{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:31:49Z","timestamp":1742913109034,"version":"3.40.3"},"publisher-location":"Dordrecht","reference-count":32,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048188642"},{"type":"electronic","value":"9789048188659"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-8865-9_20","type":"book-chapter","created":{"date-parts":[[2010,8,2]],"date-time":"2010-08-02T13:12:18Z","timestamp":1280754738000},"page":"323-334","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Privacy by Design: A Matter of Choice"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Le M\u00e9tayer","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,3]]},"reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., J. Kiernan, R. Srikant, and Y. Xu. 2002. Hippocratic databases. In Proceedings of the 28th international conference on very large data bases (VLDB 2002), eds. P.A. Bernstein, Y.E. Ioannidis, R. Ramakrishnan, and D. Papadias, 143\u2013154. Hong Kong: VLDB Endowment.","DOI":"10.1016\/B978-155860869-6\/50021-4"},{"key":"20_CR2","doi-asserted-by":"crossref","unstructured":"Anciaux, N., M. Benzine, L. Bouganim, K. Jacquemin, P. Pucheral, and S. Yin. 2008. Restoring the patient control over her medical history. In Proceedings of the 21st IEEE international symposium on computer-based medical systems, eds. N. Anciaux, M. Benzine, L. Bouganim, K. Jacquemin, P. Pucheral, and S. Yin, 132\u2013137. Washington, DC: IEEE Computer Society.","DOI":"10.1109\/CBMS.2008.101"},{"issue":"9","key":"20_CR3","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1007\/s11623-008-0145-1","volume":"32","author":"K. Bock","year":"2008","unstructured":"Bock, K. 2008. An approach to strengthen user confidence through privacy certification. Datenschutz and Datensicherheit\u2014DuD 32 (9): 610\u2013614.","journal-title":"Datenschutz and Datensicherheit\u2014DuD"},{"key":"20_CR4","first-page":"135","volume":"9","author":"L.A. Bygrave","year":"2002","unstructured":"Bygrave, L.A. 2002. Privacy-enhancing technologies: Caught between a rock and the hard place. Privacy Law and Policy Reporter 9: 135\u2013137.","journal-title":"Privacy Law and Policy Reporter"},{"key":"20_CR5","unstructured":"Cavoukian, A. 2008. Privacy and radical pragmatism: Change the paradigm. White Paper. Information and Privacy Commissioner of Ontario, Canada."},{"key":"20_CR6","unstructured":"CC. 2006. The common criteria for information technologies security evaluation, CC V3.1, Part 1: Introduction and general model. CCMB-2006-09-001."},{"issue":"(","key":"20_CR7","doi-asserted-by":"crossref","first-page":"399","DOI":"10.1007\/BF03219914","volume":"61","author":"Y. Deswarte","year":"2006","unstructured":"Deswarte, Y., C. Aguilar Melchor. 2006. Current and future privacy enhancing technologies for the internet. Annales des t\u00e9l\u00e9communications 61 (3\u20134): 399\u2013417.","journal-title":"Annales des t\u00e9l\u00e9communications"},{"issue":"11\/","key":"20_CR8","first-page":"31","volume":"L281","author":"Directive 95\/46\/EC","year":"1995","unstructured":"Directive 95\/46\/EC. 1995. Directive 95\/46\/EC of the European Parliament and of the Council of the 24 October 1995 on the protection of individuals with regard to the processing of personal data and on the free movement of such data. Official Journal L281(23\/11\/1995): 31\u201350.","journal-title":"Official Journal"},{"key":"20_CR9","doi-asserted-by":"crossref","DOI":"10.1007\/978-90-6704-595-7","volume-title":"Coding regulation: Essays on the normative role of information technology","author":"E. Dommering","year":"2006","unstructured":"Dommering, E., and L. Asscher, eds. 2006. Coding regulation: Essays on the normative role of information technology. The Hague: T.M.C. Asser Press."},{"key":"20_CR10","unstructured":"European Commission. 2003. First report on the implementation of the Data Protection Directive 95\/46\/EC. COM (2003) 265, May 2003."},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Goldberg, I. 2003. Privacy-enhancing technologies for the Internet, II: Five years later. In Proceedings of the workshop on privacy enhancing technologies. Lecture Notes in Computer Science (LNCS), vol. 2482. Heidelberg: Springer.","DOI":"10.1007\/3-540-36467-6_1"},{"key":"20_CR12","unstructured":"Grossklags, J., and A. Acquisti. 2009. When 25 cents is too much: An experiment on willingness-to-sell and willingness-to-protect personal information. Working paper."},{"key":"20_CR13","unstructured":"G\u00fcrses, S. 2009. Circumscribing PETs. In Proceedings of the conference on privacy and data protection, (CPDP 2009). Heidelberg: Springer."},{"key":"20_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-6914-7","volume-title":"Profiling the European citizen","author":"M. Hildebrandt","year":"2008","unstructured":"Hildebrandt, M., and S. Gutwirth. eds. 2008. Profiling the European citizen. Dordrecht: Springer."},{"key":"20_CR15","unstructured":"ISTPA. 2002. Privacy framework, version 1.1. International Security, Trust and Privacy Alliance."},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Jacobs, B. 2009. Architecture is politics: Security and privacy issues in transport and beyond. In Proceedings of the conference on privacy and data protection, (CPDP 2009). Heidelberg: Springer.","DOI":"10.1007\/978-90-481-8865-9_18"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"De Jonge, W., and B. Jacobs. 