{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,14]],"date-time":"2026-05-14T06:12:34Z","timestamp":1778739154526,"version":"3.51.4"},"reference-count":71,"publisher":"Informa UK Limited","issue":"3","license":[{"start":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T00:00:00Z","timestamp":1553212800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["The Information Society"],"published-print":{"date-parts":[[2019,5,27]]},"DOI":"10.1080\/01972243.2019.1583296","type":"journal-article","created":{"date-parts":[[2019,3,23]],"date-time":"2019-03-23T05:12:15Z","timestamp":1553317935000},"page":"122-142","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":78,"title":["Engineering Privacy by Design: Are engineers ready to live up to the challenge?"],"prefix":"10.1080","volume":"35","author":[{"given":"Kathrin","family":"Bednar","sequence":"first","affiliation":[{"name":"Institute for Information Systems and Society, Vienna University of Economics and Business, Vienna, Austria;"}]},{"given":"Sarah","family":"Spiekermann","sequence":"additional","affiliation":[{"name":"Institute for Information Systems and Society, Vienna University of Economics and Business, Vienna, Austria;"}]},{"given":"Marc","family":"Langheinrich","sequence":"additional","affiliation":[{"name":"Faculty of Informatics, Universit\u00e0 della Svizzera Italiana, Lugano, Switzerland"}]}],"member":"301","published-online":{"date-parts":[[2019,3,22]]},"reference":[{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa1465"},{"key":"CIT0003","volume-title":"Proceedings of the 27th International Conference on Intelligent Systems (ICIS), 1563-1580","author":"Acquisti A.","year":"2006"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-69746-3_2"},{"key":"CIT0005","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2002.tb00236.x"},{"key":"CIT0008","volume-title":"A gift of fire: Social, legal, and ethical issues for computing and the Internet","author":"Baase S","year":"2008"},{"key":"CIT0009","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23006"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.2307\/41409971"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.22"},{"issue":"1","key":"CIT0012","first-page":"55","volume":"55","author":"Birnhack M.","year":"2014","journal-title":"Jurimetrics"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1109\/MTAS.2004.1273467"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1145\/1102486.1102491"},{"key":"CIT0015","volume-title":"Privacy by design: Take the challenge","author":"Cavoukian A","year":"2009"},{"key":"CIT0017","volume-title":"Corporate surveillance in everyday life: How companies collect, combine, analyze, trade, and use personal data on billions","author":"Christl W","year":"2017"},{"key":"CIT0018","volume-title":"Networks of control: A report on corporate surveillance, digital tracking, big data & privacy","author":"Christl W.","year":"2016"},{"issue":"1","key":"CIT0019","first-page":"245","volume":"12","author":"Ciocchetti C","year":"2007","journal-title":"Journal of Technology Law & Policy"},{"issue":"1","key":"CIT0020","first-page":"290","volume":"24","author":"Clarke R","year":"2001","journal-title":"University of New South Wales Law Journal"},{"key":"CIT0021","first-page":"56","author":"Cochrane P","year":"2000","journal-title":"Sovereign Magazine, March"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-012-1518-9"},{"key":"CIT0023","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.12.008"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1287\/orsc.10.1.104"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.120"},{"key":"CIT0026","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2010.400"},{"key":"CIT0027","first-page":"348","volume-title":"Human-Computer Interaction and Management Information Systems: Foundations","author":"Friedman B.","year":"2006"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1177\/1461444817702397"},{"key":"CIT0029","volume-title":"Post-privacy: Prima leben ohne privatsph\u00e4re","author":"Heller C","year":"2011"},{"key":"CIT0030","volume-title":"Privacy-enhancing technologies: The path to anonymity (Revised edition","author":"Hes R.","year":"2000"},{"key":"CIT0031","author":"Hoffman D","year":"2014","journal-title":"Harvard Business Review"},{"key":"CIT0032","volume-title":"Data breach reports","author":"Identity Theft Resource Center","year":"2016"},{"key":"CIT0033","volume-title":"Computer ethics: Analyzing information technology","author":"Johnson D. G","year":"2009"},{"key":"CIT0034","volume-title":"The imperative of responsibility: In search of an ethics for the technological age","author":"Jonas H","year":"1984"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.53"},{"key":"CIT0036","volume-title":"Knowledge management: The darker side of KM (KODE Working Papers Series #9","author":"Land F.","year":"2004"},{"key":"CIT0037","volume-title":"A troubadour approach to privacy (Ambient Agoras Report 15.3.1)","author":"Langheinrich M.","year":"2003"},{"key":"CIT0038","first-page":"125","volume-title":"The AAAI Spring Symposium: Intelligent Information Privacy Management","author":"Mayes G. R","year":"2010"},{"key":"CIT0040","first-page":"1","volume-title":"Proceedings of the Conference on Information Systems Applied Research","author":"Nakayama