{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T05:11:29Z","timestamp":1755839489569,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031254598"},{"type":"electronic","value":"9783031254604"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-25460-4_13","type":"book-chapter","created":{"date-parts":[[2023,2,17]],"date-time":"2023-02-17T09:12:22Z","timestamp":1676625142000},"page":"228-247","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Data Protection Officers\u2019 Perspectives on\u00a0Privacy Challenges in\u00a0Digital Ecosystems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7917-6065","authenticated-orcid":false,"given":"Stephan","family":"Wiefling","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1961-100X","authenticated-orcid":false,"given":"Jan","family":"Tolsdorf","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7863-0622","authenticated-orcid":false,"given":"Luigi","family":"Lo Iacono","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,18]]},"reference":[{"key":"13_CR1","doi-asserted-by":"crossref","unstructured":"Almeida, J., da Cunha, P.R., Pereira, A.D.: GDPR-compliant data processing: practical considerations. In: Proceedings of the 18th European, Mediterranean, and Middle Eastern Conference (EMCIS), pp. 505\u2013514 (2021)","DOI":"10.1007\/978-3-030-95947-0_36"},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Anwar, M.J., Gill, A.Q., Beydoun, G.: A review of information privacy laws and standards for secure digital ecosystems. In: Proceedings of the 29th Australasian Conference on Information Systems (ACIS), pp. 1\u201312 (2018)","DOI":"10.5130\/acis2018.bb"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Bier, C., K\u00fchne, K., Beyerer, J.: PrivacyInsight: the next generation privacy dashboard. In: Proceedings of the 4th Annual Privacy Forum, pp. 135\u2013152 (2016)","DOI":"10.1007\/978-3-319-44760-5_9"},{"key":"13_CR4","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1177\/0049124113500475","volume":"42","author":"JL Campbell","year":"2013","unstructured":"Campbell, J.L., Quincy, C.D., Osserman, J., Pedersen, O.K.: Coding in-depth semistructured interviews. Sociol. Methods Res. 42, 294\u2013320 (2013)","journal-title":"Sociol. Methods Res."},{"issue":"4","key":"13_CR5","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/s10676-018-9480-6","volume":"20","author":"ZT Chen","year":"2018","unstructured":"Chen, Z.T., Cheung, M.: Privacy perception and protection on Chinese social media. Ethics Inf. Technol. 20(4), 279\u2013289 (2018)","journal-title":"Ethics Inf. Technol."},{"issue":"4","key":"13_CR6","first-page":"30","volume":"3","author":"M da Concei\u00e7\u00e3o Freitas","year":"2018","unstructured":"da Concei\u00e7\u00e3o Freitas, M., da Silva, M.M.: GDPR compliance in SMEs: there is much to be done. J. Inf. Syst. Eng. Manag. 3(4), 30 (2018)","journal-title":"J. Inf. Syst. Eng. Manag."},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Drozd, O.: Privacy Pattern Catalogue: a tool for integrating privacy principles of ISO\/IEC 29100 into the software development process. In: Proceedings of the 10th IFIP International Summer School on Privacy and Identity Management, pp. 129\u2013140 (2016)","DOI":"10.1007\/978-3-319-41763-9_9"},{"key":"13_CR8","unstructured":"EDPB: Guidelines 4\/2019 on article 25 data protection by design and by default, version 2.0 (2020)"},{"key":"13_CR9","unstructured":"EDPB: Guidelines 3\/2022 on dark patterns in social media platform interfaces: how to recognise and avoid them, version 1.0 (2022)"},{"key":"13_CR10","unstructured":"European Union: GDPR, Regulation (EU) 2016\/679 (2016)"},{"issue":"4","key":"13_CR11","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1108\/DPRG-03-2021-0041","volume":"24","author":"J Fernandes","year":"2022","unstructured":"Fernandes, J., Machado, C., Amaral, L.: Identifying critical success factors for the general data protection regulation implementation in higher education institutions. Digital Policy, Regul. Gov. 24(4), 355\u2013379 (2022)","journal-title":"Digital Policy, Regul. Gov."},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Holler, M., van Giffen, B., Benzell, S., Ehrat, M.: The general data protection regulation in financial services industries: how do companies approach the implementation of the gdpr and what can we learn from their approaches? In: Proceedings of the 82th Jahrestagung des Verbands der Hochschullehrer f\u00fcr Betriebswirtschaft (VHB), pp. 1\u201311 (2020)","DOI":"10.4324\/9781003004790-1"},{"issue":"5","key":"13_CR13","doi-asserted-by":"publisher","first-page":"1337","DOI":"10.1093\/icc\/dtab053","volume":"30","author":"B Kira","year":"2021","unstructured":"Kira, B., Sinha, V., Srinivasan, S.: Regulating digital ecosystems. Industr. Corp. Change 30(5), 1337\u20131360 (2021)","journal-title":"Industr. Corp. Change"},{"issue":"2","key":"13_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.digbus.2022.100027","volume":"2","author":"M Koch","year":"2022","unstructured":"Koch, M., Krohmer, D., Naab, M., Rost, D., Trapp, M.: A matter of definition: criteria for digital ecosystems. Digital Business 2(2), 100027 (2022)","journal-title":"Digital Business"},{"key":"13_CR15","first-page":"1","volume":"43","author":"D Lisiak-Felicka","year":"2021","unstructured":"Lisiak-Felicka, D., Szmit, M.: GDPR implementation in public administrationin Poland - 1.5 year after: an empirical analysis. J. Econ. Manag. 43, 1\u201321 (2021)","journal-title":"J. Econ. Manag."