{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T03:17:53Z","timestamp":1743131873039,"version":"3.40.3"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031203152"},{"type":"electronic","value":"9783031203169"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-20316-9_23","type":"book-chapter","created":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T18:52:04Z","timestamp":1669315924000},"page":"297-307","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Investigating Data Privacy Evaluation Criteria and Requirements for e-Commerce Websites"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9777-8721","authenticated-orcid":false,"given":"Ad\u00e9le","family":"da Veiga","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8912-1578","authenticated-orcid":false,"given":"Elisha","family":"Ochola","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6560-8082","authenticated-orcid":false,"given":"Mathias","family":"Mujinga","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1690-7518","authenticated-orcid":false,"given":"Emilia","family":"Mwim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,25]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Bt Mohd, N.A., Zaaba, Z.F.: A review of usability and security evaluation model of E-commerce website. In: Procedia Computer Science, pp. 1199\u20131205 (2019)","DOI":"10.1016\/j.procs.2019.11.233"},{"key":"23_CR2","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1007\/1-4020-2148-8_17","volume-title":"Designing Personalized User Experiences in eCommerce","author":"M Teltzrow","year":"2004","unstructured":"Teltzrow, M., Kobsa, A.: Impacts of user privacy preferences on personalized systems: a comparative study. In: Karat, C.-M., Blom, J.O., Karat, J. (eds.) Designing Personalized User Experiences in eCommerce, pp. 315\u2013332. Springer, Dordrecht (2004)"},{"key":"23_CR3","unstructured":"European Union: General Data Protection Regulation (GDPR), Brussels (2016)"},{"key":"23_CR4","unstructured":"Protection of Personal Information Act 4 of 2013. The Parliament of the Republic of South Africa, Cape Town (2013)"},{"key":"23_CR5","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/978-3-030-21752-5_12","volume-title":"Privacy Technologies and Policy: 7th Annual Privacy Forum, APF 2019, Rome, Italy, June 13\u201314, 2019, Proceedings","author":"C Boniface","year":"2019","unstructured":"Boniface, C., Fouad, I., Bielova, N., Lauradoux, C., Santos, C.: Security analysis of subject access request procedures: how to authenticate data subjects safely when they request for their data. In: Naldi, M., Italiano, G.F., Rannenberg, K., Medina, M., Bourka, A. (eds.) Privacy Technologies and Policy: 7th Annual Privacy Forum, APF 2019, Rome, Italy, June 13\u201314, 2019, Proceedings, pp. 182\u2013209. Springer International Publishing, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-21752-5_12"},{"key":"23_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-29387-1_1","volume-title":"Human-Computer Interaction \u2013 INTERACT 2019","author":"CS De Souza","year":"2019","unstructured":"De Souza, C.S.: A contrastive study of pre- and post-legislation interaction design for communication and action about personal data protection in e-commerce websites. In: Lamas, D., Loizides, F., Nacke, L., Petrie, H., Winckler, M., Zaphiris, P. (eds.) INTERACT 2019. LNCS, vol. 11748, pp. 3\u201323. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29387-1_1"},{"key":"23_CR7","doi-asserted-by":"publisher","first-page":"348","DOI":"10.1108\/ICS-05-2015-0020","volume":"24","author":"A Gurung","year":"2016","unstructured":"Gurung, A., Raja, M.K.: Online privacy and security concerns of consumers. Inf. Comput. Secur. 24, 348\u2013371 (2016). https:\/\/doi.org\/10.1108\/ICS-05-2015-0020","journal-title":"Inf. Comput. Secur."},{"key":"23_CR8","doi-asserted-by":"publisher","first-page":"19","DOI":"10.5815\/ijcnis.2019.10.03","volume":"10","author":"I Baako","year":"2019","unstructured":"Baako, I., Umar, S., Gidisu, P.: Privacy and security concerns in electronic commerce websites in ghana: a survey study. Int. J. Comput. Network Inf. Secur. 10, 19\u201325 (2019). https:\/\/doi.org\/10.5815\/ijcnis.2019.10.03","journal-title":"Int. J. Comput. Network Inf. Secur."},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.elerap.2018.11.003","volume":"32","author":"K Kaushik","year":"2018","unstructured":"Kaushik, K., Kumar Jain, N., Kumar Singh, A.: Antecedents and outcomes of information privacy concerns: role of subjective norm and social presence. Electron. Commer. Res. Appl. 32, 57\u201368 (2018). https:\/\/doi.org\/10.1016\/j.elerap.2018.11.003","journal-title":"Electron. Commer. Res. Appl."