M.","year":"2016"},{"key":"CIT0041","doi-asserted-by":"crossref","DOI":"10.1515\/9780804772891","volume-title":"Privacy in context: Technology, policy, and the integrity of social life","author":"Nissenbaum H","year":"2009"},{"key":"CIT0042","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-005-2929-7"},{"key":"CIT0043","volume-title":"OECD guidelines on the protection of privacy and transborder flows of personal data","author":"Organisation for Economic Cooperation and Development","year":"1980"},{"key":"CIT0044","volume-title":". The OECD privacy framework","author":"Organisation for Economic Cooperation and Development","year":"2013"},{"key":"CIT0045","doi-asserted-by":"publisher","DOI":"10.1177\/0963662510376886"},{"key":"CIT0046","volume-title":"Public perceptions of privacy and security in the post-Snowden era","author":"Pew Research Center","year":"2014"},{"key":"CIT0047","volume-title":"The true cost of compliance: A benchmark study of multinational organizations (Research report","author":"Ponemon Institute LLC","year":"2011"},{"key":"CIT0048","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-010-9236-0"},{"key":"CIT0049","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4020-9498-9_2"},{"key":"CIT0050","doi-asserted-by":"publisher","DOI":"10.1145\/1142958.1142962"},{"key":"CIT0051","volume-title":"Personal data: The emergence of a new asset class","author":"Schwab K.","year":"2011"},{"key":"CIT0052","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.05.009"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025628530013"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1177\/0162243912436985"},{"key":"CIT0055","author":"Shilton K.","year":"2017","journal-title":"Journal of Business Ethics"},{"key":"CIT0056","volume-title":"Managing privacy: Information technology and corporate America","author":"Smith H. J","year":"1994"},{"key":"CIT0057","doi-asserted-by":"publisher","DOI":"10.2307\/41409970"},{"key":"CIT0058","volume-title":"Understanding privacy","author":"Solove D. J","year":"2008"},{"key":"CIT0059","volume-title":"Software engineering","author":"Sommerville I","year":"2011","edition":"9"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1145\/2209249.2209263"},{"key":"CIT0061","volume-title":"Ethical IT innovation: A value-based system design approach","author":"Spiekermann S","year":"2016"},{"key":"CIT0062","doi-asserted-by":"publisher","DOI":"10.1007\/s12525-015-0191-0"},{"key":"CIT0063","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.88"},{"key":"CIT0065","doi-asserted-by":"publisher","DOI":"10.5465\/amr.1995.9508080331"},{"key":"CIT0066","first-page":"198","volume-title":"Internet and surveillance: The challenges of Web 2.0 and social media","author":"Szekely I","year":"2011"},{"issue":"281","key":"CIT0067","first-page":"31","volume":"38","author":"The European Parliament and the Council of the European Union","year":"1995","journal-title":"Official Journal of the European Union"},{"issue":"119","key":"CIT0068","first-page":"1","volume":"59","author":"The European Parliament and the Council of the European Union","year":"2016","journal-title":"Official Journal of the European Union"},{"key":"CIT0069","volume-title":"Administration discussion draft: Consumer Privacy Bill of Rights Act of 2015","author":"The White House","year":"2015"},{"key":"CIT0070","volume-title":"Special Eurobarometer 431: Data protection","author":"TNS Opinion &amp; Social","year":"2015"},{"key":"CIT0071","doi-asserted-by":"publisher","DOI":"10.1145\/2088883.2088901"},{"key":"CIT0073","volume-title":"Philosophy and design: From engineering to architecture","author":"Vermaas P. E.","year":"2008"},{"key":"CIT0074","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.1974.6366483"},{"key":"CIT0075","volume-title":". Educating engineering students about ethics: Experiences at Brown University and Trinity College","author":"Ware D. K.","year":"2013"},{"key":"CIT0076","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.68"},{"key":"CIT0077","volume-title":"The official PGP user\u2019s guide","author":"Zimmermann P","year":"1995"}],"container-title":["The Information Society"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01972243.2019.1583296","content-type":"application\/pdf","content-version":"am","intended-application":"text-mining"},{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01972243.2019.1583296","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,3]],"date-time":"2020-12-03T02:45:54Z","timestamp":1606963554000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/01972243.2019.1583296"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,22]]},"references-count":71,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2019,3,19]]},"published-print":{"date-parts":[[2019,5,27]]}},"alternative-id":["10.1080\/01972243.2019.1583296"],"URL":"https:\/\/doi.org\/10.1080\/01972243.2019.1583296","relation":{},"ISSN":["0197-2243","1087-6537"],"issn-type":[{"value":"0197-2243","type":"print"},{"value":"1087-6537","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,22]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2017-06-29","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-07-31","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-12-28","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-03-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}