{"id":"https://openalex.org/W3027037005","doi":"https://doi.org/10.3390/fi12050093","title":"DPIA in Context: Applying DPIA to Assess Privacy Risks of Cyber Physical Systems","display_name":"DPIA in Context: Applying DPIA to Assess Privacy Risks of Cyber Physical Systems","publication_year":2020,"publication_date":"2020-05-24","ids":{"openalex":"https://openalex.org/W3027037005","doi":"https://doi.org/10.3390/fi12050093","mag":"3027037005"},"language":"en","primary_location":{"id":"doi:10.3390/fi12050093","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi12050093","pdf_url":"https://www.mdpi.com/1999-5903/12/5/93/pdf?version=1590576677","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/1999-5903/12/5/93/pdf?version=1590576677","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5053485779","display_name":"Jane Henriksen-Bulmer","orcid":"https://orcid.org/0000-0002-0807-2661"},"institutions":[{"id":"https://openalex.org/I9300472","display_name":"Bournemouth University","ror":"https://ror.org/05wwcw481","country_code":"GB","type":"education","lineage":["https://openalex.org/I9300472"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Jane Henriksen-Bulmer","raw_affiliation_strings":["Department of Computing &amp; Informatics, Bournemouth University, Fern Barrow, Poole BH12 5BB, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computing &amp; Informatics, Bournemouth University, Fern Barrow, Poole BH12 5BB, UK","institution_ids":["https://openalex.org/I9300472"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5045597082","display_name":"Shamal Faily","orcid":"https://orcid.org/0000-0002-2859-1143"},"institutions":[{"id":"https://openalex.org/I9300472","display_name":"Bournemouth University","ror":"https://ror.org/05wwcw481","country_code":"GB","type":"education","lineage":["https://openalex.org/I9300472"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Shamal Faily","raw_affiliation_strings":["Department of Computing &amp; Informatics, Bournemouth University, Fern Barrow, Poole BH12 5BB, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computing &amp; Informatics, Bournemouth University, Fern Barrow, Poole BH12 5BB, UK","institution_ids":["https://openalex.org/I9300472"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041671011","display_name":"Sheridan Jeary","orcid":"https://orcid.org/0000-0003-2923-8007"},"institutions":[{"id":"https://openalex.org/I9300472","display_name":"Bournemouth University","ror":"https://ror.org/05wwcw481","country_code":"GB","type":"education","lineage":["https://openalex.org/I9300472"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sheridan Jeary","raw_affiliation_strings":["Department of Computing &amp; Informatics, Bournemouth University, Fern Barrow, Poole BH12 5BB, UK"],"affiliations":[{"raw_affiliation_string":"Department of Computing &amp; Informatics, Bournemouth University, Fern Barrow, Poole BH12 5BB, UK","institution_ids":["https://openalex.org/I9300472"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5053485779"],"corresponding_institution_ids":["https://openalex.org/I9300472"],"apc_list":{"value":1400,"currency":"CHF","value_usd":1515},"apc_paid":{"value":1400,"currency":"CHF","value_usd":1515},"fwci":3.277,"has_fulltext":true,"cited_by_count":17,"citation_normalized_percentile":{"value":0.93369228,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"12","issue":"5","first_page":"93","last_page":"93"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9951000213623047,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10883","display_name":"Ethics and Social Impacts of AI","score":0.989799976348877,"subfield":{"id":"https://openalex.org/subfields/3311","display_name":"Safety Research"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9891999959945679,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7061259150505066},{"id":"https://openalex.org/keywords/privacy-by-design","display_name":"Privacy by Design","score":0.6186688542366028},{"id":"https://openalex.org/keywords/general-data-protection-regulation","display_name":"General Data Protection Regulation","score":0.6008262038230896},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.5461006760597229},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.5459831953048706},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.5040289759635925},{"id":"https://openalex.org/keywords/usable","display_name":"USable","score":0.49342551827430725},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.4871904253959656},{"id":"https://openalex.org/keywords/cyber-physical-system","display_name":"Cyber-physical