{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T00:49:51Z","timestamp":1771634991100,"version":"3.50.1"},"reference-count":64,"publisher":"Association for Computing Machinery (ACM)","issue":"5","license":[{"start":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T00:00:00Z","timestamp":1621900800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2022,6,30]]},"abstract":"<jats:p>Internet of Things applications have the potential to derive sensitive information about individuals. Therefore, developers must exercise due diligence to make sure that data are managed according to the privacy regulations and data protection laws. However, doing so can be a difficult and challenging task. Recent research has revealed that developers typically face difficulties when complying with regulations. One key reason is that, at times, regulations are vague and could be challenging to extract and enact such legal requirements. In this article, we have conducted a systematic analysis of the privacy and data protection laws that are used across different continents, namely (i) General Data Protection Regulations, (ii) the Personal Information Protection and Electronic Documents Act, (iii) the California Consumer Privacy Act, (iv) Australian Privacy Principles, and (v) New Zealand\u2019s Privacy Act 1993. Then, we used framework analysis method to attain a comprehensive view of different privacy and data protection laws and highlighted the disparities to assist developers in adhering to the regulations across different regions, along with creating a Combined Privacy Law Framework (CPLF). After that, the key principles and individuals\u2019 rights of the CPLF were mapped with Privacy by Design (PbD) schemes (e.g., privacy principles, strategies, guidelines, and patterns) developed previously by different researchers to investigate the gaps in existing schemes. Subsequently, we have demonstrated how to apply and map privacy patterns into IoT architectures at the design stage and have also highlighted the complexity of doing such mapping. Finally, we have identified the major challenges that should be addressed and potential research directions to take the burden off software developers when applying privacy-preserving techniques that comply with privacy and data protection laws. We have released a companion technical report [3] that comprises all definitions, detailed steps on how we developed the CPLF, and detailed mappings between CPLF and PbD schemes.<\/jats:p>","DOI":"10.1145\/3450965","type":"journal-article","created":{"date-parts":[[2021,5,25]],"date-time":"2021-05-25T13:02:30Z","timestamp":1621947750000},"page":"1-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":62,"title":["Privacy Laws and Privacy by Design Schemes for the Internet of Things"],"prefix":"10.1145","volume":"54","author":[{"given":"Atheer","family":"Aljeraisy","sequence":"first","affiliation":[{"name":"Cardiff University, UK"}]},{"given":"Masoud","family":"Barati","sequence":"additional","affiliation":[{"name":"Cardiff University, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3597-2646","authenticated-orcid":false,"given":"Omer","family":"Rana","sequence":"additional","affiliation":[{"name":"Cardiff University, UK"}]},{"given":"Charith","family":"Perera","sequence":"additional","affiliation":[{"name":"Cardiff University, UK"}]}],"member":"320","published-online":{"date-parts":[[2021,5,25]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2016. EUR-Lex 32016R0679 EN EUR-Lex. Retrieved from https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=uriserv%3AOJ.L_.2016.119.01.0001.01.ENG&toc=OJ%3AL%3A2016%3A119%3ATOC.  2016. EUR-Lex 32016R0679 EN EUR-Lex. Retrieved from https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=uriserv%3AOJ.L_.2016.119.01.0001.01.ENG&toc=OJ%3AL%3A2016%3A119%3ATOC."