{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:48:25Z","timestamp":1740098905067,"version":"3.37.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319623917"},{"type":"electronic","value":"9783319623924"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-62392-4_48","type":"book-chapter","created":{"date-parts":[[2017,7,4]],"date-time":"2017-07-04T22:34:09Z","timestamp":1499207649000},"page":"667-676","source":"Crossref","is-referenced-by-count":0,"title":["Data Protection Risk Modeling into Business Process Analysis"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6091-2624","authenticated-orcid":false,"given":"Ant\u00f3nio","family":"Gon\u00e7alves","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7248-4310","authenticated-orcid":false,"given":"Anacleto","family":"Correia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5590-1493","authenticated-orcid":false,"given":"Luis","family":"Cavique","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,6]]},"reference":[{"key":"48_CR1","unstructured":"The European Parliament: The European Council: General Data Protection Regulation (2016)"},{"key":"48_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-33143-5","volume-title":"Fundamentals of Business Process Management","author":"M Dumas","year":"2013","unstructured":"Dumas, M., La Rosa, M., Mendling, J., Reijers, H.A.: Fundamentals of Business Process Management. Springer, Heidelberg (2013)"},{"key":"48_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-24798-2_1","volume-title":"Process Management","author":"J Becker","year":"2003","unstructured":"Becker, J., Kahn, D.: The process in focus. In: Becker, J., Kugeler, M., Rosemann, M. (eds.) Process Management, pp. 1\u201312. Springer, Heidelberg (2003). doi: 10.1007\/978-3-540-24798-2_1"},{"key":"48_CR4","doi-asserted-by":"crossref","unstructured":"Scheer, A.-W., Thomas, O., Adam, O.: Process modeling using event-driven process chains. Process. Inf. Syst. 119\u2013146 (2005)","DOI":"10.1002\/0471741442.ch6"},{"key":"48_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1007\/978-3-540-69534-9_34","volume-title":"Advanced Information Systems Engineering","author":"B Dongen Van","year":"2008","unstructured":"Van Dongen, B., Dijkman, R., Mendling, J.: Measuring similarity between business process models. In: Bellahs\u00e8ne, Z., L\u00e9onard, M. (eds.) CAiSE 2008. LNCS, vol. 5074, pp. 450\u2013464. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-69534-9_34"},{"key":"48_CR6","volume-title":"SAP R\/3 Business Blueprint: Understanding the Business Process Reference Model","author":"T Curran","year":"1998","unstructured":"Curran, T., Keller, G., Ladd, A.: SAP R\/3 Business Blueprint: Understanding the Business Process Reference Model. Prentice Hall PTR, Upper Saddle River (1998)"},{"key":"48_CR7","volume-title":"Process Management: A Guide for the Design of Business Processes","author":"J Becker","year":"2013","unstructured":"Becker, J., Kugeler, M., Rosemann, M.: Process Management: A Guide for the Design of Business Processes. Springer Science & Business Media, Heidelberg (2013)"},{"key":"48_CR8","unstructured":"EU Directive: 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Off. J. EC. 23 (1995)"},{"key":"48_CR9","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-319-41763-9_9","volume-title":"Privacy and Identity Management. Time for a Revolution?","author":"O Drozd","year":"2016","unstructured":"Drozd, O.: Privacy pattern catalogue: a tool for integrating privacy principles of ISO\/IEC 29100 into the software development process. In: Aspinall, D., Camenisch, J., Hansen, M., Fischer-H\u00fcbner, S., Raab, C. (eds.) Privacy and Identity 2015. IAICT, vol. 476, pp. 129\u2013140. Springer, Cham (2016). doi: 10.1007\/978-3-319-41763-9_9"},{"key":"48_CR10","unstructured":"Parlamento Europeu, Conselho da Uni\u00e3o Europeia: GDPR - EUR-Lex - 32016R0679 - EN. J. Of. da Uni\u00e3o Eur. 59 (2016)"},{"key":"48_CR11","first-page":"64","volume":"116","author":"P Tucker","year":"2013","unstructured":"Tucker, P.: Has big data made anonymity impossible? MIT Rev. 116, 64\u201367 (2013)","journal-title":"MIT Rev."