{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,14]],"date-time":"2026-01-14T23:19:58Z","timestamp":1768432798902,"version":"3.49.0"},"reference-count":67,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100013209","name":"Hellenic Foundation for Research and Innovation (HFRI) under the HFRI PhD Fellowship grant","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100013209","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3000662","type":"journal-article","created":{"date-parts":[[2020,6,8]],"date-time":"2020-06-08T21:26:21Z","timestamp":1591651581000},"page":"108052-108061","source":"Crossref","is-referenced-by-count":18,"title":["GDPR Interference With Next Generation 5G and IoT Networks"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0370-0830","authenticated-orcid":false,"given":"Stavroula","family":"Rizou","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Eugenia","family":"Alexandropoulou-Egyptiadou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Konstantinos E.","family":"Psannis","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2932042"},{"key":"ref38","first-page":"27","author":"ahmadi","year":"2019","journal-title":"5G NR Architecture Technology Implementation and Operation of 3GPP New Radio Standards"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipx023"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-04-2019-0047"},{"key":"ref31","year":"2018","journal-title":"Privacy Impact Assessment Methodology"},{"key":"ref30","first-page":"60","article-title":"Data breach notification: Issues and challenges for security management","author":"karyda","year":"2016","journal-title":"Proc 10th MCIS"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2919116"},{"key":"ref36","year":"2019","journal-title":"Report on the Impact of 5G on Regulation and the Role of Regulation in Enabling the 5G Ecosystem"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/5GWF.2018.8516981"},{"key":"ref34","year":"2019","journal-title":"EU coordinated risk assessment 5G cybersecurity"},{"key":"ref60","article-title":"Guidelines for public administrations on location privacy: European union location framework","author":"bargiotti","year":"2016"},{"key":"ref62","year":"2020","journal-title":"System Architecture for the 5G System"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5741153"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.13052\/jicts2245-800X.619"},{"key":"ref28","first-page":"5","article-title":"Minor&#x2019;s data protection according to GDPR","volume":"1","author":"alexandropoulou-egyptiadou","year":"2018","journal-title":"DiMEE"},{"key":"ref64","year":"2019","journal-title":"Partnering with Industry for 5G Security Assurence"},{"key":"ref27","year":"2018","journal-title":"Guidelines on Automated Individual Decision-Making and Profiling for the Purposes of Regulation 2016\/679 WP 251"},{"key":"ref65","year":"0","journal-title":"Security architecture and procedures for 5G System"},{"key":"ref66","year":"2020","journal-title":"Cybersecurity of 5G Networks EU Toolbox of Risk Mitigating Measures"},{"key":"ref29","first-page":"17","year":"2019","journal-title":"Recommendations on Shaping Technology According to GDPR Provisions&#x2014;Exploring the Notion of Data Protection by Default"},{"key":"ref67","year":"2019","journal-title":"Council Conclusions on the Significance of 5G to the European Economy and the Need to Mitigate Security Risks Linked to 5G-Council Conclusions (14517\/19)"},{"key":"ref2","first-page":"225","article-title":"The general data protection regulation: Achieving compliance for EU and non-EU companies","volume":"18","author":"karaduman","year":"2017","journal-title":"International Business Lawyer"},{"key":"ref1","year":"2019","journal-title":"Note Entitled Law Enforcement and Judicial Aspects Related to 5G"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2015.2461602"},{"key":"ref22","year":"2018","journal-title":"WP29 Guidelines on transparency under Regulation 2016\/679"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.10.017"},{"key":"ref24","year":"2014","journal-title":"V Agencia Espa&#x00F1;ola de Protecci&#x00F3;n de Datos (AEPD) and Mario Costeja Gonz&#x00E1;lez"},{"key":"ref23","year":"2014","journal-title":"YS V Minister Voor Immigratie Integratie en Asiel and Minister voor Immigratie Integratie en Asiel v M and S"},{"key":"ref26","first-page":"3","article-title":"The general data protection regulation: A new opportunity and challenge for the banking sector","volume":"1","author":"giurgiu","year":"2017","journal-title":"Ace Magazine et Archives Online Fiscalit&#x00E9; Comptabilit&#x00E9; Audit Droit des Affaires au Luxembourg"},{"key":"ref25","year":"2018","journal-title":"Explanatory Report of the Modernised Convention for