{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:24:16Z","timestamp":1751495056243},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030278120"},{"type":"electronic","value":"9783030278137"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-27813-7_4","type":"book-chapter","created":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T23:02:41Z","timestamp":1566169361000},"page":"46-62","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Privacy Policy Specification Framework for Addressing End-Users\u2019 Privacy Requirements"],"prefix":"10.1007","author":[{"given":"Nazila","family":"Gol Mohammadi","sequence":"first","affiliation":[]},{"given":"Jens","family":"Leicht","sequence":"additional","affiliation":[]},{"given":"Nelufar","family":"Ulfat-Bunyadi","sequence":"additional","affiliation":[]},{"given":"Maritta","family":"Heisel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,2]]},"reference":[{"key":"4_CR1","unstructured":"ISO\/IEC 29100:2011 - Information technology \u2013 Security techniques \u2013 Privacy framework (2011). http:\/\/www.iso.org\/iso\/catalogue_detail.htm?csnumber=45123"},{"key":"4_CR2","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-3-642-20769-3_22","volume-title":"Privacy and Identity Management for Life","author":"I Agrafiotis","year":"2011","unstructured":"Agrafiotis, I., Creese, S., Goldsmith, M., Papanikolaou, N.: Applying formal methods to detect and resolve ambiguities in privacy requirements. In: Fischer-H\u00fcbner, S., Duquenoy, P., Hansen, M., Leenes, R., Zhang, G. (eds.) Privacy and Identity 2010. IAICT, vol. 352, pp. 271\u2013282. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20769-3_22"},{"key":"4_CR3","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/978-3-642-20769-3_3","volume-title":"Privacy and Identity Management for Life","author":"S Berthold","year":"2011","unstructured":"Berthold, S.: Towards a formal language for privacy options. In: Fischer-H\u00fcbner, S., Duquenoy, P., Hansen, M., Leenes, R., Zhang, G. (eds.) Privacy and Identity 2010. IAICT, vol. 352, pp. 27\u201340. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20769-3_3"},{"key":"4_CR4","unstructured":"Regulation 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation). Official Journal of the European Union L119, pp. 1\u201388, May 2016. http:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=OJ:L:2016:119:TOC"},{"key":"4_CR5","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/978-3-642-20769-3_24","volume-title":"Privacy and Identity Management for Life","author":"K Fatema","year":"2011","unstructured":"Fatema, K., Chadwick, D.W., Lievens, S.: A multi-privacy policy enforcement system. In: Fischer-H\u00fcbner, S., Duquenoy, P., Hansen, M., Leenes, R., Zhang, G. (eds.) Privacy and Identity 2010. IAICT, vol. 352, pp. 297\u2013310. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20769-3_24"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Gol Mohammadi, N., Pampus, J., Heisel, M.: Resolving the conflicting needs of service providers and end-users: a pattern for incorporating end-users privacy preferences into privacy policies (2019, accepted for publication)","DOI":"10.1145\/3361149.3361154"},{"key":"4_CR7","unstructured":"Hansen, M.: Putting privacy pictograms into practice-a European perspective. Jahrestagung der Gesellschaft f\u00fcr Informatik e.V. (GI) 154, 1\u2013703 (2009)"},{"key":"4_CR8","unstructured":"Hayes, P., Patel-Schneider, P.: RDF 1.1 semantics. W3C recommendation, World Wide Web Consortium, February 2014. http:\/\/www.w3.org\/TR\/2014\/REC-rdf11-mt-20140225\/"},{"key":"4_CR9","doi-asserted-by":"publisher","unstructured":"Kelley, P.G., Bresee, J., Cranor, L.F., Reeder, R.W.: A nutrition label for privacy. In: Proceedings of the 5th Symposium on Usable Privacy and Security, SOUPS, p. 4 (2009). https:\/\/doi.org\/10.1145\/1572532.1572538","DOI":"10.1145\/1572532.1572538"},{"key":"4_CR10","doi-asserted-by":"publisher","unstructured":"Kelley, P.G., Cesca, L., Bresee, J., Cranor, L.F.: Standardizing privacy notices: an online study of the nutrition label approach. In: Proceedings of the 28th International Conference on Human Factors in Computing Systems, CHI, pp. 1573\u20131582 (2010). https:\/\/doi.org\/10.1145\/1753326.1753561","DOI":"10.1145\/1753326.1753561"},{"key":"4_CR11","unstructured":"Kolter, J.P.: User-centric Privacy: A Usable and Provider-independent Privacy Infrastructure, vol. 41. BoD-Books on Demand (2010)"},{"issue":"9","key":"4_CR12","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1109\/MC.2011.225","volume":"44","author":"S Pearson","year":"2011","unstructured":"Pearson, S., Casassa-Mont, M.: Sticky policies: an approach for managing privacy across multiple parties. IEEE Comput. 44(9), 60\u201368 (2011). https:\/\/doi.org\/10.1109\/MC.2011.225","journal-title":"IEEE Comput."},{"issue":"6","key":"4_CR13","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1007\/s11623-016-0618-6","volume":"40","author":"M Pollmann","year":"2016","unstructured":"Pollmann, M., Kipker, D.K.: Informierte Einwilligung in der Online-Welt. Datenschutz und Datensicherheit 40(6), 378\u2013381 (2016). https:\/\/doi.org\/10.1007\/s11623-016-0618-6","journal-title":"Datenschutz und Datensicherheit"},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1016\/j.cose.2017.07.005","volume":"70","author":"G Spyra","year":"2017","unstructured":"Spyra, G., Buchanan, W.J., Ekonomou, E.: Sticky policies approach within cloud computing. Comput. Secur. 70, 366\u2013375 (2017). https:\/\/doi.org\/10.1016\/j.cose.2017.07.005","journal-title":"Comput. Secur."},{"key":"4_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-05089-3_1","volume-title":"FM 2009: Formal Methods","author":"MC Tschantz","year":"2009","unstructured":"Tschantz, M.C., Wing, J.M.: Formal methods for privacy. In: Cavalcanti, A., Dams, D.R. (eds.) FM 2009. LNCS, vol. 5850, pp. 1\u201315. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-05089-3_1"},{"key":"4_CR16","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-31668-5_19","volume-title":"Privacy and Identity Management for Life","author":"H Zwingelberg","year":"2012","unstructured":"Zwingelberg, H., Hansen, M.: Privacy protection goals and their implications for eid systems. In: Camenisch, J., Crispo, B., Fischer-H\u00fcbner, S., Leenes, R., Russello, G. (eds.) Privacy and Identity 2011. IAICT, vol. 375, pp. 245\u2013260. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31668-5_19"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-27813-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,5]],"date-time":"2019-12-05T18:38:27Z","timestamp":1575571107000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-27813-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030278120","9783030278137"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-27813-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"2 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"TrustBus","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Trust and Privacy in Digital Business","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Linz","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"trustbus2019a","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.dexa.org\/trustbus2019","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Mixed (single-blind and double-blind)","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"ConfDriver","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2-3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}