},{"key":"48_CR12","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1016\/j.infsof.2008.04.004","volume":"51","author":"P Guarda","year":"2009","unstructured":"Guarda, P., Zannone, N.: Towards the development of privacy-aware systems. Inf. Softw. Technol. 51, 337\u2013350 (2009)","journal-title":"Inf. Softw. Technol."},{"key":"48_CR13","unstructured":"Laudon, K.C., Laudon, J.P.: Management Information Systems 13e (2013)"},{"key":"48_CR14","unstructured":"Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management (2010)"},{"key":"48_CR15","volume-title":"Requirements Engineering: Processes and Techniques","author":"I Sommerville","year":"1998","unstructured":"Sommerville, I., Kotonya, G.: Requirements Engineering: Processes and Techniques. Wiley, Hoboken (1998)"},{"key":"48_CR16","unstructured":"ISO: 31000: 2009 risk management\u2013principles and guidelines. Int. Organ. Stand. Geneva, Switz. (2009)"},{"key":"48_CR17","unstructured":"ISO Guide: 73: 2009. Risk Manag. (2009)"},{"key":"48_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/3-540-44895-0_12","volume-title":"Business Process Management","author":"M Backes","year":"2003","unstructured":"Backes, M., Pfitzmann, B., Waidner, M.: Security in business process engineering. In: Aalst, W.M.P., Weske, M. (eds.) BPM 2003. LNCS, vol. 2678, pp. 168\u2013183. Springer, Heidelberg (2003). doi: 10.1007\/3-540-44895-0_12"},{"key":"48_CR19","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1109\/TSE.2015.2396526","volume":"41","author":"M El-Attar","year":"2015","unstructured":"El-Attar, M., Luqman, H., Karpati, P., Sindre, G., Opdahl, A.L.: Extending the UML statecharts notation to model security aspects. IEEE Trans. Softw. Eng. 41, 661\u2013690 (2015)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"48_CR20","doi-asserted-by":"crossref","unstructured":"Nunes, F.J.B., Belchior, A.D., Albuquerque, A.B.: Security engineering approach to support software security. In: 6th World Congress Services, pp. 48\u201355 (2010)","DOI":"10.1109\/SERVICES.2010.37"},{"key":"48_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"350","DOI":"10.1007\/978-3-540-30187-5_25","volume-title":"\u00abUML\u00bb 2004 \u2014 The Unified Modeling Language. Modeling Languages and Applications","author":"H Abie","year":"2004","unstructured":"Abie, H., Aredo, D.B., Kristoffersen, T., Mazaher, S., Raguin, T.: Integrating a security requirement language with UML. In: Baar, T., Strohmeier, A., Moreira, A., Mellor, Stephen J. (eds.) UML 2004. LNCS, vol. 3273, pp. 350\u2013364. Springer, Heidelberg (2004). doi: 10.1007\/978-3-540-30187-5_25"},{"key":"48_CR22","unstructured":"Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J.-H., Metayer, D.L., Tirtea, R., Schiffner, S.: Privacy and data protection by design-from policy to engineering. arXiv Preprint arXiv:1501.03726 (2015)"},{"key":"48_CR23","unstructured":"Oladimeji, E.A., Supakkul, S., Chung, L.: Security threat modeling and analysis: a goal-oriented approach. In: Proceedings of the 10th IASTED International Conference on Software Engineering and Applications, SEA 2006, pp. 13\u201315 (2006)"},{"key":"48_CR24","unstructured":"Pfitzmann, A., Kiel, U.L.D.: Pseudonymity, and identity management \u2013 a consolidated proposal for terminology. Management 1\u201383 (2008)"},{"key":"48_CR25","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1016\/j.jss.2014.05.075","volume":"96","author":"K Wuyts","year":"2014","unstructured":"Wuyts, K., Scandariato, R., Joosen, W.: Empirical evaluation of a privacy-focused threat modeling methodology. J. Syst. Softw. 96, 122\u2013138 (2014)","journal-title":"J. Syst. Softw."}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2017"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-62392-4_48","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,28]],"date-time":"2019-09-28T09:27:09Z","timestamp":1569662829000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-62392-4_48"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319623917","9783319623924"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-62392-4_48","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}