{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T22:28:50Z","timestamp":1775687330682,"version":"3.50.1"},"reference-count":90,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. IEEE"],"published-print":{"date-parts":[[2019,3]]},"DOI":"10.1109\/jproc.2018.2866769","type":"journal-article","created":{"date-parts":[[2018,9,14]],"date-time":"2018-09-14T19:18:50Z","timestamp":1536952730000},"page":"600-615","source":"Crossref","is-referenced-by-count":58,"title":["Inside the Organization: Why Privacy and Security Engineering Is a Challenge for Engineers"],"prefix":"10.1109","volume":"107","author":[{"given":"Sarah","family":"Spiekermann","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3220-5372","authenticated-orcid":false,"given":"Jana","family":"Korunovska","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8834-7388","authenticated-orcid":false,"given":"Marc","family":"Langheinrich","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","volume":"3492","author":"jonas","year":"1979","journal-title":"Das Prinzip Verantwortung Versuch Einer Ethik f&#x00FC;r die Technologische Zivilisation"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1037\/a0017103"},{"key":"ref71","article-title":"Stage and sequence: The cognitive-developmental approach to socialization","author":"kohlberg","year":"0","journal-title":"Handbook of Socialization Theory and Research"},{"key":"ref70","doi-asserted-by":"crossref","DOI":"10.1093\/acprof:oso\/9780190498511.001.0001","author":"vallor","year":"2016","journal-title":"Technology and the Virtues A Philosophical Guide to a Future Worth Wanting"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1037\/a0036708"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/1124706.1121474"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1006\/ceps.2000.1046"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.2307\/258867"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1177\/0149206314525203"},{"key":"ref38","author":"sommerville","year":"2011","journal-title":"Software Engineering"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2575.2003.00139.x"},{"key":"ref79","first-page":"1608","article-title":"Aligning security and privacy to support the development of secure information systems","volume":"18","author":"mouratidis","year":"2012","journal-title":"J UCS"},{"key":"ref33","year":"2011"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23006"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2011.53"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1047671.1047705"},{"key":"ref37","article-title":"Engineering Privacy by Design: Are engineers ready to live up to the challenge?","author":"bednar","year":"0","journal-title":"Inf Soc"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-69746-3_2"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/0749-5978(91)90020-T"},{"key":"ref34","first-page":"173","article-title":"The influence of attitudes on behavior","author":"ajzen","year":"2005","journal-title":"The Handbook Attitudes Behavior"},{"key":"ref60","first-page":"515","article-title":"Understanding privacy","volume":"13","author":"solove","year":"2008","journal-title":"Harvard Univ Press"},{"key":"ref62","article-title":"Surveillance: A success story","author":"kessler","year":"0","journal-title":"Politico"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.4324\/9780203642481"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.17705\/1CAIS.01403"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1177\/0162243912436985"},{"key":"ref64","article-title":"That &#x2019;Badlock&#x2019; bug is more hype than hurt","author":"zetter","year":"2016","journal-title":"Wired"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MRA.2017.2787225"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/ISTAS.2010.5514610"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025628530013"},{"key":"ref29","first-page":"1","article-title":"Linking platforms, practices, and developer ethics: Levers for privacy discourse in mobile application development","author":"shilton","year":"2017","journal-title":"J Bus Ethics"},{"key":"ref67","article-title":"What are the pros and cons of mass surveillance?","author":"szekely","year":"2011","journal-title":"Internet and surveillance The challenges of Web 2 0 and social media"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1111\/j.1559-1816.2002.tb00236.x"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/1142958.1142962"},{"key":"ref2","article-title":"Human values, ethics, and design","author":"friedman","year":"2003","journal-title":"The Human-computer interaction handbook"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2006.80"},{"key":"ref20","year":"2017","journal-title":"Identity Theft Resource Center&#x2014;Data Breach Rep 2017 End of Year Report"},{"key":"ref22","article-title":"2016 identity fraud: Fraud hits an inflection point","author":"pascual","year":"2016"},{"key":"ref21","year":"2017","journal-title":"Verizon Trademark Services LLC USA"},{"key":"ref24","article-title":"The dark side of ethical robots","author":"vanderelst","year":"2016"},{"key":"ref23","year":"2017"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.22"},{"key":"ref25","author":"richardson","year":"2004","journal-title":"Hammurabi&#x2019;s Laws Text Translation and Glossary"},{"key":"ref50","article-title":"Knowledge management: The darker side of KM","author":"land","year":"2004"},{"key":"ref51","doi-asserted-by":"crossref","first-page":"1640","DOI":"10.1177\/1461444817702397","article-title":"Platform privacies: Governance, collaboration, and the different meanings of &#x2018;privacy&#x2019; in iOS and Android development","volume":"20","author":"greene","year":"2017","journal-title":"New Media