{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:39:17Z","timestamp":1743115157632,"version":"3.40.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030750039"},{"type":"electronic","value":"9783030750046"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-75004-6_1","type":"book-chapter","created":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T23:09:48Z","timestamp":1621379388000},"page":"3-6","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Security, Trust and Privacy: Challenges for Community-Oriented ICT Support"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2998-742X","authenticated-orcid":false,"given":"Gerald","family":"Quirchmayr","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,19]]},"reference":[{"key":"1_CR1","unstructured":"Koch, M.: CSCW and enterprise 2.0 - towards an integrated perspective. In: BLED 2008 Proceedings, p. 15 (2008). http:\/\/aisel.aisnet.org\/bled2008\/15"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Azencott, C.-A.: Machine learning and genomics: precision medicine versus patient privacy. Phil. Trans. R. Soc. A. 376(2128) (2018). http:\/\/dx.doi.org\/10.1098\/rsta.2017.0350. 3762017035020170350","DOI":"10.1098\/rsta.2017.0350"},{"key":"1_CR3","series-title":"Computer Communications and Networks","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-1-4471-4189-1_1","volume-title":"Privacy and Security for Cloud Computing","author":"S Pearson","year":"2013","unstructured":"Pearson, S.: Privacy, security and trust in cloud computing. In: Pearson, S., Yee, G. (eds.) Privacy and Security for Cloud Computing. CCN, pp. 3\u201342. Springer, London (2013). https:\/\/doi.org\/10.1007\/978-1-4471-4189-1_1"},{"issue":"9","key":"1_CR4","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1089\/gtmb.2020.29055.sjt","volume":"24","author":"J Labs","year":"2020","unstructured":"Labs, J., Terry, S.: Privacy in the coronavirus era. Genet. Testing Mol. Biomarkers 24(9), 535\u2013536 (2020). https:\/\/doi.org\/10.1089\/gtmb.2020.29055.sjt","journal-title":"Genet. Testing Mol. Biomarkers"},{"key":"1_CR5","doi-asserted-by":"publisher","unstructured":"Dragoni, N.: A survey on trust-based web service provision approaches. In: 2010 Third International Conference on Dependability, Venice, Italy, pp. 83\u201391 (2010). https:\/\/doi.org\/10.1109\/depend.2010.21","DOI":"10.1109\/depend.2010.21"},{"volume-title":"Handbook of the Secure Agile Software Development Life Cycle","year":"2014","key":"1_CR6","unstructured":"Pietik\u00e4inen, P., R\u00f6ning, J. (eds.): Handbook of the Secure Agile Software Development Life Cycle. University of Oulu, Finland (2014). ISBN number: 978-952-62-0341-6, Juvenes Print Oulu"},{"key":"1_CR7","unstructured":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (General Data Protection Regulation) (Text with EEA relevance), pp. 1\u201388. OJ L 119 (2016)"},{"key":"1_CR8","unstructured":"CNIL Privacy Impact Assessment (PIA) Guides and Tools. https:\/\/www.cnil.fr\/en\/PIA-privacy-impact-assessment-en. Accessed 14 March 2021"},{"key":"1_CR9","unstructured":"Guide to undertaking privacy impact assessments. https:\/\/www.oaic.gov.au\/privacy\/guidance-and-advice\/guide-to-undertaking-privacy-impact-assessments\/. Accessed 14 March 2021"}],"container-title":["Communications in Computer and Information Science","Innovations for Community Services"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-75004-6_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T23:09:59Z","timestamp":1621379399000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-75004-6_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030750039","9783030750046"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-75004-6_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"19 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"I4CS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovations for Community Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bamberg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 May 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 May 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"i4cs2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.i4cs-conference.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.56","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5.88","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1 short invited paper is also included.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}