{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,28]],"date-time":"2026-03-28T21:09:28Z","timestamp":1774732168870,"version":"3.50.1"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030890216","type":"print"},{"value":"9783030890223","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-89022-3_21","type":"book-chapter","created":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T10:01:29Z","timestamp":1634292089000},"page":"257-267","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Trustworthiness Requirements: The Pix Case Study"],"prefix":"10.1007","author":[{"given":"Glenda","family":"Amaral","sequence":"first","affiliation":[]},{"given":"Renata","family":"Guizzardi","sequence":"additional","affiliation":[]},{"given":"Giancarlo","family":"Guizzardi","sequence":"additional","affiliation":[]},{"given":"John","family":"Mylopoulos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,16]]},"reference":[{"key":"21_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/978-3-030-62522-1_25","volume-title":"Conceptual Modeling","author":"G Amaral","year":"2020","unstructured":"Amaral, G., Guizzardi, R., Guizzardi, G., Mylopoulos, J.: Ontology-based modeling and analysis of trustworthiness requirements: preliminary results. In: Dobbie, G., Frank, U., Kappel, G., Liddle, S.W., Mayr, H.C. (eds.) ER 2020. LNCS, vol. 12400, pp. 342\u2013352. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-62522-1_25"},{"key":"21_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-33246-4_1","volume-title":"On the Move to Meaningful Internet Systems: OTM 2019 Conferences","author":"G Amaral","year":"2019","unstructured":"Amaral, G., Sales, T.P., Guizzardi, G., Porello, D.: Towards a reference ontology of trust. In: Panetto, H., Debruyne, C., Hepp, M., Lewis, D., Ardagna, C.A., Meersman, R. (eds.) OTM 2019. LNCS, vol. 11877, pp. 3\u201321. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-33246-4_1"},{"key":"21_CR3","unstructured":"Amaral, G., Sales, T.P., Guizzardi, G., Porello, D.: Ontological foundations for trust management: extending the reference ontology of trust. In: 15th International Workshop on Value Modelling and Business Ontologies (2021)"},{"key":"21_CR4","volume-title":"Ontology and Metaontology: A Contemporary Guide","author":"F Berto","year":"2015","unstructured":"Berto, F., Plebani, M.: Ontology and Metaontology: A Contemporary Guide. Bloomsbury Publishing, London (2015)"},{"key":"21_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/9780470519851","volume-title":"Trust Theory: A Socio-cognitive and Computational Model","author":"C Castelfranchi","year":"2010","unstructured":"Castelfranchi, C., Falcone, R.: Trust Theory: A Socio-cognitive and Computational Model, vol. 18. Wiley, Hoboken (2010)"},{"key":"21_CR6","series-title":"International Series in Software Engineering","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5269-7","volume-title":"Non-Functional Requirements in Software Engineering","author":"L Chung","year":"2000","unstructured":"Chung, L., Nixon, B., Yu, E., Mylopoulos, J.: Non-Functional Requirements in Software Engineering. International Series in Software Engineering, vol. 5. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/978-1-4615-5269-7"},{"key":"21_CR7","volume-title":"User Stories Applied: For Agile Software Development","author":"M Cohn","year":"2004","unstructured":"Cohn, M.: User Stories Applied: For Agile Software Development. Addison Wesley Longman Publishing Co., Inc., Boston (2004)"},{"key":"21_CR8","unstructured":"Dalpiaz, F., Franch, X., Horkoff, J.: iStar 2.0 language guide. arXiv:1605.07767 [cs.SE] (2016). dalp-fran-hork-16-istar.pdf"},{"key":"21_CR9","unstructured":"Guizzardi, G.: Ontological foundations for structural conceptual models. Telematica Instituut\/CTIT (2005)"},{"key":"21_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-642-41924-9_27","volume-title":"Conceptual Modeling","author":"G Guizzardi","year":"2013","unstructured":"Guizzardi, G., Wagner, G., de Almeida Falbo, R., Guizzardi, R.S.S., Almeida, J.P.A.: Towards ontological foundations for the conceptual modeling of events. In: Ng, W., Storey, V.C., Trujillo, J.C. (eds.) ER 2013. LNCS, vol. 8217, pp. 327\u2013341. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-41924-9_27"},{"key":"21_CR11","unstructured":"Guizzardi, R., et al.: An ontological interpretation of non-functional requirements. In: 8th International Conference on Formal Ontology in Information Systems, vol. 14, pp. 344\u2013357 (2014)"},{"key":"21_CR12","first-page":"6","volume":"6","author":"A Hussain","year":"2016","unstructured":"Hussain, A., Mkpojiogu, E., Kamal, F.: The role of requirements in the success or failure of software projects. EJ Econjournals 6, 6\u20137 (2016)","journal-title":"EJ Econjournals"},{"issue":"3","key":"21_CR13","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1016\/j.ijhcs.2005.01.001","volume":"62","author":"J Riegelsberger","year":"2005","unstructured":"Riegelsberger, J., et al.: The mechanics of trust: a framework for research and design. Int. J. Human-Comput. Stud. 62(3), 381\u2013422 (2005)","journal-title":"Int. J. Human-Comput. Stud."},{"key":"21_CR14","volume-title":"Requirements Engineering - From System Goals to UML Models to Software Specifications","author":"A Van Lamsweerde","year":"2009","unstructured":"Van Lamsweerde, A.: Requirements Engineering - From System Goals to UML Models to Software Specifications. Wiley, Chichester (2009)"},{"key":"21_CR15","volume-title":"Case Study Research: Design and Methods (Applied Social Research Methods)","author":"RK Yin","year":"2008","unstructured":"Yin, R.K.: Case Study Research: Design and Methods (Applied Social Research Methods). Sage Publications, Thousand Oaks (2008)"}],"container-title":["Lecture Notes in Computer Science","Conceptual Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-89022-3_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,15]],"date-time":"2021-10-15T10:22:13Z","timestamp":1634293333000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-89022-3_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030890216","9783030890223"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-89022-3_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"16 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ER","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Conceptual Modeling","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 October 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"40","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"er2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.er2021.org\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"85","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.9","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}