{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:04:56Z","timestamp":1760043896840,"version":"3.40.3"},"publisher-location":"Cham","reference-count":53,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584591"},{"type":"electronic","value":"9783319584607"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58460-7_50","type":"book-chapter","created":{"date-parts":[[2017,5,12]],"date-time":"2017-05-12T11:08:42Z","timestamp":1494587322000},"page":"739-752","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Designing Privacy for You: A Practical Approach for User-Centric Privacy"],"prefix":"10.1007","author":[{"given":"Awanthika","family":"Senarath","sequence":"first","affiliation":[]},{"given":"Nalin A. G.","family":"Arachchilage","sequence":"additional","affiliation":[]},{"given":"Jill","family":"Slay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"key":"50_CR1","unstructured":"Fahrenthold, D.A.: Trump recorded having extremely lewd conversation about women in 2005. https:\/\/www.washingtonpost.com\/politics\/trump-recorded-having-extremely-lewd-conversation-about-women-in-2005\/2016\/10\/07\/3b9ce776-8cb4-11e6-bf8a-3d26847eeed4_story.html. Accessed 14 Oct 2016"},{"key":"50_CR2","unstructured":"Facebook data policy. https:\/\/www.facebook.com\/policy.php. Accessed 21 Aug 2016"},{"key":"50_CR3","unstructured":"Curran, P.: August 2016 hacks: 8 of the largest hacks, breaches and cyber incidents. https:\/\/www.checkmarx.com\/2016\/09\/11\/august-2016-hacks-8-largest-hacks-breaches-cyber-incidents. Accessed 03 Nov 2016"},{"key":"50_CR4","unstructured":"Abrahamsson, P., Salo, O., Ronkainen, J., Warsta, J., Agile software development methods: review and analysis (2002)"},{"issue":"12","key":"50_CR5","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1145\/322796.322806","volume":"42","author":"A Adams","year":"1999","unstructured":"Adams, A., Sasse, M.A.: Users are not the enemy. Commun. ACM 42(12), 40\u201346 (1999)","journal-title":"Commun. ACM"},{"issue":"2","key":"50_CR6","first-page":"12","volume":"5","author":"A Anwar","year":"2014","unstructured":"Anwar, A.: A review of RUP (Rational Unified Process). Int. J. Softw. Eng. (IJSE) 5(2), 12\u201319 (2014)","journal-title":"Int. J. Softw. Eng. (IJSE)"},{"key":"50_CR7","doi-asserted-by":"crossref","unstructured":"Arachchilage, N.A.G., Martin, A.P.: A trust domains taxonomy for securely sharing information: a preliminary investigation. In: HAISA, pp. 53\u201368 (2014)","DOI":"10.1109\/ICIST.2013.6747559"},{"key":"50_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/978-3-642-02843-4_7","volume-title":"Dataspace: The Final Frontier","author":"K Barker","year":"2009","unstructured":"Barker, K., Askari, M., Banerjee, M., Ghazinour, K., Mackas, B., Majedi, M., Pun, S., Williams, A.: A data privacy taxonomy. In: Sexton, A.P. (ed.) BNCOD 2009. LNCS, vol. 5588, pp. 42\u201354. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-02843-4_7"},{"key":"50_CR9","volume-title":"Privacy: What Developers and IT Professionals Should Know","author":"J Cannon","year":"2004","unstructured":"Cannon, J.: Privacy: What Developers and IT Professionals Should Know. Addison-Wesley Professional, Boston (2004)"},{"issue":"5","key":"50_CR10","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MSP.2016.95","volume":"14","author":"DD Caputo","year":"2016","unstructured":"Caputo, D.D., Pfleeger, S.L., Sasse, M.A., Ammann, P., Offutt, J., Deng, L.: Barriers to usable security? Three organizational case studies. IEEE Secur. Priv. 14(5), 22\u201332 (2016)","journal-title":"IEEE Secur. Priv."},{"issue":"2","key":"50_CR11","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/s12394-010-0062-y","volume":"3","author":"A Cavoukian","year":"2010","unstructured":"Cavoukian, A.: Privacy by design: the definitive workshop. A foreword by Ann Cavoukian, Ph.D. Identity Inf. Soc. 3(2), 247\u2013251 (2010)","journal-title":"Identity Inf. Soc."},{"issue":"2","key":"50_CR12","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s12394-010-0053-z","volume":"3","author":"A Cavoukian","year":"2010","unstructured":"Cavoukian, A., Taylor, S., Abrams, M.E.: Privacy by design: essential for organizational accountability and strong business practices. Identity Inf. Soc. 3(2), 405\u2013413 (2010)","journal-title":"Identity Inf. Soc."