{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:39:55Z","timestamp":1726004395895},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030025465"},{"type":"electronic","value":"9783030025472"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-02547-2_3","type":"book-chapter","created":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T14:22:57Z","timestamp":1546093377000},"page":"43-60","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["RESPECT4U \u2013 Privacy as Innovation Opportunity"],"prefix":"10.1007","author":[{"given":"Marc","family":"van Lieshout","sequence":"first","affiliation":[]},{"given":"Sophie","family":"Emmert","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,30]]},"reference":[{"key":"3_CR1","unstructured":"Article 29 Working Party: Guidelines on Data Protection Impact Assessment (DPIA) and determining whether processing is\u201d likely to result in a high risk\u201d for the purposes of Regula- tion 2016\/679, wp248rev.01. \nhttp:\/\/ec.europa.eu\/newsroom\/article29\/item-de-tail.cfm?item_id\u2009=\u2009611236\n\n. Accessed 15 Apr 2018"},{"key":"3_CR2","unstructured":"Acquisti, A., Friedman, A., Telang, R.: Is there a cost to privacy breaches? an event study. In: ICIS 2006 Proceedings, p. 94 (2006). \nhttp:\/\/aisel.aisnet.org\/icis2006\/94\n\n. Accessed 16 Apr 2018"},{"key":"3_CR3","unstructured":"Aquisti, A.: Nudging privacy \u2013 the behavioral economics of privacy. In: IEEE Privacy & Security, November\/December, pp. 72\u201375 (2009)"},{"issue":"2","key":"3_CR4","doi-asserted-by":"publisher","first-page":"442","DOI":"10.1257\/jel.54.2.442","volume":"54","author":"A Acquisti","year":"2016","unstructured":"Acquisti, A., Taylor, C., Wagman, L.: The economics of privacy. J. Econ. Lit. 54(2), 442\u2013492 (2016)","journal-title":"J. Econ. Lit."},{"key":"3_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-642-02843-4_7","volume-title":"Dataspace: The Final Frontier","author":"K Barker","year":"2009","unstructured":"Barker, K., et al.: A data privacy taxonomy. In: Sexton, A.P. (ed.) BNCOD 2009. LNCS, vol. 5588, pp. 42\u201354. Springer, Heidelberg (2009). \nhttps:\/\/doi.org\/10.1007\/978-3-642-02843-4_7"},{"issue":"2","key":"3_CR6","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1177\/0887302X11407910","volume":"29","author":"G Baduri","year":"2011","unstructured":"Baduri, G., Ha-Brookshire, J.E.: Do transparent business practices pay? Exploration of transparency and consumer purchase intention. Cloth. Text. Res. J. 29(2), 135\u2013149 (2011)","journal-title":"Cloth. Text. Res. J."},{"key":"3_CR7","volume-title":"The Governance of Privacy","author":"CJ Bennet","year":"2006","unstructured":"Bennet, C.J., Raab, C.D.: The Governance of Privacy. The MIT Press, Cambridge\/London (2006)"},{"key":"3_CR8","unstructured":"Bost, R., Popa, R.A., Tu, S., Goldwasser, S.: Machine learning classification over encrypted data. Crypto ePrint Archive (2014). \nhttps:\/\/eprint.iacr.org\/2014\/331.pdf"},{"key":"3_CR9","unstructured":"Cavoukian, A.: Privacy by Design \u2013 The 7 Foundational Principles (2011). \nhttps:\/\/ipc.on.ca\/wp-con-tent\/uploads\/Resources\/7foundationalprinciples.pdf"},{"key":"3_CR10","doi-asserted-by":"publisher","unstructured":"Colesky, M., Hoepman, J.-H., Hillen, C.: A critical analysis of privacy design strategies. In: IEEE Security and Privacy Workshops (SPW) (2016). \nhttps:\/\/doi.org\/10.1109\/spw.2016.23","DOI":"10.1109\/spw.2016.23"},{"key":"3_CR11","unstructured":"Council of Europe: Convention for the Protection of Individuals with regard to Automatic Processing of Personal Data. Strassbourg (2013)"},{"key":"3_CR12","unstructured":"Danezis, G., et al.: Privacy and Data Protection by Design \u2013 from policy to engineering. ENISA (2014)"},{"key":"3_CR13","unstructured":"De Vos, H., et al.: 16244 \u2013 PIME - A1602, Guidelines on inclusion of users\u2019 perception and attitude on offering control and choice with respect to health data and health data services, EIT PIME Deliverable 2 (2016)"},{"issue":"2","key":"3_CR14","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/S0019-8501(02)00224-9","volume":"32","author":"E Eggert","year":"2003","unstructured":"Eggert, E., Helm, S.: Exploring the impact of relationship transparency on business relationships: a cross-sectional study among purchasing managers in German. Ind. Mark. Manag. 