},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the 2016 IEEE Cybersecurity Development, (SecDev\u201916)","author":"Acar Yasemin","unstructured":"Yasemin Acar , Sascha Fahl , and Michelle L. Mazurek . 2016. You are not your developer, either: A research agenda for usable security and privacy research beyond end users . In Proceedings of the 2016 IEEE Cybersecurity Development, (SecDev\u201916) , 3--8. Yasemin Acar, Sascha Fahl, and Michelle L. Mazurek. 2016. You are not your developer, either: A research agenda for usable security and privacy research beyond end users. In Proceedings of the 2016 IEEE Cybersecurity Development, (SecDev\u201916), 3--8."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWESEP.2014.17"},{"key":"e_1_2_1_5_1","volume-title":"Proc. Comput. Sci. 39","author":"A\u0161eri\u0161kis Darius","year":"2014","unstructured":"Darius A\u0161eri\u0161kis and Robertas Dama\u0161evi\u010dius . 2014 . Gamification patterns for gamification applications . Proc. Comput. Sci. 39 , C (2014), 83--90. Darius A\u0161eri\u0161kis and Robertas Dama\u0161evi\u010dius. 2014. Gamification patterns for gamification applications. Proc. Comput. Sci. 39, C (2014), 83--90."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2018.00023"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.70"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23006"},{"key":"e_1_2_1_9_1","volume-title":"Software Architecture in Practice Addison-Wesley","author":"Bass Len","unstructured":"Len Bass , Paul Clements , and Rick Kazman . 2003. Software Architecture in Practice Addison-Wesley . Vol. 3 . Addison Wesley . 662 pages. Len Bass, Paul Clements, and Rick Kazman. 2003. Software Architecture in Practice Addison-Wesley. Vol. 3. Addison Wesley. 662 pages."},{"key":"e_1_2_1_10_1","volume-title":"A System of Patterns.","author":"Buschmann Frank","unstructured":"Frank Buschmann , Regine Meunier , Hans Rohnert , Peter Sommerlad , and Michael Stal . 1996. Pattern-Oriented Software Architecture , A System of Patterns. Vol. 1 . Frank Buschmann, Regine Meunier, Hans Rohnert, Peter Sommerlad, and Michael Stal. 1996. Pattern-Oriented Software Architecture, A System of Patterns. Vol. 1."},{"key":"e_1_2_1_11_1","unstructured":"Fred H. Cate. 2006. The failure of fair information practice principles. Consumer Protection in the Age of the \u2018Information Economy\u2019 341--377.  Fred H. Cate. 2006. The failure of fair information practice principles. Consumer Protection in the Age of the \u2018Information Economy\u2019 341--377."},{"key":"e_1_2_1_12_1","first-page":"1","article-title":"Privacy by design","volume":"3","author":"Cavoukian Ann","year":"2010","unstructured":"Ann Cavoukian . 2010 . Privacy by design . Ident. Inf. Soc. 3 , 2 (2010), 1 -- 12 . Ann Cavoukian. 2010. Privacy by design. Ident. Inf. Soc. 3, 2 (2010), 1--12.","journal-title":"Ident. Inf. Soc."},{"key":"e_1_2_1_13_1","volume-title":"Privacy by design in the age of big data. Information and Privacy CommisionerJune","author":"Cavoukian Ann","year":"2012","unstructured":"Ann Cavoukian and Jeff Jonas . 2012. Privacy by design in the age of big data. Information and Privacy CommisionerJune ( 2012 ), 1--17. Ann Cavoukian and Jeff Jonas. 2012. Privacy by design in the age of big data. Information and Privacy CommisionerJune (2012), 1--17."},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","unstructured":"B. Costa P. F. Pires F. C. Delicato W. Li and A. Y. Zomaya. 2016. Design and analysis of IoT applications: A model-driven approach. In Proceedings of the 2016 IEEE 14th International Conference on Dependable Autonomic and Secure Computing Proceedings of the 14th International Conference on Pervasive Intelligence and Computing and Proceedings of the 2nd International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech\u201916). 