{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:55:36Z","timestamp":1725566136514},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540229162"},{"type":"electronic","value":"9783540300786"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30078-6_54","type":"book-chapter","created":{"date-parts":[[2010,9,16]],"date-time":"2010-09-16T19:28:46Z","timestamp":1284665326000},"page":"328-331","source":"Crossref","is-referenced-by-count":0,"title":["Towards a Privacy Audit Programmes Comparison Framework"],"prefix":"10.1007","author":[{"given":"Kabouraki","family":"Konstantina","sequence":"first","affiliation":[]},{"given":"Gritzalis","family":"Stefanos","sequence":"additional","affiliation":[]},{"given":"Moulinos","family":"Konstantinos","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"54_CR1","unstructured":"Electronic Privacy Information Center, Privacy & Human Rights: An International survey of privacy laws and developments, EPIC-Privacy international (2002)"},{"key":"54_CR2","unstructured":"Information on the powers of European Data Protection Authorities (DPA) concerning requests for information put to a controller, complaints, audits and sanctions, and on their implementation, V International Complaints Handling Workshop, Dublin, March 14-15 (2002)"},{"key":"54_CR3","unstructured":"BS7799-1: 2000 Information security management \u2013 Part 1: Code of practice for information security management, British Standards Institution (2000)"},{"key":"54_CR4","unstructured":"The Committee of Sponsoring Organizations of the Treadway Commission, \n                    \n                      http:\/\/www.coo.gr"},{"key":"54_CR5","unstructured":"American Institute of Certified Public Accountants, Inc. and Canadian Institute of Chartered Accountants, Suitable Trust Services Criteria and Illustrations Suitable Trust Services Criteria and Illustrations for Security, Availability, Processing Integrity, Online Privacy, and Confidentiality (2003)"},{"key":"54_CR6","unstructured":"UK Central Computer and Telecommunications Agency, CCTA Risk Analysis and Management Method: User Manual, HMSO, Version 3.0, London (1996)"},{"key":"54_CR7","unstructured":"COBRATM, C&A Systems Security Ltd (1991)"},{"key":"54_CR8","unstructured":"Cavoukian, A., Crompton, M.: Web Seals: A Review of Online Privacy Programs. In: 22nd International Conference on Privacy and Personal Data Protection (2000)"}],"container-title":["Lecture Notes in Computer Science","Electronic Government"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30078-6_54.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:44:01Z","timestamp":1620013441000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30078-6_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540229162","9783540300786"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30078-6_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}