{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T20:57:49Z","timestamp":1776113869668,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319470719","type":"print"},{"value":"9783319470726","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47072-6_15","type":"book-chapter","created":{"date-parts":[[2016,9,21]],"date-time":"2016-09-21T01:20:20Z","timestamp":1474420820000},"page":"221-229","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":38,"title":["PRIAM: A Privacy Risk Analysis Methodology"],"prefix":"10.1007","author":[{"given":"Sourya Joyee","family":"De","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Le M\u00e9tayer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,22]]},"reference":[{"key":"15_CR1","unstructured":"Privacy Risk Management for Federal Information Systems (2015). http:\/\/csrc.nist.gov\/publications\/drafts\/nistir-8062\/nistir-8062-draft.pdf"},{"key":"15_CR2","unstructured":"European Commission. General Data Protection Regulation (2016)"},{"key":"15_CR3","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1007\/978-3-319-18491-3_5","volume-title":"Trust Management IX","author":"T Antignac","year":"2015","unstructured":"Antignac, T., Le M\u00e9tayer, D.: Trust driven strategies for privacy by design. In: Damsgaard Jensen, C., Marsh, S., Dimitrakos, T., Murayama, Y. (eds.) IFIPTM 2015. IFIP AICT, vol. 454, pp. 60\u201375. Springer, Heidelberg (2015)"},{"key":"15_CR4","unstructured":"Baringer, F.: New Electricity Meters Stir Fear (2011). www.nytimes.com"},{"key":"15_CR5","first-page":"1131","volume":"86","author":"R Calo","year":"2011","unstructured":"Calo, R.: The Boundaries of Privacy Harm. Ind. LJ 86, 1131 (2011)","journal-title":"Ind. LJ"},{"key":"15_CR6","unstructured":"CNIL. Privacy Impact Assessment (PIA) Methodology (2015)"},{"key":"15_CR7","unstructured":"CNIL. Privacy Impact Assessment (PIA) Tools (2015)"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"De, S.J., Le M\u00e9tayer, D.: Privacy harm analysis: a case study on smart grids. In: International Workshop on Privacy Engineering, IEEE (2016)","DOI":"10.1109\/SPW.2016.21"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"De, S.J., Le M\u00e9tayer, D.: PRIAM: A Privacy Risk Analysis Methodology. INRIA Research Report, (RR-8876), July 2016","DOI":"10.1007\/978-3-319-47072-6_15"},{"issue":"1","key":"15_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00766-010-0115-7","volume":"16","author":"M Deng","year":"2011","unstructured":"Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfilment of privacy requirements. Requirements Eng. 16(1), 3\u201332 (2011)","journal-title":"Requirements Eng."},{"key":"15_CR11","series-title":"Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1007\/978-3-319-11569-6_65","volume-title":"Mobile and Ubiquitous Systems: Computing, Networking, and Services","author":"J Friginal","year":"2014","unstructured":"Friginal, J., Guiochet, J., Killijian, M.-O.: Towards a privacy risk assessment methodology for location-based systems. In: Stojmenovic, I., Cheng, Z., Guo, S. (eds.) MindCare 2014. LNICSSITE, vol. 131, pp. 748\u2013753. Springer, Heidelberg (2014). doi: 10.1007\/978-3-319-11569-6_65"},{"key":"15_CR12","first-page":"515","volume":"26","author":"K Hill","year":"2011","unstructured":"Hill, K.: Fitbit moves quickly after users\u2019 sex stats exposed. Forbes 26, 515\u2013519 (2011)","journal-title":"Forbes"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Kordy, B., Mauw, S., Radomirovi\u0107, S., Schweitzer, P.: Attack-defense trees. J. Logic Comput. 24(1), 55\u201387 (2014)","DOI":"10.1093\/logcom\/exs029"},{"issue":"1","key":"15_CR14","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MSP.2010.40","volume":"8","author":"M Lisovich","year":"2010","unstructured":"Lisovich, M., Mulligan, D.K., Wicker, S.B., et al.: Inferring personal information from demand-response systems. Secur. Priv. IEEE 8(1), 11\u201320 (2010)","journal-title":"Secur. Priv. IEEE"},{"issue":"2","key":"15_CR15","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1057\/ejis.2013.18","volume":"23","author":"MC Oetzel","year":"2014","unstructured":"Oetzel, M.C., Spiekermann, S.: A systematic methodology for privacy impact assessments: a design science approach. Eur. J. Inf. Syst. 23(2), 126\u2013150 (2014)","journal-title":"Eur. J. Inf. Syst."},{"key":"15_CR16","unstructured":"Oetzel, M.C., Spiekermann, S., Gr\u00fcning, I., Kelter, H., Mull, S.: Privacy Impact Assessment Guideline for RFID Applications (2011). www.bsi.bund.de"},{"key":"15_CR17","unstructured":"SGTF. Data Protection Impact Assessment Template for Smart Grid and Smart Metering Systems (2014). http:\/\/ec.europa.eu\/"},{"key":"15_CR18","doi-asserted-by":"publisher","first-page":"477","DOI":"10.2307\/40041279","volume":"154","author":"DJ Solove","year":"2006","unstructured":"Solove, D.J.: A taxonomy of privacy. U. Pa. L. Rev. 154, 477\u2013564 (2006)","journal-title":"U. Pa. L. Rev."},{"issue":"5","key":"15_CR19","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1080\/01972243.2013.825687","volume":"29","author":"D Wright","year":"2013","unstructured":"Wright, D.: Making privacy impact assessment more effective. Inf. Soc. 29(5), 307\u2013315 (2013)","journal-title":"Inf. Soc."},{"issue":"1","key":"15_CR20","doi-asserted-by":"crossref","first-page":"160","DOI":"10.30950\/jcer.v9i1.513","volume":"9","author":"D Wright","year":"2013","unstructured":"Wright, D., Finn, R., Rodrigues, R.: A comparative analysis of privacy impact assessment in six countries. J. Contemp. Eur. Res. 9(1), 160\u2013180 (2013)","journal-title":"J. Contemp. Eur. Res."},{"key":"15_CR21","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-31668-5_19","volume-title":"Privacy and Identity Management for Life","author":"H Zwingelberg","year":"2012","unstructured":"Zwingelberg, H., Hansen, M.: Privacy protection goals and their implications for eID systems. In: Camenisch, J., Crispo, B., Fischer-H\u00fcbner, S., Leenes, R., Russello, G. (eds.) Privacy and Identity Management for Life. IFIP AICT, vol. 375, pp. 245\u2013260. Springer, Heidelberg (2012)"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management and Security Assurance"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47072-6_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,8]],"date-time":"2022-07-08T22:09:17Z","timestamp":1657318157000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47072-6_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319470719","9783319470726"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47072-6_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"22 September 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}