{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T09:27:47Z","timestamp":1742981267807,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031346736"},{"type":"electronic","value":"9783031346743"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-34674-3_4","type":"book-chapter","created":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T20:32:15Z","timestamp":1686169935000},"page":"26-33","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards Designing Energy-Aware Cybersecurity Policies"],"prefix":"10.1007","author":[{"given":"Mattia","family":"Salnitri","sequence":"first","affiliation":[]},{"given":"Pierluigi","family":"Plebani","sequence":"additional","affiliation":[]},{"given":"Alessandra","family":"Raffone","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,8]]},"reference":[{"issue":"3","key":"4_CR1","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1023\/B:AGNT.0000018806.20944.ef","volume":"8","author":"P Bresciani","year":"2004","unstructured":"Bresciani, P., Perini, A., Giorgini, P., Giunchiglia, F., Mylopoulos, J.: Tropos: an agent-oriented software development methodology. Auton. Agent. Multi-Agent Syst. 8(3), 203\u2013236 (2004)","journal-title":"Auton. Agent. Multi-Agent Syst."},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Caviglione, L., Merlo, A., Migliardi, M.: What is green security? In: International Conference on Information Assurance and Security (IAS), pp. 366\u2013371. IEEE (2011)","DOI":"10.1109\/ISIAS.2011.6122781"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Cotnoir, A., Varzi, A.C.: Mereology. Oxford University Press, Oxford (2021)","DOI":"10.1093\/oso\/9780198749004.001.0001"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"375","DOI":"10.1007\/978-3-540-75563-0_26","volume-title":"Conceptual Modeling","author":"G Elahi","year":"2007","unstructured":"Elahi, G., Yu, E.: A goal oriented approach for modeling and analyzing security trade-offs. In: Parent, C., Schewe, K.-D., Storey, V.C., Thalheim, B. (eds.) ER 2007. LNCS, vol. 4801, pp. 375\u2013390. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-75563-0_26"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jss.2017.11.023","volume":"137","author":"E Gon\u00e7alves","year":"2018","unstructured":"Gon\u00e7alves, E., Castro, J., Ara\u00fajo, J., Heineck, T.: A systematic literature review of istar extensions. J. Syst. Softw. 137, 1\u201333 (2018)","journal-title":"J. Syst. Softw."},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s00766-017-0280-z","volume":"24","author":"J Horkoff","year":"2019","unstructured":"Horkoff, J., et al.: Goal-oriented requirements engineering: an extended systematic mapping study. Requirements Eng. 24, 133\u2013160 (2019)","journal-title":"Requirements Eng."},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"700","DOI":"10.1007\/978-3-642-33615-7_17","volume-title":"On the Move to Meaningful Internet Systems","author":"J Horkoff","year":"2012","unstructured":"Horkoff, J., et al.: Making data meaningful: the business intelligence model and its formal semantics in description logics. In: Meersman, R., et al. (eds.) OTM 2012. LNCS, vol. 7566, pp. 700\u2013717. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33615-7_17"},{"issue":"10","key":"4_CR8","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/1400181.1400186","volume":"51","author":"P Kurp","year":"2008","unstructured":"Kurp, P.: Green computing. Commun. ACM 51(10), 11\u201313 (2008)","journal-title":"Commun. ACM"},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1016\/j.pmcj.2015.05.005","volume":"24","author":"A Merlo","year":"2015","unstructured":"Merlo, A., Migliardi, M., Caviglione, L.: A survey on energy-aware security mechanisms. Pervasive Mob. Comput. 24, 77\u201390 (2015)","journal-title":"Pervasive Mob. Comput."},{"issue":"02","key":"4_CR10","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1142\/S0218194007003240","volume":"17","author":"H Mouratidis","year":"2007","unstructured":"Mouratidis, H., Giorgini, P.: Secure tropos: a security-oriented extension of the tropos methodology. Int. J. Softw. Eng. Knowl. Eng. 17(02), 285\u2013309 (2007)","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"key":"4_CR11","unstructured":"OMG: BPMN 2.0. Technical Report, January 2011. http:\/\/www.omg.org\/spec\/BPMN\/2.0"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1016\/j.datak.2015.07.007","volume":"98","author":"E Paja","year":"2015","unstructured":"Paja, E., Dalpiaz, F., Giorgini, P.: Modelling and reasoning about security requirements in socio-technical systems. Data Knowl. Eng. 98, 123\u2013143 (2015)","journal-title":"Data Knowl. Eng."},{"issue":"4","key":"4_CR13","doi-asserted-by":"publisher","first-page":"745","DOI":"10.1093\/ietisy\/e90-d.4.745","volume":"90","author":"A Rodr\u00edguez","year":"2007","unstructured":"Rodr\u00edguez, A., Fern\u00e1ndez-Medina, E., Piattini, M.: A BPMN extension for the modeling of security requirements in business processes. IEICE Trans. Inf. Syst. 90(4), 745\u2013752 (2007)","journal-title":"IEICE Trans. Inf. Syst."},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Salnitri, M., Paja, E., Giorgini, P.: Maintaining secure business processes in light of socio-technical systems\u2019 evolution. In: 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW), pp. 155\u2013164. IEEE (2016)","DOI":"10.1109\/REW.2016.038"},{"issue":"2011","key":"4_CR15","first-page":"66","volume":"11","author":"E Yu","year":"2011","unstructured":"Yu, E.: Modeling strategic relationships for process reengineering. Soc. Model. Requirements Eng. 11(2011), 66\u201387 (2011)","journal-title":"Soc. Model. Requirements Eng."}],"container-title":["Lecture Notes in Business Information Processing","Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-34674-3_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T20:32:41Z","timestamp":1686169961000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-34674-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031346736","9783031346743"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-34674-3_4","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"8 June 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CAiSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Zaragoza","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 June 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"35","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"caise2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"161","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.63","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"For the CAISE 2023 Forum 18 papers have been accepted from a total of 25 submissions. For the CAISE workshops 10 full and 9 short papers have been accepted from 25 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}