{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T05:16:24Z","timestamp":1742966184132,"version":"3.40.3"},"publisher-location":"Cham","reference-count":62,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031562808"},{"type":"electronic","value":"9783031562815"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-56281-5_8","type":"book-chapter","created":{"date-parts":[[2024,4,11]],"date-time":"2024-04-11T23:02:46Z","timestamp":1712876566000},"page":"135-152","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Challenges of\u00a0Assuring Compliance of\u00a0Information Systems in\u00a0Finance"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4503-2244","authenticated-orcid":false,"given":"Tomas","family":"Bueno Mom\u010dilovi\u0107","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8311-3227","authenticated-orcid":false,"given":"Dian","family":"Balta","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,12]]},"reference":[{"key":"8_CR1","unstructured":"National Institute of Standards and Technology (NIST): Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations. NIST Special Publication. NIST, Gaithersburg, MD"},{"key":"8_CR2","unstructured":"European Banking Authority (EBA): Study of the Cost of Compliance with Supervisory Reporting Requirements. Report EBA\/Rep\/2021\/15. Luxembourg, EBA"},{"key":"8_CR3","unstructured":"Hammond, S., Cowan, M.: Cost of Compliance: Shaping the Future. Thomson Reuters Regulatory Intelligence, Toronto (2021)"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Duncan, B., Whittington, M.: Compliance with standards, assurance and audit: does this equal security? In: ACM International Conference Proceeding Series, pp. 77\u201384, September 2014","DOI":"10.1145\/2659651.2659711"},{"issue":"1","key":"8_CR5","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1111\/rego.12094","volume":"11","author":"C Koop","year":"2015","unstructured":"Koop, C., Lodge, M.: What is regulation? An interdisciplinary concept analysis. Regul. Gov. 11(1), 95\u2013108 (2015)","journal-title":"Regul. Gov."},{"issue":"1","key":"8_CR6","first-page":"1","volume":"30","author":"B Orbach","year":"2012","unstructured":"Orbach, B.: What is regulation? Yale J. Regul. 30(1), 1\u201310 (2012)","journal-title":"Yale J. Regul."},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-319-98690-6_6","volume-title":"Electronic Government","author":"D Balta","year":"2018","unstructured":"Balta, D., Krcmar, H.: Managing standardization in eGovernment: a coordination theory based analysis framework. In: Parycek, P., et al. (eds.) EGOV 2018. LNCS, vol. 11020, pp. 60\u201372. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98690-6_6"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Sutinen, J.G., Kuperan, K.: A socio-economic theory of regulatory compliance. Int. J. Soc. Econ. 26(1\/2\/3), 174\u2013193 (1999)","DOI":"10.1108\/03068299910229569"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Breaux, T.D., Vail, M.W., Anton, A.I.: Towards regulatory compliance: extracting rights and obligations to align requirements with regulations. In: 14th IEEE International Requirements Engineering Conference (RE 2006), Minneapolis and St. Paul, MN, 11\u201315 September, pp. 49\u201358 (2006)","DOI":"10.1109\/RE.2006.68"},{"key":"8_CR10","unstructured":"International Organization for Standardization (ISO): ISO 37301:2021. Compliance management systems. Requirements with guidance for use. ISO, Geneva"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Massey, A.K., Rutledge, R.L., Anton, A.I., Swire, P.P.: Identifying and classifying ambiguity for regulatory requirements. In: Proceedings of the 2014 IEEE 22nd International Requirements Engineering Conference (RE 2014), pp. 83\u201392 (2014)","DOI":"10.1109\/RE.2014.6912250"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Hashmi, M., Governatori, G., Lam, H.P., Wynn, M.T.: Are we done with business process compliance: state of the art and challenges ahead (2018)","DOI":"10.1007\/s10115-017-1142-1"},{"issue":"4","key":"8_CR13","first-page":"360","volume":"33","author":"S Bozkus Kahyaoglu","year":"2018","unstructured":"Bozkus Kahyaoglu, S., Caliyurt, K.: Cyber security assurance process from the internal audit perspective. Manag. Account. J. 33(4), 360\u2013376 (2018)","journal-title":"Manag. Account. J."