{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T11:37:02Z","timestamp":1775129822982,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":51,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642540684","type":"print"},{"value":"9783642540691","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54069-1_4","type":"book-chapter","created":{"date-parts":[[2014,1,15]],"date-time":"2014-01-15T03:09:15Z","timestamp":1389755355000},"page":"55-72","source":"Crossref","is-referenced-by-count":37,"title":["Designing Privacy-by-Design"],"prefix":"10.1007","author":[{"given":"Jeroen","family":"van Rest","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Daniel","family":"Boonstra","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Maarten","family":"Everts","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Martin","family":"van Rijn","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ron","family":"van Paassen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"EC, Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1995)"},{"key":"4_CR2","unstructured":"EC, COM(2012) 11 (final) Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) (January 25, 2012)"},{"key":"4_CR3","unstructured":"EC, COM(2010) 609 (final), A comprehensive approach on personal data protection in the European Union (November 4, 2010)"},{"key":"4_CR4","unstructured":"EC, COM(2010) 245 (final)\/2, A Digital Agenda for Europe (August 26, 2010)"},{"issue":"6","key":"4_CR5","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1108\/14636691111174261","volume":"13","author":"M. Lieshout van","year":"2011","unstructured":"van Lieshout, M., Kool, L., van Schoonhoven, B., de Jonge, M.: Privacy by Design: an alternative to existing practice in safeguarding privacy. Info.\u00a013(6), 55\u201368 (2011)","journal-title":"Info."},{"key":"4_CR6","unstructured":"European Forum for Urban Security, Charter for a Democratic Use of Video Surveillance (2011)"},{"key":"4_CR7","unstructured":"Hes, R., Borking, J.: Privacy Enhancing Technologies: the path to anonymity (Revised Edition) Registratiekamer, Achtergrondstudies en Verkenningen 11 (first edition 1995)"},{"key":"4_CR8","unstructured":"CFP2000, Conference on Computers, Freedom & Privacy (2000), \n                    \n                      http:\/\/www.cfp2000.org\/"},{"key":"4_CR9","unstructured":"EC \/ TNO et al, FP5, PISA project (2003), \n                    \n                      http:\/\/cordis.europa.eu\/projects\/rcn\/53640_en.html\n                    \n                    \n                   (accessed June 2, 2012)"},{"key":"4_CR10","unstructured":"Cavoukian, Origins of Privacy by Design, \n                    \n                      http:\/\/privacybydesign.ca\/publications\/pbd-origin-and-evolution\/\n                    \n                    \n                   (accessed August 3, 2011)"},{"key":"4_CR11","unstructured":"Cavoukian, Privacy by Design \u2013 The 7 foundational principles (August 2009) (revised January 2011)"},{"key":"4_CR12","unstructured":"G\u00fcrses, Troncose, Diaz: Engineering Privacy by Design. In: Conference on Computers, Privacy & Data protection, CPDP (2011)"},{"key":"4_CR13","unstructured":"Jean-Philippe Courtois, Privacy by Design at Microsoft (November 29, 2010)"},{"key":"4_CR14","unstructured":"Winterfield, K. (2009), \n                    \n                      http:\/\/ibmresearchnews.blogspot.com\/2009\/10\/inventors-corner-innovations-enable.html"},{"key":"4_CR15","unstructured":"Cavoukian, Privacy by Design \u2013 The answer to overcoming negative externalities arising from poor management of personal data, Trust Economics Workshop (June 23, 2009)"},{"issue":"3","key":"4_CR16","doi-asserted-by":"publisher","first-page":"544","DOI":"10.2307\/3105385","volume":"27","author":"M.. Kranzberg","year":"1986","unstructured":"Kranzberg, M.: Technology and History: Kranzberg\u2019s Laws. Technology and Culture\u00a027(3), 544\u2013560 (1986)","journal-title":"Technology and Culture"},{"key":"4_CR17","unstructured":"EuroPrise - the European Privacy Seal for IT Products and IT-Based Services (2007), \n                    \n                      https:\/\/www.european-privacy-seal.eu\/\n                    \n                    \n                   (accessed June 2, 2012)"},{"key":"4_CR18","unstructured":"London Economics, Study on the economic benefits of privacy-enhancing technologies (PETs) (July 2010)"},{"key":"4_CR19","unstructured":"Borking, J.: Privacy law is code (2010)"},{"key":"4_CR20","unstructured":"Rogers, E.M.: Diffusion of Innovations (1962)"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Warren and Brandeis, Harvard Law Review. The right to privacy, vol.