{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:38:57Z","timestamp":1742913537558,"version":"3.40.3"},"publisher-location":"Cham","reference-count":24,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031342066"},{"type":"electronic","value":"9783031342073"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-34207-3_16","type":"book-chapter","created":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T19:01:38Z","timestamp":1685300498000},"page":"244-258","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Privacy by Design in CBRN Technologies Targeted to Vulnerable Groups: The Case of PROACTIVE"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3338-7400","authenticated-orcid":false,"given":"Mariano Mart\u00edn","family":"Zamorano","sequence":"first","affiliation":[]},{"given":"Natasha","family":"Newton","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2680-2517","authenticated-orcid":false,"given":"Virginia","family":"Bertelli","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0226-0095","authenticated-orcid":false,"given":"Laura","family":"Petersen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,29]]},"reference":[{"key":"16_CR1","unstructured":"Borking, J., Raab, C.: Laws, PETs and other technologies for privacy protection. J. Inf. Law Technol. (JILT), 1 (2001)"},{"key":"16_CR2","unstructured":"Bunker, D., Mirbabaie, M., Stieglitz, S.: Convergence behaviour of bystanders: an analysis of 2016 munich shooting twitter crisis communication. In: Proceedings of the Australasian Conference on Information Systems (2017)"},{"key":"16_CR3","unstructured":"Cavoukian, A.: Privacy by Design. The 7 Foundational Principles Implementation and Mapping of Fair Information Practices (2009). https:\/\/www.ipc.on.ca\/wp-content\/uploads\/resources\/pbd-implement-7found-principles.pdf"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Chen, J., Wilkinson, D., Richardson, R.B., Waruszynski, B.: Issues, considerations and recommendations on emergency preparedness for vulnerable population groups. Radiat. Prot. Dosim. 134, 3\u20134, 132\u2013135 (2009)","DOI":"10.1093\/rpd\/ncp083"},{"key":"16_CR5","unstructured":"Galdon Clavell, G., Valbuena Leon, M.A., Zamorano M., Marsh, I.: Legal and ethical state-of-the-art on CBRNe preparedness and response. Deliverable D8.1 of the PROACTIVE project (2021)"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"Guberek, T., McDonald, A., Simioni, S., Mhaidli, A.H., Toyama, K., Schaub, F.: Keeping a low profile? Technology, risk and privacy among undocumented immigrants. In: Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, New York, NY, pp. 114:1\u2013114:15. CHI (2018)","DOI":"10.1145\/3173574.3173688"},{"key":"16_CR7","doi-asserted-by":"publisher","unstructured":"Hansen, M.: Top 10 mistakes in system design from a privacy perspective and privacy protection goals. In: Camenisch, J., Crispo, B., Fischer-H\u00fcbner, S., Leenes, R., Russello, G. (eds.) Privacy and Identity Management for Life. Privacy and Identity 2011. IFIP AICT, vol. 375, pp. 14\u201331. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-31668-5_2","DOI":"10.1007\/978-3-642-31668-5_2"},{"key":"16_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2015.05.002","volume":"53","author":"J Heurix","year":"2015","unstructured":"Heurix, J., Zimmermann, P., Neubauer, T., Fenz, S.: A taxonomy for privacy enhancing technologies. Comput. Secur. 53, 1\u201317 (2015)","journal-title":"Comput. Secur."},{"issue":"2","key":"16_CR9","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1108\/IJES-05-2018-0030","volume":"8","author":"S Hignett","year":"2019","unstructured":"Hignett, S., Hancox, G., Edmunds Otter, M.: Chemical, biological, radiological, nuclear and explosive (CBRNe) events: systematic literature review of evacuation, triage and decontamination for vulnerable people. Int. J. Emerg. Serv. 8(2), 175\u2013190 (2019)","journal-title":"Int. J. Emerg. Serv."},{"key":"16_CR10","doi-asserted-by":"publisher","unstructured":"Jillson, I.A.: Ethical frameworks for CBRNE crises: toward shared concepts and their practical application. In: O\u2019Math\u00fana, D., de Miguel Beriain, I. (eds.) Ethics and Law for Chemical, Biological, Radiological, Nuclear & Explosive Crises. The International Library of Ethics, Law and Technology, vol. 20, pp. 53\u201364. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-11977-5_5","DOI":"10.1007\/978-3-030-11977-5_5"},{"key":"16_CR11","unstructured":"Kolev, G., Markarian, G., Polushkina, N.: Deliverable 4.1. Report on the High-level Architecture design including an interface control document. PROACTIVE (2021). https:\/\/proactive-h2020.eu\/wp-content\/uploads\/2021\/04\/PROACTIVE_20210312_D4.1_V6_RINI_Report-on-the-high-level-architecture-design_revised.pdf"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Lambert, P.: The Data Protection Officer: Profession, Rules, and Role. CRC Press, Boca Raton (2016)","DOI":"10.31228\/osf.io\/759cj"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Marwick, A., Fontaine, C., Boyd, D.: \u201cNobody sees it, nobody gets mad\u201d: social media, privacy, and personal responsibility among low-SES youth. Soc. Media Soc. 3(2) (2017)","DOI":"10.1177\/2056305117710455"},{"key":"16_CR14","doi-asserted-by":"publisher","unstructured":"McDonald, N., Forte, A.: Privacy and vulnerable populations. In: Knijnenburg, B.P., Page, X., Wisniewski, P., Lipford, H.R., Proferes, N., Romano, J. (eds.) Modern Socio-Technical Perspectives on Privacy, pp. 337\u2013363. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-82786-1_15)","DOI":"10.1007\/978-3-030-82786-1_15"},{"key":"16_CR15","unstructured":"Nicholson, W., et al.: Report on the Workshop with Vulnerable Citizens. Deliverable D3.3 of the PROACTIVE project (2021). https:\/\/www.researchgate.net\/publication\/360106969_CBRNe_toolkit_for_policy_makers_integrating_vulnerable_groups_in_preparedness_and_response. Accessed  28 July 2022"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Nissenbaum, H.: Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford Law Books (2010)","DOI":"10.1515\/9780804772891"},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Petersen, L., Havarneanu, G., Markarian, G., McCroneline, N.: CBRNe and vulnerable citizens: co-creating an app for that. In: 2019 International Conference on Information and Communication Technologies for Disaster Management (ICT-DM), pp. 1\u20134. IEEE (2019)","DOI":"10.1109\/ICT-DM47966.2019.9032967"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Rubinstein, I., Good, N.: Privacy by design: a counterfactual analysis of google and Facebook privacy incident. Berkeley Technol. Law J., 1333 (2012). NYU School of Law, Public Law Research Paper No. 12\u201343","DOI":"10.2139\/ssrn.2128146"},{"issue":"3","key":"16_CR19","doi-asserted-by":"publisher","first-page":"324","DOI":"10.1177\/1012690211433456","volume":"47","author":"K Toohey","year":"2012","unstructured":"Toohey, K., Taylor, T.: Surveillance and securitization: a forgotten sydney olympic legacy. Int. Rev. Sociol. Sport. 47(3), 324\u2013337 (2012)","journal-title":"Int. Rev. Sociol. Sport."},{"key":"16_CR20","unstructured":"Urban, J.M., Hoofnagle, C.J.: The privacy pragmatic as privacy vulnerable. Technical report #ID 2514381. Social Science Research Network (2014)"},{"key":"16_CR21","series-title":"The International Library of Ethics, Law and Technology","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1007\/978-3-030-11977-5_12","volume-title":"Ethics and Law for Chemical, Biological, Radiological, Nuclear & Explosive Crises","author":"A Urruela Mora","year":"2019","unstructured":"Urruela Mora, A.: The current legal framework on data protection in CBRNE crises: a general exposition. In: O\u2019Math\u00fana, D.P., de Miguel Beriain, I. (eds.) Ethics and Law for Chemical, Biological, Radiological, Nuclear & Explosive Crises. TILELT, vol. 20, pp. 147\u2013161. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-11977-5_12"},{"key":"16_CR22","doi-asserted-by":"publisher","unstructured":"Wright, D., De Hert, P. (eds.): Privacy Impact Assessment. Springer, Dordrecht (2012). https:\/\/doi.org\/10.1007\/978-94-007-2543-0","DOI":"10.1007\/978-94-007-2543-0"},{"key":"16_CR23","unstructured":"Zamorano, M., Suarez Gonzalo, S., Clavell Galdon, G.: Legal and acceptability recommendations for PROACTIVE toolkit. Deliverable D8.2 of the PROACTIVE project (2021). https:\/\/www.researchgate.net\/publication\/360106969_CBRNe_toolkit_for_policy_makers_integrating_vulnerable_groups_in_preparedness_and_response"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Zannettou, S., Sirivianos, M., Blackburn, J., Kourtellis, N.: The web of false information: rumors, fake news, hoaxes, clickbait, and various other shenanigans. Data Inf. Qual. 11(3) (2019)","DOI":"10.1145\/3309699"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Technology in Disaster Risk Reduction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-34207-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T19:03:27Z","timestamp":1685300607000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-34207-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031342066","9783031342073"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-34207-3_16","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"29 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ITDRR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Technology in Disaster Risk Reduction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Krisitansand","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itdrr2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/itdrr2022.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"70% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}