{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T08:57:50Z","timestamp":1740128270427,"version":"3.37.3"},"reference-count":65,"publisher":"Informa UK Limited","issue":"10","funder":[{"DOI":"10.13039\/501100002347","name":"German Bundesministerium f\u00fcr Bildung und Forschung","doi-asserted-by":"crossref","award":["16KIS0899"],"award-info":[{"award-number":["16KIS0899"]}],"id":[{"id":"10.13039\/501100002347","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Behaviour &amp; Information Technology"],"published-print":{"date-parts":[[2022,7,27]]},"DOI":"10.1080\/0144929x.2022.2069596","type":"journal-article","created":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T17:06:40Z","timestamp":1652807200000},"page":"2084-2119","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":4,"title":["Data cart \u2013 designing a tool for the GDPR-compliant handling of personal data by employees"],"prefix":"10.1080","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1961-100X","authenticated-orcid":false,"given":"Jan","family":"Tolsdorf","sequence":"first","affiliation":[{"name":"Bonn-Rhein-Sieg University of Applied Sciences, Sankt Augustin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8824-2500","authenticated-orcid":false,"given":"Florian","family":"Dehling","sequence":"additional","affiliation":[{"name":"Bonn-Rhein-Sieg University of Applied Sciences, Sankt Augustin, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7863-0622","authenticated-orcid":false,"given":"Luigi","family":"Lo Iacono","sequence":"additional","affiliation":[{"name":"Bonn-Rhein-Sieg University of Applied Sciences, Sankt Augustin, Germany"}]}],"member":"301","published-online":{"date-parts":[[2022,5,17]]},"reference":[{"doi-asserted-by":"publisher","key":"CIT0001","DOI":"10.1109\/EuroSPW51379.2020.00025"},{"doi-asserted-by":"publisher","key":"CIT0002","DOI":"10.1016\/j.chb.2016.12.040"},{"doi-asserted-by":"publisher","key":"CIT0003","DOI":"10.1177\/0149206319878254"},{"doi-asserted-by":"publisher","key":"CIT0004","DOI":"10.1109\/BigDataCongress.2019.00015"},{"unstructured":"Brackenbury, Jordan, and Rebecca Bailey. 2020. \u201c2020 Outbound Email Security Report \u2014 Egress.\u201d","key":"CIT0005"},{"doi-asserted-by":"publisher","key":"CIT0006","DOI":"10.1007\/978-981-10-5251-4_103"},{"unstructured":"Cavoukian, Ann. 2009. Privacy by Design The 7 Foundational Principles Implementation and Mapping of Fair Information Practices. Brochure: Information and Privacy Comissioner of Ontario.","key":"CIT0007"},{"doi-asserted-by":"publisher","key":"CIT0008","DOI":"10.1007\/978-3-030-86586-3_7"},{"unstructured":"Domingo-Ferrer, Josep, Marit Hansen, Jaap-Henk Hoepman, Daniel Le M\u00e9tayer, Rodica Tirtea, Stefan Schiffner, George Danezis, European Union, European Network and Information Security Agency. 2014. Privacy and Data Protection by Design\u2013From Policy to Engineering, ENISA.","key":"CIT0009"},{"doi-asserted-by":"publisher","key":"CIT0010","DOI":"10.1007\/978-3-030-58201-2_9"},{"doi-asserted-by":"publisher","key":"CIT0011","DOI":"10.17265\/2159-5313\/2016.09.003"},{"unstructured":"Evdokimov, Andrey, Alena Reva, and Koen Maris. 2020. Taking Care of Corporate Security and Employee Privacy. Survey. AO Kaspersky Lab.","key":"CIT0012"},{"doi-asserted-by":"publisher","key":"CIT0013","DOI":"10.1016\/B978-0-12-803843-7.00053-3"},{"doi-asserted-by":"publisher","key":"CIT0014","DOI":"10.1016\/j.tele.2019.01.002"},{"unstructured":"Geers, Michael. 