32(2), 101\u2013108 (2003)","journal-title":"Ind. Mark. Manag."},{"key":"3_CR15","unstructured":"Executive Office of the President: Big Data: A Report on Algorithmic Systems, Opportunity and Civil Rights, US Presidency (2016)"},{"issue":"3","key":"3_CR16","doi-asserted-by":"publisher","first-page":"1053","DOI":"10.1109\/TIFS.2012.2190726","volume":"7","author":"Z Erikin","year":"2012","unstructured":"Erikin, Z., Veugen, T., Toft, T., Lagendijk, R.L.: Generating private recommendations efficiently using homomorphic encryption and data packing. IEEE Trans. Inf. Forensics Secur. 7(3), 1053\u20131066 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3_CR17","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-94-007-5170-5_1","volume-title":"European Data Protection: Coming of Age","author":"Rachel L. Finn","year":"2012","unstructured":"Finn, R.L., Wright, D., Friedewald, M.: Seven types of privacy. In: Gutwirth, S., Leenes, R., De Hert, P., Poulett, Y. (eds.) Data Protection: Coming of Age. Springer, Dordrecht (2013). \nhttps:\/\/doi.org\/10.1007\/978-94-007-5170-5_1"},{"key":"3_CR18","unstructured":"Jentsch, N., Preibusch, S., Harasser, A.: Study on monetizing privacy \u2013 an economic model for pricing personal information. ENISA (2012)"},{"key":"3_CR19","doi-asserted-by":"publisher","first-page":"602","DOI":"10.21552\/EDPL\/2016\/4\/21","volume":"4","author":"M Galic","year":"2016","unstructured":"Galic, M.: Covert surveillance of privileged consultations and the weakening of the legal professional privilege. Eur. Data Prot. Law Rev. 4, 602\u2013607 (2016)","journal-title":"Eur. Data Prot. Law Rev."},{"key":"3_CR20","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1016\/j.clsr.2013.07.005","volume":"29","author":"R Gellert","year":"2013","unstructured":"Gellert, R., Gutwirth, S.: The legal construction of privacy and data protection. Comput. Law Secur. Rev. 29, 522\u2013530 (2013)","journal-title":"Comput. Law Secur. Rev."},{"key":"3_CR21","doi-asserted-by":"publisher","DOI":"10.4337\/9781849808774","volume-title":"Smart Technologies and the End(s) of Law","author":"M Hildebrandt","year":"2015","unstructured":"Hildebrandt, M.: Smart Technologies and the End(s) of Law. Edward Elgar Publishing, Cheltenham, Northampton (2015)"},{"key":"3_CR22","unstructured":"Keymolen, E.: Trust on the line \u2013 a philosophical exploration of trust in the networked era. Erasmus University, Rotterdam (2016)"},{"key":"3_CR23","unstructured":"Kumaraguru, P., Cranor, L.F.: Privacy Indexes: A Survey of Westin\u2019s Studies, CMU-ISRI-5\u2013 138, Carnegie Mellon University (2005)"},{"key":"3_CR24","unstructured":"London Economics: Study on the Economic Benefits of PET; Study for the European Commission, DG Justice, Freedom and Security. EC, Brussel (2010)"},{"key":"3_CR25","doi-asserted-by":"publisher","unstructured":"Paulk, M.: Capability maturity model. In: J.-J. Macinaik (ed.) Encyclopedia of Software Engineering, Wiley Online Library (first published 2002). \nhttps:\/\/onlineli-brary.wiley.com\/doi\/book\/\n\n, \nhttps:\/\/doi.org\/10.1002\/0471028959\n\n. Accessed 15 Apr 2018","DOI":"10.1002\/0471028959"},{"issue":"3","key":"3_CR26","doi-asserted-by":"publisher","first-page":"0","DOI":"10.1111\/j.1083-6101.2000.tb00342.x","volume":"5","author":"Jonathan W. Palmer","year":"2006","unstructured":"Palmer, J.W., Bailey, J.P., Faraj, S.: The role of intermediaries in the development of trust on the www: the use and prominence of trusted third parties and privacy statements. J. Comput.-Mediat. Commun. 5(3) (2000). \nhttps:\/\/doi.org\/10.1111\/j.1083-6101.2000.tb00342.x\n\n. Accessed 15 Apr 2018","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"2","key":"3_CR27","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1057\/dddmp.2014.58","volume":"16","author":"Merlin Stone","year":"2014","unstructured":"Stone, M.: The new (and ever-evolving) direct and digital marketing ecosystem. J. Direct, Data Digit. Mark. Pract. 16(2), 71\u201374 (2014)","journal-title":"Journal of Direct, Data and Digital Marketing Practice"},{"issue":"3","key":"3_CR28","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/s11292-016-9272-0","volume":"12","author":"J Saunders","year":"2016","unstructured":"Saunders, J., Hunt, P., Hollywood, J.S.: Predictions put into practice: a quasi-experimental evaluation of Chicago\u2019s predictive policing pilot. J. Exp. Criminol. 