{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,22]],"date-time":"2026-01-22T03:11:39Z","timestamp":1769051499402,"version":"3.49.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030551957","type":"print"},{"value":"9783030551964","type":"electronic"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-55196-4_8","type":"book-chapter","created":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T23:11:38Z","timestamp":1602717098000},"page":"127-142","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Italian National Framework for\u00a0Cybersecurity and Data Protection"],"prefix":"10.1007","author":[{"given":"Marco","family":"Angelini","sequence":"first","affiliation":[]},{"given":"Claudio","family":"Ciccotelli","sequence":"additional","affiliation":[]},{"given":"Luisa","family":"Franchina","sequence":"additional","affiliation":[]},{"given":"Alberto","family":"Marchetti-Spaccamela","sequence":"additional","affiliation":[]},{"given":"Leonardo","family":"Querzoni","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,15]]},"reference":[{"key":"8_CR1","unstructured":"Accenture and Ponemon Institute: Cost of cybercrime study (2017). \nhttps:\/\/www.accenture.com\/us-en\/insight-cost-of-cybercrime-2017?src=SOMS"},{"key":"8_CR2","doi-asserted-by":"publisher","unstructured":"Angelini, M., Lenti, S., Santucci, G.: Crumbs: a cyber security framework browser. In: 2017 IEEE Symposium on Visualization for Cyber Security (VizSec), pp. 1\u20138, October 2017. \nhttps:\/\/doi.org\/10.1109\/VIZSEC.2017.8062194","DOI":"10.1109\/VIZSEC.2017.8062194"},{"key":"8_CR3","unstructured":"Center for Internet Security: Critical Security Controls for Effective Cyber Defense (CIS Controls). \nhttps:\/\/www.cisecurity.org\/"},{"key":"8_CR4","unstructured":"CIS Sapienza: 2015 Italian Cyber Security Report: Un Framework Nazionale per la Cybersecurity, February 2016. \nhttps:\/\/www.cybersecurityframework.it"},{"key":"8_CR5","unstructured":"CIS Sapienza: Framework Nazionale per la Cybersecurity e la Data Protection, February 2019. \nhttps:\/\/www.cybersecurityframework.it"},{"key":"8_CR6","unstructured":"CIS Sapienza: Tool for the implementation of Italian Cybersecurity Framework (2020). \nhttp:\/\/tool.cybersecurityframework.it"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Lachaud, E.: ISO\/IEC 27701: Threats and opportunities for GDPR certification (2020). \nhttps:\/\/research.tilburguniversity.edu\/en\/publications\/isoiec-27701-threats-and-opportunities-for-gdpr-certification","DOI":"10.2139\/ssrn.3521250"},{"key":"8_CR8","unstructured":"ENISA: Guidance and gaps analysis for European standardisation (2019). \nhttps:\/\/www.enisa.europa.eu\/publications\/guidance-and-gaps-analysis-for-european-standardisation"},{"key":"8_CR9","unstructured":"ENISA: Inventory of risk management\/risk assessment tools (2020). \nhttps:\/\/www.enisa.europa.eu\/topics\/threat-risk-management\/risk-management\/current-risk\/risk-management-inventory\/rm-ra-tools"},{"key":"8_CR10","unstructured":"European Union: Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation), May 2016. \nhttp:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=OJ:L:2016:119:TOC"},{"key":"8_CR11","unstructured":"HITRUST Alliance: HITRUST CSF. \nhttps:\/\/hitrustalliance.net\/hitrust-csf\/"},{"key":"8_CR12","unstructured":"ISACA: Cobit 5. ISA (2012)"},{"key":"8_CR13","unstructured":"ISO\/IEC 27000:2018: Information technology - Security techniques - Information security management systems - Overview and vocabulary, February 2018"},{"key":"8_CR14","unstructured":"NIST: Risk management framework overview. \nhttp:\/\/csrc.nist.gov\/projects\/risk-management\/risk-management-framework-(RMF)-Overview"},{"key":"8_CR15","unstructured":"NIST: SP 800\u201353 Rev. 4 - Security and Privacy Controls for Federal Information Systems and Organizations, April 2013"},{"key":"8_CR16","unstructured":"NIST: An Introduction to Privacy Engineering and Risk Management in Federal Systems (NIST Interagency Report 8062), January 2017. \nhttps:\/\/csrc.nist.gov\/publications\/detail\/nistir\/8062\/final"},{"key":"8_CR17","unstructured":"NIST: Framework for improving critical infrastructure cybersecurity (version 1.1), April 2018. \nhttps:\/\/www.nist.gov\/cyberframework\/framework"},{"key":"8_CR18","unstructured":"NIST: NIST Privacy Framework, January 2020. \nhttps:\/\/www.nist.gov\/privacy-framework"},{"key":"8_CR19","unstructured":"Zaras, D.: Information Security Frameworks and Controls Catalogue (Impact Makers Report) (2018)"}],"container-title":["Lecture Notes in Computer Science","Privacy Technologies and Policy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-55196-4_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T23:28:31Z","timestamp":1602718111000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-55196-4_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030551957","9783030551964"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-55196-4_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"15 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APF","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual Privacy Forum","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lisbon","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 June 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 June 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apf2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/privacyforum.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"59","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"https:\/\/privacyforum.eu\/","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}