2020. Micro Frontends in Action.","key":"CIT0015"},{"doi-asserted-by":"publisher","key":"CIT0016","DOI":"10.23919\/CISTI49556.2020.9140922"},{"unstructured":"Goodman, Seb. 2020. \u201cHuman Error to Blame for 9 in 10 UK Cyber Data Breaches in 2019.\u201d","key":"CIT0017"},{"unstructured":"IAPP. 2021. \u201cPrivacy Tech Vendor Report.\u201d Report 5.2.01. IAPP.","key":"CIT0018"},{"unstructured":"ISO. 2011. ISO\/IEC 25010:2011: Systems and Software Engineering \u2013 Systems and Software Quality Requirements and Evaluation (SQuaRE) \u2013 System and Software Quality Models, (first ed.). ISO\/IEC.","key":"CIT0019"},{"unstructured":"ISO. 2018. EN ISO 9241-11:2018, Ergonomics of Human-System Interaction Part 11: Usability: Definitions and Concepts.","key":"CIT0020"},{"unstructured":"ISO. 2019. EN ISO 9241-210:2019, Ergonomics of Human-System Interaction Part 210: Human-centred Design for Interactive Systems.","key":"CIT0021"},{"doi-asserted-by":"publisher","key":"CIT0022","DOI":"10.1007\/978-3-319-55783-0_12"},{"key":"CIT0023","volume-title":"Focus Groups: A Practical Guide for Applied Research","author":"Krueger Richard A.","year":"2015","edition":"5"},{"doi-asserted-by":"publisher","key":"CIT0024","DOI":"10.1108\/IJOTB-20-03-2017-B003"},{"key":"CIT0025","volume-title":"Research Methods in Human Computer Interaction","author":"Lazar Jonathan","year":"2017","edition":"3"},{"doi-asserted-by":"publisher","key":"CIT0026","DOI":"10.17705\/1CAIS.02828"},{"doi-asserted-by":"publisher","key":"CIT0027","DOI":"10.1080\/1097198X.2019.1569186"},{"doi-asserted-by":"publisher","key":"CIT0028","DOI":"10.2478\/popets-2020-0037"},{"doi-asserted-by":"publisher","key":"CIT0029","DOI":"10.1007\/978-0-387-35610-5_9"},{"doi-asserted-by":"publisher","key":"CIT0030","DOI":"10.1080\/10447318.2021.1949134"},{"doi-asserted-by":"publisher","key":"CIT0031","DOI":"10.18420\/in2017_109"},{"doi-asserted-by":"publisher","key":"CIT0032","DOI":"10.1016\/j.giq.2019.06.002"},{"doi-asserted-by":"publisher","key":"CIT0033","DOI":"10.1145\/2413296.2413305"},{"doi-asserted-by":"publisher","key":"CIT0034","DOI":"10.1109\/ACCESS.2017.2765539"},{"doi-asserted-by":"publisher","key":"CIT0035","DOI":"10.1007\/978-3-030-22312-0_15"},{"doi-asserted-by":"publisher","key":"CIT0036","DOI":"10.1145\/3313831.3376321"},{"doi-asserted-by":"publisher","key":"CIT0037","DOI":"10.1007\/978-3-540-40956-4_8"},{"unstructured":"Personal Information Protection Commission Japan. 2020. \u201cAmended Act on the Protection of Personal Information.\u201d","key":"CIT0038"},{"doi-asserted-by":"publisher","key":"CIT0039","DOI":"10.1007\/978-3-030-58986-8_13"},{"doi-asserted-by":"publisher","key":"CIT0040","DOI":"10.1007\/978-3-030-27813-7_6"},{"doi-asserted-by":"publisher","key":"CIT0041","DOI":"10.1007\/978-3-030-22351-9_29"},{"doi-asserted-by":"publisher","key":"CIT0042","DOI":"10.12821\/ijispm070302"},{"unstructured":"Privacy Rights Clearinghouse (PRC). 2020. PRC Data Breach Chronology. Database 1.13.20. Privacy Rights Clearinghouse. https:\/\/privacyrights.org\/sites\/default\/files\/2020-01\/PRC%20Data%20Bre%ach%20Chronology%20-%201.13.20.csv.","key":"CIT0043"},{"unstructured":"Rapportage Datalekken. 2020. \u201cRapportage Datalekken 2020.\u201d Technical Report. Autoriteit Persoonsgegevens.","key":"CIT0044"},{"unstructured":"Rosen, Ellen. 2015. \u201cHuman Error Biggest Cause of Data Breach: Survey.\u201d Bloomberg Law.","key":"CIT0045"},{"unstructured":"Runte, Christian, and Michael Kamps. 