{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T06:27:01Z","timestamp":1749191221955,"version":"3.40.3"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030766627"},{"type":"electronic","value":"9783030766634"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-76663-4_2","type":"book-chapter","created":{"date-parts":[[2021,5,18]],"date-time":"2021-05-18T08:03:46Z","timestamp":1621325026000},"page":"23-46","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["A Case Study on the Implementation of the Right of Access in Privacy Dashboards"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1961-100X","authenticated-orcid":false,"given":"Jan","family":"Tolsdorf","sequence":"first","affiliation":[]},{"given":"Michael","family":"Fischer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7863-0622","authenticated-orcid":false,"given":"Luigi","family":"Lo Iacono","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,5,19]]},"reference":[{"issue":"1","key":"2_CR1","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1109\/MSP.2005.22","volume":"3","author":"A Acquisti","year":"2005","unstructured":"Acquisti, A., Grossklags, J.: Privacy and rationality in individual decision making. IEEE Secur. Priv. 3(1), 26\u201333 (2005). https:\/\/doi.org\/10.1109\/MSP.2005.22","journal-title":"IEEE Secur. Priv."},{"key":"2_CR2","doi-asserted-by":"publisher","unstructured":"Alizadeh, F., Jakobi, T., Boden, A., Stevens, G., Boldt, J.: GDPR reality check - claiming and investigating personally identifiable data from companies. In: 2020 IEEE European Symposium on Security and Privacy Workshops (EuroSPW), pp. 120\u2013129. IEEE (2020). https:\/\/doi.org\/10.1109\/EuroSPW51379.2020.00025","DOI":"10.1109\/EuroSPW51379.2020.00025"},{"key":"2_CR3","doi-asserted-by":"publisher","unstructured":"Angulo, J., Fischer-H\u00fcbner, S., Pulls, T., W\u00e4stlund, E.: Usable transparency with the data track: a tool for visualizing data disclosures. In: Proceedings of the 33rd Annual ACM Conference Extended Abstracts on Human Factors in Computing Systems, pp. 1803\u20131808. Association for Computing Machinery (2015). https:\/\/doi.org\/10.1145\/2702613.2732701","DOI":"10.1145\/2702613.2732701"},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"681","DOI":"10.1007\/978-3-030-29959-0_33","volume-title":"Computer Security \u2013 ESORICS 2019","author":"E Arfelt","year":"2019","unstructured":"Arfelt, E., Basin, D., Debois, S.: Monitoring the GDPR. In: Sako, K., Schneider, S., Ryan, P.Y.A. (eds.) ESORICS 2019. LNCS, vol. 11735, pp. 681\u2013699. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29959-0_33"},{"key":"2_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-44760-5_9","volume-title":"Privacy Technologies and Policy","author":"C Bier","year":"2016","unstructured":"Bier, C., K\u00fchne, K., Beyerer, J.: PrivacyInsight: the next generation privacy dashboard. In: Schiffner, S., Serna, J., Ikonomou, D., Rannenberg, K. (eds.) APF 2016. LNCS, vol. 9857, pp. 135\u2013152. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-44760-5_9"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-030-21752-5_12","volume-title":"Privacy Technologies and Policy","author":"C Boniface","year":"2019","unstructured":"Boniface, C., Fouad, I., Bielova, N., Lauradoux, C., Santos, C.: Security analysis of subject access request procedures. In: Naldi, M., Italiano, G.F., Rannenberg, K., Medina, M., Bourka, A. (eds.) APF 2019. LNCS, vol. 11498, pp. 182\u2013209. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-21752-5_12"},{"key":"2_CR7","unstructured":"Buchmann, J., Nebel, M., Ro\u00dfnagel, A., Shirazi, F., Simo, H., Waidner, M.: Personal information dashboard: putting the individual back in control. In: Digital Enlightenment Yearbook 2013, pp. 139\u2013164. IOS Press (2013)"},{"key":"2_CR8","doi-asserted-by":"publisher","unstructured":"Bufalieri, L., Morgia, M.L., Mei, A., Stefa, J.: GDPR: when the right to access personal data becomes a threat. In: 2020 IEEE International Conference on Web Services (ICWS), pp. 75\u201383 (2020). https:\/\/doi.org\/10.1109\/ICWS49710.2020.00017","DOI":"10.1109\/ICWS49710.2020.00017"},{"key":"2_CR9","unstructured":"Cabinakova, J., Zimmermann, C., Mueller, G.: An empirical analysis of privacy dashboard acceptance: the google case. In: Proceeding of the 24th European Conference on Information Systems (ECIS). Research Papers, vol. 114, pp. 1\u201318. AIS Electronic Library (AISeL) (2016)"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/978-3-030-29962-0_18","volume-title":"Computer Security \u2013 ESORICS 2019","author":"M Cagnazzo","year":"2019","unstructured":"Cagnazzo, M., Holz, T., Pohlmann, N.: GDPiRated \u2013 stealing personal information on- and offline. In: Sako, K., Schneider, S., Ryan, P.Y.A. (eds.) ESORICS 2019. LNCS, vol. 11736, pp. 367\u2013386. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29962-0_18"},{"key":"2_CR11","unstructured":"European Parliament and Council of European Union: Regulation (EU) 2016\/679 (2016). https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/HTML\/?uri=CELEX:32016R0679&from=EN"},{"key":"2_CR12","unstructured":"Few, S.: Information Dashboard Design: The Effective Visual Communication of Data. O\u2019Reilly Media, Inc. (2006)"},{"key":"2_CR13","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-3-642-55137-6_6","volume-title":"Privacy and Identity Management for Emerging Services and Technologies","author":"S Fischer-H\u00fcbner","year":"2014","unstructured":"Fischer-H\u00fcbner, S., Angulo, J., Pulls, T.: How can cloud users be supported in deciding on, tracking and controlling how their data are used? In: Hansen, M., Hoepman, J.-H., Leenes, R., Whitehouse, D. (eds.) Privacy and Identity 2013. IAICT, vol. 421, pp. 77\u201392. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-642-55137-6_6"},{"key":"2_CR14","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1016\/j.cose.2018.04.002","volume":"77","author":"N Gerber","year":"2018","unstructured":"Gerber, N., Gerber, P., Volkamer, M.: Explaining the privacy paradox: a systematic review of literature investigating privacy attitude and behavior. Comput. Secur. 77, 226\u2013261 (2018). https:\/\/doi.org\/10.1016\/j.cose.2018.04.002","journal-title":"Comput. Secur."},{"key":"2_CR15","unstructured":"Gluck, J., et al.: How short is too short? Implications of length and framing on the effectiveness of privacy notices. In: 12th Symposium on Usable Privacy and Security (SOUPS), pp. 321\u2013340. USENIX Association (2016)"},{"issue":"3","key":"2_CR16","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1609\/aimag.v38i3.2741","volume":"38","author":"B Goodman","year":"2017","unstructured":"Goodman, B., Flaxman, S.: European union regulations on algorithmic decision-making and a \u201cRight to Explanation\u201d. AI Mag. 38(3), 50\u201357 (2017). https:\/\/doi.org\/10.1609\/aimag.v38i3.2741","journal-title":"AI Mag."},{"key":"2_CR17","unstructured":"Harkous, H., Fawaz, K., Lebret, R., Schaub, F., Shin, K.G., Aberer, K.: Polisis: automated analysis and presentation of privacy policies using deep learning. In: 27th USENIX Security Symposium (USENIX Security), pp. 531\u2013548. USENIX Association (2018)"},{"key":"2_CR18","doi-asserted-by":"publisher","unstructured":"Herder, E., van Maaren, O.: Privacy dashboards: the impact of the type of personal data and user control on trust and perceived risk. In: Adjunct Publication of the 28th ACM Conference on User Modeling, Adaptation and Personalization (UMAP), pp. 169\u2013174. Association for Computing Machinery (2020). https:\/\/doi.org\/10.1145\/3386392.3399557","DOI":"10.1145\/3386392.3399557"},{"key":"2_CR19","unstructured":"Kang, R., Dabbish, L., Fruchter, N., Kiesler, S.: \u201cMy data just goes everywhere:\u201d user mental models of the internet and implications for privacy and security. In: 11th Symposium On Usable Privacy and Security (SOUPS), pp. 39\u201352. USENIX Association (2015)"},{"key":"2_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/978-3-642-29615-4_10","volume-title":"Information Security Technology for Applications","author":"E Kani-Zabihi","year":"2012","unstructured":"Kani-Zabihi, E., Helmhout, M.: Increasing service users\u2019 privacy awareness by introducing on-line interactive privacy features. In: Laud, P. (ed.) NordSec 2011. LNCS, vol. 7161, pp. 131\u2013148. