{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:53:42Z","timestamp":1725792822142},"publisher-location":"Berlin, Heidelberg","reference-count":39,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642551369"},{"type":"electronic","value":"9783642551376"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-55137-6_3","type":"book-chapter","created":{"date-parts":[[2014,5,2]],"date-time":"2014-05-02T01:34:40Z","timestamp":1398994480000},"page":"33-52","source":"Crossref","is-referenced-by-count":1,"title":["Privacy Management and Accountability in Global Organisations"],"prefix":"10.1007","author":[{"given":"Siani","family":"Pearson","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","unstructured":"Information Commissioner\u2019s Office (ICO), The Privacy Dividend: The Business Case for Investing in Proactive Privacy Protection (March 2010), http:\/\/www.ico.org.uk\/~\/media\/documents\/library\/Data_Protection\/Detailed_specialist_guides\/PRIVACY_DIVIDEND.ashx"},{"key":"3_CR2","unstructured":"Tressell, R.: The Ragged Trousered Philanthropists. Wordsworth Classics (2012)"},{"key":"3_CR3","volume-title":"The Governance of Privacy: Policy Instruments in Global Perspective","author":"C.J. Bennett","year":"2006","unstructured":"Bennett, C.J., Raab, C.D.: The Governance of Privacy: Policy Instruments in Global Perspective. MIT Press, Cambridge (2006)"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Warren, S., Brandeis, L.: The Right to Privacy. 4 Harvard Law Review\u00a0193 (1890)","DOI":"10.2307\/1321160"},{"key":"3_CR5","unstructured":"Westin, A.: Privacy and Freedom, New York, US, Atheneum (1967)"},{"key":"3_CR6","unstructured":"American Institute of Certified Public Accountants (AICPA) and CICA: Generally Accepted Privacy Principles (August 2009)"},{"issue":"3","key":"3_CR7","doi-asserted-by":"publisher","first-page":"477","DOI":"10.2307\/40041279","volume":"154","author":"D.J. Solove","year":"2006","unstructured":"Solove, D.J.: A Taxonomy of Privacy. University of Pennyslavania Law Review\u00a0154(3), 477 (2006)","journal-title":"University of Pennyslavania Law Review"},{"key":"3_CR8","unstructured":"Nissenbaum, H.: Privacy as Contextual Integrity. Washington Law Review, 101\u2013139 (2004)"},{"key":"3_CR9","unstructured":"Swire, P., Bermann, S.: Information Privacy. Official Reference for the Certified Information Privacy Professional, CIPP (2007)"},{"key":"3_CR10","unstructured":"European Commission (EC): Directive 95\/46\/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data (1995)"},{"key":"3_CR11","unstructured":"Privacy Protection Study Commission: Personal Privacy in an Information Society, United Statues Privacy Protection Study Commission Fair Information Practices (1977)"},{"key":"3_CR12","unstructured":"Organisation for Economic Co-operation and Development (OECD): Guidelines for the Protection of Personal Data and Transborder Data Flows (1980)"},{"key":"3_CR13","unstructured":"OECD: Guidelines Concerning the Protection of Privacy and Transborder Flows of Personal Data (2013), http:\/\/www.oecd.org\/sti\/ieconomy\/2013-oecd-privacy-guidelines.pdf"},{"key":"3_CR14","unstructured":"European Commission, Unleashing the Potential of Cloud Computing in Europe (2012), http:\/\/eur-lex.europa.eu\/LexUriServ\/LexUriServ.do?uri=COM:2012:0529:FIN:EN:PDF"},{"key":"3_CR15","unstructured":"European Commission, Cybersecurity Strategy of the European Union: An Open, Safe and Secure Cyberspace (2013), http:\/\/ec.europa.eu\/information_society\/newsroom\/cf\/\/document.cfm?doc_id=1667"},{"key":"3_CR16","unstructured":"European Commission, Directive on Network and Information Security (2013), http:\/\/ec.europa.eu\/digital-agenda\/en\/news\/eu-cybersecurity-plan-protect-open-internet-and-online-freedom-and-opportunity-cyber-security"},{"key":"3_CR17","doi-asserted-by":"crossref","unstructured":"Pearson, S.: Privacy, Security and Trust in Cloud Computing. In: Pearson, S., Yee, G. (eds.) Privacy and Security for Cloud Computing, Computer Communications and Networks, pp. 3\u201342. Springer (2012)","DOI":"10.1007\/978-1-4471-4189-1_1"},{"key":"3_CR18","unstructured":"The Guardian: NSA Prism program taps in to user data of Apple, Google and others (June 7, 2013), http:\/\/www.guardian.co.uk\/world\/2013\/jun\/06\/us-tech-giants-nsa-data"},{"key":"3_CR19","unstructured":"Barab\u00e1si, A.