{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T04:03:12Z","timestamp":1749873792573,"version":"3.41.0"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031953965","type":"print"},{"value":"9783031953972","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-95397-2_16","type":"book-chapter","created":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T04:23:45Z","timestamp":1749788625000},"page":"257-273","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Forensic Readiness and\u00a0Privacy: Towards Resolving Software Goal Conflict"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0853-2776","authenticated-orcid":false,"given":"Lukas","family":"Daubner","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5722-0325","authenticated-orcid":false,"given":"Jakub","family":"Hara\u0161ta","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1829-4794","authenticated-orcid":false,"given":"Raimundas","family":"Matulevi\u010dius","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,14]]},"reference":[{"issue":"4","key":"16_CR1","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1007\/s00766-018-0294-1","volume":"24","author":"O Akhigbe","year":"2019","unstructured":"Akhigbe, O., Amyot, D., Richards, G.: A systematic literature mapping of goal and non-goal modelling methods for legal and regulatory compliance. Requirements Eng. 24(4), 459\u2013481 (2019)","journal-title":"Requirements Eng."},{"key":"16_CR2","doi-asserted-by":"publisher","first-page":"S127","DOI":"10.1016\/j.diin.2015.05.003","volume":"14","author":"F Armknecht","year":"2015","unstructured":"Armknecht, F., Dewald, A.: Privacy-preserving email forensics. Digit. Inv. 14, S127\u2013S136 (2015)","journal-title":"Digit. Inv."},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Ayala-Rivera, V., Pasquale, L.: The grace period has ended: an approach to operationalize GDPR requirements. In: IEEE 26th International Requirements Engineering Conference, pp. 136\u2013146 (2018)","DOI":"10.1109\/RE.2018.00023"},{"key":"16_CR4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2022.103010","volume":"125","author":"M Azzam","year":"2023","unstructured":"Azzam, M., Pasquale, L., Provan, G., Nuseibeh, B.: Forensic readiness of industrial control systems under stealthy attacks. Comput. Secur. 125, 103010 (2023)","journal-title":"Comput. Secur."},{"key":"16_CR5","volume":"76","author":"M Bakhtina","year":"2023","unstructured":"Bakhtina, M., Matulevi\u010dius, R., Seeba, M.: Tool-supported method for privacy analysis of a business process model. J. Inf. Secur. Appl. 76, 103525 (2023)","journal-title":"J. Inf. Secur. Appl."},{"key":"16_CR6","unstructured":"CESG: Good Practice Guide No. 18: Forensic Readiness. Guideline, National Technical Authority for Information Assurance, United Kingdom (2015)"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Daubner, L., Buhnova, B., Pitner, T.: Forensic experts\u2019 view of forensic-ready software systems: a qualitative study. J. Softw. Evol. Process e2598 (2023)","DOI":"10.1002\/smr.2598"},{"key":"16_CR8","volume":"73","author":"L Daubner","year":"2023","unstructured":"Daubner, L., Macak, M., Matulevi\u010dius, R., Buhnova, B., Maksovi\u0107, S., Pitner, T.: Addressing insider attacks via forensic-ready risk management. J. Inf. Secur. Appl. 73, 103433 (2023)","journal-title":"J. Inf. Secur. Appl."},{"key":"16_CR9","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/978-3-031-59468-7_6","volume-title":"Research Challenges in Information Science: 18th International Conference, RCIS 2024, Guimar\u00e3es, Portugal, May 14\u201317, 2024, Proceedings, Part II","author":"L Daubner","year":"2024","unstructured":"Daubner, L., Maksovi\u0107, S., Matulevi\u010dius, R., Buhnova, B., Sedl\u00e1c\u0306ek, T.: Forensic-ready analysis suite: a tool support for\u00a0forensic-ready software systems design. In: Ara\u00fajo, J., de la Vara, J.L., Santos, M.Y., Assar, S. (eds.) Research Challenges in Information Science: 18th International Conference, RCIS 2024, Guimar\u00e3es, Portugal, May 14\u201317, 2024, Proceedings, Part II, pp. 47\u201355. Springer Nature Switzerland, Cham (2024). https:\/\/doi.org\/10.1007\/978-3-031-59468-7_6"},{"key":"16_CR10","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/978-3-031-33080-3_19","volume-title":"Research Challenges in Information Science: Information Science and the Connected World: 17th International Conference, RCIS 2023, Corfu, Greece, May 23\u201326, 2023, Proceedings","author":"L Daubner","year":"2023","unstructured":"Daubner, L., Matulevi\u010dius, R., Buhnova, B.: A