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29615-4_10"},{"key":"2_CR21","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-319-55783-0_12","volume-title":"Privacy and Identity Management. Facing up to Next Steps","author":"F Karegar","year":"2016","unstructured":"Karegar, F., Pulls, T., Fischer-H\u00fcbner, S.: Visualizing exports of personal data by exercising the right of data portability in the data track - are people ready for this? In: Lehmann, A., Whitehouse, D., Fischer-H\u00fcbner, S., Fritsch, L., Raab, C. (eds.) Privacy and Identity 2016. IAICT, vol. 498, pp. 164\u2013181. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-55783-0_12"},{"key":"2_CR22","doi-asserted-by":"publisher","unstructured":"Kolter, J., Netter, M., Pernul, G.: Visualizing past personal data disclosures. In: 2010 International Conference on Availability, Reliability and Security (ARES), pp. 131\u2013139. IEEE (2010). https:\/\/doi.org\/10.1109\/ARES.2010.51","DOI":"10.1109\/ARES.2010.51"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Le Pochat, V., Van Goethem, T., Tajalizadehkhoob, S., Korczy\u0144ski, M., Joosen, W.: Tranco: a research-oriented top sites ranking hardened against manipulation. In: Proceedings of the 26th Annual Network and Distributed System Security Symposium (NDSS). The Internet Society (2019)","DOI":"10.14722\/ndss.2019.23386"},{"key":"2_CR24","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-030-39634-3_8","volume-title":"Digital Transformation for a Sustainable Society in the 21st Century","author":"F Mannhardt","year":"2020","unstructured":"Mannhardt, F., Oliveira, M., Petersen, S.A.: Designing a privacy dashboard for a smart manufacturing environment. In: Pappas, I.O., Mikalef, P., Dwivedi, Y.K., Jaccheri, L., Krogstie, J., M\u00e4ntym\u00e4ki, M. (eds.) I3E 2019. IAICT, vol. 573, pp. 79\u201385. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-39634-3_8"},{"issue":"1","key":"2_CR25","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1509\/jppm.15.159","volume":"36","author":"E Markos","year":"2017","unstructured":"Markos, E., Milne, G.R., Peltier, J.W.: Information sensitivity and willingness to provide continua: a comparative privacy study of the United States and Brazil. J. Public Policy Market. 36(1), 79\u201396 (2017). https:\/\/doi.org\/10.1509\/jppm.15.159","journal-title":"J. Public Policy Market."},{"key":"2_CR26","unstructured":"Martino, M.D., Robyns, P., Weyts, W., Quax, P., Lamotte, W., Andries, K.: Personal information leakage by abusing the GDPR \u2018Right of Access\u2019. In: 15th USENIX Symposium on Usable Privacy and Security (SOUPS). USENIX Association (2019)"},{"key":"2_CR27","doi-asserted-by":"publisher","unstructured":"Matzutt, R., et al.: myneData: towards a trusted and user-controlled ecosystem for sharing personal data. In: 47. Jahrestagung Der Gesellschaft F\u00fcr Informatik, pp. 1073\u20131084 (2017). https:\/\/doi.org\/10.18420\/in2017_109","DOI":"10.18420\/in2017_109"},{"issue":"1","key":"2_CR28","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1111\/joca.12111","volume":"51","author":"GR Milne","year":"2017","unstructured":"Milne, G.R., Pettinico, G., Hajjat, F.M., Markos, E.: Information sensitivity typology: mapping the degree and type of risk consumers perceive in personal data sharing. J. Consum. Aff. 51(1), 133\u2013161 (2017). https:\/\/doi.org\/10.1111\/joca.12111","journal-title":"J. Consum. Aff."},{"key":"2_CR29","doi-asserted-by":"publisher","first-page":"22965","DOI":"10.1109\/ACCESS.2017.2765539","volume":"5","author":"P Murmann","year":"2017","unstructured":"Murmann, P., Fischer-H\u00fcbner, S.: Tools for achieving usable ex post transparency: a survey. IEEE Access 5, 22965\u201322991 (2017). https:\/\/doi.org\/10.1109\/ACCESS.2017.2765539","journal-title":"IEEE Access"},{"issue":"1","key":"2_CR30","first-page":"1119","volume":"79","author":"H Nissenbaum","year":"2004","unstructured":"Nissenbaum, H.: Privacy as contextual integrity. Washington Law Rev. 79(1), 1119\u2013157 (2004)","journal-title":"Washington Law Rev."