{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:39:01Z","timestamp":1742913541221,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031840777"},{"type":"electronic","value":"9783031840784"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-84078-4_20","type":"book-chapter","created":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T19:06:07Z","timestamp":1741806367000},"page":"283-300","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Holistic List of Privacy-Preserving Measures for System Development Life Cycles"],"prefix":"10.1007","author":[{"given":"Alida","family":"Hills","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9777-8721","authenticated-orcid":false,"given":"Ad\u00e9le","family":"Da Veiga","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8005-716X","authenticated-orcid":false,"given":"Mariaan","family":"Loock","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7191-8690","authenticated-orcid":false,"given":"Karen","family":"Renaud","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,3,13]]},"reference":[{"issue":"10","key":"20_CR1","first-page":"6","volume":"172","author":"P Agarwal","year":"2017","unstructured":"Agarwal, P., Singhal, A., Garg, A.: SDLC model selection tool and risk incorporation. Int. J. Comp. Appl. 172(10), 6\u201310 (2017)","journal-title":"Int. J. Comp. Appl."},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Alhuqail, S.K., Jamail, N.S.M.: Implementation of an effective framework in merging cybersecurity and software engineering. In: Sixth International Conference of Women in Data Science 2023, pp. 31\u201336. IEEE, Prince Sultan University (WIDS PSU) (2023)","DOI":"10.1109\/WiDS-PSU57071.2023.00019"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Al-Momani, A., Kargl, F., Schmidt, R., Kung, A., B\u00f6sch, C.: A privacy-aware V-model for software development. In: Security and 2019, pp. 100\u2013104. IEEE (2019)","DOI":"10.1109\/SPW.2019.00028"},{"key":"20_CR4","unstructured":"Baldassarre, M.T., Barlette, V.S., Caivano, D., Piccinno, A.: Integrating security and privacy in HCD-Scrum. In: CHItaly: 14TH Biannual Conference of The Italian Sigchi Chapter 2021, pp. 11\u201313. ACM, New York (2021)"},{"key":"20_CR5","unstructured":"Banerjee, C., Pandey, S.K.: Software security rules. IJCSIS 6(1), 123\u2013128 (2009)"},{"key":"20_CR6","unstructured":"Bernsmed, K.: Applying privacy by design in software engineering \u2013 a european perspective. In: The Second International Conference on Advances and Trends in Software Engineering (SOFTENG) 2016, pp. 69\u201376. IARIA (2016)"},{"issue":"1","key":"20_CR7","first-page":"548","volume":"6","author":"F Blix","year":"2018","unstructured":"Blix, F., Elshekeil, S.A., Laoyookhong, S.: Designing GDPR data protection principles in systems development. J. Int. Tech. Sec. Trans. 6(1), 548\u2013555 (2018)","journal-title":"J. Int. Tech. Sec. Trans."},{"issue":"2","key":"20_CR8","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/s00766-022-00382-8","volume":"28","author":"ED Canedo","year":"2023","unstructured":"Canedo, E.D., Bandeira, I.N., Calazans, A.T.S., Costa, P.H.T., Can\u00e7ado, E.C.R., Bonif\u00e1cio, R.: Privacy requirements elicitation: a systematic literature review and perception analysis of IT practitioners. Req. Eng. 28(2), 177\u2013194 (2023)","journal-title":"Req. Eng."},{"key":"20_CR9","unstructured":"Cavoukian, A., et al.: Annex Guide to Privacy by Design Documentation for Software Engineers Version 1.0. http:\/\/docs.oasis-open.org\/pbd-se\/pbd-se-annex\/v1.0\/. Accessed 01 Oct 2023"},{"issue":"4","key":"20_CR10","first-page":"18","volume":"31","author":"A Cavoukian","year":"2012","unstructured":"Cavoukian, A.: Privacy by design. Leading Edge 31(4), 18\u201319 (2012)","journal-title":"Leading Edge"},{"key":"20_CR11","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s12394-010-0053-z","volume":"3","author":"A Cavoukian","year":"2010","unstructured":"Cavoukian, A., Taylor, S., Abrams, M.E.: Privacy by design: essential for organizational accountability and strong business practices. IDIS 3, 405\u2013413 (2010)","journal-title":"IDIS"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"De Chaves, S.A., Benitti, F.B.V.: Privacy by design in software engineering: an update of a systematic mapping study. In: Symposium on Applied Computing. Association for Computing Machinery 2023, pp. 1362\u20131369. ACM\/SIGAPP, Tallinn, Estonia (2023)","DOI":"10.1145\/3555776.3577626"},{"key":"20_CR13","unstructured":"ElShekeil, S.A., Laoyookhong, S.: GDPR Privacy by Design - From Legal Requirements to Technical Solutions. https:\/\/dsv.su.se\/en\/about\/news\/dsv-students-rewarded-for-master-thesis-in-the-field-of-it-security-1.351719. Accessed 14 Aug 2023"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Freitas, M.B., Ara\u00fajo, V.M., Magalh\u00e3es, J.P.: Process SDLC-GDPR: towards the development of secure and compliant applications. In: 1ST International Conference on Advanced Innovations in Smart Cities (ICAISC) 2023, pp. 1\u20136. IEEE (2023)","DOI":"10.1109\/ICAISC56366.2023.10085308"},{"key":"20_CR15","doi-asserted-by":"crossref","unstructured":"Fujdiak, R., et al.: Managing the secure software development. In: IFIP International Conference on New Technologies, Mobility and Security (NTMS) 2019, pp. 1\u20134. IEEE (2019)","DOI":"10.1109\/NTMS.2019.8763845"},{"key":"20_CR16","unstructured":"General Data Protection Regulation 2016\/679. https:\/\/eur-lex.europa.eu\/homepage.html. Accessed 06 July 2023"},{"key":"20_CR17","doi-asserted-by":"publisher","unstructured":"J\u00f8sang, A., \u00d8degaard, M., Oftedal, E.: Cybersecurity through secure software development. In: Bishop, M., Miloslavskaya, N., Theocharidou, M. (eds.) Information Security Education Across the Curriculum. WISE 2015. IFIP Advances in Information and Communication Technology, vol. 453, pp. 53\u201363. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18500-2_5","DOI":"10.1007\/978-3-319-18500-2_5"},{"issue":"10","key":"20_CR18","doi-asserted-by":"publisher","first-page":"4601","DOI":"10.1007\/s12652-021-03450-z","volume":"13","author":"S Kang","year":"2022","unstructured":"Kang, S., Kim, S.: CIA-level driven secure SDLC framework for integrating security into SDLC process. J. Ambient Intell. Hum. Comput. 13(10), 4601\u20134624 (2022)","journal-title":"J. Ambient Intell. Hum. Comput."},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Khan, P.M., Beg, M.M.S.S.: Extended decision support matrix for selection of SDLC-models on traditional and agile software development projects. In: International Conference On Advanced Computing And Communication Technologies (ACCT) 2013, pp. 8\u201315. IEEE (2013)","DOI":"10.1109\/ACCT.2013.12"},{"key":"20_CR20","unstructured":"Morales-Trujillo, M.E., Matla-Cruz, E.O., Garc\u00eda-Mireles, G.A., Piattini, M.: Privacy by design in software engineering: a systematic mapping study. In: CiBSE, pp. 107\u2013120 (2018)"},{"key":"20_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s12874-018-0611-x","volume":"18","author":"Z Munn","year":"2018","unstructured":"Munn, Z., Peters, M.D.J., Stern, C., Tufanara, C., McArthur, A., Aromataris, E.: Systematic review or scoping review? guidance for authors when choosing between a systematic or scoping review approach. BMC Med. Res. Meth. 18, 1\u20137 (2018)","journal-title":"BMC Med. Res. Meth."},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Notario, N., et al.: PRIPARE: Integrating privacy best practices into a privacy engineering methodology. IEEE Secur. Privacy Workshops, pp. 151\u2013158. IEEE (2015)","DOI":"10.1109\/SPW.2015.22"},{"key":"20_CR23","unstructured":"Okoye, J.N.: Privacy by design. https:\/\/ntnuopen.ntnu.no\/ntnu-xmlui\/handle\/11250\/2457831. Accessed 20 Sept 2023"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Pelteret, M., Ophoff, J.: Organizational information privacy strategy and the impact of the POPI act. Inf. Secur. South Africa (ISSA), 56\u201365 (2017)","DOI":"10.1109\/ISSA.2017.8251775"},{"issue":"1","key":"20_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13643-020-01542-z","volume":"10","author":"ML Rethlefsen","year":"2021","unstructured":"Rethlefsen, M.L., et al.: PRISMA-S: an extension to the PRISMA statement for reporting literature searches in systematic reviews. Syst. Rev. 10(1), 1\u201319 (2021)","journal-title":"Syst. Rev."},{"issue":"3","key":"20_CR26","doi-asserted-by":"publisher","first-page":"176","DOI":"10.3926\/hdbr.180","volume":"6","author":"S Romero","year":"2017","unstructured":"Romero, S., De-Pablos-Heredero, C.: Contribution of privacy by DESIGN (of the processes). Harv. Deusto Bus. Res. 6(3), 176\u2013191 (2017)","journal-title":"Harv. Deusto Bus. Res."},{"issue":"3","key":"20_CR27","first-page":"1","volume":"53","author":"A Roos","year":"2020","unstructured":"Roos, A.: The European union\u2019s general data protection regulation (GDPR) and its Implications for South African data privacy law: an evaluation of selected content principles. Comp. Int. Law J. South Afr. 53(3), 1\u201337 (2020)","journal-title":"Comp. Int. Law J. South Afr."},{"issue":"2","key":"20_CR28","first-page":"365","volume":"71","author":"ML Rustad","year":"2019","unstructured":"Rustad, M.L., Koenig, T.H.: Towards a global data privacy standard. Fla. L. Rev. 71(2), 365\u2013454 (2019)","journal-title":"Fla. L. Rev."},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Sakul-Ung, P., Smanchat, S.: Towards privacy framework in software development projects and applications: an integrated framework. Res. Invention Innov. Congress (RI2C) 2019. IEEE (2019)","DOI":"10.1109\/RI2C48728.2019.8999957"},{"key":"20_CR30","first-page":"771","volume":"94","author":"PM Schwartz","year":"2019","unstructured":"Schwartz, P.M.: Global data privacy: the EU way. NYUL Rev. 94, 771\u2013818 (2019)","journal-title":"NYUL Rev."},{"issue":"1","key":"20_CR31","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1177\/0739456X17723971","volume":"39","author":"Y Xiao","year":"2019","unstructured":"Xiao, Y., Watson, M.: Guidance on conducting a systematic literature review. J. Plan. Educ. Res. 39(1), 93\u2013112 (2019)","journal-title":"J. Plan. Educ. Res."}],"container-title":["Communications in Computer and Information Science","Advanced Research in Technologies, Information, Innovation and Sustainability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-84078-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,12]],"date-time":"2025-03-12T19:06:17Z","timestamp":1741806377000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-84078-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031840777","9783031840784"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-84078-4_20","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 March 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ARTIIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Research in Technologies, Information, Innovation and Sustainability","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Santiago de Chile","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chile","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"artiis2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.artiis.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}