system","score":0.47571784257888794},{"id":"https://openalex.org/keywords/mandate","display_name":"Mandate","score":0.446994423866272},{"id":"https://openalex.org/keywords/privacy-software","display_name":"Privacy software","score":0.44092223048210144},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.43482524156570435},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.41121894121170044},{"id":"https://openalex.org/keywords/data-protection-act-1998","display_name":"Data Protection Act 1998","score":0.3691669702529907},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.3668477535247803},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.1905028522014618}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7061259150505066},{"id":"https://openalex.org/C193934123","wikidata":"https://www.wikidata.org/wiki/Q7246028","display_name":"Privacy by Design","level":3,"score":0.6186688542366028},{"id":"https://openalex.org/C3090818","wikidata":"https://www.wikidata.org/wiki/Q1172506","display_name":"General Data Protection Regulation","level":3,"score":0.6008262038230896},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.5461006760597229},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.5459831953048706},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.5040289759635925},{"id":"https://openalex.org/C2780615836","wikidata":"https://www.wikidata.org/wiki/Q2471869","display_name":"USable","level":2,"score":0.49342551827430725},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4871904253959656},{"id":"https://openalex.org/C179768478","wikidata":"https://www.wikidata.org/wiki/Q1120057","display_name":"Cyber-physical system","level":2,"score":0.47571784257888794},{"id":"https://openalex.org/C2775884135","wikidata":"https://www.wikidata.org/wiki/Q845436","display_name":"Mandate","level":2,"score":0.446994423866272},{"id":"https://openalex.org/C509729295","wikidata":"https://www.wikidata.org/wiki/Q7246032","display_name":"Privacy software","level":3,"score":0.44092223048210144},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.43482524156570435},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.41121894121170044},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.3691669702529907},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.3668477535247803},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.1905028522014618},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.3390/fi12050093","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi12050093","pdf_url":"https://www.mdpi.com/1999-5903/12/5/93/pdf?version=1590576677","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},{"id":"pmh:oai:eprints.bournemouth.ac.uk:34036","is_oa":true,"landing_page_url":null,"pdf_url":"http://eprints.bournemouth.ac.uk/34036/1/futureinternet-12-00093.pdf","source":{"id":"https://openalex.org/S4306400187","display_name":"Bournemouth University Research Online (Bournemouth University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I9300472","host_organization_name":"Bournemouth University","host_organization_lineage":["https://openalex.org/I9300472"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Article"},{"id":"pmh:oai:RePEc:gam:jftint:v:12:y:2020:i:5:p:93-:d:362400","is_oa":false,"landing_page_url":"https://www.mdpi.com/1999-5903/12/5/93/","pdf_url":null,"source":{"id":"https://openalex.org/S4306401271","display_name":"RePEc: Research Papers in Economics","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I77793887","host_organization_name":"Federal Reserve Bank of St. Louis","host_organization_lineage":["https://openalex.org/I77793887"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"article"},{"id":"pmh:oai:doaj.org/article:0f56dda4b13f40febfedd582e392fa25","is_oa":true,"landing_page_url":"https://doaj.org/article/0f56dda4b13f40febfedd582e392fa25","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet, Vol 12, Iss 5, p 93 (2020)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/1999-5903/12/5/93/","is_oa":true,"landing_page_url":"http://dx.doi.org/10.3390/fi12050093","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Future Internet","raw_type":"Text"},{"id":"pmh:oai:rgu-repository.worktribe.com:1427724","is_oa":true,"landing_page_url":"https://rgu-repository.worktribe.com/output/1427724","pdf_url":null,"source":{"id":"https://openalex.org/S4306400814","display_name":"Open Access Institutional Repository at Robert Gordon University (Robert Gordon University)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I522815984","host_organization_name":"Robert Gordon University","host_organization_lineage":["https://openalex.org/I522815984"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"publishedVersion"}],"best_oa_location":{"id":"doi:10.3390/fi12050093","is_oa":true,"landing_page_url":"https://doi.org/10.3390/fi12050093","pdf_url":"https://www.mdpi.com/1999-5903/12/5/93/pdf?version=1590576677","source":{"id":"https://openalex.org/S34838331","display_name":"Future Internet","issn_l":"1999-5903","issn":["1999-5903"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Future Internet","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.4000000059604645,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3027037005.pdf","grobid_xml":"https://content.openalex.org/works/W3027037005.