},{"issue":"4","key":"8_CR14","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1016\/j.is.2012.07.003","volume":"38","author":"N Lohmann","year":"2013","unstructured":"Lohmann, N.: Compliance by design for artifact-centric business processes. Inf. Syst. 38(4), 606\u2013618 (2013)","journal-title":"Inf. Syst."},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1016\/j.is.2014.07.007","volume":"48","author":"MT Gomez-Lopez","year":"2015","unstructured":"Gomez-Lopez, M.T., Gasca, R.M., Perez-Alvarez, J.M.: Compliance validation and diagnosis of business data constraints in business processes at runtime. Inf. Syst. 48, 26\u201343 (2015)","journal-title":"Inf. Syst."},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Awad, A., Barnawi, A., Elgammal, A., Elshawi, R., Almalaise, A., Sakr, S.: Runtime detection of business process compliance violations: an approach based on anti patterns? In: Proceedings of the 30th Annual ACM Symposium on Applied Computing (SAC 2015), Salamanca, Spain, 13\u201317 April, pp. 1203\u20131210 (2015)","DOI":"10.1145\/2695664.2699488"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Poscher, R.: Ambiguity and vagueness in legal interpretation. In: Tiersma, P., Solan, L. (eds.) The Oxford Handbook of Language and Law, Oxford University Press, Oxford (2011)","DOI":"10.1093\/oxfordhb\/9780199572120.013.0010"},{"issue":"2","key":"8_CR18","doi-asserted-by":"publisher","first-page":"301","DOI":"10.1017\/bap.2017.34","volume":"20","author":"GM Randolph","year":"2017","unstructured":"Randolph, G.M., Fetzner, J.P.: Regulatory interpretation: regulators, regulated parties, and the courts. Bus. Polit. 20(2), 301\u2013328 (2017)","journal-title":"Bus. Polit."},{"issue":"2","key":"8_CR19","doi-asserted-by":"publisher","first-page":"379","DOI":"10.1086\/533421","volume":"37","author":"GAM Ponzetto","year":"2008","unstructured":"Ponzetto, G.A.M., Fernandez, P.A.: Case law versus statute law: an evolutionary comparison. J. Leg. Stud. 37(2), 379\u2013430 (2008)","journal-title":"J. Leg. Stud."},{"key":"8_CR20","unstructured":"Klimas, T., Vaiciukaite, J.: The law of recitals in European community legislation. ILSA J. Int. Comp. Law 15(1), 61\u201393 (2008)"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Kempe, E., Massey, A.K.: Regulatory and security standard compliance throughout the software development lifecycle. In: Proceedings of the 54th Annual Hawaii International Conference on System Sciences, Virtual, 4\u20138 January, pp. 2026\u20132035 (2021)","DOI":"10.24251\/HICSS.2021.248"},{"key":"8_CR22","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-319-38980-6_2","volume-title":"Software Process Improvement and Capability Determination","author":"AB Bujok","year":"2016","unstructured":"Bujok, A.B., MacMahon, S.T., McCaffery, F., Whelan, D., Mulcahy, B., Rickard, W.J.: Safety critical software development \u2013 extending quality management system practices to achieve compliance with regulatory requirements. In: Clarke, P.M., O\u2019Connor, R.V., Rout, T., Dorling, A. (eds.) SPICE 2016. CCIS, vol. 609, pp. 17\u201330. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-38980-6_2"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Yulianto, S., Lim, C., Soewito, B.: Information security maturity model: a best practice driven approach to PCI DSS compliance. In: Proceedings of the 2016 IEEE Region 10 Symposium (TENSYMP 2016), Bali, 9\u201311 May, pp. 65\u201370 (2016)","DOI":"10.1109\/TENCONSpring.2016.7519379"},{"key":"8_CR24","unstructured":"Humphreys, L., Santos, C., Di Caro, L., Boella, G., Van Der Torre, L., Robaldo, L.: Mapping recitals to normative provisions in EU legislation to assist legal interpretation. In: JURIX 2015: The Twenty-Eighth Annual Conference, Braga, Portugal, 10\u201311 December (2015). Frontiers Artif. Intell. Appl. 279, 41\u201349"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Floridi, L., Holweg, M., Taddeo, M., Silva, J.A., M\u00f6kander, J., Wen, Y.: capAI - a procedure