{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T11:49:03Z","timestamp":1751456943190,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030425036"},{"type":"electronic","value":"9783030425043"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-42504-3_18","type":"book-chapter","created":{"date-parts":[[2020,3,10]],"date-time":"2020-03-10T18:03:57Z","timestamp":1583863437000},"page":"275-291","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Making GDPR Usable: A Model to Support Usability Evaluations of Privacy"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4908-9045","authenticated-orcid":false,"given":"Johanna","family":"Johansen","sequence":"first","affiliation":[]},{"given":"Simone","family":"Fischer-H\u00fcbner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,6]]},"reference":[{"key":"18_CR1","unstructured":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC. Official Journal of the European Union L 119\/1 (2016)"},{"key":"18_CR2","unstructured":"The House of Lords EU Committee, European Union Committee\u2019s report on Online Platforms and the Digital Single Market (2016). https:\/\/publications.parliament.uk\/pa\/ld201516\/ldselect\/ldeucom\/129\/12909.htm#_idTextAnchor235"},{"key":"18_CR3","unstructured":"EuroPriSe Criteria for the certification of IT products and IT-based services - v201701. Technical report (2017). https:\/\/www.european-privacy-seal.eu\/AppFile\/GetFile\/6a29f2ca-f918-4fdf-a1a8-7ec186b2e78a"},{"key":"18_CR4","unstructured":"Ergonomics of human-system interaction - Part 11: Usability: Definitions and concepts. Standard ISO 9241\u201311:2018 (2018)"},{"key":"18_CR5","first-page":"381","volume-title":"Security and Usability: Designing Secure Systems That People Can Use","author":"MS Ackerman","year":"2005","unstructured":"Ackerman, M.S., Mainwaring, S.D.: Privacy issues and human-computer interaction. In: Cranor, L., Garfinkel, S. (eds.) Security and Usability: Designing Secure Systems That People Can Use, pp. 381\u2013399. O\u2019Reilly, Newton (2005)"},{"issue":"12","key":"18_CR6","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/322796.322806","volume":"42","author":"A Adams","year":"1999","unstructured":"Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 41\u201346 (1999)","journal-title":"Commun. ACM"},{"key":"18_CR7","series-title":"Information Technology and Law Series","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1007\/978-94-6265-228-6_6","volume-title":"Privacy and Data Protection Seals","author":"P Balboni","year":"2018","unstructured":"Balboni, P., Dragan, T.: Controversies and challenges of trustmarks: lessons for privacy and data protection seals. In: Rodrigues, R., Papakonstantinou, V. (eds.) Privacy and Data Protection Seals. ITLS, vol. 28, pp. 83\u2013111. T.M.C. Asser Press, The Hague (2018). https:\/\/doi.org\/10.1007\/978-94-6265-228-6_6"},{"issue":"194","key":"18_CR8","first-page":"4","volume":"189","author":"J Brooke","year":"1996","unstructured":"Brooke, J.: SUS - A quick and dirty usability scale. Usability Eval. Ind. 189(194), 4\u20137 (1996)","journal-title":"Usability Eval. Ind."},{"key":"18_CR9","series-title":"Information Technology and Law Series","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-94-6265-228-6_5","volume-title":"Privacy and Data Protection Seals","author":"A Cavoukian","year":"2018","unstructured":"Cavoukian, A., Chibba, M.: Privacy seals in the USA, Europe, Japan, Canada, India and Australia. In: Rodrigues, R., Papakonstantinou, V. (eds.) Privacy and Data Protection Seals. ITLS, vol. 28, pp. 59\u201382. T.M.C. Asser Press, The Hague (2018). https:\/\/doi.org\/10.1007\/978-94-6265-228-6_5"},{"key":"18_CR10","doi-asserted-by":"publisher","unstructured":"Cranor, L.F.: SIGCHI social impact award talk - making privacy and security more usable. In: CHI EA 2018. ACM (2018). https:\/\/doi.org\/10.1145\/3170427.3185061","DOI":"10.1145\/3170427.3185061"},{"key":"18_CR11","volume-title":"Security and Usability: Designing Secure Systems That People Can Use","author":"LF Cranor","year":"2005","unstructured":"Cranor, L.F., Garfinkel, S.: Security and Usability: Designing Secure Systems That People Can Use. O\u2019Reilly, Newton (2005)"},{"key":"18_CR12","unstructured":"Dumas, J.S., Redish, J.C.: A Practical Guide to Usability Testing, Revised edn. Intellect Books (1999)"},{"key":"18_CR13","unstructured":"European Union Agency for Fundamental Rights: Handbook on European Data Protection Law - 2018 Edition. Publications Office of the European Union, Luxembourg (2018)"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Good, N.S., Krekelberg, A.: Usability and privacy: a study of Kazaa P2P file-sharing. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 137\u2013144. ACM (2003)","DOI":"10.1145\/642611.642636"},{"key":"18_CR15","series-title":"Information Technology and Law Series","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-94-6265-228-6_3","volume-title":"Privacy and Data Protection Seals","author":"M Hansen","year":"2018","unstructured":"Hansen, M.: The Schleswig-Holstein data protection seal. In: Rodrigues, R., Papakonstantinou, V. (eds.) Privacy and Data Protection Seals. ITLS, vol. 28, pp. 35\u201348. T.M.C. Asser Press, The Hague (2018). https:\/\/doi.org\/10.1007\/978-94-6265-228-6_3"},{"issue":"1","key":"18_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/1100000004","volume":"1","author":"G Iachello","year":"2007","unstructured":"Iachello, G., Hong, J.: End-user privacy in human-computer interaction. Found. Trends Hum.