},{"key":"23_CR10","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.cose.2017.03.001","volume":"67","author":"ZA Mohammed","year":"2017","unstructured":"Mohammed, Z.A., Tejay, G.P.: Examining privacy concerns and ecommerce adoption in developing countries: the impact of culture in shaping individuals\u2019 perceptions toward technology. Comput. Secur. 67, 254\u2013265 (2017). https:\/\/doi.org\/10.1016\/j.cose.2017.03.001","journal-title":"Comput. Secur."},{"key":"23_CR11","first-page":"14","volume":"2019","author":"G Greenleaf","year":"2019","unstructured":"Greenleaf, G.: Global data privacy laws 2019: 132 national laws & many bills. Privacy Laws Bus. Int. Report 2019, 14\u201318 (2019)","journal-title":"Privacy Laws Bus. Int. Report"},{"key":"23_CR12","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/978-3-030-90016-8_3","volume-title":"Emerging Technologies in Computing","author":"M Tanjin","year":"2021","unstructured":"Tanjin, M., Botlero, I.A., Hridita, M.T., Riyadh, T.I., Onik, M.H., Miraz, M.H.: Privacy and security\u00a0factors\u00a0of government\u00a0websites\u00a0versus private websites\u00a0in Bangladesh and USA: a comparative study. In: Miraz, M.H., Southall, G., Ali, M., Ware, A., Soomro, S. (eds.) iCETiC 2021. LNICSSITE, vol. 395, pp. 37\u201355. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-90016-8_3"},{"key":"23_CR13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3124332","author":"O Amaral","year":"2021","unstructured":"Amaral, O., Abualhaija, S., Torre, D., Sabetzadeh, M., Briand, L.: AI-enabled automation for completeness checking of privacy policies. IEEE Trans. Software Eng. (2021). https:\/\/doi.org\/10.1109\/TSE.2021.3124332","journal-title":"IEEE Trans. Software Eng."},{"key":"23_CR14","doi-asserted-by":"publisher","first-page":"156067","DOI":"10.1109\/ACCESS.2020.3019334","volume":"8","author":"Y Javed","year":"2020","unstructured":"Javed, Y., Salehin, K.M., Shehab, M.: A study of South Asian websites on privacy compliance. IEEE Access 8, 156067\u2013156083 (2020). https:\/\/doi.org\/10.1109\/ACCESS.2020.3019334","journal-title":"IEEE Access"},{"key":"23_CR15","doi-asserted-by":"publisher","unstructured":"Bier, C., Kuhne, K., Beyerer J.: Privacy insight: the next generation privacy dashboard. In: Schiffner, S., Serna, J., Ikonomou, D., Rannenberg, K. (eds.) Privacy Technologies and Policy. APF 2016. LNCS, pp. 135\u2013152. Springer International Publishing, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-44760-5_9","DOI":"10.1007\/978-3-319-44760-5_9"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Mahindrakar, A., Joshi, K.P.: Automating GDPR compliance using policy integrated Blockchain. In: Proceedings - 6th Intl Conference on Big Data Security on Cloud, BigDataSecurity 2020, pp. 86\u201393. IEEE, Baltimore, MD, USA (2020)","DOI":"10.1109\/BigDataSecurity-HPSC-IDS49724.2020.00026"},{"key":"23_CR17","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-030-66039-0_10","volume-title":"Information and Cyber Security","author":"D Brandreth","year":"2020","unstructured":"Brandreth, D., Ophoff, J.: Investigating customer-facing security features on south african e-commerce websites. In: Venter, H., Loock, M., Coetzee, M., Eloff, M., Eloff, J., Botha, R. (eds.) ISSA 2020. CCIS, vol. 1339, pp. 144\u2013159. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-66039-0_10"},{"key":"23_CR18","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1111\/j.1471-1842.2009.00848.x","volume":"26","author":"MJ Grant","year":"2009","unstructured":"Grant, M.J., Booth, A., Centre, S.: A typology of reviews: an analysis of 14 review types and associated methodologies. Health Info. Libr. J. 26, 91\u2013108 (2009)","journal-title":"Health Info. Libr. J."},{"key":"23_CR19","doi-asserted-by":"crossref","unstructured":"Moher, D., Liberati, A., Tetzlaff, J., Altman, D.G., Group, P.: Preferred reporting items for systematic reviews and meta-analyses: the PRISMA statement. Ann. Int. Med. 151(4), 264\u2013270 (2009)","DOI":"10.7326\/0003-4819-151-4-200908180-00135"},{"key":"23_CR20","unstructured":"Organisation for Economic Co-operation and Development: OECD Recommendation of the Council on Consumer Protection in E-Commerce. OECD (2016)"},{"key":"23_CR21","unstructured":"The GDPR Law: GDPR Website Requirements. https:\/\/www.thegdprlaw.com\/requirements\/"},{"key":"23_CR22","unstructured":"CookieYes Limited: GDPR Checklist for Your Website. https:\/\/www.cookieyes.com\/blog\/gdpr-checklist-for-websites\/"},{"key":"23_CR23","unstructured":"Daniels, J.: Everything You Need to Know About Websites and Privacy Laws. https:\/\/www.webdesignerdepot.com\/2020\/10\/everything-you-need-to-know-about-websites-and-privacy-laws\/"},{"key":"23_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1007\/978-3-319-67280-9_10","volume-title":"Privacy Technologies and Policy","author":"M Maass","year":"2017","unstructured":"Maass, M., Wichmann, P., Prid\u00f6hl, H., Herrmann, D.: PrivacyScore: Improving privacy and security via crowd-sourced benchmarks of websites. In: Schweighofer, E., Leitold, H., Mitrakas, A., Rannenberg, K. (eds.) APF 2017. LNCS, vol. 10518, pp. 178\u2013191. