{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:56:27Z","timestamp":1725566187647},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642332807"},{"type":"electronic","value":"9783642332814"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-33281-4_12","type":"book-chapter","created":{"date-parts":[[2012,9,17]],"date-time":"2012-09-17T23:29:17Z","timestamp":1347924557000},"page":"148-161","source":"Crossref","is-referenced-by-count":2,"title":["Conducting a Privacy Impact Analysis for the Analysis of Communication Records"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Hofbauer","sequence":"first","affiliation":[]},{"given":"Kristian","family":"Beckers","sequence":"additional","affiliation":[]},{"given":"Gerald","family":"Quirchmayr","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","unstructured":"Australian Government \u2013 Office of the Privacy Commissioner: Privacy Impact Assessment Guide. Australian Government (2010), \n                    \n                      http:\/\/www.privacy.gov.au\/materials\/types\/download\/9509\/6590"},{"key":"12_CR2","unstructured":"Gartner Inc.: Gartner Magic Quadrant for Unified Communications 2010. Gartner Inc. (2010), \n                    \n                      http:\/\/msunified.net\/2010\/08\/09\/gartner-magic-quadrant-for-unified-communications-2010\/"},{"issue":"1","key":"12_CR3","first-page":"101","volume":"79","author":"H. Nissenbaum","year":"2004","unstructured":"Nissenbaum, H.: Privacy as contextual integrity. Washington Law Review\u00a079(1), 101\u2013139 (2004)","journal-title":"Washington Law Review"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Hofbauer, S., Quirchmayr, G., Wills, C.C.: CDRAS: An approach to dealing with Man-in-the-Middle attacks in the context of Voice over IP. In: International Conference on Availability, Reliability and Security, ARES 2011, pp. 353\u2013358 (August 2011)","DOI":"10.1109\/ARES.2011.59"},{"key":"12_CR5","unstructured":"Cisco Systems Inc.: Cisco Call Detail Records Field Descriptions. Cisco Systems Inc. (2010), \n                    \n                      http:\/\/www.cisco.com\/en\/US\/docs\/voice_ip_comm\/cucm\/service\/8_5_1\/cdrdef\/cdrfdes.html"},{"key":"12_CR6","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00766-010-0115-7","volume":"16","author":"M. Deng","year":"2011","unstructured":"Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requir. Eng.\u00a016, 3\u201332 (2011)","journal-title":"Requir. Eng."},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Wuyts, K., Scandariato, R., De Decker, B., Joosen, W.: Linking privacy solutions to developer goals. In: International Conference on Availability, Reliability and Security, ARES 2009, pp. 847\u2013852 (2009)","DOI":"10.1109\/ARES.2009.51"},{"key":"12_CR8","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s00766-008-0067-3","volume":"13","author":"C. Kalloniatis","year":"2008","unstructured":"Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in systems design: the pris method. Requir. Eng.\u00a013, 241\u2013255 (2008)","journal-title":"Requir. Eng."},{"issue":"1","key":"12_CR9","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/TSE.2008.88","volume":"35","author":"S. Spiekermann","year":"2009","unstructured":"Spiekermann, S., Cranor, L.F.: Engineering Privacy. IEEE Transactions on Software Engineering\u00a035(1), 67\u201382 (2009)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Pfleeger, C.P., Pfleeger, S.L.: Security in Computing, 4th edn. Prentice Hall PTR (2007)","DOI":"10.1109\/MSP.2006.111"},{"key":"12_CR11","unstructured":"Zhang, J., Zulkernine, M., Haque, A.: Random-forest-based network intrusion detection systems. IEEE Trans. Syst. Man Cybernet. C Appl. Rev., 84\u201393 (2008)"},{"key":"12_CR12","unstructured":"Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, unobservability, pseudonymity, and identity management \u2013 version v0.34, TU Dresden and ULD Kiel, Tech. Rep. (2011), \n                    \n                      http:\/\/dud.inf.tu-dresden.de\/literatur\/Anon_Terminology_v0.34.pdf"},{"key":"12_CR13","unstructured":"Danezis, G., G\u00fcrses, S.: A critical review of 10 years of privacy