{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T03:29:00Z","timestamp":1767324540317,"version":"3.48.0"},"publisher-location":"Cham","reference-count":10,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032128782","type":"print"},{"value":"9783032128799","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-12879-9_4","type":"book-chapter","created":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T03:23:58Z","timestamp":1767324238000},"page":"35-43","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["The OECD-Inspired ORM Blueprint for Personal Data Security"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6091-2624","authenticated-orcid":false,"given":"Antonio","family":"Goncalves","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7248-4310","authenticated-orcid":false,"given":"Anacleto","family":"Correia","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,1,2]]},"reference":[{"key":"4_CR1","unstructured":"OECD: The OECD Privacy Framework 2013 (2013)"},{"issue":"8","key":"4_CR2","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1007\/s00439-018-1919-7","volume":"137","author":"M Phillips","year":"2018","unstructured":"Phillips, M.: International data-sharing norms: from the OECD to the General Data Protection Regulation (GDPR). Hum. Genet. 137(8), 575\u2013582 (2018)","journal-title":"Hum. Genet."},{"issue":"2","key":"4_CR3","first-page":"91","volume":"1","author":"J Babikian","year":"2023","unstructured":"Babikian, J.: Securing rights: legal frameworks for privacy and data protection in the digital era. Law Res. J. 1(2), 91\u2013101 (2023)","journal-title":"Law Res. J."},{"issue":"5","key":"4_CR4","doi-asserted-by":"publisher","first-page":"601","DOI":"10.1016\/j.ejvs.2018.02.018","volume":"55","author":"CA Behrendt","year":"2018","unstructured":"Behrendt, C.A., Joassart Ir, A., Debus, E.S., Kolh, P.: The challenge of data privacy compliant registry based research. Eur. J. Vasc. Endovasc. Surg. 55(5), 601\u2013602 (2018)","journal-title":"Eur. J. Vasc. Endovasc. Surg."},{"key":"4_CR5","first-page":"4379","volume":"2020","author":"Q Covert","year":"2020","unstructured":"Covert, Q., Francis, M., Steinhagen, D., Streff, K.: Towards a triad for data privacy. Proc. Annu. Hawaii Int. Conf. Syst. Sci. 2020, 4379\u20134387 (2020)","journal-title":"Proc. Annu. Hawaii Int. Conf. Syst. Sci."},{"issue":"4","key":"4_CR6","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1007\/s10506-017-9206-9","volume":"25","author":"J Kingsto","year":"2017","unstructured":"Kingsto, J.: Using artificial intelligence to support compliance with the general data protection regulation. Artif. Intell. Law. 25(4), 429\u2013443 (2017)","journal-title":"Artif. Intell. Law"},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-98385-1_1","volume-title":"Trust, Privacy and Security in Digital Business","author":"C Lambrinoudakis","year":"2018","unstructured":"Lambrinoudakis, C.: The general data protection regulation (GDPR) era\u00a0: ten steps for compliance of data processors and data controllers. In: Trust, Privacy and Security in Digital Business, pp. 3\u20138. Springer International Publishing (2018)"},{"key":"4_CR8","first-page":"5039","volume":"2019","author":"C Grundstrom","year":"2019","unstructured":"Grundstrom, C., V\u00e4yrynen, K., Iivari, N., Isomursu, M.: Making sense of the general data protection regulation-four categories of personal data access challenges. Proc. Annu. Hawaii Int. Conf. Syst. Sci. 2019, 5039\u20135048 (2019)","journal-title":"Proc. Annu. Hawaii Int. Conf. Syst. Sci."},{"key":"4_CR9","volume-title":"Object-Role Modeling Fundamentals: A Practical Guide to Data Modeling with ORM","author":"T Halpin","year":"2015","unstructured":"Halpin, T.: Object-Role Modeling Fundamentals: A Practical Guide to Data Modeling with ORM (2015)"},{"key":"4_CR10","volume-title":"Writing Effective Use Cases","author":"A Cockburn","year":"2015","unstructured":"Cockburn, A., Cockburn, L.: Writing Effective Use Cases. Pearson Education (2015)"}],"container-title":["Lecture Notes in Networks and Systems","Proceedings of 19th Iberian Conference on Information Systems and Technologies (CISTI 2024)"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-12879-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T03:24:01Z","timestamp":1767324241000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-12879-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9783032128782","9783032128799"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-12879-9_4","relation":{},"ISSN":["2367-3370","2367-3389"],"issn-type":[{"value":"2367-3370","type":"print"},{"value":"2367-3389","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"2 January 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CISTI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Iberian Conference on Information Systems and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Salamanca","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 June 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cisti2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.cisti.eu\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}