\u00a0IV(5) (December 15, 1890), \n                    \n                      http:\/\/groups.csail.mit.edu\/mac\/classes\/6.805\/articles\/privacy\/Privacy_brand_warr2.html","DOI":"10.2307\/1321160"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Agre & Rottenberg, Technology and privacy: the new landscape (1997)","DOI":"10.7551\/mitpress\/6682.001.0001"},{"key":"4_CR23","unstructured":"Clarke, R.: Roger Clarke\u2019s \u2018What\u2019s Privacy?, \n                    \n                      http:\/\/www.rogerclarke.com\/DV\/Privacy.html\n                    \n                    \n                   (accessed May 12, 2011)"},{"key":"4_CR24","unstructured":"Cambridge Essential English Dictionary, lemma Privacy (accessed August 6, 2011)"},{"key":"4_CR25","volume-title":"Privacy and Freedom","author":"A. Westin","year":"1967","unstructured":"Westin, A.: Privacy and Freedom. Atheneum, New York (1967)"},{"issue":"2","key":"4_CR26","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1177\/026540758900600201","volume":"6","author":"K. Burgoon","year":"1989","unstructured":"Burgoon, K., Parrott, R., Le Poire, B.A., Kelley, D.L., Walther, J.B., Perry, D.: Maintaining and Restoring Privacy through Communication in Different Types of Relationships. Journal of Social and Personal Relationships\u00a06(2), 131\u2013158 (1989)","journal-title":"Journal of Social and Personal Relationships"},{"key":"4_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-45427-6_23","volume-title":"Ubicomp 2001: Ubiquitous Computing","author":"M. Langheinrich","year":"2001","unstructured":"Langheinrich, M.: Privacy by design - principles of privacy-aware ubiquitous systems. In: Abowd, G.D., Brumitt, B., Shafer, S. (eds.) UbiComp 2001. LNCS, vol.\u00a02201, pp. 273\u2013291. Springer, Heidelberg (2001)"},{"issue":"3","key":"4_CR28","doi-asserted-by":"publisher","first-page":"477","DOI":"10.2307\/40041279","volume":"154","author":"D.J. Solove","year":"2006","unstructured":"Solove, D.J.: A Taxonomy of Privacy. University of Pennsylvania Law Review\u00a0154(3), 477\u2013564 (2006)","journal-title":"University of Pennsylvania Law Review"},{"key":"4_CR29","unstructured":"UML 2.4.1 Specification, \n                    \n                      http:\/\/www.omg.org\/spec\/UML\/2.4.1\/\n                    \n                    \n                   (accessed December 2011)"},{"key":"4_CR30","unstructured":"Harrison McKnight, D., Chervany, N.L.: The Meanings of Trust, University of Minnesota (1996), \n                    \n                      http:\/\/www.misrc.umn.edu\/wpaper\/wp96-04.htm"},{"key":"4_CR31","unstructured":"BBC, Eric Schmidt, Google (April 13, 2013), \n                    \n                      http:\/\/www.bbc.co.uk\/news\/technology-22134898"},{"issue":"3-4","key":"4_CR32","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/S0963-8687(02)00021-5","volume":"11","author":"C.M. Ridings","year":"2002","unstructured":"Ridings, C.M., Gefen, D., Arinze, B.: Some antecedents and effects of trust in virtual communities. The Journal of Strategic Information Systems\u00a011(3-4), 271\u2013295 (2002) ISSN 0963-8687, 10.1016\/S0963-8687(02)00021-5","journal-title":"The Journal of Strategic Information Systems"},{"key":"4_CR33","unstructured":"Article 8 of the European Convention on Human Rights (1950)"},{"key":"4_CR34","unstructured":"EC, undated, Status of implementation of Directive 95\/46 on the Protection of Individuals with regard to the Processing of Personal Data (2011), \n                    \n                      http:\/\/ec.europa.eu\/justice\/policies\/privacy\/law\/implementation_en.htm\n                    \n                    \n                   (accessed August 3, 2011)"},{"key":"4_CR35","unstructured":"EC, COM\/2012\/010 final - 2012\/0010 (COD), Proposal