for conducting conformity assessment of AI systems in line with the EU artificial intelligence act. SSRN. https:\/\/dx.doi.org\/10.2139\/ssrn.4064091","DOI":"10.2139\/ssrn.4064091"},{"key":"8_CR26","doi-asserted-by":"crossref","unstructured":"Hjerppe, K., Ruohonen, J., Leppanen, V.: The general data protection regulation: requirements, architectures, and constraints. In: Proceedings of the 27th IEEE International Conference on Requirements Engineering (RE2019), Jeju Island, 23\u201327 September, pp. 265\u2013275 (2019)","DOI":"10.1109\/RE.2019.00036"},{"key":"8_CR27","unstructured":"Commission Nationale de l\u2019Informatique et des Libert\u00e9s (CNIL): The open source PIA software helps to carry out data protection impact assessment. https:\/\/www.cnil.fr\/en\/open-source-pia-software-helps-carry-out-data-protection-impact-assessment. Accessed 20 Nov 2023"},{"issue":"6","key":"8_CR28","first-page":"2995","volume":"82","author":"JS Dzienkowski","year":"2014","unstructured":"Dzienkowski, J.S.: The future of big law: alternative legal service providers to corporate clients. Fordham Law Rev. 82(6), 2995\u20133040 (2014)","journal-title":"Fordham Law Rev."},{"issue":"5","key":"8_CR29","doi-asserted-by":"publisher","first-page":"524","DOI":"10.1016\/j.aos.2009.12.001","volume":"35","author":"M Christensen","year":"2010","unstructured":"Christensen, M., Skaerbaek, P.: Consultancy outputs and the purification of accounting technologies. Acc. Organ. Soc. 35(5), 524\u2013545 (2010)","journal-title":"Acc. Organ. Soc."},{"issue":"6","key":"8_CR30","first-page":"357","volume":"16","author":"EH Freeman","year":"2007","unstructured":"Freeman, E.H.: Regulatory compliance and the chief compliance officer. Inf. Syst. Secur. 16(6), 357\u2013361 (2007)","journal-title":"Inf. Syst. Secur."},{"issue":"3","key":"8_CR31","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1108\/ICS-02-2016-0013","volume":"25","author":"E Karanja","year":"2017","unstructured":"Karanja, E.: The role of the chief information security officer in the management of IT security. Inf. Comput. Secur. 25(3), 300\u2013329 (2017)","journal-title":"Inf. Comput. Secur."},{"issue":"5","key":"8_CR32","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1016\/j.csi.2005.01.003","volume":"27","author":"F Massacci","year":"2005","unstructured":"Massacci, F., Prest, M., Zannone, N.: Using a security requirements engineering methodology in practice: the compliance with the Italian data protection legislation. Comput. Stand. Interfaces 27(5), 445\u2013455 (2005)","journal-title":"Comput. Stand. Interfaces"},{"key":"8_CR33","unstructured":"Klymenko, A., Meisenbacher, S., Matthes, F.: The structure of data privacy compliance. In: CIISR 2023: 3rd International Workshop on Current Information Security and Compliance Issues in Information Systems Research, 18 September 2023, Paderborn, Germany, pp. 85\u201391 (2023)"},{"key":"8_CR34","doi-asserted-by":"crossref","unstructured":"Moeller, R.: IT Audit, Control, and Security. Wiley, Hoboken, NJ (2010)","DOI":"10.1002\/9781118269138"},{"key":"8_CR35","doi-asserted-by":"crossref","unstructured":"Abdullah, N.S., Sadiq, S., Indulska, M.: Emerging challenges in information systems research for regulatory compliance management. In: Proceedings of the International Conference on Advanced Information Systems Engineering (CAiSE 2010), pp. 251\u2013265 (2010)","DOI":"10.1007\/978-3-642-13094-6_21"},{"issue":"5","key":"8_CR36","doi-asserted-by":"publisher","first-page":"995","DOI":"10.1007\/s10796-016-9631-4","volume":"18","author":"NS Abdullah","year":"2016","unstructured":"Abdullah, N.S., Indulska, M., Sadiq, S.: Compliance management ontology - a shared conceptualization for research and practice in compliance management. Inf. Syst. Front. 18(5), 995\u20131020 (2016)","journal-title":"Inf. Syst. Front."