-L.: Scientists must spearhead ethical use of big data (2013), http:\/\/www.politico.com\/story\/2013\/09\/scientists-must-spearhead-ethical-use-of-big-data-97578.html"},{"key":"3_CR20","unstructured":"Office of the Information and Privacy Commissioner of Alberta, Office of the Privacy Commissioner of Canada, Office of the Information and Privacy Commissioner for British Colombia: Getting Accountability Right with a Privacy Management Program (April 2012)"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Cavoukian, A.: Privacy by Design: Origins, Meaning, and Prospects for Assuring Privacy and Trust in the Information Era. In: Yee, G. (ed.) Privacy Protection Measures and Technologies in Business Organisations: Aspects and Standards, pp. 170\u2013208. IGI Global (2012)","DOI":"10.4018\/978-1-61350-501-4.ch007"},{"key":"3_CR22","unstructured":"Information Commissioners Office (ICO): Privacy by Design. Report (2008), www.ico.gov.uk"},{"key":"3_CR23","unstructured":"Privacy Enhancing Technologies: A Review. HPL-2011-113, http:\/\/www.hpl.hp.com\/techreports\/2011\/HPL-2011-113.html"},{"key":"3_CR24","unstructured":"Microsoft Corporation: Privacy Guidelines for Developing Software Products and Services, Version 2.1a (2007)"},{"key":"3_CR25","unstructured":"European Commission: Proposal for a Directive of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data by competent authorities for the purposes of prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and the free movement of such data (January 2012)"},{"key":"3_CR26","unstructured":"Federal Trade Commission (FTC): Protecting Consumer Privacy in an Age of Rapid Change: Recommendations for Business and PolicyMakers. FTC Report (March 2012)"},{"key":"3_CR27","doi-asserted-by":"crossref","unstructured":"Spiekermann, S., Cranor, L.F.: Engineering privacy. IEEE Transactions on Software Engineering, 1\u201342 (2008)","DOI":"10.1109\/TSE.2008.88"},{"key":"3_CR28","unstructured":"European DG of Justice: Article 29 Working Party. \u2018Opinion 3\/2010 on the principle of accountability (WP 173)\u2019 (July 2010)"},{"key":"3_CR29","unstructured":"Felici, Pearson: MS:C-2.2, Internal Project Report, A4Cloud project (March 2013)"},{"key":"3_CR30","unstructured":"Information Commissioner\u2019s Office (ICO): Binding Corporate Rules., http:\/\/www.ico.gov.uk\/for_organisations\/data_protection\/overseas\/binding_corporate_rules.aspx"},{"issue":"6","key":"3_CR31","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/1349026.1349043","volume":"51","author":"D.J. Weitzner","year":"2008","unstructured":"Weitzner, D.J., Abelson, H., Berners-Lee, T., Feigenbaum, J., Hendler, J., Sussman, G.J.: Information accountability. Communications of ACM\u00a051(6), 87 (2008)","journal-title":"Communications of ACM"},{"key":"3_CR32","unstructured":"Center for Information Policy Leadership (CIPL): Data protection accountability: the essential elements (2009), http:\/\/www.huntonfiles.com\/files\/webupload\/CIPL_Galway_Accountability_Paper.pdf"},{"key":"3_CR33","doi-asserted-by":"crossref","unstructured":"Bennett, C.J.: The Accountability Approach to Privacy and Data Protection: Assumptions and Caveats. In: Guagnin, D., et al. (eds.) Managing Privacy through Accountability, pp. 33\u201348. MacMillan (2012)","DOI":"10.1057\/9781137032225_3"},{"key":"3_CR34","unstructured":"Catteddu, D., et al.: Towards a Model of Accountability for Cloud Computing Services. In: Proceedings of the DIMACS\/BIC\/A4Cloud\/CSA International Workshop on Trustworthiness, Accountability and Forensics in the Cloud (TAFC) (May 2013)"},{"key":"3_CR35","unstructured":"Trilateral Research and Consulting, Privacy Impact Assessment and Risk Management, ICO report (May 2013), http:\/\/www.ico.org.uk\/~\/media\/documents\/library\/Corporate\/Research_and_reports\/pia-and-risk-management-full-report-for-the-ico.pdf"},{"key":"3_CR36","unstructured":"Information Commissioner\u2019s Office UK (ICO): Data protection guidance note: Privacy enhancing technologies (2007)"},{"key":"3_CR37","series-title":"Information Science Reference","doi-asserted-by":"publisher","first-page":"158","DOI":"10.4018\/978-1-4666-0978-5.ch008","volume-title":"Threats, Countermeasures, and Advances in Applied Information Security","author":"S. Pearson","year":"2012","unstructured":"Pearson, S., Sander, T.: A Decision Support System for Privacy Compliance. In: Gupta, M., Walp, J., Sharman, R. (eds.) Threats, Countermeasures, and Advances in Applied Information Security. Information Science Reference, pp. 158\u2013180. IGI Global, New York (2012)"},{"key":"3_CR38","unstructured":"EU Cloud Accountability project, http:\/\/www.a4cloud.eu"},{"key":"3_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/978-3-642-33615-7_3","volume-title":"On the Move to Meaningful Internet Systems: OTM 2012","author":"M. Mowbray","year":"2012","unstructured":"Mowbray, M., Pearson, S.: Protecting Personal Information in Cloud Computing. In: Meersman, R., Panetto, H., Dillon, T., Rinderle-Ma, S., Dadam, P., Zhou, X., Pearson, S., Ferscha, A., Bergamaschi, S., Cruz, I.F. (eds.) OTM 2012, Part II. LNCS, vol.\u00a07566, pp. 475\u2013491. Springer, Heidelberg (2012)"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management for Emerging Services and Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-55137-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,10]],"date-time":"2019-08-10T01:59:56Z","timestamp":1565402396000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-55137-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642551369","9783642551376"],"references-count":39,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-55137-6_3","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2014]]}}}