392--399.  B. Costa P. F. Pires F. C. Delicato W. Li and A. Y. Zomaya. 2016. Design and analysis of IoT applications: A model-driven approach. In Proceedings of the 2016 IEEE 14th International Conference on Dependable Autonomic and Secure Computing Proceedings of the 14th International Conference on Pervasive Intelligence and Computing and Proceedings of the 2nd International Conference on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC\/PiCom\/DataCom\/CyberSciTech\u201916). 392--399.","DOI":"10.1109\/DASC-PICom-DataCom-CyberSciTec.2016.81"},{"key":"e_1_2_1_15_1","first-page":"48","article-title":"Some privacy issues in knowledge discovery: The OECD personal privacy guidelines","volume":"10","author":"O\u2019leary Daniel E.","year":"1995","unstructured":"Daniel E. O\u2019leary . 1995 . Some privacy issues in knowledge discovery: The OECD personal privacy guidelines . IEEE Expert-Intell. Syst. Appl. 10 , 2 (1995), 48 -- 59 . Daniel E. O\u2019leary. 1995. Some privacy issues in knowledge discovery: The OECD personal privacy guidelines. IEEE Expert-Intell. Syst. Appl. 10, 2 (1995), 48--59.","journal-title":"IEEE Expert-Intell. Syst. Appl."},{"key":"e_1_2_1_18_1","volume-title":"Towards a thriving data-driven economy. COM","author":"European Commission","year":"2014","unstructured":"European Commission . 2014. Towards a thriving data-driven economy. COM ( 2014 ), 442. European Commission. 2014. Towards a thriving data-driven economy. COM (2014), 442."},{"key":"e_1_2_1_19_1","volume-title":"Framework analysis: A method for analysing qualitative data. Afr. J. Midwif. Women\u2019s Health 4, 2","author":"Furber Christine","year":"2010","unstructured":"Christine Furber . 2010. Framework analysis: A method for analysing qualitative data. Afr. J. Midwif. Women\u2019s Health 4, 2 ( 2010 ), 97--100. Christine Furber. 2010. Framework analysis: A method for analysing qualitative data. Afr. J. Midwif. Women\u2019s Health 4, 2 (2010), 97--100."},{"key":"e_1_2_1_20_1","volume-title":"Mirna Mu\u00f1oz, and Jezreel Mej\u00eda.","author":"Gasca-Hurtado Gloria Piedad","year":"2016","unstructured":"Gloria Piedad Gasca-Hurtado , Mar\u00eda Clara G\u00f3mez-Alvarez , Mirna Mu\u00f1oz, and Jezreel Mej\u00eda. 2016 . Gamification proposal for defect tracking in software development process. In Gamification Proposal for Defect Tracking in Software Development Process, Communications in Computer and Information Science . 212--224. Gloria Piedad Gasca-Hurtado, Mar\u00eda Clara G\u00f3mez-Alvarez, Mirna Mu\u00f1oz, and Jezreel Mej\u00eda. 2016. Gamification proposal for defect tracking in software development process. In Gamification Proposal for Defect Tracking in Software Development Process, Communications in Computer and Information Science. 212--224."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9517-1"},{"key":"e_1_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Jaap-henk Hoepman. 2014. IFIP AICT 428\u2013Privacy design strategies. 446--459.  Jaap-henk Hoepman. 2014. IFIP AICT 428\u2013Privacy design strategies. 446--459.","DOI":"10.1007\/978-3-642-55415-5_38"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2017.2940957"},{"key":"e_1_2_1_25_1","volume-title":"Proceedings of the 32nd International Conference of Data Protection and Privacy Commissioners.","author":"Jerusalem Israel","year":"2010","unstructured":"Israel Jerusalem . 2010 . Resolution on privacy by design . In Proceedings of the 32nd International Conference of Data Protection and Privacy Commissioners. Israel Jerusalem. 