-Comput. Interact. 1(1), 1\u2013137 (2007)","journal-title":"Found. Trends Hum.-Comput. Interact."},{"key":"18_CR17","unstructured":"Johansen, J., Fischer-H\u00fcbner, S.: Making GDPR usable: a model to support usability evaluations of privacy. Technical report, arXiv, August 2019. arxiv.org\/abs\/1908.03503"},{"key":"18_CR18","series-title":"Information Technology and Law Series","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1007\/978-94-6265-228-6_2","volume-title":"Privacy and Data Protection Seals","author":"I Kamara","year":"2018","unstructured":"Kamara, I., De Hert, P.: Data protection certification in the EU: possibilities, actors and building blocks in a reformed landscape. In: Rodrigues, R., Papakonstantinou, V. (eds.) Privacy and Data Protection Seals. ITLS, vol. 28, pp. 7\u201334. T.M.C. Asser Press, The Hague (2018). https:\/\/doi.org\/10.1007\/978-94-6265-228-6_2"},{"key":"18_CR19","unstructured":"Karat, C.M., Brodie, C., Karat, J.: Usability design and evaluation for privacy and security solutions. In: Security and Usability, pp. 47\u201374 (2005)"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Karat, C.M., Karat, J., Brodie, C.: Privacy security and trust: human-computer interaction challenges and opportunities at their intersection. In: The Human-Computer Interaction Handbook, pp. 669\u2013700 (2012)","DOI":"10.1201\/b11963-33"},{"key":"18_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-45427-6_23","volume-title":"Ubicomp 2001: Ubiquitous Computing","author":"M Langheinrich","year":"2001","unstructured":"Langheinrich, M.: Privacy by design\u2014principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol. 2201, pp. 273\u2013291. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45427-6_23"},{"key":"18_CR22","series-title":"Information Technology and Law Series","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-94-6265-228-6_1","volume-title":"Privacy and Data Protection Seals","author":"V Papakonstantinou","year":"2018","unstructured":"Papakonstantinou, V.: Introduction: privacy and data protection seals. In: Rodrigues, R., Papakonstantinou, V. (eds.) Privacy and Data Protection Seals. ITLS, vol. 28, pp. 1\u20136. T.M.C. Asser Press, The Hague (2018). https:\/\/doi.org\/10.1007\/978-94-6265-228-6_1"},{"key":"18_CR23","unstructured":"Patrick, A.S., Kenny, S., Holmes, C., van Breukelen, M.: Human computer interaction (chap. 12). In: Handbook for Privacy and Privacy-Enhancing Technologies: The case of Intelligent Software Agents, pp. 249\u2013290 (2003)"},{"key":"18_CR24","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.comnet.2014.11.008","volume":"76","author":"S Sicari","year":"2015","unstructured":"Sicari, S., Rizzardi, A., Grieco, L.A., Coen-Porisini, A.: Security, privacy and trust in Internet of Things: the road ahead. Comput. Netw. 76, 146\u2013164 (2015)","journal-title":"Comput. Netw."},{"issue":"1","key":"18_CR25","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/JIOT.2014.2312291","volume":"1","author":"JA Stankovic","year":"2014","unstructured":"Stankovic, J.A.: Research directions for the internet of things. IEEE Internet Things J. 1(1), 3\u20139 (2014)","journal-title":"IEEE Internet Things J."},{"key":"18_CR26","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/2.237456","volume":"10","author":"M Weiser","year":"1993","unstructured":"Weiser, M.: Ubiquitous computing. Computer 10, 71\u201372 (1993)","journal-title":"Computer"},{"key":"18_CR27","unstructured":"Whitten, A., Tygar, J.D.: Why Johnny can\u2019t encrypt: a usability evaluation of PGP 5.0. In: USENIX Security Symposium, vol. 348 (1999)"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management. Data for Better Living: AI and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-42504-3_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,10]],"date-time":"2024-03-10T01:22:50Z","timestamp":1710033770000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-42504-3_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030425036","9783030425043"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-42504-3_18","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"6 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Privacy and Identity","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Summer School on Privacy and Identity Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Windisch","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Switzerland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 August 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"privacy-identity2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.ifip-summerschool.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"31","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"71% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}