},{"key":"2_CR31","unstructured":"Pavur, J., Knerr, C.: GDPArrrrr: Using Privacy Laws to Steal Identities. arXiv:1912.00731 [cs] (2019)"},{"key":"2_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/978-3-030-22351-9_29","volume-title":"HCI for Cybersecurity, Privacy and Trust","author":"S Polst","year":"2019","unstructured":"Polst, S., Kelbert, P., Feth, D.: Company privacy dashboards: employee needs and requirements. In: Moallem, A. (ed.) HCII 2019. LNCS, vol. 11594, pp. 429\u2013440. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-22351-9_29"},{"key":"2_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1007\/978-3-319-31456-3_3","volume-title":"Privacy Technologies and Policy","author":"A Popescu","year":"2016","unstructured":"Popescu, A., et al.: Increasing transparency and privacy for online social network users \u2013 USEMP value model, scoring framework and legal. In: Berendt, B., Engel, T., Ikonomou, D., Le M\u00e9tayer, D., Schiffner, S. (eds.) APF 2015. LNCS, vol. 9484, pp. 38\u201359. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-31456-3_3"},{"issue":"3","key":"2_CR34","first-page":"19","volume":"7","author":"W Presthus","year":"2019","unstructured":"Presthus, W., S\u00f8rum, H.: Consumer perspectives on information privacy following the implementation of the GDPR. Int. J. Inf. Syst. Project Manag. (IJISPM) 7(3), 19\u201334 (2019)","journal-title":"Int. J. Inf. Syst. Project Manag. (IJISPM)"},{"key":"2_CR35","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-319-92925-5_14","volume-title":"Privacy and Identity Management. The Smart Revolution","author":"P Raschke","year":"2018","unstructured":"Raschke, P., K\u00fcpper, A., Drozd, O., Kirrane, S.: Designing a GDPR-compliant and\u00a0usable privacy dashboard. In: Hansen, M., Kosta, E., Nai-Fovino, I., Fischer-H\u00fcbner, S. (eds.) Privacy and Identity 2017. IAICT, vol. 526, pp. 221\u2013236. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-92925-5_14"},{"key":"2_CR36","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.ijinfomgt.2018.11.018","volume":"46","author":"EM Schomakers","year":"2019","unstructured":"Schomakers, E.M., Lidynia, C., M\u00fcllmann, D., Ziefle, M.: Internet users\u2019 perceptions of information sensitivity - insights from Germany. Int. J. Inf. Manag. 46, 142\u2013150 (2019). https:\/\/doi.org\/10.1016\/j.ijinfomgt.2018.11.018","journal-title":"Int. J. Inf. Manag."},{"issue":"2","key":"2_CR37","doi-asserted-by":"publisher","first-page":"1840","DOI":"10.1109\/TVCG.2020.3028946","volume":"27","author":"M Schufrin","year":"2021","unstructured":"Schufrin, M., Reynolds, S.L., Kuijper, A., Kohlhammer, J.: A visualization interface to improve the transparency of collected personal data on the internet. IEEE Trans. Vis. Comput. Graph. 27(2), 1840\u20131849 (2021). https:\/\/doi.org\/10.1109\/TVCG.2020.3028946","journal-title":"IEEE Trans. Vis. Comput. Graph."},{"key":"2_CR38","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/978-3-642-17303-5_7","volume-title":"Policies and Research in Identity Management","author":"J Scudder","year":"2010","unstructured":"Scudder, J., J\u00f8sang, A.: Personal federation control with the identity dashboard. In: de Leeuw, E., Fischer-H\u00fcbner, S., Fritsch, L. (eds.) IDMAN 2010. IAICT, vol. 343, pp. 85\u201399. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17303-5_7"},{"key":"2_CR39","doi-asserted-by":"publisher","unstructured":"Siljee, J.: Privacy transparency patterns. In: Proceedings of the 20th ACM European Conference on Pattern Languages of Programs (EuroPLoP), pp. 1\u201311. ACM (2015). https:\/\/doi.org\/10.1145\/2855321.2855374","DOI":"10.1145\/2855321.2855374"},{"key":"2_CR40","unstructured":"The European Comission: ICT usage in households and by individuals. Technical report, The European Union (2019). https:\/\/ec.europa.eu\/eurostat\/cache\/metadata\/en\/isoc_i_esms.htm"},{"key":"2_CR41","unstructured":"The European Comission: Digital Economy and Society Index (DESI) 2020 - Use of internet services. Technical report. DESI 2020, The European Union (2020). https:\/\/ec.europa.eu\/digital-single-market\/en\/use-internet-and-online-activities"},{"key":"2_CR42","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-030-54455-3_9","volume-title":"Financial Cryptography and Data Security","author":"J Tolsdorf","year":"2020","unstructured":"Tolsdorf, J., Dehling, F.: In our employer we trust: mental models of office workers\u2019 privacy perceptions. In: Bernhard, M., et al. (eds.) FC 2020. LNCS, vol. 12063, pp. 122\u2013136. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-54455-3_9"},{"issue":"3","key":"2_CR43","first-page":"15","volume":"8","author":"J Tolsdorf","year":"2020","unstructured":"Tolsdorf, J., Dehling, F., Lo Iacono, L.: Take back control! the use of mental models to develop privacy dashboards. ITG News 8(3), 15\u201320 (2020)","journal-title":"ITG News"},{"key":"2_CR44","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1007\/978-3-030-31500-9_5","volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"T Urban","year":"2019","unstructured":"Urban, T., Tatang, D., Degeling, M., Holz, T., Pohlmann, N.: A study on subject data access in online advertising after the GDPR. In: P\u00e9rez-Sol\u00e0, C., Navarro-Arribas, G., Biryukov, A., Garcia-Alfaro, J. (eds.) DPM\/CBT -2019. LNCS, vol. 11737, pp. 61\u201379. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-31500-9_5"},{"key":"2_CR45","doi-asserted-by":"publisher","unstructured":"Utz, C., Degeling, M., Fahl, S., Schaub, F., Holz, T.: (un)informed consent: studying GDPR consent notices in the field. In: Proceedings of the 26th ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 973\u2013990. Association for Computing Machinery (2019). https:\/\/doi.org\/10.1145\/3319535.3354212","DOI":"10.1145\/3319535.3354212"},{"key":"2_CR46","doi-asserted-by":"publisher","unstructured":"Wilson, S., et al.: Crowdsourcing annotations for websites\u2019 privacy policies: can it really work? In: Proceedings of the 25th International Conference on World Wide Web (WWW), pp. 133\u2013143. International World Wide Web Conferences Steering Committee (2016). https:\/\/doi.org\/10.1145\/2872427.2883035","DOI":"10.1145\/2872427.2883035"},{"key":"2_CR47","doi-asserted-by":"crossref","unstructured":"Wong, J., Henderson, T.: How portable is portable? Exercising the GDPR\u2019s right to data portability. In: Proceedings of the 2018 ACM International Joint Conference and 2018 International Symposium on Pervasive and Ubiquitous Computing and Wearable Computers (UbiComp), pp. 911\u2013920. Association for Computing Machinery (2018)","DOI":"10.1145\/3267305.3274152"},{"key":"2_CR48","doi-asserted-by":"publisher","unstructured":"Zimmermann, C., Accorsi, R., M\u00fcller, G.: Privacy dashboards: reconciling data-driven business models and privacy. In: Proceedings of the 9th International Conference on Availability, Reliability and Security (ARES), pp. 152\u2013157. IEEE Computer Society (2014). https:\/\/doi.org\/10.1109\/ARES.2014.27","DOI":"10.1109\/ARES.2014.27"}],"container-title":["Lecture Notes in Computer Science","Privacy Technologies and Policy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-76663-4_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,26]],"date-time":"2021-05-26T23:18:28Z","timestamp":1622071108000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-76663-4_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030766627","9783030766634"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-76663-4_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"19 May 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APF","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Annual Privacy Forum","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 June 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"apf2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/privacyforum.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Virtual Event","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}