},{"issue":"3","key":"13_CR16","doi-asserted-by":"publisher","first-page":"276","DOI":"10.11613\/BM.2012.031","volume":"22","author":"ML McHugh","year":"2012","unstructured":"McHugh, M.L.: Interrater reliability: the kappa statistic. Biochemia Medica 22(3), 276\u2013282 (2012)","journal-title":"Biochemia Medica"},{"key":"13_CR17","unstructured":"Nachira, F., Nicolai, A., Dini, P.: Digital business ecosystems. European Commission (2007)"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Namara, M., Sloan, H., Knijnenburg, B.P.: The effectiveness of adaptation methods in improving user engagement and privacy protection on social network sites. In: Proceedings on Privacy Enhancing Technologies, vol. 2022, iss. 1, pp. 629\u2013648 (2022)","DOI":"10.2478\/popets-2022-0031"},{"issue":"10","key":"13_CR19","doi-asserted-by":"publisher","first-page":"1319","DOI":"10.1177\/0002764218787863","volume":"62","author":"YJ Park","year":"2018","unstructured":"Park, Y.J., Chung, J.E., Shin, D.H.: The structuration of digital ecosystem, privacy, and big data intelligence. Am. Behav. Sci. 62(10), 1319\u20131337 (2018)","journal-title":"Am. Behav. Sci."},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Popescu, A., et al.: Increasing transparency and privacy for online social network users \u2013 USEMP value model, scoring framework and legal. In: Proceedings of the 4th Annual Privacy Forum (APF), pp. 38\u201359 (2016)","DOI":"10.1007\/978-3-319-31456-3_3"},{"issue":"5","key":"13_CR21","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1108\/DPRG-05-2019-0039","volume":"21","author":"N Poritskiy","year":"2019","unstructured":"Poritskiy, N., Oliveira, F., Almeida, F.: The benefits and challenges of general data protection regulation for the information technology sector. Digital Policy, Regul. Gov. 21(5), 510\u2013524 (2019)","journal-title":"Digital Policy, Regul. Gov."},{"issue":"2","key":"13_CR22","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1287\/isre.2016.0664","volume":"28","author":"Y Qiu","year":"2017","unstructured":"Qiu, Y., Gopal, A., Hann, I.H.: Logic pluralism in mobile platform ecosystems. Inf. Syst. Res. 28(2), 225\u2013249 (2017)","journal-title":"Inf. Syst. Res."},{"key":"13_CR23","doi-asserted-by":"crossref","unstructured":"Ranzini, G., Etter, M., Lutz, C., Vermeulen, I.: Privacy in the sharing economy. Tech. rep., Ps2Share (2017)","DOI":"10.2139\/ssrn.2960942"},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Raschke, P., K\u00fcpper, A., Drozd, O., Kirrane, S.: Designing a GDPR-compliant and usable privacy dashboard. In: Proceedings of the 12th Annual IFIP Summer School on Privacy and Identity Management, pp. 221\u2013236 (2017)","DOI":"10.1007\/978-3-319-92925-5_14"},{"key":"13_CR25","doi-asserted-by":"crossref","unstructured":"Sirur, S., Nurse, J.R., Webb, H.: Are We There Yet? Understanding the challenges faced in complying with the general data protection regulation (GDPR). In: Proceedings of the 2nd International Workshop on Multimedia Privacy and Security (MPS), pp. 88\u201395 (2018)","DOI":"10.1145\/3267357.3267368"},{"key":"13_CR26","doi-asserted-by":"crossref","unstructured":"Spiekermann, S., Grossklags, J., Berendt, B.: E-privacy in 2nd generation e-commerce: privacy preferences versus actual behavior. In: Proceedings of the 3rd ACM Conference on Electronic Commerce (EC), pp. 38\u201347 (2001)","DOI":"10.1145\/501158.501163"},{"issue":"4","key":"13_CR27","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1108\/DPRG-01-2019-0007","volume":"21","author":"GA Teixeira","year":"2019","unstructured":"Teixeira, G.A., da Silva, M.M., Pereira, R.: The critical success factors of GDPR implementation: a systematic literature review. Digital Policy, Regul. Gov. 21(4), 402\u2013418 (2019)","journal-title":"Digital Policy, Regul. Gov."},{"key":"13_CR28","unstructured":"Teixeira, G.A., da Silva, M.M., Pereira, R.: The critical success factors of GDPR implementation: a delphi study. In: Proceedings of the 29th International Conference on Information Systems Development (ISD), pp. 1\u201312 (2021)"},{"issue":"3","key":"13_CR29","first-page":"213","volume":"20","author":"T Teubner","year":"2019","unstructured":"Teubner, T., Flath, C.: Privacy in the sharing economy. J. Assoc. Inf. Syst. 20(3), 213\u2013242 (2019)","journal-title":"J. Assoc. Inf. Syst."},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Van Landuyt, D., Sion, L., Dewitte, P., Joosen, W.: The bigger picture. In: Proceedings of the 2nd Workshop on Security, Privacy, Organizations, and Systems Engineering (SPOSE), pp. 283\u2013293 (2020)","DOI":"10.1007\/978-3-030-66504-3_17"},{"issue":"4","key":"13_CR31","doi-asserted-by":"publisher","first-page":"570","DOI":"10.1016\/j.im.2018.10.001","volume":"56","author":"H Yun","year":"2019","unstructured":"Yun, H., Lee, G., Kim, D.J.: A chronological review of empirical research on personal information privacy concerns. Inf. Manag. 56(4), 570\u2013601 (2019)","journal-title":"Inf. Manag."}],"container-title":["Lecture Notes in Computer Science","Computer Security. ESORICS 2022 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-25460-4_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T14:03:32Z","timestamp":1707487412000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-25460-4_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031254598","9783031254604"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-25460-4_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"18 February 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Copenhagen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Denmark","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 September 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 September 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/esorics2022.compute.dtu.dk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"80","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1.7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}