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67280-9_10"},{"key":"23_CR25","doi-asserted-by":"crossref","unstructured":"Thai, N.D., Hieu, N.H.: A framework for website security assessment. In: ACM International Conference Proceeding Series, pp. 153\u2013157 (2019)","DOI":"10.1145\/3348445.3348456"},{"key":"23_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2022.102606","volume":"114","author":"X Lin","year":"2022","unstructured":"Lin, X., Liu, H., Li, Z., Xiong, G., Gou, G.: Privacy protection of China\u2019s top websites: a Multi-layer privacy measurement via network behaviours and privacy policies. Comput. Secur. 114, 1\u201320 (2022). https:\/\/doi.org\/10.1016\/j.cose.2022.102606","journal-title":"Comput. Secur."},{"key":"23_CR27","doi-asserted-by":"publisher","first-page":"79477","DOI":"10.1109\/ACCESS.2021.3083897","volume":"9","author":"J Oh","year":"2021","unstructured":"Oh, J., Hong, J., Lee, C., Lee, J.J., Woo, S.S., Lee, K.: Will EU\u2019s GDPR act as an effective enforcer to gain consent? IEEE Access 9, 79477\u201379490 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3083897","journal-title":"IEEE Access"},{"key":"23_CR28","doi-asserted-by":"crossref","unstructured":"Belen Saglam, R., Aslan, C.B., Li, S., Dickson, L., Pogrebna, G.: A Data-driven analysis of blockchain systems\u2019 public online communications on GDPR. In: Proceedings - 2020 IEEE International Conference on Decentralized Applications and Infrastructures, (DAPPS), pp. 22\u201331. IEEE. (2020)","DOI":"10.1109\/DAPPS49028.2020.00003"},{"key":"23_CR29","first-page":"80","volume":"7","author":"M Al-Jamal","year":"2015","unstructured":"Al-Jamal, M., Abu-Shanab, E.: Privacy policy of e-government websites: an itemized checklist proposed and tested. Manage. Res. Pract. 7, 80\u201395 (2015)","journal-title":"Manage. Res. Pract."},{"key":"23_CR30","doi-asserted-by":"crossref","unstructured":"Nwaeze, A.C., Zavarsky, P., Ruhl, R.: Compliance evaluation of information privacy protection in e-government systems in anglophone west africa using ISO\/IEC 29100:2011. In: 2017 Twelfth International Conference on Digital Information Management (ICDIM), pp. 98\u2013102. IEEE, Fukuoka, Japan (2017)","DOI":"10.1109\/ICDIM.2017.8244644"},{"key":"23_CR31","doi-asserted-by":"crossref","unstructured":"Sanchez-Rola, I., et al.: Can I opt out yet? GDPR and the global illusion of cookie control. In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, pp. 340\u2013351. ACM, Auckland, New Zeeland (2019)","DOI":"10.1145\/3321705.3329806"},{"key":"23_CR32","doi-asserted-by":"crossref","unstructured":"Vlachos, V., et al.: ASPIDA: An observatory for security and privacy in the Greek e-business sector. In: 25th Pan-Hellenic Conference on Informatics, pp. 362\u2013368 (2021)","DOI":"10.1145\/3503823.3503890"}],"container-title":["Communications in Computer and Information Science","Advanced Research in Technologies, Information, Innovation and Sustainability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-20316-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,24]],"date-time":"2022-11-24T19:20:10Z","timestamp":1669317610000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-20316-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031203152","9783031203169"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-20316-9_23","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"25 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARTIIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Research in Technologies, Information, Innovation and Sustainability","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santiago de Compostela","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"artiis2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/artiis.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"easy chair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"191","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"72","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}