},{"key":"8_CR37","doi-asserted-by":"crossref","unstructured":"Klymenko, O., Kosenkov, O., Meisenbacher, S., Elahidoost, P., Mendez, D., Matthes, F.: Understanding the implementation of technical measures in the process of data privacy compliance: a qualitative study. In: ESEM 2022, Helsinki, Finland, 19\u201323 September, pp. 261\u2013271 (2022)","DOI":"10.1145\/3544902.3546234"},{"key":"8_CR38","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1057\/9781137033604_4","volume-title":"Finance: The Discreet Regulator","author":"M Lenglet","year":"2012","unstructured":"Lenglet, M.: Ambivalence and ambiguity: the interpretive role of compliance officers. In: Huault, I., Richard, C. (eds.) Finance: The Discreet Regulator, pp. 59\u201384. Palgrave Macmillan UK, London (2012). https:\/\/doi.org\/10.1057\/9781137033604_4"},{"issue":"6","key":"8_CR39","doi-asserted-by":"publisher","first-page":"1722","DOI":"10.1287\/orsc.2014.0927","volume":"25","author":"D Chandler","year":"2014","unstructured":"Chandler, D.: Organizational susceptibility to institutional complexity: critical events driving the adoption and implementation of the ethics and compliance officer position. Organ. Sci. 25(6), 1722\u20131743 (2014)","journal-title":"Organ. Sci."},{"issue":"2","key":"8_CR40","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MS.2012.174","volume":"30","author":"L Chen","year":"2013","unstructured":"Chen, L., Babar, M.A., Nuseibeh, B.: Characterizing architecturally significant requirements. IEEE Softw. 30(2), 38\u201345 (2013)","journal-title":"IEEE Softw."},{"key":"8_CR41","unstructured":"European Commission: Proposal for a Regulation of the European Parliament and of the Council on digital operational resilience for the financial sector and amending Regulations (EC) No 1060\/2009, (EU) No 648\/2012, (EU) No 600\/2014 and (EU) No 909\/2014. Brussels, European Commission. https:\/\/eur-lex.europa.eu\/legal-content\/EN\/TXT\/?uri=CELEX%3A52020PC0595. Accessed 25 Oct 2023"},{"key":"8_CR42","unstructured":"International Auditing and Assurance Standards Board (IAASB): International Standard on Assurance Engagements (ISAE) 3402. Assurance Reports on Controls at a Service Organization, IAASB, New York, NY"},{"key":"8_CR43","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s10664-008-9102-8","volume":"14","author":"P Runeson","year":"2009","unstructured":"Runeson, P., H\u00f6st, M.: Guidelines for conducting and reporting case study research in software engineering. Empir. Softw. Eng. 14, 131\u2013164 (2009)","journal-title":"Empir. Softw. Eng."},{"issue":"1","key":"8_CR44","doi-asserted-by":"publisher","first-page":"37","DOI":"10.2307\/23043488","volume":"35","author":"MK Sein","year":"2011","unstructured":"Sein, M.K., Henfridsson, O., Purao, S., Rossi, M., Lindgren, R.: Action design research. MIS Q. 35(1), 37\u201356 (2011)","journal-title":"MIS Q."},{"issue":"2","key":"8_CR45","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1108\/01443570210417515","volume":"22","author":"P Coughlan","year":"2002","unstructured":"Coughlan, P., Coghlan, D.: Action research for operations management. Int. J. Oper. Prod. Manag. 22(2), 220\u2013240 (2002)","journal-title":"Int. J. Oper. Prod. Manag."},{"issue":"1","key":"8_CR46","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/291469.291479","volume":"42","author":"DE Avison","year":"1999","unstructured":"Avison, D.E., Lau, F., Myers, M.D., Nielsen, P.A.: Action research. Commun. ACM 42(1), 94\u201397 (1999)","journal-title":"Commun. ACM"},{"key":"8_CR47","doi-asserted-by":"publisher","unstructured":"Keet, C.M.: The What and How of Modelling Information and Knowledge: From Mind Maps to Ontologies. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-39695-3","DOI":"10.1007\/978-3-031-39695-3"},{"key":"8_CR48","unstructured":"Yin, R.K.: Case Study Research and Applications. Design and Methods, 6th edn. Sage Publications, Los Angeles, CA (2017)"},{"issue":"1","key":"8_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0024274","volume":"7","author":"DI Spivak","year":"2012","unstructured":"Spivak, D.I., Kent, R.E.: Ologs: a categorical framework for knowledge representation. PLoS ONE 7(1), 1\u201322 (2012)","journal-title":"PLoS ONE"},{"key":"8_CR50","doi-asserted-by":"crossref","unstructured":"Watrobski, J.: Ontology learning methods from text - an extensive knowledge-based approach. Procedia Comput. Sci. 176. Proceedings of the 24th KES International Conference on