{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T10:29:08Z","timestamp":1752229748744,"version":"3.41.0"},"publisher-location":"Cham","reference-count":51,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319591704"},{"type":"electronic","value":"9783319591711"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59171-1_15","type":"book-chapter","created":{"date-parts":[[2017,5,19]],"date-time":"2017-05-19T08:09:03Z","timestamp":1495181343000},"page":"199-218","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Strong Accountability and Its Contribution to Trustworthy Data Handling in the Information Society"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3576-9402","authenticated-orcid":false,"given":"Siani","family":"Pearson","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,20]]},"reference":[{"key":"15_CR1","unstructured":"European Data Protection Supervisor (EDPS): Towards a New Digital Ethics. Opinion 4\/2015, 11 September 2015"},{"key":"15_CR2","volume-title":"Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World","author":"B Schneier","year":"2015","unstructured":"Schneier, B.: Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. W.W. Norton & Co., New York (2015)"},{"key":"15_CR3","unstructured":"General Data Protection Regulation (GDPR): Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95\/46\/EC (2016)"},{"issue":"2","key":"15_CR4","doi-asserted-by":"publisher","first-page":"53","DOI":"10.17645\/mac.v3i2.297","volume":"3","author":"N Ni Loideain","year":"2015","unstructured":"Ni Loideain, N.: EU law and mass internet metadata surveillance in the post-snowden era. Media Commun. 3(2), 53\u201362 (2015). doi:10.17645\/mac.v3i2.297","journal-title":"Media Commun."},{"key":"15_CR5","unstructured":"UK Investigatory Powers Act (2016). https:\/\/www.gov.uk\/government\/collections\/investigatory-powers-bill"},{"issue":"1","key":"15_CR6","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1080\/13511610.2013.732753","volume":"26","author":"A Charlesworth","year":"2013","unstructured":"Charlesworth, A., Pearson, S.: Developing accountability-based solutions for data privacy in the cloud. innovation, special issue: privacy and technology. Eur. J Soc. Sci. Res. 26(1), 7\u201335 (2013). Taylor & Francis","journal-title":"Eur. J Soc. Sci. Res."},{"key":"15_CR7","series-title":"Computer Communications and Networks","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-1-4471-4189-1_1","volume-title":"Privacy and Security for Cloud Computing","author":"S Pearson","year":"2013","unstructured":"Pearson, S.: Privacy, security and trust in cloud computing. In: Pearson, S., Yee, G. (eds.) Privacy and Security for Cloud Computing. CCN, pp. 3\u201342. Springer, London (2013). doi:10.1007\/978-1-4471-4189-1_1"},{"key":"15_CR8","unstructured":"Shae, M.: English translation of German Chancellor Angela Merkel\u2019s speech to the German Parliament, 29 January 2014"},{"key":"15_CR9","unstructured":"UK Information Economy Council: Addressing consumer confidence in the Digital Economy (2015). http:\/\/www.digitalcatapultcentre.org.uk\/wp-content\/uploads\/2015\/04\/Information-Economy-Council-IEC-Principles-Consultation.pdf"},{"key":"15_CR10","unstructured":"Article 29 Data Protection Working Party: Opinion 05\/2012 on Cloud Computing (2012)"},{"key":"15_CR11","unstructured":"Cloud Security Alliance (CSA): The Treacherous Twelve: Cloud Computing Top Threats in 2016, Top Threats Working Group (2016)"},{"key":"15_CR12","unstructured":"CSA: The Notorious Nine: Cloud Computing Top Threats in 2013. Top Threats Working Group, February 2013"},{"key":"15_CR13","unstructured":"European Parliament (EP): Fighting Cyber Crime and Protecting Privacy in the Cloud. Directorate-General for Internal Policies (2012)"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Berners-Lee, T., Halpin, H.: Defend the web. In: Bus, J., Crompton, M., Hildebrandt, M., Metakides, G. (eds.) Digital Enlightenment Yearbook, pp. 3\u201312. IOS Press (2012)","DOI":"10.3233\/978-1-61499-057-4-3"},{"key":"15_CR15","unstructured":"Jourova, V.: Data protection Eurobarometer. European Commission Factsheet 431 (2015)"},{"key":"15_CR16","unstructured":"Wilton, R.: Four ethical issues in online trust. In: CREDS 2014 (2014)"},{"key":"15_CR17","unstructured":"Harris, I: Commercial Ethics: Process or Outcome? Gresham Lecture, London, 6 November 2008"},{"key":"15_CR18","unstructured":"Moriaty, J.: Business Ethics. Stanford Encyclopedia of Philosophy, November 2016"},{"key":"15_CR19","unstructured":"Friedman, M.: The Social Responsibility of Business is to Increase Its Profits. New York Times Magazine, 13 September 1970"},{"key":"15_CR20","doi-asserted-by":"crossref","first-page":"117","DOI":"10.2307\/259398","volume":"26","author":"A McWilliams","year":"2001","unstructured":"McWilliams, A., Siegel, D.: Corporate social responsibility: a theory of the firm perspective. Acad. Manag. Rev. 26, 117\u2013127 (2001)","journal-title":"Acad. Manag. Rev."