2010. Resolution on privacy by design. In Proceedings of the 32nd International Conference of Data Protection and Privacy Commissioners."},{"key":"e_1_2_1_26_1","unstructured":"Jean-Denis Kusion. 2018. Minutes. ETHI (42-1) No. 91 House of Commons of Canada. Retrieved from https:\/\/www.ourcommons.ca\/DocumentViewer\/en\/42-1\/ETHI\/meeting-91\/minutes.  Jean-Denis Kusion. 2018. Minutes. ETHI (42-1) No. 91 House of Commons of Canada. Retrieved from https:\/\/www.ourcommons.ca\/DocumentViewer\/en\/42-1\/ETHI\/meeting-91\/minutes."},{"key":"e_1_2_1_27_1","volume-title":"Ubicomp 2001: Ubiquitous Computing, Gregory D","author":"Langheinrich Marc","unstructured":"Marc Langheinrich . 2001. Privacy by design \u2014 Principles of privacy-aware ubiquitous systems . In Ubicomp 2001: Ubiquitous Computing, Gregory D . Abowd, Barry Brumitt, and Steven Shafer (Eds.). Springer , Berlin , 273--291. Marc Langheinrich. 2001. Privacy by design \u2014 Principles of privacy-aware ubiquitous systems. In Ubicomp 2001: Ubiquitous Computing, Gregory D. Abowd, Barry Brumitt, and Steven Shafer (Eds.). Springer, Berlin, 273--291."},{"key":"e_1_2_1_28_1","unstructured":"California State Legislature. 2018. Bill Text\u2013AB-375 Privacy: Personal information: Businesses. Retrieved from https:\/\/leginfo.legislature.ca.gov\/faces\/billTextClient.xhtml?bill_id=201720180AB375.  California State Legislature. 2018. Bill Text\u2013AB-375 Privacy: Personal information: Businesses. Retrieved from https:\/\/leginfo.legislature.ca.gov\/faces\/billTextClient.xhtml?bill_id=201720180AB375."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3287056"},{"key":"e_1_2_1_30_1","volume-title":"Privacy engineering for domestic IoT: Enabling due diligence. Sensors 19, 20","author":"Lodge Tom","year":"2019","unstructured":"Tom Lodge and Andy Crabtree . 2019. Privacy engineering for domestic IoT: Enabling due diligence. Sensors 19, 20 ( 2019 ). https:\/\/doi.org\/10.3390\/s192043 10.3390\/s192043 Tom Lodge and Andy Crabtree. 2019. Privacy engineering for domestic IoT: Enabling due diligence. Sensors 19, 20 (2019). https:\/\/doi.org\/10.3390\/s192043"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44208-1_21"},{"key":"e_1_2_1_32_1","unstructured":"NewZealandGovernment. 2020. Privacy by Design (PbD) | NZ Digital Government. Retrieved from https:\/\/www.digital.govt.nz\/standards-and-guidance\/privacy-security-and-risk\/privacy\/manage-a-privacy-programme\/privacy-by-design-pbd\/.  NewZealandGovernment. 2020. Privacy by Design (PbD) | NZ Digital Government. Retrieved from https:\/\/www.digital.govt.nz\/standards-and-guidance\/privacy-security-and-risk\/privacy\/manage-a-privacy-programme\/privacy-by-design-pbd\/."},{"key":"e_1_2_1_33_1","volume-title":"The National People\u2019s Congress of the People\u2019s Republic of China.","author":"NPC.","year":"2018","unstructured":"NPC. 2018 . The National People\u2019s Congress of the People\u2019s Republic of China. Retrieved from http:\/\/www.npc.gov.cn\/englishnpc\/index.shtml. NPC. 2018. The National People\u2019s Congress of the People\u2019s Republic of China. Retrieved from http:\/\/www.npc.gov.cn\/englishnpc\/index.shtml."},{"key":"e_1_2_1_34_1","unstructured":"Office of the Australian Information Commissioner. 2013. Australian Privacy Principles\u2014OAIC. Retrieved from https:\/\/www.oaic.gov.au\/privacy\/australian-privacy-principles\/.  Office of the Australian Information Commissioner. 2013. Australian Privacy Principles\u2014OAIC. Retrieved from https:\/\/www.oaic.gov.au\/privacy\/australian-privacy-principles\/."},{"key":"e_1_2_1_35_1","unstructured":"Office of the Australian Information Commissioner. 2014. Australian Privacy Principles Quick Reference\u2014OAIC. Retrieved from https:\/\/www.oaic.gov.au\/privacy\/australian-privacy-principles\/australian-privacy-principles-quick-reference\/.  