Knowledge-Based and Intelligent Information and Engineering Systems (KES 2020), Virtual, 16\u201318 September, pp. 3356\u20133368 (2020)","DOI":"10.1016\/j.procs.2020.09.061"},{"key":"8_CR51","unstructured":"World Wide Web Consortium (W3C): RDF\/XML Syntax Specification (Revised). https:\/\/www.w3.org\/TR\/REC-rdf-syntax\/. Accessed 25 Oct 2023"},{"key":"8_CR52","unstructured":"World Wide Web Consortium (W3C): OWL 2 Web Ontology Language. RDF-Based Semantics, 2nd Edn. https:\/\/www.w3.org\/TR\/owl2-rdf-based-semantics\/. Accessed 25 Oct 2023"},{"issue":"4","key":"8_CR53","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/2757001.2757003","volume":"1","author":"MA Musen","year":"2015","unstructured":"Musen, M.A.: The Prot\u00e9g\u00e9 project: a look back and a look forward. AI Matters 1(4), 4\u201312 (2015)","journal-title":"AI Matters"},{"key":"8_CR54","unstructured":"Ontotext: Ontotext Refine Overview and Features. https:\/\/platform.ontotext.com\/ontorefine\/. Accessed 25 Oct 2023"},{"key":"8_CR55","unstructured":"Ontotext: What is GraphDB? https:\/\/graphdb.ontotext.com\/documentation\/10.4\/. Accessed 25 Oct 2023"},{"key":"8_CR56","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/s13740-012-0005-x","volume":"1","author":"F Giunchiglia","year":"2012","unstructured":"Giunchiglia, F., Dutta, B., Maltese, V., Farazi, F.: A facet-based methodology for the construction of a large-scale geospatial ontology. J. Data Semant. 1, 57\u201373 (2012)","journal-title":"J. Data Semant."},{"issue":"1","key":"8_CR57","first-page":"45","volume":"69","author":"CE Golumbic","year":"2017","unstructured":"Golumbic, C.E.: The big chill: personal liability and the targeting of financial sector compliance officers. Hastings Law J. 69(1), 45\u201393 (2017)","journal-title":"Hastings Law J."},{"key":"8_CR58","unstructured":"Object Management Group (OMG): Business Process Model and Notation (BPMN). OMG, Milford, MA. https:\/\/www.omg.org\/spec\/BPMN\/2.0\/PDF. Accessed 25 Oct 2023"},{"key":"8_CR59","unstructured":"Bloomfield, R., Rushby, J.: Assessing Confidence with Assurance 2.0. CSL Technical Report SRI-CSR-2022. SRI International, Menlo Park, CA (2022)"},{"key":"8_CR60","doi-asserted-by":"crossref","unstructured":"Sunkle, S., Kholkar, D., Kulkarni, V.: Explanation of proofs of regulator (Non-)compliance using semantic vocabularies. In: 9th International Web Rule Symposium (RuleML 2015), Berlin, Germany, 2\u20135 August, pp. 388\u2013403 (2015)","DOI":"10.1007\/978-3-319-21542-6_25"},{"key":"8_CR61","doi-asserted-by":"crossref","unstructured":"Gallina, B., Olessen, T.Y., Parajdi, E., Aarup, M.: A knowledge management strategy for seamless compliance with the machinery regulation. In: Proceedings of the 30th European & Asian System, Software & Service Process Improvement & Innovation (EuroSPI 2023), pp. 220\u2013234 (2023)","DOI":"10.1007\/978-3-031-42307-9_17"},{"key":"8_CR62","unstructured":"Sellami, M., Bueno Momcilovic, T., Kuhn, P., Balta, D.: Interaction patterns for regulatory compliance in federated learning. In: Proceedings of the 3rd International Workshop on Current Information Security and Compliance Issues in Information Systems Research, pp. 6\u201318 (2023)"}],"container-title":["Lecture Notes in Business Information Processing","Software Quality as a Foundation for Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-56281-5_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,11]],"date-time":"2024-04-11T23:03:55Z","timestamp":1712876635000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-56281-5_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031562808","9783031562815"],"references-count":62,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-56281-5_8","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"12 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"SWQD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Software Quality","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vienna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"swqd2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.software-quality-days.com","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}