{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T06:02:49Z","timestamp":1775023369714,"version":"3.50.1"},"reference-count":45,"publisher":"Informa UK Limited","issue":"2","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Risk Research"],"published-print":{"date-parts":[[2020,2,1]]},"DOI":"10.1080\/13669877.2018.1517381","type":"journal-article","created":{"date-parts":[[2019,1,12]],"date-time":"2019-01-12T09:40:00Z","timestamp":1547286000000},"page":"139-152","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":17,"title":["The risk-based approach under the new EU data protection regulation: a critical perspective"],"prefix":"10.1080","volume":"23","author":[{"given":"Maria Eduarda","family":"Gon\u00e7alves","sequence":"first","affiliation":[{"name":"Instituto Universit\u00e1rio de Lisboa (ISCTE-IUL), DIN\u00c2MI\u00c1CET \u2013 IUL, Lisboa, Portugal"}]}],"member":"301","published-online":{"date-parts":[[2019,1,12]]},"reference":[{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.4135\/9781446219539"},{"key":"CIT0011","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2011.01612.x"},{"key":"CIT0013","volume-title":"The Risk Society: Towards a New Modernity","author":"Beck U","year":"1992"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8675.2009.00534.x"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1080\/13669877.2016.1153500"},{"key":"CIT0017","doi-asserted-by":"publisher","DOI":"10.1787\/9789264082939-11-en"},{"key":"CIT0018","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9930.2010.00318.x"},{"key":"CIT0020","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipw007"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1080\/1369118X.2012.678878"},{"key":"CIT0024","volume-title":"\u00c0 quoi r\u00eavent les algorithmes. Nos vies \u00e0 l\u2019Heure des big data","author":"Cardon D","year":"2015"},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-7540-4_14"},{"key":"CIT0026","volume-title":"Privacy Impact Assessment (PIA), Tools (Templates and Knowledge Bases","author":"Commission Nationale Informatique et Libert\u00e9s (CNIL).","year":"2015"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2011.11.004"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.21552\/EDPL\/2016\/3\/5"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2016.02.006"},{"key":"CIT0034","doi-asserted-by":"publisher","DOI":"10.1111\/soru.12064"},{"key":"CIT0042","doi-asserted-by":"crossref","first-page":"473","DOI":"10.54648\/ERPL2012028","volume":"2","author":"Ferretti F","year":"2012","journal-title":"European Review of Private Law"},{"key":"CIT0043","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipu035"},{"key":"CIT0048","volume-title":"The Closing of the Net","author":"Horten M","year":"2016"},{"key":"CIT0053","doi-asserted-by":"publisher","DOI":"10.1080\/13600869.2013.801589"},{"key":"CIT0054","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipv012"},{"key":"CIT0056","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2009.02.010"},{"key":"CIT0057","volume-title":"The Foundations of EU Data Protection Law","author":"Lynskey O","year":"2015"},{"key":"CIT0058","doi-asserted-by":"publisher","DOI":"10.1017\/S1867299X00000027"},{"key":"CIT0059","first-page":"161","volume":"6","author":"Mantelero A.","year":"2013","journal-title":"Computer Review International"},{"key":"CIT0060","doi-asserted-by":"publisher","DOI":"10.1016\/j.diin.2015.09.006"},{"key":"CIT0063","volume-title":"Le mirage num\u00e9rique: Pour une politique du big data","author":"Morozov E","year":"2015"},{"key":"CIT0064","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-017-7376-8_13"},{"key":"CIT0065","volume-title":"The Black Box Society: The Secret Algorithms that Control Money and Information","author":"Pasquale F","year":"2016"},{"key":"CIT0066","doi-asserted-by":"publisher","DOI":"10.1080\/13600830802472990"},{"key":"CIT0068","first-page":"53","volume-title":"Social Theories of Risk","author":"Renn O","year":"1992"},{"issue":"4","key":"CIT0070","first-page":"1525","volume":"80","author":"Rosen J","year":"2012","journal-title":"Fordham Law Review"},{"key":"CIT0071","doi-asserted-by":"publisher","DOI":"10.1177\/016224390002500101"},{"key":"CIT0076","first-page":"13","volume":"15","author":"Tene O","year":"2010","journal-title":"International Data Privacy Law"},{"key":"CIT0078","doi-asserted-by":"publisher","DOI":"10.1080\/13501763.2013.834549"},{"key":"CIT0079","first-page":"359","volume-title":"Uncertain Risks Regulated","author":"Van Asselt M. B. A.","year":"2009"},{"key":"CIT0080","doi-asserted-by":"publisher","DOI":"10.1017\/S1867299X00001987"},{"key":"CIT0081","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipu018"},{"key":"CIT0082","doi-asserted-by":"publisher","DOI":"10.1021\/es405170k"},{"key":"CIT0083","doi-asserted-by":"publisher","DOI":"10.4324\/9780203465462"},{"key":"CIT0085","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-2543-0_1"},{"key":"CIT0086","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipu001"},{"key":"CIT0087","doi-asserted-by":"publisher","DOI":"10.1016\/0959-3780(92)90017-2"},{"key":"CIT0088","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-7540-4_12"},{"key":"CIT0089","author":"Zittrain J","year":"2014","journal-title":"New Republic"}],"container-title":["Journal of Risk Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/13669877.2018.1517381","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,9,10]],"date-time":"2022-09-10T04:48:57Z","timestamp":1662785337000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/13669877.2018.1517381"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,12]]},"references-count":45,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,2,1]]}},"alternative-id":["10.1080\/13669877.2018.1517381"],"URL":"https:\/\/doi.org\/10.1080\/13669877.2018.1517381","relation":{},"ISSN":["1366-9877","1466-4461"],"issn-type":[{"value":"1366-9877","type":"print"},{"value":"1466-4461","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,12]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=rjrr20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=rjrr20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2018-03-05","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-07-11","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-08-15","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-01-12","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}