},{"issue":"2","key":"50_CR13","first-page":"340","volume":"10","author":"J Cho","year":"2009","unstructured":"Cho, J.: A hybrid software development method for large-scale projects: rational unified process with scrum. Issues Inf. Syst. 10(2), 340\u2013348 (2009)","journal-title":"Issues Inf. Syst."},{"issue":"2","key":"50_CR14","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.clsr.2009.02.002","volume":"25","author":"R Clarke","year":"2009","unstructured":"Clarke, R.: Privacy impact assessment: its origins and development. Comput. Law Secur. Rev. 25(2), 123\u2013135 (2009)","journal-title":"Comput. Law Secur. Rev."},{"key":"50_CR15","unstructured":"Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J.-H., Metayer, D.L., Tirtea, R., Schiffner, S.: Privacy data protection by design-from policy to engineering. arXiv preprint arXiv:1501.03726 (2015)"},{"key":"50_CR16","unstructured":"Danezis, G., G\u00fcrses, S.: A critical review of 10 years of privacy technology. In: Proceedings of surveillance cultures: a global surveillance society, pp. 1\u201316 (2010)"},{"key":"50_CR17","unstructured":"Davies, S.: Why privacy by design is the next crucial step for privacy protection (2010)"},{"key":"50_CR18","doi-asserted-by":"crossref","unstructured":"Fuggetta, A.: Software process: a roadmap. In: Proceedings of the Conference on the Future of Software Engineering, pp. 25\u201334. ACM (2000)","DOI":"10.1145\/336512.336521"},{"key":"50_CR19","doi-asserted-by":"crossref","unstructured":"Gellman, R.: Fair information practices: a basic history. Available at SSRN 2415020 (2015)","DOI":"10.2139\/ssrn.2415020"},{"issue":"6","key":"50_CR20","doi-asserted-by":"publisher","first-page":"594","DOI":"10.1080\/0144929X.2012.659218","volume":"32","author":"MN Giannakos","year":"2013","unstructured":"Giannakos, M.N., Chorianopoulos, K., Giotopoulos, K., Vlamos, P.: Using Facebook out of habit. Behav. Inf. Technol. 32(6), 594\u2013602 (2013)","journal-title":"Behav. Inf. Technol."},{"key":"50_CR21","doi-asserted-by":"crossref","unstructured":"Grechanik, M., Csallner, C., Fu, C., Xie, Q.: Is data privacy always good for software testing? In: IEEE 21st International Symposium on Software Reliability Engineering, pp. 368\u2013377. IEEE (2010)","DOI":"10.1109\/ISSRE.2010.13"},{"key":"50_CR22","unstructured":"G\u00fcrses, S., Troncoso, C., Diaz, C.: Engineering privacy by design. Comput. Priv. Data Prot. 14(3) (2011)"},{"key":"50_CR23","doi-asserted-by":"crossref","unstructured":"Hall, J.G., Rapanotti, L.: Towards a design-theoretic characterisation of software development process models. In: Proceedings of the Fourth SEMAT Workshop on General Theory of Software Engineering, pp. 3\u201314. IEEE Press (2015)","DOI":"10.1109\/GTSE.2015.8"},{"key":"50_CR24","series-title":"IFIP advances in information and communication technology","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1007\/978-3-642-55415-5_38","volume-title":"ICT Systems Security and Privacy Protection","author":"J-H Hoepman","year":"2014","unstructured":"Hoepman, J.-H.: Privacy design strategies. In: Cuppens-Boulahia, N., Cuppens, F., Jajodia, S., Abou El Kalam, A., Sans, T. (eds.) SEC 2014. IAICT, vol. 428, pp. 446\u2013459. Springer, Heidelberg (2014). doi:10.1007\/978-3-642-55415-5_38"},{"key":"50_CR25","doi-asserted-by":"crossref","unstructured":"Jensen, C., Potts, C.: Privacy policies as decision-making tools: an evaluation of online privacy notices. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 471\u2013478. ACM (2004)","DOI":"10.1145\/985692.985752"},{"key":"50_CR26","doi-asserted-by":"crossref","unstructured":"Kelley, P.G., Cesca, L., Bresee, J., Cranor, L.F.: Standardizing privacy notices: an online study of the nutrition label approach. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1573\u20131582. ACM (2010)","DOI":"10.1145\/1753326.1753561"},{"key":"50_CR27","unstructured":"Kerry Spalding, J.Y.T.: Practical strategies for integrating privacy by design throughout product development process. In: Proceedings of the CHI Conference Extended Abstracts on Human Factors in Computing Systems, pp. 3415\u20133422. ACM (2016)"},{"key":"50_CR28","doi-asserted-by":"crossref","unstructured":"Kincaid, J.P., Fishburne, R.P., Rogers, R.L., Chissom, B.S.: Derivation of new readability formulas (automated readability index, fog count and flesch reading ease formula) for navy enlisted personnel. Technical report, DTIC Document (1975)","DOI":"10.21236\/ADA006655"},{"key":"50_CR29","unstructured":"Kumar, P.: Ranking digital rights: pushing ICT companies to respect users privacy. In: CHI 2016 Workshop: Bridging the Gap Between Privacy by Design and Privacy in Practice, p. 15. CHI (2016)"},{"key":"50_CR30","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/978-3-319-12574-9_6","volume-title":"Cyber Security and Privacy","author":"N Notario","year":"2014","unstructured":"Notario, N., Crespo, A., Kung, A., Kroener, I., M\u00e9tayer, D., Troncoso, C., del \u00c1lamo, J.M., Mart\u00edn, Y.S.: PRIPARE: a new vision on engineering privacy and security by design. In: Cleary, F., Felici, M. (eds.) CSP 2014. CCIS, vol. 470, pp. 65\u201376. Springer, Cham (2014). doi:10.1007\/978-3-319-12574-9_6"},{"issue":"6","key":"50_CR31","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1007\/s00779-004-0304-9","volume":"8","author":"S Lederer","year":"2004","unstructured":"Lederer, S., Hong, J.I., Dey, A.K., Landay, J.A.: Personal privacy through understanding and action: five pitfalls for designers. Pers. Ubiquit. Comput. 8(6), 440\u2013454 (2004)","journal-title":"Pers. Ubiquit. Comput."},{"key":"50_CR32","doi-asserted-by":"crossref","unstructured":"LeFevre, K., DeWitt, D.J., Ramakrishnan, R.: Incognito: efficient full-domain k-anonymity. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, pp. 49\u201360. ACM (2005)","DOI":"10.1145\/1066157.1066164"},{"key":"50_CR33","unstructured":"Leon, P.G., Rao, A., Schaub, F., Marsh, A., Cranor, L.F., Sadeh, N.: Why people are (Un) willing to share information with online advertisers (2015)"},{"key":"50_CR34","doi-asserted-by":"crossref","unstructured":"Leon, P.G., Ur, B., Wang, Y., Sleeper, M., Balebako, R., Shay, R., Bauer, L., Christodorescu, M., Cranor, L.F., What matters to users?: factors that affect users\u2019 willingness to share information with online advertisers. In: Proceedings of the Ninth Symposium on Usable Privacy and Security, p. 7. ACM (2013)","DOI":"10.1145\/2501604.2501611"},{"issue":"1","key":"50_CR35","first-page":"6","volume":"5","author":"K Liu","year":"2010","unstructured":"Liu, K., Terzi, E.: A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Discov. Data (TKDD) 5(1), 6 (2010)","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"key":"50_CR36","unstructured":"Maximilien, E.M., Grandison, T., Sun, T., Richardson, D., Guo, S., Liu, K.: Privacy-as-a-service: models, algorithms, and results on the Facebook platform. In: Proceedings of Web, vol. 2 (2009)"},{"key":"50_CR37","doi-asserted-by":"crossref","unstructured":"Minkus, T., Memon, N.: On a scale from 1 to 10, how private are you? Scoring facebook privacy settings. In: Proceedings of the Workshop on Usable Security (USEC 2014). Internet Society (2014)","DOI":"10.14722\/usec.2014.23013"},{"issue":"1","key":"50_CR38","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s00779-011-0412-2","volume":"16","author":"A Oulasvirta","year":"2012","unstructured":"Oulasvirta, A., Rattenbury, T., Ma, L., Raita, E.: Habits make smartphone use more pervasive. Pers. Ubiquit. Comput. 16(1), 105\u2013114 (2012)","journal-title":"Pers. Ubiquit. Comput."},{"key":"50_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-642-01718-6_7","volume-title":"Privacy, Security, and Trust in KDD","author":"Y Rachlin","year":"2009","unstructured":"Rachlin, Y., Probst, K., Ghani, R.: Maximizing privacy under data distortion constraints in noise perturbation methods. In: Bonchi, F., Ferrari, E., Jiang, W., Malin, B. (eds.) PInKDD 2008. LNCS, vol. 5456, pp. 92\u2013110. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-01718-6_7"},{"key":"50_CR40","unstructured":"Rao, A., Schaub, F., Sadeh, N., Acquisti, A., Kang, R.: Expecting the unexpected: understanding mismatched privacy expectations online. In: Federal Trade Commission PrivacyCon Conference (2016)"},{"key":"50_CR41","unstructured":"Rashtian, H., Boshmaf, Y., Jaferian, P., Beznosov, K.: To befriend or not? A model of friend request acceptance on Facebook. In: Symposium on Usable Privacy and Security (SOUPS 2014), pp. 285\u2013300 (2014)"},{"key":"50_CR42","doi-asserted-by":"crossref","unstructured":"Rubinstein, I., Good, N.: Privacy by design: a counterfactual analysis of Google and Facebook privacy incidents (2012)","DOI":"10.2139\/ssrn.2128146"},{"key":"50_CR43","volume-title":"Object-Oriented Analysis Design: With the Unified