{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,3]],"date-time":"2024-09-03T10:19:33Z","timestamp":1725358773616},"reference-count":29,"publisher":"Informa UK Limited","issue":"5","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["The Information Society"],"published-print":{"date-parts":[[2014,10,20]]},"DOI":"10.1080\/01972243.2014.944730","type":"journal-article","created":{"date-parts":[[2014,10,2]],"date-time":"2014-10-02T15:50:16Z","timestamp":1412265016000},"page":"355-365","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":23,"title":["A Strategy for Operationalizing Privacy by Design"],"prefix":"10.1080","volume":"30","author":[{"given":"Inga","family":"Kroener","sequence":"first","affiliation":[]},{"given":"David","family":"Wright","sequence":"additional","affiliation":[]}],"member":"301","published-online":{"date-parts":[[2014,10,2]]},"reference":[{"key":"cit0001","volume-title":"The future of privacy: Joint contribution to the consultation of the European Commission on the legal framework for the fundamental right to protection of personal data","author":"Article 29 Data Protection Working Party","year":"2009"},{"key":"cit0002","volume-title":"Opinion 3\/2010 on the principle of accountability","author":"Article 29 Data Protection Working Party","year":"2010"},{"key":"cit0003","doi-asserted-by":"publisher","DOI":"10.1057\/9781137032225.0008"},{"key":"cit0004","doi-asserted-by":"crossref","DOI":"10.3138\/9781442683105","volume-title":"Visions of privacy: Policy choices for the digital age","author":"Bennett CJ.","year":"1999"},{"key":"cit0005","volume-title":"The governance of privacy\u2014Policy instruments in global perspective","author":"Bennett CJ.","year":"2003"},{"key":"cit0007","volume-title":"Privacy risk management: building privacy protection into a risk management framework to ensure that privacy risks are managed by default","author":"Cavoukian A","year":"2010"},{"key":"cit0008","volume-title":"Operationalizing privacy by design: A guide to implementing strong privacy practices","author":"Cavoukian A","year":"2012"},{"key":"cit0010","volume-title":"Privacy and security by design: A convergence of paradigms","author":"Cavoukian A.","year":"2013"},{"key":"cit0011","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-010-0053-z"},{"key":"cit0016","volume-title":"Annual report 2011","author":"European Data Protection Supervisor","year":"2011"},{"key":"cit0018","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-5170-5_1"},{"key":"cit0019","volume-title":"The Personal Information Protection and Electronic Documents Act","author":"Flaherty D","year":"2001"},{"key":"cit0020","doi-asserted-by":"publisher","DOI":"10.1057\/9781137032225"},{"key":"cit0023","volume-title":"Data protection technical guidance note: Privacy enhancing technologies (PETs)","author":"Information Commissioner's Office","year":"2006"},{"key":"cit0024","volume-title":"Privacy by design","author":"Information Commissioner's Office","year":"2008"},{"key":"cit0026","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2013.09.005"},{"key":"cit0027","first-page":"4","volume":"2","author":"Krebs D","year":"2013","journal-title":"Journal of Intellectual Property, Information Technology and Electronic Commerce Law"},{"key":"cit0028","doi-asserted-by":"publisher","DOI":"10.1007\/978-90-481-8865-9_20"},{"key":"cit0029","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9299.00218"},{"key":"cit0039","author":"OASIS","year":"2012","journal-title":"Call for participation: Privacy by design documentation for Software Engineers (PbD-SE) Technical Committee"},{"key":"cit0030","doi-asserted-by":"publisher","DOI":"10.1057\/9781137032225.0007"},{"key":"cit0031","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-010-0058-7"},{"key":"cit0032","first-page":"1333","volume":"28","author":"Rubinstein I.","year":"2011","journal-title":"Berkeley Technology Law Journal"},{"key":"cit0033","doi-asserted-by":"publisher","DOI":"10.1007\/s12394-010-0055-x"},{"key":"cit0034","volume-title":"Nothing to hide: The false tradeoff between privacy and security","author":"Solove D","year":"2011"},{"key":"cit0035","doi-asserted-by":"publisher","DOI":"10.1145\/2209249.2209263"},{"key":"cit0036","volume-title":"The end of privacy","author":"Sykes C","year":"1999"},{"key":"cit0037","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2011.11.007"},{"key":"cit0038","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2013.825687"}],"container-title":["The Information Society"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/01972243.2014.944730","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T21:39:24Z","timestamp":1498167564000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/01972243.2014.944730"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,10,2]]},"references-count":29,"journal-issue":{"issue":"5","published-online":{"date-parts":[[2014,10,2]]},"published-print":{"date-parts":[[2014,10,20]]}},"alternative-id":["10.1080\/01972243.2014.944730"],"URL":"https:\/\/doi.org\/10.1080\/01972243.2014.944730","relation":{},"ISSN":["0197-2243","1087-6537"],"issn-type":[{"value":"0197-2243","type":"print"},{"value":"1087-6537","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,10,2]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=utis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}