12(3), 347\u2013371 (2016)","journal-title":"J. Exp. Criminol."},{"issue":"4","key":"3_CR29","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1109\/MTS.2012.2225671","volume":"31","author":"M Steen","year":"2012","unstructured":"Steen, M., Van der Poel, I.: Making values explicit during the design process. IEEE Technol. Soc. Mag. 31(4), 63\u201372 (2012)","journal-title":"IEEE Technol. Soc. Mag."},{"issue":"2","key":"3_CR30","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s10676-009-9187-9","volume":"11","author":"M Turilli","year":"2009","unstructured":"Turilli, M., Floridi, L.: The ethics of information transparency. Ethics Inf. Technol. 11(2), 105\u2013112 (2009)","journal-title":"Ethics Inf. Technol."},{"issue":"4","key":"3_CR31","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1073\/pnas.1418680112","volume":"112","author":"Wu Youyou","year":"2015","unstructured":"Youyou, W., Kosinski, M., Stillwella, D.: Computer-based personality judgments are more accurate than those made by humans, PNAS (2015). \nhttps:\/\/doi.org\/10.1073\/pnas.1418680112\n\n. Accessed 15 Apr 2018","journal-title":"Proceedings of the National Academy of Sciences"},{"key":"3_CR32","doi-asserted-by":"publisher","first-page":"15","DOI":"10.4324\/9781315619309-2","volume-title":"Surveillance, Privacy and Security","author":"Tijs van den Broek","year":"2017","unstructured":"Van den Broek, T., Ooms, M., Friedewald, M., Van Lieshout, M., Rung, S.: Privacy and security \u2013 citizens\u2019 desires for an equal footing. In: Friedewald, M., Burgess, J.P., Cas, J., Bellanova, R., Preissl, W. (eds.) Surveillance, Privacy and Security, pp. 15\u201335. Routledge, Abingdon, Oxon\/New York, (2017)"},{"issue":"1","key":"3_CR33","first-page":"153","volume":"18","author":"MJ Hoven Van der","year":"2012","unstructured":"Van der Hoven, M.J., Lokhorst, G.J., Van de Poel, I.R.: Engineering and the problem of moral overload. Sci. Eng. Ethics 18(1), 153\u2013155 (2012)","journal-title":"Sci. Eng. Ethics"},{"key":"3_CR34","doi-asserted-by":"publisher","unstructured":"Van der Hoven, J., Manders-Huits, N.: Value sensitive design. In: Berg Olsen, J.K., Pedersen, S.A., Hendricks, V.F. (eds.) A Companion to the Philosophy of Technology, Wiley Online, Chapter 86, \nhttps:\/\/doi.org\/10.1002\/9781444310795.ch86\n\n. Accessed 16 Apr 2018","DOI":"10.1002\/9781444310795.ch86"},{"key":"3_CR35","unstructured":"Verheul, E., Jacobs, B.: Polymorphic encryption and pseudonymisation in identity management and medical research. NAW 5\/18(3), 168\u201372 (2017)"},{"issue":"3","key":"3_CR36","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1109\/TIFS.2014.2370255","volume":"10","author":"Thijs Veugen","year":"2015","unstructured":"Veugen, T., De Haan, R., Cramer, R., Muller, F.: A framework for secure computations with two non-colluding servers and multiple clients, applied to recommendations. IEEE Trans. Inf. Forensics Secur. 10(3), 445\u2013457 (2015)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"3_CR37","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-2543-0","volume-title":"Privacy Impact Assessment, Law, Governance & Technology Series","year":"2012","unstructured":"Wright, D., De Hert, P. (eds.): Privacy Impact Assessment, Law, Governance & Technology Series, vol. 6. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-94-007-2543-0"}],"container-title":["Lecture Notes in Computer Science","Privacy Technologies and Policy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-02547-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,29]],"date-time":"2018-12-29T14:24:09Z","timestamp":1546093449000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-02547-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030025465","9783030025472"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-02547-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"APF","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual Privacy Forum","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apf2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/privacyforum.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"49","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3.16","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3.0","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}