Soc"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1177\/109467050133001"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1007\/978-1-4020-9498-9_2","article-title":"The right to informational self-determination and the value of self-development: Reassessing the importance of privacy for democracy","author":"rouvroy","year":"2009","journal-title":"Reinventing Data Protection"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/1102486.1102491"},{"key":"ref57","article-title":"Privacy by design. Take the challenge. Information and privacy commissioner of Ontario (Canada)","author":"cavoukian","year":"2011"},{"key":"ref56","first-page":"94","article-title":"Is there a cost to privacy breaches? An event study analysis","author":"acquisti","year":"2006","journal-title":"Proc 3rd Int Conf Intell Syst (ICIS)"},{"key":"ref55","article-title":"The true cost of compliance a benchmark study of multinational organizations","year":"2011"},{"key":"ref54","first-page":"2","article-title":"Privacy is a business opportunity","volume":"18","author":"hoffman","year":"2014","journal-title":"Harvard Bus Rev"},{"key":"ref53","first-page":"125","article-title":"Privacy and transparency","author":"mayes","year":"2010","journal-title":"Proc AAAI Spring Symp Intell Inf Privacy Manage"},{"key":"ref52","first-page":"56","article-title":"Peter cochrane&#x2014;Head to head","author":"cochrane","year":"2000","journal-title":"Sovereign Mag"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-61350-501-4.ch007"},{"key":"ref11","year":"2016","journal-title":"Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation)"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.21236\/AD0708563"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2307\/40041279"},{"key":"ref13","year":"2013","journal-title":"Privacy Expert Group Report on the Review of the 1980 OECD Privacy Guidelines"},{"key":"ref14","author":"zimmermann","year":"1995","journal-title":"The Official PGP User&#x2019;s Guide"},{"key":"ref15","article-title":"The platform for privacy preferences 1.1 (P3P1.1) specification W3C working group note 13 Nov.2006","author":"cranor","year":"2006"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1207\/S15327752JPA740109"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1165734.1165735"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1037\/h0035357"},{"key":"ref17","year":"2012","journal-title":"ISO\/IEC 15408"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/BF02722112"},{"key":"ref18","year":"2013","journal-title":"Security and Privacy Controls for Federal Information Systems and Organizations"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1016\/S0092-6566(03)00046-1"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2594502"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-008-0067-3"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1509\/jmkr.44.2.175"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1177\/0162243912436985"},{"key":"ref3","author":"spiekermann","year":"2016","journal-title":"Ethical IT Innovation A Value-based System Design Approach"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1126\/science.aaa1465"},{"key":"ref5","author":"scheler","year":"1973","journal-title":"Formalism in Ethics and Non-Formal Ethics of Values A New Attempt Toward the Foundation of an Ethical Personalism"},{"key":"ref85","author":"arbuckle","year":"2011","journal-title":"IBM SPSS Amos 20 User&#x2019;s Guide"},{"key":"ref8","author":"anderson","year":"2010","journal-title":"Security Engineering A Guide to Building Dependable Distributed Systems"},{"key":"ref86","first-page":"23","article-title":"Evaluating the fit of structural equation models: Tests of significance and descriptive goodness-of-fit measures","volume":"8","author":"schermelleh-engel","year":"2003","journal-title":"Methods of Psychological Research Online"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3047268"},{"key":"ref49","article-title":"Rethinking personal data: Strengthening trust","author":"forum","year":"2012"},{"key":"ref87","author":"christl","year":"2017","journal-title":"Corporate Surveillance in Everyday Life How Companies Collect Combine Analyze Trade and Use Personal Data on Billions"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2010.120"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.88"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1111\/j.1460-2466.1993.tb01251.x"},{"key":"ref45","article-title":"Constructing a TpB questionnaire: Conceptual and methodological considerations","author":"ajzen","year":"2006"},{"key":"ref48","author":"heller","year":"2011","journal-title":"Post-Privacy Prima Leben Ohne Privatsph&#x00E4;re"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.132.5.778"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1348\/014466601164939"},{"key":"ref41","first-page":"529","article-title":"The expected utility model: Its variants, purposes, evidence and limitations","volume":"20","author":"schoemaker","year":"1982","journal-title":"J Econ Literature"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2014.995563"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s10551-012-1518-9"}],"container-title":["Proceedings of the IEEE"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/5\/8662725\/08466102.pdf?arnumber=8466102","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T20:44:38Z","timestamp":1657745078000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8466102\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3]]},"references-count":90,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/jproc.2018.2866769","relation":{},"ISSN":["0018-9219","1558-2256"],"issn-type":[{"value":"0018-9219","type":"print"},{"value":"1558-2256","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3]]}}}