{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T21:30:06Z","timestamp":1725485406608},"publisher-location":"Berlin, Heidelberg","reference-count":7,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540443094"},{"type":"electronic","value":"9783540458319"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2002]]},"DOI":"10.1007\/3-540-45831-x_8","type":"book-chapter","created":{"date-parts":[[2007,6,2]],"date-time":"2007-06-02T23:19:06Z","timestamp":1180826346000},"page":"104-114","source":"Crossref","is-referenced-by-count":2,"title":["A Model Enabling Law Compliant Privacy Protection through the Selection and Evaluation of Appropriate Security Controls"],"prefix":"10.1007","author":[{"given":"E. S.","family":"Siougle","sequence":"first","affiliation":[]},{"given":"V. C.","family":"Zorkadis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2002,9,26]]},"reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1016\/S0167-4048(97)81981-5","volume":"17","author":"C. Pounder","year":"1998","unstructured":"C. Pounder, \u2018Security And The New Data Protection Law\u2019, J. Computers & Security, 17 (1998), pp. 124\u2013128.","journal-title":"J. Computers & Security"},{"key":"8_CR2","unstructured":"Institute for Certification of Information Technology (ICIT), \u2018Scheme for self-assessment and certification of information security against BS 7799\u2019, 1997."},{"key":"8_CR3","unstructured":"OECD, Guidelines Governing the Protection of Privacy and Transborder Flows of Personal Data, Paris, 1980."},{"issue":"2","key":"8_CR4","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/S0167-4048(00)87829-3","volume":"19","author":"L. Barnard","year":"2000","unstructured":"Lynette Barnard and Prof. Rossuw von Solms, \u2018A Formalized Approach to the Effective Selection and Evaluation of Information Security Controls\u2019, J. Computers & Security, Vol. 19, No. 2, pp. 185\u2013194, 2000.","journal-title":"J. Computers & Security"},{"key":"8_CR5","unstructured":"V. C. Zorkadis, E. Siougle, Ph. Mitletton, \u2018Technical and Legal Reports on Evaluation of Security and Privacy Protection\u2019, Hellenic Data Protection Authority, 1999\u20132000."},{"key":"8_CR6","unstructured":"V. Zorkadis, E. Siougle, \u2018Information Security and Privacy Audit Modeling\u2019, Proc. of the 5\n \n th\n \n World Multiconference on Circuits, Systems, Communications and Computers, Crete, July 2001"},{"key":"8_CR7","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1016\/S0167-4048(97)80796-1","volume":"16","author":"A. Jones","year":"1997","unstructured":"A. Jones, \u2018Penetration testing and system audit-Experience gained during the investigation the investigation of systems within the UK\u2019, J. Computers & Security, 16 (1997), pp. 595\u2013602.","journal-title":"J. Computers & Security"}],"container-title":["Lecture Notes in Computer Science","Infrastructure Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-45831-X_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,2,17]],"date-time":"2019-02-17T03:06:36Z","timestamp":1550372796000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-45831-X_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002]]},"ISBN":["9783540443094","9783540458319"],"references-count":7,"URL":"https:\/\/doi.org\/10.1007\/3-540-45831-x_8","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2002]]}}}