},{"issue":"1","key":"15_CR21","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1108\/14779961111123223","volume":"9","author":"I Harris","year":"2010","unstructured":"Harris, I., Jennings, R.C., Pullinger, D., Rogerson, S., Duquenoy, P.: Ethical assessment of new technologies: a meta-methodology. J. Inf. Commun. Ethics Soc. 9(1), 49\u201364 (2010). Emerald Group Publishing","journal-title":"J. Inf. Commun. Ethics Soc."},{"key":"15_CR22","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1109\/MSP.2012.52","volume":"10","author":"M Bailey","year":"2012","unstructured":"Bailey, M., Dittrich, D., Kenneally, E., Maughan, D.: The Menlo Report. IEEE Secur. Priv. 10, 71\u201375 (2012)","journal-title":"IEEE Secur. Priv."},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Information Accountability Foundation: A Unified Ethical Frame for Big Data Analysis. Big Data Ethics Project, v1.0 (2014)","DOI":"10.1177\/2053951714559253"},{"key":"15_CR24","unstructured":"UK Cabinet Office: Data Science Ethical Framework, v1.0, 19 May 2016"},{"key":"15_CR25","unstructured":"EPDS: Meeting the Challenges of Big Data. Opinion 7\/2015, 19 November 2015"},{"key":"15_CR26","unstructured":"EDPS: Opinion on coherent enforcement of fundamental rights in the age of big data. Opinion 8\/2016, 23 September 2016"},{"key":"15_CR27","doi-asserted-by":"publisher","first-page":"266","DOI":"10.1111\/j.1467-9973.1985.tb00173.x","volume":"16","author":"JH Moor","year":"1985","unstructured":"Moor, J.H.: What is computer ethics? Metaphilosophy 16, 266\u2013275 (1985)","journal-title":"Metaphilosophy"},{"issue":"3","key":"15_CR28","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1080\/019722498128809","volume":"14","author":"GT Marx","year":"1998","unstructured":"Marx, G.T.: An ethics for the new surveillance. Inf. Soc. 14(3), 171\u2013186 (1998)","journal-title":"Inf. Soc."},{"key":"15_CR29","unstructured":"Raab, C.D.: Information Privacy: Ethics and Accountability, Keynote Presentation for the Expert Workshop on \u2018Cultures of Accountability\u2019, KU Leuven, 13 November 2014"},{"key":"15_CR30","unstructured":"Lake, R.: Social Accountability, the OECD Guidelines for Multinational Enterprises and the OECD Principles of Corporate Governance (1999)"},{"key":"15_CR31","unstructured":"Organization for Economic Cooperation and Development (OECD): Guidelines on the Protection of Privacy and Transborder Flows of Personal Data (1980)"},{"key":"15_CR32","unstructured":"Information Commissioner\u2019s Office (ICO): Binding corporate rules (2012)"},{"key":"15_CR33","unstructured":"APEC Data Privacy Sub-Group: Cross-border privacy enforcement arrangement, San Francisco (2011). http:\/\/aimp.apec.org\/Documents\/2011\/ECSG\/DPS2\/11_ecsg_dps2_010.pdf"},{"key":"15_CR34","unstructured":"Papanikolaou, N., Pearson, S.: A cross-disciplinary review of the concept of accountability. In: Proceedings of TAFC. IFIP, May 2013"},{"issue":"5","key":"15_CR35","doi-asserted-by":"publisher","first-page":"946","DOI":"10.1080\/01402382.2010.486119","volume":"33","author":"M Bovens","year":"2010","unstructured":"Bovens, M.: Two concepts of accountability: accountability as a virtue and as a mechanism. West Eur. Politics 33(5), 946\u2013967 (2010)","journal-title":"West Eur. Politics"},{"key":"15_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-11599-3_1","volume-title":"Secure IT Systems","author":"S Pearson","year":"2014","unstructured":"Pearson, S.: Accountability in cloud service provision ecosystems. In: Bernsmed, K., Fischer-H\u00fcbner, S. (eds.) NordSec 2014. LNCS, vol. 8788, pp. 3\u201324. Springer, Cham (2014). doi:10.1007\/978-3-319-11599-3_1"},{"key":"15_CR37","unstructured":"Center for Information Policy Leadership (CIPL): Accountability: A compendium for stakeholders. The Galway\/Paris Project (2011)"},{"key":"15_CR38","unstructured":"Office of the Information and Privacy Commissioner for British Columbia: Getting Accountability Right with