for a Directive of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by competent authorities for the purposes of prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and the free movement of such data (January 2012)"},{"key":"4_CR36","unstructured":"EU KP7 SMART project, \n                    \n                      http:\/\/www.smartsurveillance.eu\/\n                    \n                    \n                   (accessed May 13, 2012)"},{"key":"4_CR37","unstructured":"Cambridge Essential English Dictionary, lemma Design (accessed August 28, 2011)"},{"key":"4_CR38","unstructured":"INCOSE, A Consensus of the INCOSE Fellows, \n                    \n                      http:\/\/www.incose.org\/practice\/fellowsconsensus.aspx\n                    \n                    \n                   (accessed June 2012)"},{"issue":"4","key":"4_CR39","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1109\/5326.725338","volume":"28","author":"A.T. Bahill","year":"1998","unstructured":"Bahill, A.T., Gissing, B.: Re-evaluating systems engineering concepts using systems thinking. IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews\u00a028(4), 516\u2013527 (1998)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews"},{"key":"4_CR40","unstructured":"The Open Group, \u201cThe Open Group Architecture Framework, TOGAF\u201d, \n                    \n                      http:\/\/www.opengroup.org\/togaf\/\n                    \n                    \n                   (last accessed April 2, 2012)"},{"key":"4_CR41","unstructured":"Alexander, C.: A Pattern Language: Towns, Buildings, Construction (1977)"},{"key":"4_CR42","unstructured":"Buschmann, F., Meunier, R., Rohnert, H., Sommerlad, P.: Pattern-Oriented Software Architecture. A System of Patterns, vol.\u00a01. John Wiley & Sons (1996)"},{"key":"4_CR43","unstructured":"Steinberg, A., Bowman, C.: Rethinking the JDL Data Fusion Levels, NSSDF JHAPL, June, 04 2. In: Bowman, C.L. (ed.) The Dual Node Network (DNN) Data Fusion & Resource Management (DF&RM) Architecture, AIAA Intelligent Systems Conference, Chicago, September 20-22 (2004)"},{"key":"4_CR44","doi-asserted-by":"crossref","unstructured":"Hafiz, M.: A collection of Privacy Design Patterns. In: Proceedings of the 13th Pattern Languages of Programs. Allerton, Illinois (2006)","DOI":"10.1145\/1415472.1415481"},{"key":"4_CR45","unstructured":"Security Patterns \u2013 Integrating Security and Systems Engineering, Schumacher, Fernandez-Buglioni, Hybertson, Buschmann, Sommerlead. John Wiley & Sons (2006)"},{"key":"4_CR46","unstructured":"UC Berkeley School of Information (2013), \n                    \n                      http:\/\/privacypatterns.org\/\n                    \n                    \n                   (last visited May 2013)"},{"key":"4_CR47","unstructured":"Revocable Privacy, Jaap-Henk Hoepman. Privacy & Informatie\u00a011(3), 114\u2013118 (June 2008)"},{"key":"4_CR48","unstructured":"BSIA, Privacy Masking Guide (2011)"},{"key":"4_CR49","unstructured":"Roelofsen, Patent WO 03\/010728\/A1 Method and System and Data Source for Processing of Image Data (February 2003)"},{"key":"4_CR50","unstructured":"WeArePerspective (2007), \n                    \n                      http:\/\/www.weareperspective.com\/project\/ns-camera\n                    \n                    \n                   (accessed December 2011)"},{"key":"4_CR51","unstructured":"Cvr\u010dek, D., Maty\u00e1\u0161, V.: D13.1: Identity and impact of privacy enhancing technology. FIDIS (2007), \n                    \n                      http:\/\/fidis-wp13-del13.1.final.pdf\n                    \n                    \n                   (accessed February 16, 2011)"}],"container-title":["Lecture Notes in Computer Science","Privacy Technologies and Policy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54069-1_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,25]],"date-time":"2019-05-25T23:05:10Z","timestamp":1558825510000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54069-1_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642540684","9783642540691"],"references-count":51,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54069-1_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}