{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T09:27:11Z","timestamp":1726133231684},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030831639"},{"type":"electronic","value":"9783030831646"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-83164-6_2","type":"book-chapter","created":{"date-parts":[[2021,8,15]],"date-time":"2021-08-15T23:03:01Z","timestamp":1629068581000},"page":"16-31","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A Framework for Investigating GDPR Compliance Through the Lens of Security"],"prefix":"10.1007","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-0021-1305","authenticated-orcid":false,"given":"Angelica","family":"Marotta","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0001-9240-2573","authenticated-orcid":false,"given":"Stuart","family":"Madnick","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,8,16]]},"reference":[{"key":"2_CR1","unstructured":"The European Parliament and the Council of the European Union: Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data (2016)"},{"key":"2_CR2","unstructured":"ICO Security outcomes | ICO. In: ico.org.uk. https:\/\/ico.org.uk\/for-organisations\/security-outcomes\/. Accessed 25 Mar 2021"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Madnick, S.E., Marotta, A., Novaes Neto, N., Powers, K.: Research Plan to Analyze the Role of Compliance in Influencing Cybersecurity in Organizations (2020)","DOI":"10.2139\/ssrn.3567388"},{"key":"2_CR4","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3569902","author":"A Marotta","year":"2020","unstructured":"Marotta, A., Madnick, S.E.: Analyzing the interplay between regulatory compliance and cybersecurity (revised). SSRN Electron. J. (2020). https:\/\/doi.org\/10.2139\/ssrn.3569902","journal-title":"SSRN Electron. J."},{"key":"2_CR5","first-page":"27","volume":"16","author":"A Marotta","year":"2021","unstructured":"Marotta, A., Madnick, S.: Perspectives on the relationship between compliance and cybersecurity. J. Inf. Syst. Secur. 16, 27 (2021)","journal-title":"J. Inf. Syst. Secur."},{"key":"2_CR6","doi-asserted-by":"publisher","unstructured":"Marotta, A., Madnick, S.: Issues in information systems convergence and divergence of regulatory compliance and cybersecurity. 22, 10\u201350 (2021). https:\/\/doi.org\/10.48009\/1_iis_2021_10-50","DOI":"10.48009\/1_iis_2021_10-50"},{"key":"2_CR7","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1016\/S1353-4858(17)30060-0","volume":"2017","author":"J Zerlang","year":"2017","unstructured":"Zerlang, J.: GDPR: a milestone in convergence for cyber-security and compliance. Netw. Secur. 2017, 8\u201311 (2017). https:\/\/doi.org\/10.1016\/S1353-4858(17)30060-0","journal-title":"Netw. Secur."},{"key":"2_CR8","doi-asserted-by":"publisher","first-page":"531","DOI":"10.1108\/ICS-01-2020-0002","volume":"28","author":"A Tsohou","year":"2020","unstructured":"Tsohou, A., Magkos, E., Mouratidis, H., et al.: Privacy, security, legal and technology acceptance elicited and consolidated requirements for a GDPR compliance platform. Inf. Comput. Secur. 28, 531\u2013553 (2020). https:\/\/doi.org\/10.1108\/ICS-01-2020-0002","journal-title":"Inf. Comput. Secur."},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"510","DOI":"10.1108\/DPRG-05-2019-0039","volume":"21","author":"N Poritskiy","year":"2019","unstructured":"Poritskiy, N., Oliveira, F., Almeida, F.: The benefits and challenges of general data protection regulation for the information technology sector. Digit. Policy Regul. Gov. 21, 510\u2013524 (2019). https:\/\/doi.org\/10.1108\/DPRG-05-2019-0039","journal-title":"Digit. Policy Regul. Gov."},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Hor\u00e1k, M., Stupka, V., Hus\u00e1k, M.: GDPR compliance in cybersecurity software: a case study of DPIA in information sharing platform. In: ACM International Conference Proceeding Series, pp. 1\u20138. Association for Computing Machinery, New York (2019)","DOI":"10.1145\/3339252.3340516"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Lachaud, E.: The General Data Protection Regulation and the rise of certification as a regulatory instrument (2018)","DOI":"10.2139\/ssrn.2940805"},{"key":"2_CR12","doi-asserted-by":"publisher","unstructured":"Saqib, N., Germanos, V., Zeng, W., Maglaras, L.: Mapping of the security requirements of GDPR and NISD. ICST Trans. Secur. Saf. 166283 (2018). https:\/\/doi.org\/10.4108\/eai.30-6-2020.166283","DOI":"10.4108\/eai.30-6-2020.166283"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-030-27813-7_7","volume-title":"Trust, Privacy and Security in Digital Business","author":"V Diamantopoulou","year":"2019","unstructured":"Diamantopoulou, V., Tsohou, A., Karyda, M.: General Data protection regulation and ISO\/IEC 27001:2013: synergies of activities towards organisations\u2019 compliance. In: Gritzalis, S., Weippl, E.R., Katsikas, S.K., Anderst-Kotsis, G., Tjoa, A.M., Khalil, I. (eds.) TrustBus 2019. LNCS, vol. 11711, pp. 94\u2013109. