{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T08:25:48Z","timestamp":1743063948907,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319125732"},{"type":"electronic","value":"9783319125749"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12574-9_11","type":"book-chapter","created":{"date-parts":[[2014,11,21]],"date-time":"2014-11-21T13:38:31Z","timestamp":1416577111000},"page":"120-132","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Teaching Privacy by Design to Non-technical Audiences"],"prefix":"10.1007","author":[{"given":"Susan","family":"Perry","sequence":"first","affiliation":[]},{"given":"Claudia","family":"Roda","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,18]]},"reference":[{"key":"11_CR1","unstructured":"Cavoukian, A., Dixon, M.: Privacy and Security by Design: An Enterprise Architecture Approach (2013). http:\/\/www.privacybydesign.ca\/index.php\/paper\/privacy-security-design-enterprise-architecture-approach\/. Accessed 10 May 2014"},{"key":"11_CR2","unstructured":"Cavoukian, A.: Foundational Principles (Privacy by design) (1997). http:\/\/www.privacybydesign.ca\/index.php\/about-pbd\/7-foundational-principles\/. Accessed 22 May 2014"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Rubinstein, I., Good, N.: Privacy by design: A counterfactual analysis of Google and Facebook privacy incidents. Berkeley Technol. Law J. 4 (2011)","DOI":"10.2139\/ssrn.2128146"},{"key":"11_CR4","unstructured":"G\u00fcrses, S., Troncoso, C., Diaz, C.: Engineering privacy by design. In: International Conference on Privacy and Data Protection (CPDP), Belgium (2011)"},{"volume-title":"Handbook of Action Research","year":"2013","key":"11_CR5","unstructured":"Reason, P., Bradbury, H. (eds.): Handbook of Action Research. Sage Publications, London (2013)"},{"key":"11_CR6","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s12394-010-0062-y","volume":"3","author":"A Cavoukian","year":"2010","unstructured":"Cavoukian, A.: Privacy by design: the definitive workshop. A foreword by Ann Cavoukian. Identity Inf. Soc. 3, 247\u2013251 (2010)","journal-title":"Identity Inf. Soc."},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Warren, S., Brandeis, L.: The Right to Privacy. Harvard Law Review IV (1890)","DOI":"10.2307\/1321160"},{"key":"11_CR8","unstructured":"Universal Declaration of Human Rights: G.A. Res. 217 A(III), adopted by the U.N. Doc. A\/810, 10 December 1948"},{"key":"11_CR9","unstructured":"Office of the High Commissioner for Human Rights: CCPR General Comment No. 16: Article 17 (Right to Privacy) The Right to Respect of Privacy, Family, Home and Correspondence, and Protection of Honour and Reputation. Adopted 8 April 1988"},{"key":"11_CR10","unstructured":"Posner, R.: Privacy is Overrated, New York Daily News, 28 April 2013"},{"volume-title":"Trust, Computing and Society","year":"2014","key":"11_CR11","unstructured":"Harper, R. (ed.): Trust, Computing and Society. Cambridge University Press, Cambridge (2014)"},{"key":"11_CR12","unstructured":"Perry, S., Roda, C., Carlson, K.: Submission United Nations Committee on the Rights of the Child - General Comment on the Rights of the Child and the Business Sector (2012)"},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1162\/DAED_a_00113","volume":"140","author":"H Nissenbaum","year":"2011","unstructured":"Nissenbaum, H.: A contextual approach to privacy online. Daedalus 140, 32\u201348 (2011)","journal-title":"Daedalus"},{"key":"11_CR14","unstructured":"Wright, D., Finn, R., Gellert, R., Gutwirth, S., Sch\u00fctz, P., Friedewald, M., Venier, S., Mordini, E.: Ethical dilemma scenarios and emerging technologies. Technological Forecasting and Social Change forthcoming"},{"key":"11_CR15","unstructured":"Pew Research Internet Project: Anonymity, Privacy and Security Online (2013). http:\/\/www.pewinternet.org\/2013\/09\/05\/anonymity-privacy-and-security-online-2\/"},{"key":"11_CR16","unstructured":"Internet Society: Internet Society Mission Statement (2014)"},{"key":"11_CR17","unstructured":"Diaz, C., G\u00fcrses, S.: Understanding the landscape of privacy