{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:21:29Z","timestamp":1742912489124,"version":"3.40.3"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031573262"},{"type":"electronic","value":"9783031573279"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-57327-9_4","type":"book-chapter","created":{"date-parts":[[2024,3,29]],"date-time":"2024-03-29T03:01:47Z","timestamp":1711681307000},"page":"57-73","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Learning to\u00a0Rank Privacy Design Patterns: A Semantic Approach to\u00a0Meeting Privacy Requirements"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0250-6884","authenticated-orcid":false,"given":"Guntur Budi","family":"Herwanto","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2998-742X","authenticated-orcid":false,"given":"Gerald","family":"Quirchmayr","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8295-9252","authenticated-orcid":false,"given":"A. Min","family":"Tjoa","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,30]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","first-page":"66542","DOI":"10.1109\/ACCESS.2021.3076921","volume":"9","author":"AJ Aberkane","year":"2021","unstructured":"Aberkane, A.J., Poels, G., Broucke, S.V.: Exploring automated GDPR-compliance in requirements engineering: a systematic mapping study. IEEE Access 9, 66542\u201366559 (2021)","journal-title":"IEEE Access"},{"key":"4_CR2","doi-asserted-by":"publisher","unstructured":"Al-Momani, A., et al.: Land of the lost: Privacy patterns\u2019 forgotten properties: enhancing selection-support for privacy patterns. In: Proceedings of the ACM Symposium on Applied Computing, pp. 1217\u20131225 (2021). https:\/\/doi.org\/10.1145\/3412841.3441996","DOI":"10.1145\/3412841.3441996"},{"key":"4_CR3","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-030-29238-6_1","volume-title":"Quality of Information and Communications Technology","author":"C Bartolini","year":"2019","unstructured":"Bartolini, C., Daoudagh, S., Lenzini, G., Marchetti, E.: GDPR-based user stories in the access control perspective. In: Piattini, M., Rupino da Cunha, P., Garc\u00eda Rodr\u00edguez de Guzm\u00e1n, I., P\u00e9rez-Castillo, R. (eds.) QUATIC 2019. CCIS, vol. 1010, pp. 3\u201317. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29238-6_1"},{"issue":"23\u2013581","key":"4_CR4","first-page":"81","volume":"11","author":"CJ Burges","year":"2010","unstructured":"Burges, C.J.: From RankNet to LambdaRank to LambdaMART: an overview. Learning 11(23\u2013581), 81 (2010)","journal-title":"Learning"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Caiza, J.C., Alamo, J.M.D., Guam\u00e1n, D.S.: A framework and roadmap for enhancing the application of privacy design patterns. In: Proceedings of the 35th Annual ACM Symposium on Applied Computing, pp. 1297\u20131304 (2020)","DOI":"10.1145\/3341105.3375768"},{"key":"4_CR6","first-page":"12","volume":"5","author":"A Cavoukian","year":"2009","unstructured":"Cavoukian, A., et al.: Privacy by design: the 7 foundational principles. Inf. Priv. Commissioner Ontario Can. 5, 12 (2009)","journal-title":"Inf. Priv. Commissioner Ontario Can."},{"key":"4_CR7","unstructured":"Chen, W., Liu, T.Y., Lan, Y., Ma, Z.M., Li, H.: Ranking measures and loss functions in learning to rank. In: Bengio, Y., Schuurmans, D., Lafferty, J., Williams, C., Culotta, A. (eds.) Advances in Neural Information Processing Systems, vol. 22. Curran Associates, Inc. (2009)"},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"Colesky, M., Caiza, J.C.: A system of privacy patterns for informing users: Creating a pattern system. In: ACM International Conference Proceeding Series (2018). https:\/\/doi.org\/10.1145\/3282308.3282325","DOI":"10.1145\/3282308.3282325"},{"issue":"1","key":"4_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s00766-010-0115-7","volume":"16","author":"M Deng","year":"2011","unstructured":"Deng, M., Wuyts, K., Scandariato, R., Preneel, B., Joosen, W.: A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements. Requirements Eng. 16(1), 3\u201332 (2011)","journal-title":"Requirements Eng."