{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:25:29Z","timestamp":1759335929201,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T00:00:00Z","timestamp":1715558400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NIHR Southampton Biomedical Research Centre (Data, Health and Society Theme)","award":["NIHR203319"],"award-info":[{"award-number":["NIHR203319"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,13]]},"DOI":"10.1145\/3589335.3651453","type":"proceedings-article","created":{"date-parts":[[2024,5,12]],"date-time":"2024-05-12T18:41:21Z","timestamp":1715539281000},"page":"1150-1153","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["AI in Health and Social Care: A Methodology for Privacy Risk Modeling and Simulation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9391-1310","authenticated-orcid":false,"given":"Laura","family":"Carmichael","sequence":"first","affiliation":[{"name":"School of Electronics and Computer Science, University of Southampton, Southampton, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9937-1762","authenticated-orcid":false,"given":"Steve","family":"Taylor","sequence":"additional","affiliation":[{"name":"School of Electronics and Computer Science, University of Southampton, Southampton, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3814-2587","authenticated-orcid":false,"given":"Adriane","family":"Chapman","sequence":"additional","affiliation":[{"name":"School of Electronics and Computer Science, University of Southampton, Southampton, United Kingdom"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9281-6095","authenticated-orcid":false,"given":"Michael","family":"Boniface","sequence":"additional","affiliation":[{"name":"School of Electronics and Computer Science, University of Southampton, Southampton, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"The data will see you now: Datafication and the boundaries of health. (2020). Retrieved","author":"Ada Lovelace Institute","year":"2024","unstructured":"Ada Lovelace Institute. 2020. The data will see you now: Datafication and the boundaries of health. (2020). Retrieved February 4, 2024 from https:\/\/www.adalovelaceinstitute.org\/wp-content\/uploads\/2020\/11\/The-data-will-see-you-now-Ada-Lovelace-Institute-Oct-2020.pdf"},{"key":"e_1_3_2_2_2_1","volume-title":"Avi Douglen and Marc French. Threat Modeling Manifesto. Retrieved","author":"Braiterman Zoe","year":"2024","unstructured":"Zoe Braiterman, Adam Shostack, Jonathan Marcil, Stephen de Vries, Irene Michlin, Kim Wuyts, Robert Hurlbut, Brook S.E. Schoenfield, Fraser Scott, Matthew Coles, Chris Romeo, Alyssa Miller, Izar Tarandach, Avi Douglen and Marc French. Threat Modeling Manifesto. Retrieved February 4, 2024 from https:\/\/www.threatmodelingmanifesto.org\/"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.7107154"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.7107466"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1049\/icp.2022.2061"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","unstructured":"Laura Carmichael Wendy Hall and Michael Boniface Forthcoming. Personal Data Store Ecosystems in Health and Social Care. Front. Public Health 12. https:\/\/doi.org\/10.3389\/fpubh.2024.1348044","DOI":"10.3389\/fpubh.2024.1348044"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603216.3624962"},{"key":"e_1_3_2_2_8_1","volume-title":"Data saves lives: reshaping health and social care with data. Policy paper. Retrieved","author":"Department of Health and Social Care (UK). 2022.","year":"2024","unstructured":"Department of Health and Social Care (UK). 2022. Data saves lives: reshaping health and social care with data. Policy paper. Retrieved February 4, 2024 from https:\/\/www.gov.uk\/government\/publications\/data-saves-lives-reshaping-health-and-social-care-with-data\/data-saves-lives-reshaping-health-and-social-care-with-data"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.2861\/568473"},{"key":"e_1_3_2_2_10_1","unstructured":"General Data Protection Regulation (GDPR). Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation) (Text with EEA relevance). Retrieved February 4 2024 from http:\/\/data.europa.eu\/eli\/reg\/2016\/679\/oj"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2023.2284645"},{"key":"e_1_3_2_2_12_1","volume-title":"What is a TRE? Retrieved","author":"Health Data","year":"2024","unstructured":"Health Data Research UK (HDR UK). 