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W1531084273","https://openalex.org/W1608516531","https://openalex.org/W1614685846","https://openalex.org/W1640628807","https://openalex.org/W1985509047","https://openalex.org/W2011182411","https://openalex.org/W2035554395","https://openalex.org/W2039649206","https://openalex.org/W2066266646","https://openalex.org/W2074656509","https://openalex.org/W2104023107","https://openalex.org/W2108982337","https://openalex.org/W2116560806","https://openalex.org/W2129835639","https://openalex.org/W2139061144","https://openalex.org/W2145561519","https://openalex.org/W2162187563","https://openalex.org/W2166977881","https://openalex.org/W2169239645","https://openalex.org/W2466852325","https://openalex.org/W2537851856","https://openalex.org/W2579603034","https://openalex.org/W2605497964","https://openalex.org/W2617246254","https://openalex.org/W2617872846","https://openalex.org/W2758544228","https://openalex.org/W2790583412","https://openalex.org/W2795757960","https://openalex.org/W2796620981","https://openalex.org/W2909197080","https://openalex.org/W2919523599","https://openalex.org/W2937393044","https://openalex.org/W3123012225","https://openalex.org/W3125356411","https://openalex.org/W4249713246","https://openalex.org/W6603327141","https://openalex.org/W6676572272"],"related_works":["https://openalex.org/W2917102635","https://openalex.org/W3023256691","https://openalex.org/W2603253017","https://openalex.org/W2883729192","https://openalex.org/W2901967497","https://openalex.org/W2910484607","https://openalex.org/W2789497412","https://openalex.org/W2794700933","https://openalex.org/W3171079982","https://openalex.org/W3048759155"],"abstract_inverted_index":{"Cyber":[0],"Physical":[1],"Systems":[2],"(CPS)":[3],"seamlessly":[4],"integrate":[5],"physical":[6,16],"objects":[7],"with":[8,144],"technology,":[9],"thereby":[10,160],"blurring":[11],"the":[12,15,36,59,80,104,122,128,152,155,158,185],"boundaries":[13],"between":[14],"and":[17,127,157],"virtual":[18],"environments.":[19],"While":[20],"this":[21,47,137,167],"brings":[22],"many":[23],"opportunities":[24],"for":[25,120],"progress,":[26],"it":[27],"also":[28,141],"adds":[29],"a":[30,84,145,191],"new":[31],"layer":[32],"of":[33,67,107,124,130,147,154],"complexity":[34],"to":[35,42,99],"risk":[37,87,187],"assessment":[38,66,88],"process":[39,189],"when":[40],"attempting":[41],"ascertain":[43],"what":[44],"privacy":[45,55,68,86,105,116,125,149,186,203],"risks":[46,106],"might":[48],"impose":[49],"on":[50,91],"an":[51],"organisation.":[52],"In":[53,174],"addition,":[54],"regulations,":[56],"such":[57],"as":[58],"General":[60],"Data":[61,72,82],"Protection":[62,73],"Regulation":[63],"(GDPR),":[64],"mandate":[65],"risks,":[69,126],"including":[70],"making":[71,102,201],"Impact":[74],"Assessments":[75],"(DPIAs)":[76],"compulsory.":[77],"We":[78,164],"present":[79],"DPIA":[81,138],"Wheel,":[83],"holistic":[85],"framework":[89,110,139,168],"based":[90],"Contextual":[92],"Integrity":[93],"(CI),":[94],"that":[95,118,195],"practitioners":[96],"can":[97,181],"use":[98],"inform":[100],"decision":[101,198],"around":[103],"CPS.":[108],"This":[109],"facilitates":[111],"comprehensive":[112],"contextual":[113],"inquiry":[114],"into":[115,184],"risk,":[117],"accounts":[119],"both":[121,151],"elicitation":[123],"identification":[129],"appropriate":[131],"mitigation":[132],"strategies.":[133],"Further,":[134],"by":[135],"using":[136],"we":[140,177],"provide":[142],"organisations":[143],"means":[146],"assessing":[148],"from":[150],"perspective":[153],"organisation":[156],"individual,":[159],"facilitating":[161],"GDPR":[162],"compliance.":[163],"empirically":[165],"evaluate":[166],"in":[169,190,200],"three":[170],"different":[171],"real-world":[172],"settings.":[173],"doing":[175],"so,":[176],"demonstrate":[178],"how":[179],"CI":[180],"be":[182],"incorporated":[183],"decision-making":[188],"usable,":[192],"practical":[193],"manner":[194],"will":[196],"aid":[197],"makers":[199],"informed":[202],"decisions.":[204]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":1},{"year":2022,"cited_by_count":6},{"year":2021,"cited_by_count":2}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