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-27813-7_7"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-030-42048-2_16","volume-title":"Computer Security","author":"V Diamantopoulou","year":"2020","unstructured":"Diamantopoulou, V., Tsohou, A., Karyda, M.: From ISO\/IEC 27002:2013 information security controls to personal data protection controls: guidelines for GDPR compliance. In: Katsikas, S., et al. (eds.) CyberICPS. LNCS, vol. 11980, pp. 238\u2013257. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-42048-2_16"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Lopes, I.M., Guarda, T., Oliveira, P.: How ISO 27001 can help achieve GDPR compliance. In: Iberian Conference on Information Systems and Technologies, CISTI. IEEE Computer Society (2019)","DOI":"10.23919\/CISTI.2019.8760937"},{"key":"2_CR16","unstructured":"Chivot, E., Castro, D.: What the Evidence Shows About the Impact of the GDPR After One Year. Cent. DATA Innov (2019). http:\/\/www2.datainnovation.org\/2019-gdpr-one-year.pdf. Accessed 25 Mar 2021"},{"key":"2_CR17","unstructured":"GOV.UK. Data protection - GOV.UK. Gov.uk (2014). https:\/\/www.gov.uk\/data-protection\/the-data-protection-act. Accessed 25 Mar 2021"},{"key":"2_CR18","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1016\/j.evalprogplan.2005.04.017","volume":"28","author":"S Sutherland","year":"2005","unstructured":"Sutherland, S., Katz, S.: Concept mapping methodology: a catalyst for organizational learning. Eval. Program. Plan. 28, 257\u2013269 (2005). https:\/\/doi.org\/10.1016\/j.evalprogplan.2005.04.017","journal-title":"Eval. Program. Plan."},{"key":"2_CR19","unstructured":"IAPP, Ernst, Young: IAPP-EY Annual Governance Report 2019 (2019)"},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3439873","volume":"13","author":"NN Neto","year":"2021","unstructured":"Neto, N.N., Madnick, S., Paula, A.M.G.D., Borges, N.M.: Developing a global data breach database and the challenges encountered. J. Data Inf. Qual. 13, 1\u201333 (2021). https:\/\/doi.org\/10.1145\/3439873","journal-title":"J. Data Inf. Qual."},{"key":"2_CR21","unstructured":"ICO. Information Commissioner\u2019s Annual Report and Financial Statements. ICO (2019)"},{"key":"2_CR22","unstructured":"Marotta, A., Martinelli, F.: GDPR survey: an analysis of the tools used for assessing GDPR compliance. Technical report (IIT B4-05\/2020) - IIT CNR (2020)"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Vinet, L., Zhedanov, A.: A \u201cmissing\u201d family of classical orthogonal polynomials (2011)","DOI":"10.1088\/1751-8113\/44\/8\/085201"},{"key":"2_CR24","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MC.2018.3191268","volume":"51","author":"J Isaak","year":"2018","unstructured":"Isaak, J., Hanna, M.J.: User data privacy: Facebook, Cambridge analytica, and privacy protection. Comput. (Long Beach Calif.) 51, 56\u201359 (2018). https:\/\/doi.org\/10.1109\/MC.2018.3191268","journal-title":"Comput. (Long Beach Calif.)"}],"container-title":["Lecture Notes in Computer Science","Mobile Web and Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-83164-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T11:50:18Z","timestamp":1673092218000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-83164-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030831639","9783030831646"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-83164-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"16 August 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"MobiWIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Mobile Web and Intelligent Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 August 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 August 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"mobiwis2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.mobiwis.org\/2021\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}