2021. What is a TRE? Retrieved February 4, 2024 from https:\/\/www.hdruk.ac.uk\/wp-content\/uploads\/2021\/09\/HDRUK_TRE-One-Pager.pdf"},{"key":"e_1_3_2_2_13_1","volume-title":"Data protection by design and default. Retrieved","author":"Information Commission","year":"2024","unstructured":"Information Commissioner's Office (ICO). Data protection by design and default. Retrieved February 4, 2024 from https:\/\/ico.org.uk\/for-organisations\/uk-gdpr-guidance-and-resources\/accountability-and-governance\/guide-to-accountability-and-governance\/accountability-and-governance\/data-protection-by-design-and-default\/"},{"key":"e_1_3_2_2_14_1","volume-title":"ISO 27005 standard for information security, cybersecurity and privacy protection. Retrieved","author":"International Organization for Standardization (ISO).","year":"2024","unstructured":"International Organization for Standardization (ISO). ISO 27005 standard for information security, cybersecurity and privacy protection. Retrieved February 4, 2024 from https:\/\/www.iso.org\/standard\/80585.html"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.2196\/33720"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.6656063"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.36227\/techrxiv.24061590"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi13050132"},{"volume-title":"Microsoft Threat Modelling Tool threats. Retrieved","year":"2024","key":"e_1_3_2_2_19_1","unstructured":"Microsoft. Microsoft Threat Modelling Tool threats. Retrieved February 4, 2024 from https:\/\/learn.microsoft.com\/en-us\/azure\/security\/develop\/threat-modeling-tool-threats#stride-model"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3229616.3229621"},{"key":"e_1_3_2_2_21_1","unstructured":"National Health Service Artificial Intelligence Laboratory (NHS AI Lab). Retrieved February 4 2024 from https:\/\/transform.england.nhs.uk\/ai-lab\/"},{"key":"e_1_3_2_2_22_1","unstructured":"NHS England 2023. Interoperability. Retrieved February 4 2024 from https:\/\/www.england.nhs.uk\/long-read\/interoperability\/"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","unstructured":"Katherine O'Sullivan and Katie Wilde 2023. A profile of the Grampian Data Safe Haven a regional Scottish safe haven for health and population data research. International Journal of Population Data Science 4(2). https:\/\/doi.org\/10.23889\/ijpds.v4i2.1817.","DOI":"10.23889\/ijpds.v4i2.1817"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2020.105402"},{"key":"e_1_3_2_2_25_1","volume-title":"Charter for Safe Havens in Scotland: Handling Unconsented Data from National Health Service Patient Records to Support Research and Statistics. Retrieved","author":"Scottish Government","year":"2024","unstructured":"Scottish Government 2015. Charter for Safe Havens in Scotland: Handling Unconsented Data from National Health Service Patient Records to Support Research and Statistics. Retrieved February 4, 2024 from https:\/\/www.gov.scot\/publications\/charter-safe-havens-scotland-handling-unconsented-data-national-health-service-patient-records-support-research-statistics\/"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/2053951719852969"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA.2019.00010"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411763.3451731"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","unstructured":"Spyderisk Open Project on GitHub. https:\/\/doi.org\/10.5281\/zenodo.10797721","DOI":"10.5281\/zenodo.10797721"},{"volume-title":"Spyderisk System Modeller Documentation. Retrieved","year":"2024","key":"e_1_3_2_2_30_1","unstructured":"Spyderisk. 2023. Spyderisk System Modeller Documentation. Retrieved February 4, 2024 from https:\/\/spyderisk.org\/documentation\/modeller\/latest\/"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23094455"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW51379.2020.00047"}],"event":{"name":"WWW '24: The ACM Web Conference 2024","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Singapore Singapore","acronym":"WWW '24"},"container-title":["Companion Proceedings of the ACM Web Conference 2024"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589335.3651453","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3589335.3651453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T00:32:35Z","timestamp":1755822755000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3589335.3651453"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,13]]},"references-count":32,"alternative-id":["10.1145\/3589335.3651453","10.1145\/3589335"],"URL":"https:\/\/doi.org\/10.1145\/3589335.3651453","relation":{},"subject":[],"published":{"date-parts":[[2024,5,13]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}