)"},{"key":"15_CR21","unstructured":"European Parliament, Council of the European Union: REGULATION (EU) No1077\/2011 of 25 October 2011 establishing a European Agency for the operational management of large-scale IT systems in the area of freedom, security and justice. Off. J. Eur. Union (L 286), 1\u201317 (2011)"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Fragapane, S., Minaldi, G.: Migration policies and digital technologies in Europe: a comparison between italy and spain. J. Eur. Integr. 0(0), 1\u201317 (2018)","DOI":"10.1080\/07036337.2018.1482289"},{"key":"15_CR23","unstructured":"Government of the Republic of Estonia: Infos\u00fcsteemide turvameetmete s\u00fcsteem.Riigi Teataja (252) (2009)"},{"key":"15_CR24","unstructured":"ISO\/IEC 27001:2013: Information technology \u2013 Security techniques \u2013 Informationsecurity management systems \u2013 Requirements. In: International Standardization Organization (2013)"},{"key":"15_CR25","unstructured":"ISO\/IEC 27002:2013: Information technology \u2013 Security techniques \u2013 Code of practice for information security controls. In: International Standardization Organization (2013)"},{"issue":"3","key":"15_CR26","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1016\/j.clsr.2017.03.009","volume":"33","author":"T Marquenie","year":"2017","unstructured":"Marquenie, T.: The police and criminal justice authorities directive \u2013 data protection standards and impact on the legal framework. Comput. Law Secur. Rev. 33(3), 324\u2013340 (2017)","journal-title":"Comput. Law Secur. Rev."},{"key":"15_CR27","doi-asserted-by":"crossref","unstructured":"Robinson, N., Gaspers, J.: Information security and data protection legal and policy frameworks applicable to european union institutions and agencies. Technical report, RAND Corporation (2014)","DOI":"10.7249\/RR557"},{"key":"15_CR28","doi-asserted-by":"crossref","unstructured":"Rull, A., T\u00e4ks, E., Norta, A.: Towards Software-Agent Enhanced Privacy Protection, pp. 73\u201394. Springer (2014)","DOI":"10.1007\/978-3-319-08117-5_5"},{"issue":"3","key":"15_CR29","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1080\/07036337.2016.1140756","volume":"38","author":"F Trauner","year":"2016","unstructured":"Trauner, F.: Asylum policy \u2013 the EU\u2019s \u2018crises\u2019 and the looming policy regimefailure. J. Eur. Integr. 38(3), 311\u2013325 (2016)","journal-title":"J. Eur. Integr."}],"container-title":["Lecture Notes in Computer Science","Challenges and Opportunities in the Digital Era"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02131-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T16:50:53Z","timestamp":1710262253000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-02131-3_15"}},"subtitle":["An Estonian Case Study"],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030021306","9783030021313"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02131-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"12 October 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"I3E","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on e-Business, e-Services and e-Society","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kuwait City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kuwait","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"i3e2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ifip.gust.edu.kw\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}