{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T18:44:13Z","timestamp":1746297853931,"version":"3.37.3"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030353322"},{"type":"electronic","value":"9783030353339"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-35333-9_30","type":"book-chapter","created":{"date-parts":[[2019,11,17]],"date-time":"2019-11-17T19:01:29Z","timestamp":1574017289000},"page":"417-432","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Integrating Data Protection into the Software Life Cycle"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3225-5895","authenticated-orcid":false,"given":"Ralf","family":"Kneuper","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,18]]},"reference":[{"key":"30_CR1","unstructured":"Cavoukian, A.: Privacy by design. The 7 foundational principles. Technical report, Information and Privacy Commissioner of Ontario (2011). \nhttps:\/\/www.ipc.on.ca\/wp-content\/uploads\/Resources\/7foundationalprinciples.pdf"},{"issue":"2","key":"30_CR2","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s12394-010-0053-z","volume":"3","author":"A Cavoukian","year":"2010","unstructured":"Cavoukian, A., Taylor, S., Abrams, M.E.: Privacy by design: essential for organizational accountability and strong business practices. Ident. Inf. Soc. 3(2), 405\u2013413 (2010). \nhttps:\/\/doi.org\/10.1007\/s12394-010-0053-z","journal-title":"Ident. Inf. Soc."},{"key":"30_CR3","doi-asserted-by":"publisher","unstructured":"Danezis, G., et al.: Privacy and data protection by design\u2013from policy to engineering. Technical report, ENISA, December 2014. \nhttps:\/\/doi.org\/10.2824\/38623","DOI":"10.2824\/38623"},{"key":"30_CR4","unstructured":"Datatilsynet: Software development with data protection by design and by default (2017). \nhttps:\/\/www.datatilsynet.no\/en\/about-privacy\/virksomhetenes-plikter\/innebygd-personvern\/data-protection-by-design-and-by-default\/"},{"key":"30_CR5","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-319-41763-9_9","volume-title":"Privacy and Identity Management. Time for a Revolution?","author":"O Drozd","year":"2016","unstructured":"Drozd, O.: Privacy pattern catalogue: a tool for integrating privacy principles of ISO\/IEC 29100 into the software development process. In: Aspinall, D., Camenisch, J., Hansen, M., Fischer-H\u00fcbner, S., Raab, C. (eds.) Privacy and Identity 2015. IAICT, vol. 476, pp. 129\u2013140. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-41763-9_9"},{"key":"30_CR6","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-79228-4_1","volume-title":"TAMC 2008","author":"C Dwork","year":"2008","unstructured":"Dwork, C.: Differential privacy: a survey of results. In: Agrawal, M., Du, D., Duan, Z., Li, A. (eds.) TAMC 2008. LNCS, vol. 4978, pp. 1\u201319. Springer, Heidelberg (2008). \nhttps:\/\/doi.org\/10.1007\/978-3-540-79228-4_1"},{"key":"30_CR7","unstructured":"Englehardt, S., Acar, G., Narayanan, A.: Website operators are in the dark about privacy violations by third-party scripts, January 2018. \nhttps:\/\/freedom-to-tinker.com\/2018\/01\/12\/website-operators-are-in-the-dark-about-privacy-violations-by-third-party-scripts\/"},{"key":"30_CR8","unstructured":"Interactive Advertising Bureau (IAB Europe): IAB Europe and IAB Tech Lab release cross-industry Transparency & Consent Framework for adoption, April 2018. \nhttps:\/\/www.iabeurope.eu\/all-news\/press-releases\/iab-europe-and-iab-tech-lab-release-cross-industry-transparency-consent-framework-for-adoption\/"},{"key":"30_CR9","unstructured":"K\u00fchlung, J., Buchner, B. (eds.): Datenschutz-Grundverordnung\/BDSG. Kommentar. C.H. Beck, 2. edn. (2018)"},{"key":"30_CR10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-98845-0_3","volume-title":"Software Processes and Life Cycle Models. An Introduction to Modelling, Using and Managing Agile, Plan-Driven and Hybrid Processes","author":"R Kneuper","year":"2018","unstructured":"Kneuper, R.: Software Processes and Life Cycle Models. An Introduction to Modelling, Using and Managing Agile, Plan-Driven and Hybrid Processes. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-98845-0_3"},{"key":"30_CR11","unstructured":"Lindsey, N.: Popular Android apps are sharing personal data with Facebook without user consent, January 2019. \nhttps:\/\/www.cpomagazine.com\/data-privacy\/popular-android-apps-are-sharing-personal-data-with-facebook-without-user-consent\/"},{"key":"30_CR12","unstructured":"Office for Civil Rights (OCR): Guidance Regarding Methods for De-Identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule (2012). \nhttps:\/\/www.hhs.gov\/hipaa\/for-professionals\/privacy\/special-topics\/de-identification\/index.html"},{"key":"30_CR13","unstructured":"Reid, G.: How to navigate the software development life cycle under the GDPR (2017). \nhttps:\/\/iapp.org\/news\/a\/how-to-navigate-the-software-development-life-cycle-under-the-gdpr\/\n\n. International Association of Privacy Professionals (IAPP)"},{"key":"30_CR14","unstructured":"Santala, A.: What should software engineers know about GDPR? (2017). \nhttps:\/\/www.infoq.com\/articles\/gdpr-for-software-devs\/"},{"issue":"2","key":"30_CR15","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1007\/s11623-019-1071-0","volume":"43","author":"K Simon","year":"2019","unstructured":"Simon, K., Moucha, C.: Sicherheit und Datenschutz im Lebenszyklus von Informationssystemen. DuD Datenschutz und Datensicherheit 43(2), 97\u2013101 (2019)","journal-title":"DuD Datenschutz und Datensicherheit"},{"issue":"5","key":"30_CR16","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: $$k$$-Anonymity: a model for protecting privacy. Int. J. Uncertain. Fuzzyness Knowl.-Based Syst. 10(5), 557\u2013570 (2002)","journal-title":"Int. J. Uncertain. Fuzzyness Knowl.-Based Syst."}],"container-title":["Lecture Notes in Computer Science","Product-Focused Software Process Improvement"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-35333-9_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,17]],"date-time":"2019-11-17T19:17:59Z","timestamp":1574018279000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-35333-9_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030353322","9783030353339"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-35333-9_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"18 November 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PROFES","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Product-Focused Software Process Improvement","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"profes2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/profes2019.upc.edu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"65","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"11","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The 11 short papers were selected from 30 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}