{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T05:39:47Z","timestamp":1725860387970},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319417622"},{"type":"electronic","value":"9783319417639"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-41763-9_7","type":"book-chapter","created":{"date-parts":[[2016,7,6]],"date-time":"2016-07-06T07:21:44Z","timestamp":1467789704000},"page":"97-110","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Report on the Workshop on Assessing the Maturity of Privacy Enhancing Technologies"],"prefix":"10.1007","author":[{"given":"Marit","family":"Hansen","sequence":"first","affiliation":[]},{"given":"Jaap-Henk","family":"Hoepman","sequence":"additional","affiliation":[]},{"given":"Meiko","family":"Jensen","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Schiffner","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,7]]},"reference":[{"unstructured":"ISO\/IEC 27004: Information technology - Security techniques - Information security management - Measurement (2009)","key":"7_CR1"},{"unstructured":"ISO\/IEC 25010: Systems and software engineering - Systems and software quality requirements and evaluation (SQuaRE) - System and software quality models (2011)","key":"7_CR2"},{"unstructured":"European Parliament legislative resolution of 12 March 2014 on the proposal for a regulation of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation) (COM(2012) 0011 - C7\u20130025\/2012 - 2012\/0011(COD)) (2014). \n http:\/\/www.europarl.europa.eu\/sides\/getDoc.do?type=TA&language=EN&reference=P7-TA-2014-0212","key":"7_CR3"},{"issue":"1","key":"7_CR4","first-page":"1","volume":"1","author":"JJ Borking","year":"2001","unstructured":"Borking, J.J., Raab, C.D.: Laws, PETs and other technologies for privacy protection. J. Inf. Law Technol. (JILT) 1(1), 1\u201314 (2001). \n http:\/\/www2.warwick.ac.uk\/fac\/soc\/law\/elj\/jilt\/2001_1\/borking","journal-title":"J. Inf. Law Technol. (JILT)"},{"doi-asserted-by":"crossref","unstructured":"Cavoukian, A.: Privacy Protection Measures and Technologies in Business Organizations: Aspects and Standards, chap. Privacy by Design: Origins, Meanings, and Prospects for Assuring Privacy and Trust in the Information Era, pp. 170\u2013208. IGI Global (2012)","key":"7_CR5","DOI":"10.4018\/978-1-61350-501-4.ch007"},{"unstructured":"Chew, E., Swanson, M., Stine, K., Bartol, N., Brown, A., Robinson, W.: Performance Measurement Guide for Information Security. NIST Special Publication 800\u201355 Revision 1 (2008). \n http:\/\/csrc.nist.gov\/publications\/nistpubs\/800-55-Rev1\/SP800-55-rev1.pdf","key":"7_CR6"},{"unstructured":"Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J.H., Le M\u00e9tayer, D., Tirtea, R., Schiffner, S.: Privacy and Data Protection by Design - from policy to engineering. Technical report, ENISA (2014). \n http:\/\/www.enisa.europa.eu\/activities\/identity-and-trust\/library\/deliverables\/privacy-and-data-protection-by-design\/at_download\/fullReport","key":"7_CR7"},{"unstructured":"European Commission: Privacy Enhancing Technologies (PETs) - the existing legal framework. MEMO\/07\/159, May 2007. \n http:\/\/europa.eu\/rapid\/press-release_MEMO-07-159_en.htm","key":"7_CR8"},{"unstructured":"European Commission: Horizon 2020 - Work Programme 2014\u20132015, Annex G. Technology readiness levels (TRL). European Commission Decision C (2014) 4995 of 22. Technical report (2014), July 2014. \n http:\/\/ec.europa.eu\/research\/participants\/data\/ref\/h2020\/wp\/2014_2015\/annexes\/h2020-wp1415-annex-g-trl_en.pdf","key":"7_CR9"},{"unstructured":"Hansen, M., Hoepman, J.H., Jensen, M., Schiffner, S.: Readiness Analysis for the Adoption and Evolution of Privacy Enhancing Technologies: Methodology, Pilot Assessment, and Continuity Plan. Technical report, ENISA (2015). \n https:\/\/www.enisa.europa.eu\/activities\/identity-and-trust\/library\/deliverables\/pets","key":"7_CR10"},{"unstructured":"ISACA: COBIT 5 for Information Security (2012). \n http:\/\/www.isaca.org","key":"7_CR11"},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"1216","DOI":"10.1016\/j.actaastro.2009.03.058","volume":"65","author":"JC Mankins","year":"2009","unstructured":"Mankins, J.C.: Technology readiness assessments: a retrospective. Acta Astronaut. 65, 1216\u20131223 (2009)","journal-title":"Acta Astronaut."},{"volume-title":"Did I Ever Tell You About the Whale? Or Measuring Technology Maturity","year":"2008","author":"WL Nolte","unstructured":"Nolte, W.L.: Did I Ever Tell You About the Whale? Or Measuring Technology Maturity. Information Age Publishing, Charlotte (2008)","key":"7_CR13"},{"unstructured":"NSA: Tor Stinks - presentation slides as part of Edward Snowden\u2019s NSA revelations, June 2012. \n https:\/\/cryptome.org\/2013\/10\/nsa-tor-stinks.pdf","key":"7_CR14"},{"doi-asserted-by":"crossref","unstructured":"Olechowski, A.L., Eppinger, S.D., Joglekar, N.: Technology Readiness Levels at 40: A Study of State-of-the-Art Use, Challenges, and Opportunities. MIT Sloan Research Paper No. 5127\u201315. Technical report, MIT (2015). \n http:\/\/dx.doi.org\/10.2139\/ssrn.2588524","key":"7_CR15","DOI":"10.2139\/ssrn.2588524"},{"doi-asserted-by":"crossref","unstructured":"Smith, J.D.: An alternative to technology readiness levels for non-developmental item (NDI) software. In: Proceedings of the 38th Annual Hawaii International Conference on System Sciences - HICSS 2005 (2005)","key":"7_CR16","DOI":"10.21236\/ADA443149"}],"container-title":["IFIP Advances in Information and Communication Technology","Privacy and Identity Management. Time for a Revolution?"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-41763-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,20]],"date-time":"2020-07-20T00:10:20Z","timestamp":1595203820000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-41763-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319417622","9783319417639"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-41763-9_7","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"7 July 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}