{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,2]],"date-time":"2025-07-02T22:23:53Z","timestamp":1751495033335,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319584683"},{"type":"electronic","value":"9783319584690"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-58469-0_29","type":"book-chapter","created":{"date-parts":[[2017,5,3]],"date-time":"2017-05-03T11:34:53Z","timestamp":1493811293000},"page":"427-441","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Towards Systematic Privacy and Operability (PRIOP) Studies"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5274-0324","authenticated-orcid":false,"given":"Rene","family":"Meis","sequence":"first","affiliation":[]},{"given":"Maritta","family":"Heisel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,4]]},"reference":[{"key":"29_CR1","unstructured":"GSMA: MOBILE PRIVACY: consumer research insights and considerations for policymakers. http:\/\/goo.gl\/pAcvAm. Accessed 1 Mar 2017"},{"key":"29_CR2","unstructured":"IEC: IEC 61882: 2001 Hazard and Operability Studies (HAZOP Studies) - Application Guide (2001)"},{"issue":"2","key":"29_CR3","doi-asserted-by":"publisher","first-page":"28","DOI":"10.3390\/info7020028","volume":"7","author":"R Meis","year":"2016","unstructured":"Meis, R., Heisel, M.: Computer-aided identification and validation of privacy requirements. Information 7(2), 28 (2016)","journal-title":"Information"},{"key":"29_CR4","series-title":"Analyzing and Structuring Software Development Problems","volume-title":"Problem Frames","author":"M Jackson","year":"2001","unstructured":"Jackson, M.: Problem Frames. Analyzing and Structuring Software Development Problems. Addison-Wesley, Boston (2001)"},{"key":"29_CR5","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1007\/978-3-642-55137-6_12","volume-title":"Privacy and Identity Management for Emerging Services and Technologies","author":"R Meis","year":"2014","unstructured":"Meis, R.: Problem-based consideration of privacy-relevant domain knowledge. In: Hansen, M., Hoepman, J.-H., Leenes, R., Whitehouse, D. (eds.) Privacy and Identity 2013. IAICT, vol. 421, pp. 150\u2013164. Springer, Heidelberg (2014). doi:10.1007\/978-3-642-55137-6_12"},{"key":"29_CR6","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-319-30142-6_5","volume-title":"Software Technologies","author":"R Meis","year":"2016","unstructured":"Meis, R., Heisel, M.: Supporting privacy impact assessments using problem-based privacy analysis. In: Lorenz, P., Cardoso, J., Maciaszek, L.A., Sinderen, M. (eds.) ICSOFT 2015. CCIS, vol. 586, pp. 79\u201398. Springer, Cham (2016). doi:10.1007\/978-3-319-30142-6_5"},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Hansen, M., Jensen, M., Rost, M.: Protection goals for privacy engineering. In: IEEE Symposium on Security and Privacy Workshops, SPW, pp. 159\u2013166. IEEE Computer Society (2015)","DOI":"10.1109\/SPW.2015.13"},{"key":"29_CR8","unstructured":"Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management v0.34, August 2010"},{"key":"29_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1007\/978-3-319-22906-5_15","volume-title":"Trust, Privacy and Security in Digital Business","author":"R Meis","year":"2015","unstructured":"Meis, R., Wirtz, R., Heisel, M.: A taxonomy of requirements for the privacy goal transparency. In: Fischer-H\u00fcbner, S., Lambrinoudakis, C., Lopez, J. (eds.) TrustBus 2015. LNCS, vol. 9264, pp. 195\u2013209. Springer, Cham (2015). doi:10.1007\/978-3-319-22906-5_15"},{"key":"29_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-319-44341-6_6","volume-title":"Trust, Privacy and Security in Digital Business","author":"R Meis","year":"2016","unstructured":"Meis, R., Heisel, M.: Understanding the privacy goal intervenability. In: Katsikas, S., Lambrinoudakis, C., Furnell, S. (eds.) TrustBus 2016. LNCS, vol. 9830, pp. 79\u201394. Springer, Cham (2016). doi:10.1007\/978-3-319-44341-6_6"},{"key":"29_CR11","unstructured":"G\u00fcrses, F.S.: Multilateral privacy requirements analysis in online social network services. Ph.D. thesis, Katholieke Universiteit Leuven (2010)"},{"issue":"2","key":"29_CR12","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/2556938","volume":"57","author":"W Young","year":"2014","unstructured":"Young, W., Leveson, N.G.: An integrated approach to safety and security based on systems theory. Commun. ACM 57(2), 31\u201335 (2014)","journal-title":"Commun. ACM"},{"key":"29_CR13","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00766-010-0115-7","volume":"16","author":"M Deng","year":"2011","unstructured":"Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir. Eng. 16, 3\u201332 (2011)","journal-title":"Requir. Eng."},{"issue":"1","key":"29_CR14","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.clsr.2011.11.007","volume":"28","author":"D Wright","year":"2012","unstructured":"Wright, D.: The state of the art in privacy impact assessment. Comput. Law Secur. Rev. 28(1), 54\u201361 (2012)","journal-title":"Comput. Law Secur. Rev."},{"issue":"2","key":"29_CR15","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1057\/ejis.2013.18","volume":"23","author":"M Oetzel","year":"2014","unstructured":"Oetzel, M., Spiekermann, S.: A systematic methodology for privacy impact assessments: a design science approach. Eur. J. Inf. Syst. 23(2), 126\u2013150 (2014)","journal-title":"Eur. J. Inf. Syst."},{"key":"29_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/978-3-319-44760-5_2","volume-title":"Privacy Technologies and Policy","author":"F Bieker","year":"2016","unstructured":"Bieker, F., Friedewald, M., Hansen, M., Obersteller, H., Rost, M.: A process for data protection impact assessment under the European general data protection regulation. In: Schiffner, S., Serna, J., Ikonomou, D., Rannenberg, K. (eds.) APF 2016. LNCS, vol. 9857, pp. 21\u201337. Springer, Cham (2016). doi:10.1007\/978-3-319-44760-5_2"},{"key":"29_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-319-31456-3_4","volume-title":"Privacy Technologies and Policy","author":"R Alnemr","year":"2016","unstructured":"Alnemr, R., Cayirci, E., Corte, L.D., Garaga, A., Leenes, R., Mhungu, R., Pearson, S., Reed, C., Oliveira, A.S., Stefanatou, D., Tetrimida, K., Vranaki, A.: A data protection impact assessment methodology for cloud. In: Berendt, B., Engel, T., Ikonomou, D., Le M\u00e9tayer, D., Schiffner, S. (eds.) APF 2015. LNCS, vol. 9484, pp. 60\u201392. Springer, Cham (2016). doi:10.1007\/978-3-319-31456-3_4"},{"issue":"4","key":"29_CR18","doi-asserted-by":"publisher","first-page":"734","DOI":"10.1016\/j.csi.2013.12.008","volume":"36","author":"AV Uzunov","year":"2014","unstructured":"Uzunov, A.V., Fernandez, E.B.: An extensible pattern-based library and taxonomy of security threats for distributed systems. Comput. Stan. Interfaces 36(4), 734\u2013747 (2014)","journal-title":"Comput. Stan. Interfaces"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-58469-0_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,22]],"date-time":"2021-05-22T00:08:05Z","timestamp":1621642085000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-58469-0_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319584683","9783319584690"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-58469-0_29","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"4 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on ICT Systems Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Rome","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 May 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31 May 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"32","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sec2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ifipsec.org\/2017\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}