{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,28]],"date-time":"2025-12-28T01:06:22Z","timestamp":1766883982893,"version":"3.48.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030661717"},{"type":"electronic","value":"9783030661724"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-66172-4_10","type":"book-chapter","created":{"date-parts":[[2020,12,28]],"date-time":"2020-12-28T14:02:53Z","timestamp":1609164173000},"page":"161-177","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["PDP-ReqLite: A Lightweight Approach for the Elicitation of Privacy and Data Protection Requirements"],"prefix":"10.1007","author":[{"given":"Nicol\u00e1s E. D\u00edaz","family":"Ferreyra","sequence":"first","affiliation":[]},{"given":"Patrick","family":"Tessier","sequence":"additional","affiliation":[]},{"given":"Gabriel","family":"Pedroza","sequence":"additional","affiliation":[]},{"given":"Maritta","family":"Heisel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,12,29]]},"reference":[{"key":"10_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-54069-1_1","volume-title":"Privacy Technologies and Policy","author":"K Beckers","year":"2014","unstructured":"Beckers, K., Fa\u00dfbender, S., Heisel, M., Meis, R.: A problem-based approach for computer-aided privacy threat identification. In: Preneel, B., Ikonomou, D. (eds.) APF 2012. LNCS, vol. 8319, pp. 1\u201316. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-54069-1_1"},{"unstructured":"CEA-LIST: The Eclipse Papyrus project. https:\/\/www.eclipse.org\/papyrus\/ (2020)","key":"10_CR2"},{"doi-asserted-by":"crossref","unstructured":"Colesky, M., Hoepman, J.H., Hillen, C.: A critical analysis of privacy design strategies. In: 2016 IEEE Security and Privacy Workshops (SPW), pp. 33\u201340. IEEE (2016)","key":"10_CR3","DOI":"10.1109\/SPW.2016.23"},{"issue":"1","key":"10_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00766-010-0115-7","volume":"16","author":"M Deng","year":"2011","unstructured":"Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requirements Eng. 16(1), 3\u201332 (2011). https:\/\/doi.org\/10.1007\/s00766-010-0115-7","journal-title":"Requirements Eng."},{"key":"10_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6356-2","volume-title":"The Privacy Engineer\u2019s Manifesto: Getting from Policy to Code to QA to Value","author":"M Dennedy","year":"2014","unstructured":"Dennedy, M., Fox, J., Finneran, T.: The Privacy Engineer\u2019s Manifesto: Getting from Policy to Code to QA to Value. Apress, New York (2014)"},{"doi-asserted-by":"crossref","unstructured":"Hansen, M., Jensen, M., Rost, M.: Protection goals for privacy engineering. In: 2015 IEEE Security and Privacy Workshops, pp. 159\u2013166. IEEE (2015)","key":"10_CR6","DOI":"10.1109\/SPW.2015.13"},{"key":"10_CR7","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1007\/978-3-642-55415-5_38","volume-title":"ICT Systems Security and Privacy Protection","author":"J-H Hoepman","year":"2014","unstructured":"Hoepman, J.-H.: Privacy design strategies. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IAICT, vol. 428, pp. 446\u2013459. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55415-5_38"},{"unstructured":"Howard, M., Lipner, S.: The security development lifecycle, vol. 8. Microsoft Press. Google Scholar Google Scholar Digital Library Digital Library, Redmond (2006)","key":"10_CR8"},{"unstructured":"Information Technology-Security Techniques-Privacy Framework. Standard ISO\/IEC 29100:2011, International Organization for Standardization, Geneva, CH, December 2011. https:\/\/www.iso.org\/standard\/45123.html","key":"10_CR9"},{"key":"10_CR10","volume-title":"Problem Frames: Analysing and Structuring Software Development Problems","author":"M Jackson","year":"2001","unstructured":"Jackson, M.: Problem Frames: Analysing and Structuring Software Development Problems. Addison-Wesley, New York (2001)"},{"doi-asserted-by":"crossref","unstructured":"Laakkonen, J., Annala, S., J\u00e4ppinen, P.: Abstracted architecture for smart grid privacy analysis. In: 2013 International Conference on Social Computing, pp. 637\u2013646 (2013)","key":"10_CR11","DOI":"10.1109\/SocialCom.2013.96"},{"doi-asserted-by":"publisher","unstructured":"Meis, R.: Problem-Based Privacy Analysis (ProPAn): A Computer-aided Privacy Requirements Engineering Method. Ph.D. thesis, DuEPublico: Duisburg-Essen Publications [online], University of Duisburg-Essen, Germany, October 2018. https:\/\/doi.org\/10.17185\/duepublico\/47797","key":"10_CR12","DOI":"10.17185\/duepublico\/47797"},{"issue":"2","key":"10_CR13","doi-asserted-by":"publisher","first-page":"28","DOI":"10.3390\/info7020028","volume":"7","author":"R Meis","year":"2016","unstructured":"Meis, R., Heisel, M.: Computer-aided identification and validation of privacy requirements. Information 7(2), 28 (2016)","journal-title":"Information"},{"doi-asserted-by":"crossref","unstructured":"Notario, N., et al.: Pripare: integrating privacy best practices into a privacy engineering methodology. In: 2015 IEEE Security and Privacy Workshops, pp. 151\u2013158. IEEE (2015)","key":"10_CR14","DOI":"10.1109\/SPW.2015.22"},{"unstructured":"PDP4E: The PDP4E Project. https:\/\/www.pdp4e-project.eu\/ (2020)","key":"10_CR15"},{"unstructured":"Pfitzmann, A., Hansen, M.: A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management, August 2010. http:\/\/dud.inf.tu-dresden.de\/literatur\/Anon_Terminology_v0.34.pdf, v0.34","key":"10_CR16"},{"issue":"1\u201388","key":"10_CR17","first-page":"294","volume":"59","author":"GDP Regulation","year":"2016","unstructured":"Regulation, G.D.P.: Regulation (Eu) 2016\/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95\/46. Official J. Eur. Union (OJ) 59(1\u201388), 294 (2016)","journal-title":"Official J. Eur. Union (OJ)"},{"unstructured":"Ryan, M., Wheatcraft, L., Zinni, R., Dick, J., Baksa, K.: Guide for writing requirements. INCOSE, California, USA (2017)","key":"10_CR18"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-66172-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,28]],"date-time":"2025-12-28T01:01:38Z","timestamp":1766883698000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-66172-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030661717","9783030661724"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-66172-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"29 December 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DPM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Data Privacy Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guildford","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dpm2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/deic-web.uab.cat\/conferences\/dpm\/dpm2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}