Office of the Australian Information Commissioner. 2014. Australian Privacy Principles Quick Reference\u2014OAIC. Retrieved from https:\/\/www.oaic.gov.au\/privacy\/australian-privacy-principles\/australian-privacy-principles-quick-reference\/."},{"key":"e_1_2_1_36_1","unstructured":"Office of the Australian Information Commissioner. 2014. Rights and Responsibilities\u2014OAIC. Retrieved from https:\/\/www.oaic.gov.au\/privacy\/the-privacy-act\/rights-and-responsibilities\/.  Office of the Australian Information Commissioner. 2014. Rights and Responsibilities\u2014OAIC. Retrieved from https:\/\/www.oaic.gov.au\/privacy\/the-privacy-act\/rights-and-responsibilities\/."},{"key":"e_1_2_1_37_1","unstructured":"Office of the Australian Information Commissioner. 2019. Chapter B: Key Concepts\u2014OAIC. Retrieved from https:\/\/www.oaic.gov.au\/privacy\/australian-privacy-principles-guidelines\/chapter-b-key-concepts\/.  Office of the Australian Information Commissioner. 2019. Chapter B: Key Concepts\u2014OAIC. Retrieved from https:\/\/www.oaic.gov.au\/privacy\/australian-privacy-principles-guidelines\/chapter-b-key-concepts\/."},{"key":"e_1_2_1_38_1","unstructured":"Office of the Privacy Commissioner. 2013. Introduction. Retrieved from https:\/\/www.privacy.org.nz\/the-privacy-act-and-codes\/privacy-act-and-codes-introduction\/.  Office of the Privacy Commissioner. 2013. Introduction. Retrieved from https:\/\/www.privacy.org.nz\/the-privacy-act-and-codes\/privacy-act-and-codes-introduction\/."},{"key":"e_1_2_1_39_1","unstructured":"Office of the Privacy Commissioner. 2013. Your Right To Know\u2014An OPC Advice Sheet. Retrieved from https:\/\/www.privacy.org.nz\/news-and-publications\/guidance-resources\/your-right-to-know-an-opc-advice-sheet\/.  Office of the Privacy Commissioner. 2013. Your Right To Know\u2014An OPC Advice Sheet. Retrieved from https:\/\/www.privacy.org.nz\/news-and-publications\/guidance-resources\/your-right-to-know-an-opc-advice-sheet\/."},{"key":"e_1_2_1_40_1","unstructured":"Office of the Privacy Commissioner. 2016. Commissioner of the Privacy Principles. Retrieved from https:\/\/www.privacy.org.nz\/your-rights\/your-privacy-rights\/the-privacy-principles\/.  Office of the Privacy Commissioner. 2016. Commissioner of the Privacy Principles. Retrieved from https:\/\/www.privacy.org.nz\/your-rights\/your-privacy-rights\/the-privacy-principles\/."},{"key":"e_1_2_1_41_1","unstructured":"Office of the Privacy Commissioner of Canada. 2016. Businesses and Your Personal Information. Retrieved from https:\/\/www.priv.gc.ca\/en\/privacy-topics\/information-and-advice-for-individuals\/your-privacy-rights\/businesses-and-your-personal-information\/.  Office of the Privacy Commissioner of Canada. 2016. Businesses and Your Personal Information. Retrieved from https:\/\/www.priv.gc.ca\/en\/privacy-topics\/information-and-advice-for-individuals\/your-privacy-rights\/businesses-and-your-personal-information\/."},{"key":"e_1_2_1_42_1","unstructured":"Office of the Privacy Commissioner of Canada. 2016. How the OPC Protects and Promotes Privacy. Retrieved from https:\/\/www.priv.gc.ca\/en\/about-the-opc\/what-we-do\/mm\/.  Office of the Privacy Commissioner of Canada. 2016. How the OPC Protects and Promotes Privacy. Retrieved from https:\/\/www.priv.gc.ca\/en\/about-the-opc\/what-we-do\/mm\/."},{"key":"e_1_2_1_43_1","unstructured":"Office of the Privacy Commissioner of Canada. 2018. Summary of Privacy Laws in Canada. https:\/\/www.priv.gc.ca\/en\/privacy-topics\/privacy-laws-in-canada\/02_05_d_15\/.  Office of the Privacy Commissioner of Canada. 