a Privacy Management Program (2012)"},{"key":"15_CR39","unstructured":"International Data Corporation (IDC): Quantitative Estimates of the Demand of Cloud Computing in Europe (2012)"},{"key":"15_CR40","doi-asserted-by":"crossref","unstructured":"Bennett, C.J.: The accountability approach to privacy and data protection: assumptions and caveats. In: Guagnin, D., et al. (eds.) Managing Privacy through Accountability, pp. 33\u201348. MacMillan (2012)","DOI":"10.1057\/9781137032225_3"},{"key":"15_CR41","unstructured":"Article 29 Data Protection Working Party: Opinion 03\/2013 on purpose limitation (2013)"},{"issue":"3","key":"15_CR42","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1108\/IJOTB-06-03-2003-B002","volume":"6","author":"MJ Dubnick","year":"2003","unstructured":"Dubnick, M.J.: Accountability and ethics: reconsidering the relationships. Int. J. Organ. Theor. Behav. 6(3), 405\u2013441 (2003)","journal-title":"Int. J. Organ. Theor. Behav."},{"key":"15_CR43","unstructured":"Pearson, S.: Accountability in the cloud. In: Proceedings of the Trust in the Information Society, ITU Kaleidoscope Conference, Barcelona, Spain, pp. 5\u201316. IEEE, 9\u201311 December 2015"},{"key":"15_CR44","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/s10676-009-9187-9","volume":"11","author":"M Turilli","year":"2009","unstructured":"Turilli, M., Floridi, L.: The ethics of information transparency. Ethics Inf. Technol. 11, 105\u2013112 (2009). Springer","journal-title":"Ethics Inf. Technol."},{"key":"15_CR45","unstructured":"Raab, C.: Privacy, Security and Safety: Intelligence Services and National Security, IFIP Summer School 2016, Privacy and Identity Management \u2013 Facing Up To Next Steps, Karlstad, Sweden, 21\u201326 August 2016"},{"key":"15_CR46","unstructured":"Jaatun, M., Pearson, S., Gittler, F., Leenes, R., Niezen, M.: Enhancing Accountability in the Cloud. Int. J. Inf. Manag. (2016). Pergamon"},{"issue":"9","key":"15_CR47","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1016\/S0016-3287(97)00035-9","volume":"29","author":"H Tsoukas","year":"1997","unstructured":"Tsoukas, H.: The Tyranny of Light. Futures 29(9), 827\u2013843 (1997)","journal-title":"Futures"},{"key":"15_CR48","unstructured":"Gittler, F., Pearson, S.: Cloud Accountability Reference Architecture. D42.4a. A4Cloud Project Public Deliverable (2016). http:\/\/www.a4cloud.eu\/sites\/default\/files\/D42.4%20Reference%20Architecture%20%28Final%29.pdf"},{"key":"15_CR49","series-title":"Computer Communications and Networks","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1007\/978-3-319-25988-8_9","volume-title":"Guide to Security Assurance for Cloud Computing","author":"S Pearson","year":"2015","unstructured":"Pearson, S., Luna, J., Reich, C.: Improving cloud assurance and transparency through accountability mechanisms. In: Zhu, S.Y., Hill, R., Trovati, M. (eds.) Guide to Security Assurance for Cloud Computing. CCN, pp. 139\u2013169. Springer, Cham (2015). doi:10.1007\/978-3-319-25988-8_9"},{"key":"15_CR50","doi-asserted-by":"crossref","unstructured":"Butin, D., Chicote, M., Le M\u00e9tayer, D.: Strong accountability: beyond vague promises. In: Gutwirth, S., Leenes, R., De Hert, P. (eds.) Reloading Data Protection: Multidisciplinary Insights and Contemporary Challenges, pp. 343\u2013369. Springer, Netherlands (2014)","DOI":"10.1007\/978-94-007-7540-4_16"},{"key":"15_CR51","doi-asserted-by":"crossref","unstructured":"Pearson, S., et al.: Accountability for cloud and other future internet services. In: Cloud Computing Technology and Science, pp. 629\u2013632. IEEE (2012)","DOI":"10.1109\/CloudCom.2012.6427512"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management XI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59171-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:14:56Z","timestamp":1750270496000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-59171-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319591704","9783319591711"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59171-1_15","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"20 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IFIPTM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Trust Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 June 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ifiptm2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/s.ifiptm.org\/conf2017","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}