the Protection of Individuals With Regard to Automatic Processing of Personal Data"},{"key":"ref50","year":"2018","journal-title":"Guidelines on Personal Data Breach Notification Under Regulation 2016\/679"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-44760-5_2"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2017.2773646"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1209"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.jii.2018.01.005"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/WF-IoT.2014.6803122"},{"key":"ref55","first-page":"41","article-title":"Towards privacy preserving data provenance for the Internet of Things","author":"sanchez","year":"2018","journal-title":"IEEE World Forum on Internet of Things (WF-IoT)"},{"key":"ref54","year":"2019","journal-title":"View on 5G Architecture 5G PPP Architecture Working Group Version 1 0"},{"key":"ref53","first-page":"1","article-title":"If you can&#x2019;t understand it, you can&#x2019;t properly assess it! The reality of assessing security risks in Internet of Things systems","author":"nurse","year":"2018","journal-title":"Proc Living Internet Things Cybersecurity IoT"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2017.3680959"},{"key":"ref10","author":"kuner","year":"2018","journal-title":"Draft commentaries on 10 GDPR articles (from commentary on the EU general data protection regulation OUP 2019)"},{"key":"ref11","first-page":"995","article-title":"Incompatible: The GDPR in the age of big data","volume":"47","author":"zarsky","year":"2017","journal-title":"Seton Hall L Rev"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2015.7346836"},{"key":"ref12","year":"2014","journal-title":"Digital Rights Ireland Ltd v Minister for Communications Marine and Natural Resources Case C-293\/12 E C R 238"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1093\/idpl\/ipx008"},{"key":"ref14","year":"2010","journal-title":"Opinion 1\/2010 on the Concepts of &#x2018;Controller&#x2019; and &#x2018;Processor&#x2019;"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.telpol.2018.02.003"},{"key":"ref16","year":"2016","journal-title":"Feasibility Study on New Services and Markets Technology Enablers"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1700086"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2016.7422408"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/9781119293071"},{"key":"ref4","year":"2016","journal-title":"Agreement on the European Economic Area"},{"key":"ref3","year":"2016","journal-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation) (Text with EEA relevance)"},{"key":"ref6","author":"blackman","year":"2019","journal-title":"Scientific and Quality of Life Policies Directorate-General for Internal Policies Policy Department for Economic 5G Deployment State of Play in Europe USA and Asia"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.05.010"},{"key":"ref8","first-page":"117","year":"2018","journal-title":"Handbook on European Data Protection Law 2018 Edition"},{"key":"ref7","first-page":"69","author":"alexandropoulou-egyptiadou","year":"2016","journal-title":"Personal Data"},{"key":"ref49","year":"2019","journal-title":"Service Requirements for the Evolved Packet System (EPS)"},{"key":"ref9","first-page":"153","article-title":"The final European union general data protection regulation","volume":"15","author":"burton","year":"2016","journal-title":"Privacy & Security Law Report"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2908985"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2815418"},{"key":"ref48","year":"2016","journal-title":"Toyfail An Analysis of Consumer and Privacy Issues in Three Internet-Connected Toys"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1080\/23738871.2019.1635176"},{"key":"ref42","year":"2018","journal-title":"Guidelines on Data Protection Impact Assessment (DPIA) and Determining Whether Processing is Likely to Result a High Risk for Purposes Regulation 2016\/679 WP 250"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600655"},{"key":"ref44","author":"ho\u0161ek","year":"2016","journal-title":"Enabling Technologies and User Perception Within Integrated 5G-IoT Ecosystem"},{"key":"ref43","year":"2019","journal-title":"Recommendations on Shaping Technology According to GDPR Provisions&#x2014;Exploring the Notion of Data Protection by Default"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09110555.pdf?arnumber=9110555","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:52:33Z","timestamp":1639770753000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9110555\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":67,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3000662","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}