technologies. Information Security Summit (2012). http:\/\/homes.esat.kuleuven.be\/~cdiaz\/activities.html. 1 May 14"},{"key":"11_CR18","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/s12394-010-0057-8","volume":"3","author":"DN Jutla","year":"2010","unstructured":"Jutla, D.N.: Layering privacy on operating systems, social networks, and other platforms by design. Identity Inf. Soc. IDIS 3, 319\u2013341 (2010)","journal-title":"Identity Inf. Soc. IDIS"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Schwartz, P.M., Solove, D.J.: Reconciling Personal Information in the United States and European Union. California Law Review Forthcoming (2014)","DOI":"10.2139\/ssrn.2271442"},{"key":"11_CR20","unstructured":"European Commission: Communication on Promoting Data Protection by Privacy Enhancing Technologies (PETs), COM(2007) 228 final, Brussels, 2 May 2007"},{"key":"11_CR21","volume-title":"New Directions in Surveillance and Privacy","author":"B Goold","year":"2009","unstructured":"Goold, B.: Building it in: The role of privacy enhancing technologies in the regulation of surveillance and data collection. In: Goold, B., Neyland, D. (eds.) New Directions in Surveillance and Privacy. Willan, Devon (2009)"},{"key":"11_CR22","unstructured":"International Telecommunication Union: ICT Facts and Figures (2013). http:\/\/www.itu.int\/en\/ITU-D\/Statistics\/Documents\/facts\/ICTFactsFigures2013.pdf. Accessed 26 Sep 2013"},{"key":"11_CR23","doi-asserted-by":"publisher","first-page":"204","DOI":"10.1016\/j.envsci.2013.09.009","volume":"37","author":"C Roda","year":"2014","unstructured":"Roda, C., Perry, S.: Mobile phone infrastructure regulation in Europe: Scientific challenges and human rights protection. Environ. Sci. Policy 37, 204\u2013214 (2014)","journal-title":"Environ. Sci. Policy"},{"key":"11_CR24","doi-asserted-by":"publisher","first-page":"755","DOI":"10.1093\/scipol\/sct083","volume":"40","author":"D Wright","year":"2013","unstructured":"Wright, D., Friedewald, M.: Integrating privacy and ethical impact assessments. Sci. Public Policy 40, 755\u2013766 (2013)","journal-title":"Sci. Public Policy"},{"key":"11_CR25","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/s10676-010-9242-6","volume":"13","author":"D Wright","year":"2011","unstructured":"Wright, D.: A framework for the ethical impact assessment of information technology. Ethics Inf. Technol. 13, 199\u2013226 (2011)","journal-title":"Ethics Inf. Technol."},{"key":"11_CR26","unstructured":"Perry, S., Roda, C.: Conceptualizing and contextualizing the changing nature of internet usage in china. In: China and the New Internet World: The Eleventh Chinese Internet Research Conference (CIRC11). Oxford Internet Institute, Oxford (2013)"},{"key":"11_CR27","unstructured":"van der Hoven, J.: Fact Sheet \u2013 Ethics, IoT Expert Group. European Commission (2011). http:\/\/ec.europa.eu\/information_society\/newsroom\/cf\/dae\/document.cfm?doc_id=1751. Accessed 10 May 2014"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"H\u00f6fer, C., Petit, J., Schmidt, R., Kargl, F.: POPCORN: Privacy-preserving charging for eMobility. In: First Workshop on Security, Privacy and Dependability for CyberVehicles (CyCar) at 20th ACM Conference on Computer and Communications Security (2013)","DOI":"10.1145\/2517968.2517971"},{"key":"11_CR29","unstructured":"Australian Ministry of Education Safe Schools Hub: \u201cWhat is cyberbullying?\u201d http:\/\/safeschoolshub.edu.au\/for-parents\/what-to-do-about-\/staying-cybersafe\/what-is-cyberbullying-. Accessed 22 May 2014"}],"container-title":["Communications in Computer and Information Science","Cyber Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12574-9_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T16:18:12Z","timestamp":1676909892000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12574-9_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319125732","9783319125749"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12574-9_11","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"18 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}