2008. Privacy-friendly electronic traffic pricing via commits. In Proceedings of the workshop of Formal Aspects of Securiy and Trust (FAST 2008). Lecture Notes in Computer Science (LNCS), vol. 5491. Heidelberg: Springer.","DOI":"10.1007\/978-3-642-01465-9_10"},{"issue":"3","key":"20_CR18","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s00766-008-0067-3","volume":"13","author":"C. Kalloniatis","year":"2008","unstructured":"Kalloniatis, C., E. Kavakli, and S. Gritzalis. 2008. Addressing privacy requirements in system design: The PriS method. Requirements Engineering 13 (3): 241\u2013255.","journal-title":"Requirements Engineering"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Karat, J., C. Karat, C. Brodie, and J. Feng. 2005. Designing natural language and structured entry methods for privacy policy authoring. In Proceedings of the 10th IFIP TC13 international conference of human-computer interaction. Berlin: Springer.","DOI":"10.1007\/11555261_54"},{"key":"20_CR20","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1016\/j.clsr.2008.01.006","volume":"24","author":"E. Kosta","year":"2008","unstructured":"Kosta, E., J. Zibuschka, T. Scherner, and J. Dumortier. 2008. Legal considerations on privacy-enhancing location based services using PRIME technology. Computer Law and Security Report 24: 139\u2013146.","journal-title":"Computer Law and Security Report"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Langheinrich, M. 2001. Privacy by design: Principles of privacy aware ubiquitous systems. In Proceedings of the Ubicomp conference, 273\u2013291. Lecture Notes in Computer Science (LNCS), vol. 2201. London: Springer.","DOI":"10.1007\/3-540-45427-6_23"},{"key":"20_CR22","doi-asserted-by":"crossref","unstructured":"Le M\u00e9tayer, D. 2009. A formal privacy management framework. Proceedings of the workshop of formal aspects of securiy and trust (FAST 2008), 162\u2013176. Lecture Notes in Computer Science (LNCS), vol. 5491. Berlin: Springer.","DOI":"10.1007\/978-3-642-01465-9_11"},{"key":"20_CR23","volume-title":"Code and other laws in cyberspace","author":"L. Lessig","year":"1999","unstructured":"Lessig, L. 1999. Code and other laws in cyberspace. New York: Basic Books."},{"key":"20_CR24","unstructured":"OECD. 1980. OECD guidelines on the protection of privacy and transborder flows of personal data. Organization for Economic Co-operation and Development."},{"issue":"3","key":"20_CR25","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1016\/j.clsr.2006.03.004","volume":"22","author":"Y. Poullet","year":"2006","unstructured":"Poullet, Y. 2006. The Directive 95\/46\/EC: Ten years after. Computer Law and Security Report 22 (3): 206\u2013217.","journal-title":"Computer Law and Security Report"},{"key":"20_CR26","doi-asserted-by":"crossref","unstructured":"Poullet, Y. 2009. About the e-Privacy directive, towards a third generation of data protection legislations. In Proceedings of the conference on privacy and data protection, (CPDP 2009). Heidelberg: Springer.","DOI":"10.1007\/978-90-481-8865-9_1"},{"issue":"6","key":"20_CR27","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSECP.2003.1253567","volume":"1","author":"A. Rezgui","year":"2003","unstructured":"Rezgui, A., A. Bouguettaya, and M.Y. Eltoweissy. 2003. Privacy on the web: Facts, challenges, and solutions. IEEE Security and Privacy 1 (6): 40\u201349.","journal-title":"IEEE Security and Privacy"},{"issue":"1","key":"20_CR28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.2202\/1941-6008.1001","volume":"2","author":"A. Rouvroy","year":"2008","unstructured":"Rouvroy, A. 2008. Privacy, data protection, and the unprecedented challenges of ambient intelligence. Studies in Law, Ethics and Technology 2 (1): 1\u201351.","journal-title":"Studies in Law, Ethics and Technology"},{"key":"20_CR29","doi-asserted-by":"crossref","unstructured":"Rouvroy, A., and Y. Poullet. 2009. The right to informational self-determination and the value of self-development. Reassessing the importance of privacy for democracy. In Proceedings of the conference reinventing data protection. Dordrecht: Springer.","DOI":"10.1007\/978-1-4020-9498-9_2"},{"key":"20_CR30","unstructured":"Tynan, D. 2007. The privacy market has many sellers, but few buyers. Wired.com. http:\/\/www.wired.com\/print\/techbiz\/startups\/news\/2007\/09\/privacy."},{"key":"20_CR31","unstructured":"WP29. 2006. Article 29 Data Protection Working Party, 1611\/06\/EN, WP 126, Opinion 8\/2006 on the review of the regulatory framework for Electronic Communications and Services, with focus on the e-Privacy Directive. Adopted on 26 September."},{"key":"20_CR32","unstructured":"WP29. 2009. Article 29 Data Protection Working Party, 00350\/09\/EN, WP 159, Opinion 1\/2009 on the proposals amending Directive 2002\/58\/EC on privacy and electronic communications (e-Privacy Directive). Adopted on 10 February."}],"container-title":["Data Protection in a Profiled World"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-8865-9_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,11]],"date-time":"2024-07-11T10:49:35Z","timestamp":1720694975000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-90-481-8865-9_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9789048188642","9789048188659"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-8865-9_20","relation":{},"subject":[],"published":{"date-parts":[[2010]]},"assertion":[{"value":"3 August 2010","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}