2018. Summary of Privacy Laws in Canada. https:\/\/www.priv.gc.ca\/en\/privacy-topics\/privacy-laws-in-canada\/02_05_d_15\/."},{"key":"e_1_2_1_44_1","unstructured":"Office of the Privacy Commissioner of Canada. 2019. PIPEDA Fair Information Principles. Retrieved from https:\/\/www.priv.gc.ca\/en\/privacy-topics\/privacy-laws-in-canada\/the-personal-information-protection-and-electronic-documents-act-pipeda\/p_principle\/.  Office of the Privacy Commissioner of Canada. 2019. PIPEDA Fair Information Principles. Retrieved from https:\/\/www.priv.gc.ca\/en\/privacy-topics\/privacy-laws-in-canada\/the-personal-information-protection-and-electronic-documents-act-pipeda\/p_principle\/."},{"key":"e_1_2_1_45_1","unstructured":"Office of the Privacy Commissioner of Canada. 2019. PIPEDA Legislation and Related Regulations. Retrieved from https:\/\/www.priv.gc.ca\/en\/privacy-topics\/privacy-laws-in-canada\/the-personal-information-protection-and-electronic-documents-act-pipeda\/pipeda_brief\/.  Office of the Privacy Commissioner of Canada. 2019. PIPEDA Legislation and Related Regulations. Retrieved from https:\/\/www.priv.gc.ca\/en\/privacy-topics\/privacy-laws-in-canada\/the-personal-information-protection-and-electronic-documents-act-pipeda\/pipeda_brief\/."},{"key":"e_1_2_1_46_1","volume-title":"Procedings of the Brazilian Symposium on Games and Digital Entertainment (SBGAMES\u201911)","author":"Passos Erick B.","unstructured":"Erick B. Passos , Danilo B. Medeiros , Pedro A.S. Neto , and Esteban W.G. Clua . 2011. Turning real-world software development into a game . In Procedings of the Brazilian Symposium on Games and Digital Entertainment (SBGAMES\u201911) , 260--269. Erick B. Passos, Danilo B. Medeiros, Pedro A.S. Neto, and Esteban W.G. Clua. 2011. Turning real-world software development into a game. In Procedings of the Brazilian Symposium on Games and Digital Entertainment (SBGAMES\u201911), 260--269."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.09.061"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TETC.2015.2390034"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.042313.00197"},{"key":"e_1_2_1_50_1","volume-title":"Protection of Personal Information Act","author":"POPI.","year":"2013","unstructured":"POPI. 2013. Protection of Personal Information Act 2013 . Retrieved from https:\/\/popia.co.za. POPI. 2013. Protection of Personal Information Act 2013. Retrieved from https:\/\/popia.co.za."},{"key":"e_1_2_1_51_1","unstructured":"privacypatterns.org. [n.d.]. Collecting Patterns for Better Privacy. Retrieved from http:\/\/privacypatterns.wu.ac.at:8080\/catalog\/.  privacypatterns.org. [n.d.]. Collecting Patterns for Better Privacy. Retrieved from http:\/\/privacypatterns.wu.ac.at:8080\/catalog\/."},{"key":"e_1_2_1_52_1","unstructured":"privacypatterns.org. [n.d.]. Privacy Patterns. Retrieved from https:\/\/privacypatterns.org\/patterns\/.  privacypatterns.org. [n.d.]. Privacy Patterns. Retrieved from https:\/\/privacypatterns.org\/patterns\/."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcom.2014.04.002"},{"key":"e_1_2_1_54_1","volume-title":"Will Be in Use in 2016, Up 30 Percent From","author":"van der Meulen Rob","year":"2015","unstructured":"Rob van der Meulen and Gartner.2017. Gartner Says 6.4 Billion Connected \u201c Things \u201d Will Be in Use in 2016, Up 30 Percent From 2015 . Retrieved from https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2017-02-07-gartner-says-8-billion-connected-things-will-be-in-use-in-2017-up-31-percent-from-2016. Rob van der Meulen and Gartner.2017. Gartner Says 6.4 Billion Connected \u201cThings\u201d Will Be in Use in 2016, Up 30 Percent From 2015. Retrieved from https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2017-02-07-gartner-says-8-billion-connected-things-will-be-in-use-in-2017-up-31-percent-from-2016."