{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:58:50Z","timestamp":1743094730114,"version":"3.40.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030293734"},{"type":"electronic","value":"9783030293741"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-29374-1_39","type":"book-chapter","created":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T23:03:18Z","timestamp":1567983798000},"page":"476-488","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Aspects of Personal Data Protection from State and Citizen Perspectives \u2013 Case of Georgia"],"prefix":"10.1007","author":[{"given":"Mariam","family":"Tsulukidze","sequence":"first","affiliation":[]},{"given":"Kartin","family":"Nyman-Metcalf","sequence":"additional","affiliation":[]},{"given":"Valentyna","family":"Tsap","sequence":"additional","affiliation":[]},{"given":"Ingrid","family":"Pappel","sequence":"additional","affiliation":[]},{"given":"Dirk","family":"Draheim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,8,14]]},"reference":[{"key":"39_CR1","unstructured":"Allen, A.L.: Uneasy Access: Privacy for Women in a Free Society, pp. 1\u201325. Rowman & Littlefield, Lanham (1988)"},{"key":"39_CR2","unstructured":"Association agreement between the European Union and the European Atomic Energy Community and their Member States of the one part and Georgia, on the other part. Opened for signature 27 June 2014, [entered into force 1 July 2016]. OJ L 261\/4. https:\/\/eur-lex.europa.eu\/legal-content\/en\/TXT\/PDF\/?uri=CELEX:22014A0830(02). Accessed 11 June 2019"},{"issue":"2","key":"39_CR3","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.jsis.2007.12.002","volume":"17","author":"F B\u00e9langer","year":"2008","unstructured":"B\u00e9langer, F., Carter, L.: Trust and risk in e-government adoption. J. Strateg. Inf. Syst. 17(2), 165\u2013176 (2008)","journal-title":"J. Strateg. Inf. Syst."},{"issue":"6","key":"39_CR4","doi-asserted-by":"publisher","first-page":"2233","DOI":"10.1016\/j.chb.2011.07.002","volume":"27","author":"A Beldad","year":"2011","unstructured":"Beldad, A., De Jong, M., Steehouder, M.: I trust not therefore it must be risky: determinants of the perceived risks of disclosing personal data for e-government transactions. Comput. Hum. Behav. 27(6), 2233\u20132242 (2011)","journal-title":"Comput. Hum. Behav."},{"issue":"1","key":"39_CR5","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/j.giq.2011.05.003","volume":"29","author":"A Beldad","year":"2012","unstructured":"Beldad, A., van der Geest, T., de Jong, M., Steehouder, M.: A cue or two and I\u2019ll trust you: determinants of trust in government organizations in terms of their processing and usage of citizens\u2019 personal information disclosed online. Gov. Inf. Quart. 29(1), 41\u201349 (2012)","journal-title":"Gov. Inf. Quart."},{"issue":"3","key":"39_CR6","doi-asserted-by":"publisher","first-page":"421","DOI":"10.2307\/795891","volume":"89","author":"R Gavison","year":"1980","unstructured":"Gavison, R.: Privacy and the limits of law. Yale Law J. 89(3), 421\u2013471 (1980)","journal-title":"Yale Law J."},{"key":"39_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-030-02131-3_15","volume-title":"Challenges and Opportunities in the Digital Era. I3E 2018","author":"M J\u00e4rvsoo","year":"2018","unstructured":"J\u00e4rvsoo, M., Norta, A., Tsap, V., Pappel, I., Draheim, D.: Implementation of information security in the EU information systems. In: Al-Sharhan, S., et al. (eds.) Challenges and Opportunities in the Digital Era. I3E 2018. Lecture Notes in Computer Science, vol. 11195, pp. 150\u2013163. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-02131-3_15"},{"issue":"1","key":"39_CR8","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1177\/0020852305051690","volume":"71","author":"W Jho","year":"2005","unstructured":"Jho, W.: Challenges for e-governance: protests from civil society on the protection of privacy in e-government in Korea. Int. Rev. Adm. Sci. 71(1), 151\u2013166 (2005)","journal-title":"Int. Rev. Adm. Sci."},{"key":"39_CR9","first-page":"69","volume":"39","author":"JH Moor","year":"1991","unstructured":"Moor, J.H.: The ethics of privacy protection. Libr. Trends 39, 69\u201382 (1991)","journal-title":"Libr. Trends"},{"issue":"3","key":"39_CR10","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1145\/270858.270866","volume":"27","author":"JH Moor","year":"1997","unstructured":"Moor, J.H.: Towards a theory of privacy in the information age. ACM SIGCAS Comput. Soc. 27(3), 27\u201332 (1997)","journal-title":"ACM SIGCAS Comput. Soc."},{"issue":"2","key":"39_CR11","first-page":"553","volume":"3","author":"J Reidenberg","year":"1997","unstructured":"Reidenberg, J.: The use of technology to assure internet privacy: adapting labels and filters for data protection. Tex. Law Rev. 3(2), 553 (1997)","journal-title":"Tex. Law Rev."},{"key":"39_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1007\/978-3-319-70004-5_33","volume-title":"Future Data and Security Engineering","author":"V Tsap","year":"2017","unstructured":"Tsap, V., Pappel, I., Draheim, D.: Key success factors in introducing national e-identification systems. In: Dang, T.K., Wagner, R., K\u00fcng, J., Thoai, N., Takizawa, M., Neuhold, E.J. (eds.) FDSE 2017. LNCS, vol. 10646, pp. 455\u2013471. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70004-5_33"},{"key":"39_CR13","doi-asserted-by":"crossref","unstructured":"Sue, V.M., Ritter, L.A.: Conducting Online Surveys, pp. 33\u201335. Sage Publications, Thousand Oaks (2012)","DOI":"10.4135\/9781506335186"},{"key":"39_CR14","unstructured":"United Nations, General Assembly: Resolution A\/RES\/69\/166 on the Right to Privacy in the Digital Age (2014). https:\/\/undocs.org\/pdf?symbol=en\/A\/RES\/69\/166. Accessed 11 June 2019"},{"issue":"1","key":"39_CR15","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.giq.2013.07.003","volume":"31","author":"Y Wu","year":"2014","unstructured":"Wu, Y.: Protecting personal data in e-government: a cross-country study. Gov. Inf. Quart. 31(1), 150\u2013159 (2014)","journal-title":"Gov. Inf. Quart."},{"key":"39_CR16"}],"container-title":["Lecture Notes in Computer Science","Digital Transformation for a Sustainable Society in the 21st Century"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-29374-1_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T17:37:09Z","timestamp":1710351429000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-29374-1_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030293734","9783030293741"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-29374-1_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"14 August 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"I3E","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Conference on e-Business, e-Services and e-Society","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Trondheim","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 September 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"i3e2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.i3e2019.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"138","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"61","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"I3E 2019 workshops (DTIS, TPSIE, 3(IT), and CROPS): 11 full papers and 4 short papers were carefully reviewed and selected from 33 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}