{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:53:18Z","timestamp":1743000798103,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319125732"},{"type":"electronic","value":"9783319125749"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-12574-9_6","type":"book-chapter","created":{"date-parts":[[2014,11,21]],"date-time":"2014-11-21T13:38:31Z","timestamp":1416577111000},"page":"65-76","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["PRIPARE: A New Vision on Engineering Privacy and Security by Design"],"prefix":"10.1007","author":[{"given":"Nicol\u00e1s","family":"Notario","sequence":"first","affiliation":[]},{"given":"Alberto","family":"Crespo","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Kung","sequence":"additional","affiliation":[]},{"given":"Inga","family":"Kroener","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Le M\u00e9tayer","sequence":"additional","affiliation":[]},{"given":"Carmela","family":"Troncoso","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9 M.","family":"del \u00c1lamo","sequence":"additional","affiliation":[]},{"given":"Yod Samuel","family":"Mart\u00edn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,11,18]]},"reference":[{"key":"6_CR1","unstructured":"United Nations General Assembly: The Universal Declaration of Human Rights, Paris (1948)"},{"key":"6_CR2","unstructured":"United Nations General Assembly: The right to privacy in the digital age. Resolution A\/C.3\/68\/L.45\/Rev.1"},{"key":"6_CR3","unstructured":"Cavoukian, A.: 7 Foundational Principles of Privacy by Design. Information & Privacy Commissioner, Ontario, Canada"},{"key":"6_CR4","unstructured":"European Data Protection Supervisor (EDPS): Opinion of the European Data Protection Supervisor on Promoting Trust in the Information Society by Fostering Data Protection and Privacy (2010)"},{"key":"6_CR5","unstructured":"Article 29 Data Protection Working Party: Opinion 01\/2012 Opinion 01\/2012 on the data protection reform proposals, March 2012"},{"key":"6_CR6","unstructured":"RFID Industry, Privacy and Data Protection Impact Assessment Framework for RFID Applications, January 2011"},{"key":"6_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19050-6","volume-title":"Digital Privacy: PRIME-Privacy and Identity Management for Europe","author":"J Camenisch","year":"2011","unstructured":"Camenisch, J., Leenes, R., Sommer, D.: Digital Privacy: PRIME-Privacy and Identity Management for Europe. Springer-Verlag New York Inc., New York (2011)"},{"key":"6_CR8","unstructured":"Privacy by Design: \u201cPbD based RFID PIA\u201d. http:\/\/www.privacybydesign.ca\/index.php\/pbd-based-rfid-pia\/"},{"key":"6_CR9","unstructured":"Linden Consulting Inc.: Privacy Impact Assessments: International Study of their Application and Effects, Information Commissioner\u2019s Office, UK (2007)"},{"issue":"1","key":"6_CR10","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.clsr.2011.11.007","volume":"28","author":"D Wright","year":"2011","unstructured":"Wright, D.: The state of the art in privacy impact assessment. Comput. Law Secur. Rev. 28(1), 54\u201361 (2011)","journal-title":"Comput. Law Secur. Rev."},{"key":"6_CR11","unstructured":"Flaherty, D.: Privacy Impact Assessments: An Essential Tool for Data Protection, Canada (2000)"},{"key":"6_CR12","unstructured":"Cavoukian, A.: Privacy risk management: building privacy protection into a risk management framework to ensure that privacy risks are managed by default. In: Information and Privacy Commissioner, Ontario, Canada, p. 12 (2010)"},{"key":"6_CR13","unstructured":"European Commission, INOFFICIAL CONSOLIDATED VERSION AFTER LIBE COMMITTEE VOTE PROVIDED BY THE RAPPORTEUR Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation), Brussels, 22 October 2013"},{"key":"6_CR14","unstructured":"European Parliament and the Council, Directive 95\/46\/EC of 24.10.1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data, OJ L 281, 23 November 1995"},{"key":"6_CR15","unstructured":"International Organization for Standardization (ISO):\u00a0Information technology \u2013 Security techniques \u2013 Privacy framework, ISO\/IEC 29100:2011, First edition, Geneva, 15 December 2011"},{"key":"6_CR16","unstructured":"International Organization for Standardization (ISO):\u00a0Information technology \u2013 Security techniques \u2013 Evaluation criteria for IT security, ISO\/IEC 15408-2, First edition, Geneva, 1 December 1999"},{"key":"6_CR17","unstructured":"Organization for the Advancement of Structured Information Standards (OASIS): Privacy Management Reference Model and Methodology (PMRM), Version 1.0. July 2013"},{"key":"6_CR18","unstructured":"European Data Protection Supervisor (EDPS): European Data Protection Supervisor Glossary. https:\/\/secure.edps.europa.eu\/EDPSWEB\/edps\/EDPS\/Dataprotection\/Glossary"},{"key":"6_CR19","unstructured":"Article 29 Working Party. http:\/\/ec.europa.eu\/justice\/data-protection\/article-29\/"},{"key":"6_CR20","volume-title":"European Data Protection: Coming of Age","author":"R Finn","year":"2013","unstructured":"Finn, R., Wright, D., Friedewald, M.: Seven types of privacy. In: Gutwirth, S., Poullet, Y., et al. (eds.) European Data Protection: Coming of Age. Springer, Dordrecht (2013)"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Rubinstein, I., Good, N.: Privacy by design: a counterfactual analysis of google and facebook privacy incidents. Berkeley Technol. Law J. 28(2), 1333\u20131414 (2011)","DOI":"10.2139\/ssrn.2128146"},{"issue":"5","key":"6_CR22","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1080\/01972243.2013.825687","volume":"29","author":"D Wright","year":"2013","unstructured":"Wright, D.: Making privacy impact assessment more effective. Inf. Soc. Int. J. 29(5), 307\u2013315 (2013)","journal-title":"Inf. Soc. Int. J."},{"key":"6_CR23","unstructured":"European Commission - Directorate General Justice: Recommendations for a privacy impact assessment framework for the European Union, Brussels \u2013 London, November 2012"},{"issue":"7","key":"6_CR24","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/2209249.2209263","volume":"55","author":"S Spiekermann","year":"2012","unstructured":"Spiekermann, S.: The challenges of privacy by design. Commun. ACM 55(7), 38\u201340 (2012)","journal-title":"Commun. ACM"},{"key":"6_CR25","unstructured":"G\u00fcrses, S.F., Troncoso, C., Diaz, C.: Engineering privacy by design. In: Computers, Privacy & Data Protection (2011)"},{"volume-title":"Managing Privacy through Accountability","year":"2012","key":"6_CR26","unstructured":"Guagnin, D., Hempel, L., Ilten, C., Kroener, I., Neyland, D., Postigo, H. (eds.): Managing Privacy through Accountability. Palgrave Macmillan, Basingstoke (2012)"},{"key":"6_CR27","unstructured":"OECD, OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data"},{"key":"6_CR28","unstructured":"OWASP Application Security Principles. https:\/\/www.owasp.org\/index.php\/Category:Principle"},{"key":"6_CR29","unstructured":"Organization for the Advancement of Structured Information Standards (OASIS): Privacy by Design Documentation for Software Engineers"}],"container-title":["Communications in Computer and Information Science","Cyber Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12574-9_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T01:03:08Z","timestamp":1676422988000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12574-9_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319125732","9783319125749"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12574-9_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"18 November 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}