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11948-010-9236-0"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.12.018"},{"key":"e_1_2_1_57_1","volume-title":"Privacy by design and the new protection goals. Datenschutz Datensicherheit","author":"Rost Martin","year":"2011","unstructured":"Martin Rost and Kirsten Bock . 2011. Privacy by design and the new protection goals. Datenschutz Datensicherheit ( 2011 ), 1--9. Martin Rost and Kirsten Bock. 2011. Privacy by design and the new protection goals. Datenschutz Datensicherheit (2011), 1--9."},{"key":"e_1_2_1_58_1","volume-title":"Privacy by design. Comput. Recht 28, 3","author":"Schulz Sebastian","year":"2014","unstructured":"Sebastian Schulz . 2014. Privacy by design. Comput. Recht 28, 3 ( 2014 ). Sebastian Schulz. 2014. Privacy by design. Comput. Recht 28, 3 (2014)."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00017"},{"key":"e_1_2_1_60_1","unstructured":"Aashish Srivastava and S. Bruce Thomson. 2009. Framework analysis: A qualitative methodology for applied policy research.  Aashish Srivastava and S. Bruce Thomson. 2009. Framework analysis: A qualitative methodology for applied policy research."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.15439\/2016F460"},{"key":"e_1_2_1_62_1","unstructured":"The European Commission. 2012. International Standard ISO \/ IEC: Information technology\u2014Security techniques\u2014Guidelines for cybersecurity. 58.  The European Commission. 2012. International Standard ISO \/ IEC: Information technology\u2014Security techniques\u2014Guidelines for cybersecurity. 58."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELAW.2014.6893479"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1080\/13600869.2014.913874"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.04.009"},{"key":"e_1_2_1_67_1","first-page":"2896","article-title":"Privacy-preserving double-projection deep computation model with crowdsourcing on cloud for big data feature learning","volume":"5","author":"Zhang Qingchen","year":"2018","unstructured":"Qingchen Zhang , Laurence T. Yang , Zhikui Chen , Peng Li , and M. Jamal Deen . 2018 . Privacy-preserving double-projection deep computation model with crowdsourcing on cloud for big data feature learning . IEEE IoT J. 5 , 4 (2018), 2896 -- 2903 . Qingchen Zhang, Laurence T. Yang, Zhikui Chen, Peng Li, and M. Jamal Deen. 2018. Privacy-preserving double-projection deep computation model with crowdsourcing on cloud for big data feature learning. IEEE IoT J. 5, 4 (2018), 2896--2903.","journal-title":"IEEE IoT J."},{"key":"e_1_2_1_68_1","volume-title":"Data Preparation for Data Mining","author":"Zhang Shichao","unstructured":"Shichao Zhang , Chengqi Zhang , and Qiang Yang . 2003. Data Preparation for Data Mining . Vol. 17 . 375--381. Shichao Zhang, Chengqi Zhang, and Qiang Yang. 2003. Data Preparation for Data Mining. Vol. 17. 375--381."}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3450965","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3450965","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T17:49:24Z","timestamp":1750268964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3450965"}},"subtitle":["A Developer\u2019s Perspective"],"short-title":[],"issued":{"date-parts":[[2021,5,25]]},"references-count":64,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2022,6,30]]}},"alternative-id":["10.1145\/3450965"],"URL":"https:\/\/doi.org\/10.1145\/3450965","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,5,25]]},"assertion":[{"value":"2020-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-02-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-05-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}