{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T23:10:03Z","timestamp":1746227403362,"version":"3.40.4"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319067483"},{"type":"electronic","value":"9783319067490"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06749-0_7","type":"book-chapter","created":{"date-parts":[[2014,5,15]],"date-time":"2014-05-15T00:43:14Z","timestamp":1400114594000},"page":"101-116","source":"Crossref","is-referenced-by-count":2,"title":["Towards a Multidisciplinary Framework to Include Privacy in the Design of Video Surveillance Systems"],"prefix":"10.1007","author":[{"given":"Zhendong","family":"Ma","sequence":"first","affiliation":[]},{"given":"Denis","family":"Butin","sequence":"additional","affiliation":[]},{"given":"Francisco","family":"Jaime","sequence":"additional","affiliation":[]},{"given":"Fanny","family":"Coudert","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Kung","sequence":"additional","affiliation":[]},{"given":"Claire","family":"Gayrel","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Ma\u00f1a","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Jouvray","sequence":"additional","affiliation":[]},{"given":"Nathalie","family":"Trussart","sequence":"additional","affiliation":[]},{"given":"Nathalie","family":"Grandjean","sequence":"additional","affiliation":[]},{"given":"V\u00edctor Manuel","family":"Hidalgo","sequence":"additional","affiliation":[]},{"given":"Mathias","family":"Bossuet","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"Casado","sequence":"additional","affiliation":[]},{"given":"M. Carmen","family":"Hidalgo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Increasing Resilience in Surveillance Societies (IRISS), http:\/\/irissproject.eu"},{"key":"7_CR2","unstructured":"PrivAcy pReserving Infrastructure for Surveillance (PARIS), http:\/\/www.paris-project.org"},{"key":"7_CR3","unstructured":"Surveillance, Privacy and Ethics (SAPIENT), http:\/\/www.sapientproject.eu"},{"key":"7_CR4","unstructured":"Surveillance, Privacy and Security (SurPRISE), http:\/\/surprise-project.eu"},{"key":"7_CR5","unstructured":"The VideoSense Network of Excellence, http:\/\/www.videosense.eu"},{"key":"7_CR6","unstructured":"Article 29 Data Protection Working Party: Opinion 3\/2010 on the principle of accountability (2010)"},{"key":"7_CR7","unstructured":"Ashley, P., Hada, S., Karjoth, G., Powers, C., Schunter, M.: Enterprise Privacy Authorization Language (EPAL). Tech. rep. IBM Research (2003)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Butin, D., Chicote, M., Le M\u00e9tayer, D.: Log Design for Accountability. In: 2013 IEEE Security & Privacy Workshop on Data Usage Management, pp. 1\u20137. IEEE Computer Society (2013)","DOI":"10.1109\/SPW.2013.26"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Butin, D., Chicote, M., Le M\u00e9tayer, D.: Strong Accountability: Beyond Vague Promises. In: Gutwirth, S., Leenes, R., De Hert, P. (eds.) Reloading Data Protection, pp. 343\u2013369. Springer (2014)","DOI":"10.1007\/978-94-007-7540-4_16"},{"issue":"2","key":"7_CR10","doi-asserted-by":"publisher","first-page":"166","DOI":"10.1109\/MSP.2007.323270","volume":"24","author":"A. Cavallaro","year":"2007","unstructured":"Cavallaro, A.: Privacy in Video Surveillance. IEEE Signal Processing Magazine\u00a024(2), 166\u2013168 (2007)","journal-title":"IEEE Signal Processing Magazine"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Cederquist, J., Corin, R., Dekker, M., Etalle, S., den Hartog, J.: An Audit Logic for Accountability. In: Sahai, A., Winsborough, W. (eds.) Proceedings of the Sixth IEEE International Workshop on Policies for Distributed Systems and Networks, pp. 34\u201343. IEEE Computer Society Press (2005)","DOI":"10.1109\/POLICY.2005.5"},{"key":"7_CR12","unstructured":"European Commission: Proposal for a Regulation of the European Parliament and of the Council on the Protection of Individuals with Regard to the Processing of Personal Data and on the Free Movement of such Data (2012)"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Finn, R.L., Wright, D., Friedewald, M.: Seven Types of Privacy. In: Gutwirth, S., Leenes, R., Hert, P.D., Poullet, Y. (eds.) European Data Protection: Coming of Age, pp. 3\u201332. Springer (2013)","DOI":"10.1007\/978-94-007-5170-5_1"},{"key":"7_CR14","unstructured":"Gayrel, C., Trussart, N., Coudert, F., Ma\u00f1a, A., Jaime, F., Hidalgo, C., Casado, F., Ma, Z., Strobl, B., Hidalgo, V.M., Bossuet, M., Le M\u00e9tayer, D., Kung, A., Jouvray, C.: PARIS Deliverable 2.1: Contexts and Concepts for SALT Frameworks, http:\/\/www.paris-project.org\/images\/Paris\/pdfFiles\/PARIS_D2.1_v1.0.pdf"},{"key":"7_CR15","unstructured":"Gill, M., Spriggs, A.: Home Office Research Study 292: Assessing the impact of CCTV (2005), https:\/\/www.cctvusergroup.com\/downloads\/file\/Martin%20gill.pdf"},{"key":"7_CR16","unstructured":"Russo, S.: Digital Video Surveillance: enhancing physical security with analytic capabilities (2008), http:\/\/www-935.ibm.com\/services\/us\/gts\/pdf\/sp_wp_digital-video-surveillance.pdf"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Senior, A.W. (ed.): Protecting Privacy in Video Surveillance. Springer (2009)","DOI":"10.1007\/978-1-84882-301-3"},{"issue":"3","key":"7_CR18","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/MSP.2005.65","volume":"3","author":"A.W. Senior","year":"2005","unstructured":"Senior, A.W., Pankanti, S., Hampapur, A., Brown, L.M.G., ITian, Y., Ekin, A., Connell, J.H., Shu, C.F., Lu, M.: Enabling Video Privacy through Computer Vision. IEEE Security & Privacy\u00a03(3), 50\u201357 (2005)","journal-title":"IEEE Security & Privacy"},{"issue":"1-2","key":"7_CR19","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1016\/S0169-023X(97)00056-6","volume":"25","author":"R. Studer","year":"1998","unstructured":"Studer, R., Benjamins, V.R., Fensel, D.: Knowledge Engineering: Principles and methods. Data Knowl. Eng.\u00a025(1-2), 161\u2013197 (1998)","journal-title":"Data Knowl. Eng."},{"key":"7_CR20","unstructured":"Trabelsi, S., Njeh, A., Bussard, L., Neven, G.: PPL Engine: A Symmetric Architecture for Privacy Policy Handling. W3C Workshop on Privacy and data usage control (2010)"},{"key":"7_CR21","unstructured":"Webster, C.W.R., T\u00f6pfer, E., Klauser, F.R., Raab, C.D. (eds.): Video Surveillance: Practices and Policies in Europe. IOS Press (2012)"},{"issue":"4","key":"7_CR22","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/MTS.2011.943460","volume":"30","author":"D. Wright","year":"2011","unstructured":"Wright, D., Gellert, R., Gutwirth, S., Friedewald, M.: Minimizing Technology Risks with PIAs, Precaution, and Participation. Technology and Society Magazine, IEEE\u00a030(4), 47\u201354 (2011)","journal-title":"Technology and Society Magazine, IEEE"}],"container-title":["Lecture Notes in Computer Science","Privacy Technologies and Policy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06749-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T22:43:37Z","timestamp":1746225817000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06749-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319067483","9783319067490"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06749-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}