Process","author":"JW Satzinger","year":"2005","unstructured":"Satzinger, J.W., Jackson, R.B., Burd, S.D.: Object-Oriented Analysis Design: With the Unified Process. Thomson Course Technology, Boston (2005)"},{"key":"50_CR44","unstructured":"Schaub, F., Balebako, R., Durity, A.L., Cranor, L.F.: A design space for effective privacy notices. In: Eleventh Symposium on Usable Privacy and Security (SOUPS 2015), pp. 1\u201317 (2015)"},{"key":"50_CR45","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-1-4471-0947-1_11","volume-title":"Business Object Design and Implementation","author":"K Schwaber","year":"1997","unstructured":"Schwaber, K.: SCRUM development process. In: Sutherland, J., Casanave, C., Miller, J., Patel, P., Hollowell, G. (eds.) Business Object Design and Implementation, pp. 117\u2013134. Springer, London (1997)"},{"issue":"3","key":"50_CR46","doi-asserted-by":"publisher","first-page":"477","DOI":"10.2307\/40041279","volume":"154","author":"DJ Solove","year":"2006","unstructured":"Solove, D.J.: A taxonomy of privacy. Univ. Pa. Law Rev. 154(3), 477\u2013564 (2006)","journal-title":"Univ. Pa. Law Rev."},{"key":"50_CR47","volume-title":"Information Privacy Law","author":"DJ Solove","year":"2003","unstructured":"Solove, D.J., Rotenberg, M., Schwartz, P.M.: Information Privacy Law, 4th edn. Aspen Publishers, New York (2003)","edition":"4"},{"issue":"7","key":"50_CR48","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/2209249.2209263","volume":"55","author":"S Spiekermann","year":"2012","unstructured":"Spiekermann, S.: The challenges of privacy by design. Commun. ACM 55(7), 38\u201340 (2012)","journal-title":"Commun. ACM"},{"issue":"1","key":"50_CR49","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/TSE.2008.88","volume":"35","author":"S Spiekermann","year":"2009","unstructured":"Spiekermann, S., Cranor, L.F.: Engineering privacy. IEEE Trans. Softw. Eng. 35(1), 67\u201382 (2009)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"50_CR50","doi-asserted-by":"crossref","unstructured":"Stark, L., King, J., Page, X., Lampinen, A., Vitak, J., Wisniewski, P., Whalen, T., Good, N.: Bridging the gap between privacy by design and privacy in practice. In: Proceedings of the CHI Conference Extended Abstracts on Human Factors in Computing Systems, pp. 3415\u20133422. ACM (2016)","DOI":"10.1145\/2851581.2856503"},{"key":"50_CR51","volume-title":"A Project Guide to UX Design: For User Experience Designers in the Field or in the Making","author":"R Unger","year":"2012","unstructured":"Unger, R., Chandler, C.: A Project Guide to UX Design: For User Experience Designers in the Field or in the Making. New Riders, Indianapolis (2012)"},{"key":"50_CR52","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/978-3-642-54069-1_4","volume-title":"Privacy Technologies and Policy","author":"J van Rest","year":"2014","unstructured":"van Rest, J., Boonstra, D., Everts, M., van Rijn, M., van Paassen, R.: Designing privacy-by-design. In: Preneel, B., Ikonomou, D. (eds.) APF 2012. LNCS, vol. 8319, pp. 55\u201372. Springer, Heidelberg (2014). doi:10.1007\/978-3-642-54069-1_4"},{"key":"50_CR53","doi-asserted-by":"crossref","unstructured":"Voigt, S., von Garrel, J., M\u00fcller, J., Wirth, D.: A study of documentation in agile software projects. In: Proceedings of the 10th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement, p. 4. ACM (2016)","DOI":"10.1145\/2961111.2962616"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy and Trust"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58460-7_50","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T02:05:50Z","timestamp":1625105150000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58460-7_50"}},"subtitle":["Practical Approach for User-Centric Privacy"],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584591","9783319584607"],"references-count":53,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58460-7_50","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"13 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"HAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Human Aspects of Information Security, Privacy, and Trust","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vancouver, BC","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 July 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"has2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}