},{"key":"4_CR10","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/978-3-319-41763-9_9","volume-title":"Privacy and Identity Management. Time for a Revolution?","author":"O Drozd","year":"2016","unstructured":"Drozd, O.: Privacy pattern catalogue: a tool for integrating privacy principles of ISO\/IEC 29100 into the software development process. In: Aspinall, D., Camenisch, J., Hansen, M., Fischer-H\u00fcbner, S., Raab, C. (eds.) Privacy and Identity 2015. IAICT, vol. 476, pp. 129\u2013140. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-41763-9_9"},{"issue":"2","key":"4_CR11","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/s11633-016-0950-1","volume":"13","author":"H Guan","year":"2016","unstructured":"Guan, H., Yang, H., Wang, J.: An ontology-based approach to security pattern selection. Int. J. Autom. Comput. 13(2), 168\u2013182 (2016). https:\/\/doi.org\/10.1007\/s11633-016-0950-1","journal-title":"Int. J. Autom. Comput."},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Guo, W., et al.: DeText: a deep text ranking framework with BERT. In: Proceedings of the 29th ACM International Conference on Information & Knowledge Management, pp. 2509\u20132516 (2020)","DOI":"10.1145\/3340531.3412699"},{"issue":"7","key":"4_CR13","first-page":"769","volume":"43","author":"M Hafiz","year":"2013","unstructured":"Hafiz, M.: A pattern language for developing privacy enhancing technologies. Softw.: Pract. Exp. 43(7), 769\u2013787 (2013)","journal-title":"Softw.: Pract. Exp."},{"key":"4_CR14","unstructured":"Han, X., Lei, S.: Feature selection and model comparison on Microsoft learning-to-rank data sets. arXiv preprint arXiv:1803.05127 (2018)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Herwanto, G.B., Quirchmayr, G., Tjoa, A.M.: PrivacyStory: tool support for extracting privacy requirements from user stories. In: 2022 IEEE 30th International Requirements Engineering Conference (RE), pp. 264\u2013265. IEEE (2022)","DOI":"10.1109\/RE54965.2022.00036"},{"issue":"24","key":"4_CR16","doi-asserted-by":"publisher","first-page":"13433","DOI":"10.1007\/s00500-019-03882-y","volume":"23","author":"S Hussain","year":"2019","unstructured":"Hussain, S., et al.: A methodology to rank the design patterns on the base of text relevancy. Soft. Comput. 23(24), 13433\u201313448 (2019)","journal-title":"Soft. Comput."},{"key":"4_CR17","unstructured":"Ke, G., et al.: LightGBM: a highly efficient gradient boosting decision tree. In: Advances in Neural Information Processing Systems, vol. 30 (2017)"},{"issue":"3","key":"4_CR18","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1561\/1500000016","volume":"3","author":"TY Liu","year":"2009","unstructured":"Liu, T.Y., et al.: Learning to rank for information retrieval. Found. Trends Inf. Retrieval 3(3), 225\u2013331 (2009)","journal-title":"Found. Trends Inf. Retrieval"},{"key":"4_CR19","unstructured":"Lundberg, S.M., Lee, S.I.: A unified approach to interpreting model predictions. In: Guyon, I., et al. (eds.) Advances in Neural Information Processing Systems, vol. 30, pp. 4765\u20134774. Curran Associates, Inc. (2017). http:\/\/papers.nips.cc\/paper\/7062-aunified-approach-to-interpreting-model-predictions.pdf"},{"key":"4_CR20","unstructured":"McCallum, A., Nigam, K., et al.: A comparison of event models for naive bayes text classification. In: AAAI-98 Workshop on Learning for Text Categorization, Madison, WI, vol. 752, pp. 41\u201348 (1998)"},{"key":"4_CR21","unstructured":"Meis, R.: Problem-based privacy analysis (ProPAn): a computer-aided privacy requirements engineering method. Universitaet Duisburg-Essen (Germany) (2018)"},{"issue":"2","key":"4_CR22","doi-asserted-by":"publisher","first-page":"28","DOI":"10.3390\/info7020028","volume":"7","author":"R Meis","year":"2016","unstructured":"Meis, R., Heisel, M.: Computer-aided identification and validation of privacy requirements. Inf. (Switz.) 7(2), 28 (2016). https:\/\/doi.org\/10.3390\/info7020028","journal-title":"Inf. (Switz.)"},{"key":"4_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-319-64483-7_4","volume-title":"Trust, Privacy and Security in Digital Business","author":"R Meis","year":"2017","unstructured":"Meis, R., Heisel, M.: Pattern-based representation of privacy enhancing technologies as early aspects. In: Lopez, J., Fischer-H\u00fcbner, S., Lambrinoudakis, C. (eds.) TrustBus 2017. LNCS, vol. 10442, pp. 49\u201365. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64483-7_4"},{"key":"4_CR24","unstructured":"Miri, M., Foomany, F.H., Mohammed, N.: Complying with GDPR: an agile case study. ISACA J. 2 (2018)"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Notario, N., et al.: PRIPARE: integrating privacy best practices into a privacy engineering methodology. In: 2015 IEEE Security and Privacy Workshops, pp. 151\u2013158. IEEE (2015)","DOI":"10.1109\/SPW.2015.22"},{"key":"4_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/978-3-642-15152-1_7","volume-title":"Trust, Privacy and Security in Digital Business","author":"S Pearson","year":"2010","unstructured":"Pearson, S., Shen, Y.: Context-aware privacy design pattern selection. In: Katsikas, S., Lopez, J., Soriano, M. (eds.) TrustBus 2010. LNCS, vol. 6264, pp. 69\u201380. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15152-1_7"},{"key":"4_CR27","unstructured":"Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management (2010)"},{"key":"4_CR28","unstructured":"Qin, T., Liu, T.: Introducing LETOR 4.0 datasets. CoRR abs\/1306.2597 (2013). http:\/\/arxiv.org\/1306.2597"},{"issue":"1","key":"4_CR29","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3471930","volume":"31","author":"I Rauf","year":"2021","unstructured":"Rauf, I., et al.: The case for adaptive security interventions. ACM Trans. Softw. Eng. Methodol. (TOSEM) 31(1), 1\u201352 (2021)","journal-title":"ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Reimers, N., Gurevych, I.: Sentence-BERT: sentence embeddings using Siamese BERT-networks. In: Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing. Association for Computational Linguistics (2019). arxiv.org\/abs\/1908.10084","DOI":"10.18653\/v1\/D19-1410"},{"key":"4_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40411-017-0036-y","volume":"5","author":"GA Sielis","year":"2017","unstructured":"Sielis, G.A., Tzanavari, A., Papadopoulos, G.A.: ArchReco: a software tool to assist software design based on context aware recommendations of design patterns. J. Softw. Eng. Res. Dev. 5, 1\u201336 (2017)","journal-title":"J. Softw. Eng. Res. Dev."},{"issue":"1","key":"4_CR32","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/TSE.2008.88","volume":"35","author":"S Spiekermann","year":"2008","unstructured":"Spiekermann, S., Cranor, L.F.: Engineering privacy. IEEE Trans. Softw. Eng. 35(1), 67\u201382 (2008)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Wei, J., Zou, K.: EDA: easy data augmentation techniques for boosting performance on text classification tasks. In: Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing (EMNLP-IJCNLP), pp. 6382\u20136388. Association for Computational Linguistics, Hong Kong (2019)","DOI":"10.18653\/v1\/D19-1670"},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Wohlin, C., Runeson, P., H\u00f6st, M., Ohlsson, M.C., Regnell, B., Wessl\u00e9n, A.: Experimentation in software engineering (2012)","DOI":"10.1007\/978-3-642-29044-2"}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-57327-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,29]],"date-time":"2024-03-29T03:03:29Z","timestamp":1711681409000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-57327-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031573262","9783031573279"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-57327-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"30 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"REFSQ","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Working Conference on Requirements Engineering: Foundation for Software Quality","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Winterthur","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Switzerland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 April 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 April 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"refsq2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2024.refsq.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"59","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}