technology. In: Proceedings of Surveillance Cultures: A Global Surveillance Society?, UK (2011), \n                    \n                      http:\/\/homes.esat.kuleuven.be\/~sguerses\/papers\/DanezisGuersesSurveillancePets2010.pdf"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Clau\u00df, S., Kesdogan, D., K\u00f6lsch, T.: Privacy enhancing identity management. Protection against re-identification and profiling. In: Proceedings of the 2005 Workshop on Digital Identity Management, DIM 2005, pp. 84\u201393. ACM (2005)","DOI":"10.1145\/1102486.1102501"},{"key":"12_CR15","unstructured":"American National Standards Institute (ANSI), American national standard for information technology \u2013 role based access control, ANSI, ANSI INCITS 359-2004 (2004)"},{"key":"12_CR16","unstructured":"Beckers, K., Hofbauer, S., Quirchmayr, G., Sorge, C.: A process for the automatic generation of white-, grey-, and black-lists from Call Detail Records to prevent VoIP attacks while preserving privacy. In: International Conference on Availability, Reliability and Security, ARES 2012 (August 2012)"},{"key":"12_CR17","series-title":"Human-Computer Interaction Series","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1007\/978-1-84882-477-5_8","volume-title":"Awareness Systems","author":"S. Patil","year":"2009","unstructured":"Patil, S., Kobsa, A.: Privacy considerations in awareness systems. Designing with privacy in mind. In: Markopoulos, P., De Ruyter, B., Mackay, W. (eds.) Awareness Systems. Human-Computer Interaction Series, pp. 187\u2013206. Springer, London (2009)"},{"key":"12_CR18","unstructured":"Platform for privacy preferences project, W3C (2002), \n                    \n                      http:\/\/www.w3.or\/TR\/P3P\/"},{"key":"12_CR19","unstructured":"OASIS, eXtensible Access Control Markup Language TC v2.0 (XACML), OASIS (2005), \n                    \n                      http:\/\/docs.oasis-open.org\/xacml\/2.0\/access-control-xacml-2.0-core-spec-os.pdf"},{"key":"12_CR20","unstructured":"IETF, Hmac: Keyed-hashing for message authentication, Internet Engineering Task Force (IETF), IETF RFC 2104 (1997), \n                    \n                      http:\/\/tools.ietf.org\/rfc\/rfc2104.txt"},{"key":"12_CR21","unstructured":"Jorns, Jung, O., Quirchmayr, G.: Transaction pseudonyms in mobile environments. In: EICAR 2007 Best Academic Paper, pp. 49\u201358 (2007)"},{"key":"12_CR22","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1109\/MSP.2010.54","volume":"8","author":"C. Sorge","year":"2010","unstructured":"Sorge, C., Niccolini, S., Seedorf, J.: The legal ramifications of call-filtering solutions. IEEE Security and Privacy\u00a08, 45\u201350 (2010)","journal-title":"IEEE Security and Privacy"},{"issue":"12","key":"12_CR23","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MCOM.2010.5673076","volume":"48","author":"S. Tartarelli","year":"2010","unstructured":"Tartarelli, S., d\u2019Heureuse, N., Niccolini, S.: Lessons learned on the usage of call logs for security and management in IP telephony. IEEE Communications Magazine\u00a048(12), 76\u201382 (2010)","journal-title":"IEEE Communications Magazine"},{"key":"12_CR24","first-page":"19","volume-title":"Proceedings of the International Multi-Conference on Computing in the Global Information Technology","author":"E.B. Fernandez","year":"2007","unstructured":"Fernandez, E.B., Pelaez, J.C., Larrondo-Petrie, M.M.: Security patterns for voice over IP networks. In: Proceedings of the International Multi-Conference on Computing in the Global Information Technology, pp. 19\u201329. IEEE Computer Society, Washington, DC (2007)"}],"container-title":["Lecture Notes in Business Information Processing","Perspectives in Business Informatics Research"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-33281-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T19:37:38Z","timestamp":1558381058000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-33281-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642332807","9783642332814"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-33281-4_12","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2012]]}}}