{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T23:42:25Z","timestamp":1778629345949,"version":"3.51.4"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319417622","type":"print"},{"value":"9783319417639","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-41763-9_9","type":"book-chapter","created":{"date-parts":[[2016,7,6]],"date-time":"2016-07-06T07:21:44Z","timestamp":1467789704000},"page":"129-140","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["Privacy Pattern Catalogue: A Tool for Integrating Privacy Principles of ISO\/IEC 29100 into the Software Development Process"],"prefix":"10.1007","author":[{"given":"Olha","family":"Drozd","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,7]]},"reference":[{"key":"9_CR1","unstructured":"International Standard ISO\/IEC 29100:2011(E) Information technology \u2014 Security techniques \u2014 Privacy framework (2011)"},{"key":"9_CR2","unstructured":"Hoepman, J.: Privacy design strategies. arXiv Prepr. \n                  arXiv:1210.6621\n                  \n                , p. 12 (2012)"},{"key":"9_CR3","volume-title":"Software Patterns","author":"JO Coplien","year":"1996","unstructured":"Coplien, J.O.: Software Patterns. Lucent Technologies, Bell Labs Innovations, New York (1996)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Hafiz, M.: A collection of privacy design patterns. In: Proceedings of the 2006 Conference Pattern Languages Programs - PLoP 2006, vol. 1 (2006)","DOI":"10.1145\/1415472.1415481"},{"key":"9_CR5","unstructured":"Fischer-H\u00fcbner, S., K\u00f6ffel, C., Pettersson, J.-S., Wolkerstorfer, P., Graf, C., Holtz, L.E., K\u00f6nig, U., Hedbom, H., Kellermann, B.: HCI Pattern Collection \u2013 Version 2. Priv. Identity Manag. Eur. Life. 61 (2010)"},{"key":"9_CR6","unstructured":"Privacy Patterns: \n                  http:\/\/www.privacypatterns.org\n                  \n                . Accessed 14 July 2015"},{"key":"9_CR7","unstructured":"Privacypatterns.eu - Collecting Patterns for Better Privacy. \n                  https:\/\/privacypatterns.eu\/\n                  \n                . Accessed 14 July 2015"},{"key":"9_CR8","unstructured":"Alexander, C., Ishikawa, S., Silverstein, M.: A Pattern Language: Towns, Buildings, Construction (1977)"},{"key":"9_CR9","doi-asserted-by":"crossref","unstructured":"Schmidt, D.C., Buschmann, F.: Patterns, frameworks, and middleware: their synergistic relationships. In: Proceedings of the 25th International Conference on Software Engineering (2003)","DOI":"10.1109\/ICSE.2003.1201256"},{"key":"9_CR10","first-page":"395","volume":"206","author":"E Gamma","year":"1995","unstructured":"Gamma, E., Helm, R., Johnson, R.E., Vlissides, J.: Design patterns: elements of reusable object-oriented software. Design 206, 395 (1995)","journal-title":"Design"},{"key":"9_CR11","unstructured":"Anthony, S.F., Thompson, M.W., Swindle, O., Leary, T.B.: Privacy online\u202f: fair information practices in the electronic marketplace a report to congress. Security (2000)"},{"key":"9_CR12","unstructured":"Organisation of Economic Co-Operation and Development: OECD guidelines governing the protection of privacy and transborder flows of personal data (1980)"},{"key":"9_CR13","unstructured":"Proposal for a Regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (2012)"},{"key":"9_CR14","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1057\/palgrave.ejis.3000374","volume":"9","author":"JM Carroll","year":"2000","unstructured":"Carroll, J.M., Swatman, P.A.: Structured-case: a methodological framework for building theory in information systems research. Eur. J. Inf. Syst. 9, 235\u2013242 (2000)","journal-title":"Eur. J. Inf. Syst."},{"key":"9_CR15","unstructured":"Miles, M.B., Huberman, A.M.: Qualitative Data Analysis (1994)"},{"key":"9_CR16","unstructured":"Privacy Pattern Catalogue. \n                  privacypatterns.wu.ac.at\n                  \n                . Accessed 01 Nov 2015"},{"key":"9_CR17","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1016\/j.infoandorg.2006.11.001","volume":"17","author":"MD Myers","year":"2007","unstructured":"Myers, M.D., Newman, M.: The qualitative interview in IS research: examining the craft. Inf. Organ. 17, 2\u201326 (2007)","journal-title":"Inf. Organ."}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management. Time for a Revolution?"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-41763-9_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,20]],"date-time":"2020-07-20T00:10:46Z","timestamp":1595203846000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-41763-9_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319417622","9783319417639"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-41763-9_9","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"7 July 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}