2021. GDPR Enforcement Tracker Report: Executive Summary. Survey 2n Edition. CMS Law-Now.","key":"CIT0046"},{"doi-asserted-by":"publisher","key":"CIT0047","DOI":"10.23919\/FRUCT50888.2021.9347593"},{"volume-title":"Quantifying the User Experience: Practical Statistics for User Research","year":"2012","author":"Sauro Jeff","key":"CIT0048"},{"doi-asserted-by":"publisher","key":"CIT0049","DOI":"10.1109\/TVCG.2020.3028946"},{"unstructured":"Shen, Yun, and Siani Pearson. 2011. Privacy Enhancing Technologies: A Review. Technical HPL-2011-113. HP Laboratories. 30 pages.","key":"CIT0050"},{"doi-asserted-by":"publisher","key":"CIT0051","DOI":"10.1145\/3267357.3267368"},{"doi-asserted-by":"publisher","key":"CIT0052","DOI":"10.1109\/TSE.2008.88"},{"key":"CIT0053","first-page":"163","volume":"52","author":"Spinuzzi Clay.","year":"2005","journal-title":"Technical Communication"},{"unstructured":"State of California. June, 2018. \u201cCalifornia Consumer Privacy Act.\u201d Assembly Bill No. 375.","key":"CIT0054"},{"doi-asserted-by":"publisher","key":"CIT0055","DOI":"10.17226\/12998"},{"doi-asserted-by":"publisher","key":"CIT0056","DOI":"10.1037\/0021-9010.68.3.459"},{"doi-asserted-by":"publisher","key":"CIT0057","DOI":"10.1016\/j.clsr.2017.05.015"},{"doi-asserted-by":"publisher","key":"CIT0058","DOI":"10.2478\/popets-2021-0035"},{"doi-asserted-by":"publisher","key":"CIT0059","DOI":"10.1007\/978-3-030-76663-4_2"},{"doi-asserted-by":"publisher","key":"CIT0060","DOI":"10.1145\/3319535.3354212"},{"unstructured":"Veys, Sophie, Daniel Serrano, Madison Stamos, Margot Herman, Nathan Reitinger, Michelle L. Mazurek, and Blase Ur. 2021. \u201cPursuing Usable and Useful Data Downloads Under GDPR\/CCPA Access Rights via Co-Design.\u201d In 17th Symposium on Usable Privacy and Security (SOUPS), 217\u2013242. Usenix.","key":"CIT0061"},{"doi-asserted-by":"publisher","key":"CIT0062","DOI":"10.1016\/j.jsis.2019.01.003"},{"unstructured":"Westphal, Patrick, Javier D. Fernandez, Sabrina Kirrane, Javier David, and Jens Lehmann. 2018. \u201cSPIRIT: A Semantic Transparency and Compliance Stack.\u201d In CEUR Workshop Proceedings, Aachen, Germany, 4.","key":"CIT0063"},{"doi-asserted-by":"publisher","key":"CIT0064","DOI":"10.1145\/3427228.3427243"},{"doi-asserted-by":"publisher","key":"CIT0065","DOI":"10.1016\/B978-0-12-410391-7.00005-1"}],"container-title":["Behaviour &amp; Information Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/0144929X.2022.2069596","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,17]],"date-time":"2022-09-17T07:10:35Z","timestamp":1663398635000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/0144929X.2022.2069596"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,17]]},"references-count":65,"journal-issue":{"issue":"10","published-print":{"date-parts":[[2022,7,27]]}},"alternative-id":["10.1080\/0144929X.2022.2069596"],"URL":"https:\/\/doi.org\/10.1080\/0144929x.2022.2069596","relation":{},"ISSN":["0144-929X","1362-3001"],"issn-type":[{"type":"print","value":"0144-929X"},{"type":"electronic","value":"1362-3001"}],"subject":[],"published":{"date-parts":[[2022,5,17]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tbit20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-10-15","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-03-31","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-05-17","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}