model of\u00a0qualitative factors in\u00a0forensic-ready software systems. In: Nurcan, S., Opdahl, A.L., Mouratidis, H., Tsohou, A. (eds.) Research Challenges in Information Science: Information Science and the Connected World: 17th International Conference, RCIS 2023, Corfu, Greece, May 23\u201326, 2023, Proceedings, pp. 308\u2013324. Springer Nature Switzerland, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-33080-3_19"},{"key":"16_CR11","doi-asserted-by":"publisher","unstructured":"Daubner, L., Matulevi\u010dius, R., Buhnova, B., Antol, M., R\u016f\u017ei\u010dka, M., Pitner, T.: A case study on the impact of forensic-ready information systems on the security posture. In: Indulska, M., Reinhartz-Berger, I., Cetina, C., Pastor, O. (eds) Advanced Information Systems Engineering, pp. 522\u2013538. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-34560-9_31","DOI":"10.1007\/978-3-031-34560-9_31"},{"key":"16_CR12","doi-asserted-by":"publisher","unstructured":"Daubner, L., Matulevi\u010dius, R., Buhnova, B., Pitner, T.: BPMN4FRSS: an BPMN extension to support risk-based development of forensic-ready software systems. In: Kaindl, H., Mannion, M., Maciaszek, L.A. (eds) Evaluation of Novel Approaches to Software Engineering, pp. 20\u201343. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-36597-3_2","DOI":"10.1007\/978-3-031-36597-3_2"},{"key":"16_CR13","unstructured":"Ekeh, I.F.: A Recommendation Model for Security Risk Management in Car-Sharing Scenarios. Master\u2019s thesis, University of Tartu (2024)"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Englbrecht, L., Pernul, G.: A privacy-aware digital forensics investigation in enterprises. In: Proceedings of the 15th International Conference on Availability, Reliability and Security. ACM (2020)","DOI":"10.1145\/3407023.3407064"},{"key":"16_CR15","unstructured":"European Parliament, Council of the European Union: Regulation (EU) 2016\/679 of the European Parliament and of the Council"},{"issue":"2","key":"16_CR16","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1108\/JIC-05-2019-0097","volume":"21","author":"RI Ferguson","year":"2020","unstructured":"Ferguson, R.I., Renaud, K., Wilford, S., Irons, A.: Precept: a framework for ethical digital forensics investigations. J. Intellect. Cap. 21(2), 257\u2013290 (2020)","journal-title":"J. Intellect. Cap."},{"key":"16_CR17","doi-asserted-by":"crossref","unstructured":"Ghanavati, S., Rifaut, A., Dubois, E., Amyot, D.: Goal-oriented compliance with multiple regulations. In: IEEE 22nd International Requirements Engineering Conference (RE), pp. 73\u201382 (2014)","DOI":"10.1109\/RE.2014.6912249"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Hjerppe, K., Ruohonen, J., Lepp\u00e4nen, V.: The general data protection regulation: requirements, architectures, and constraints. In: IEEE 27th International Requirements Engineering Conference, pp. 265\u2013275 (2019)","DOI":"10.1109\/RE.2019.00036"},{"key":"16_CR19","unstructured":"Howard, M.: The Security Development Lifecycle. Microsoft Press (2006)"},{"key":"16_CR20","unstructured":"ISO\/IEC: Information technology - Security techniques - Incident investigation principles and processes. Standard, International Organization for Standardization, Switzerland (2015)"},{"key":"16_CR21","unstructured":"Lamsweerde, A.V.: Requirements engineering: from system goals to UML models to software specifications. Wiley (2009)"},{"key":"16_CR22","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1007\/978-3-540-73031-6_2","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"R Matulevi\u010dius","year":"2007","unstructured":"Matulevi\u010dius, R., Heymans, P.: Comparing goal modelling languages: an experiment. In: Sawyer, P., Paech, B., Heymans, P. (eds.) Requirements Engineering: Foundation for Software Quality, pp. 18\u201332. Springer Berlin Heidelberg, Berlin, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73031-6_2"},{"key":"16_CR23","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1007\/978-3-030-58135-0_9","volume-title":"Advanced Information Systems Engineering: CAiSE Forum 2020, Grenoble, France, June 8\u201312, 2020, Proceedings","author":"R Matulevi\u010dius","year":"2020","unstructured":"Matulevi\u010dius, R., Tom, J., Kala, K., Sing, E.: A method for managing GDPR compliance in business processes. In: Herbaut, N., La Rosa, M. (eds.) Advanced Information Systems Engineering: CAiSE Forum 2020, Grenoble, France, June 8\u201312, 2020, Proceedings, pp. 100\u2013112. Springer International Publishing, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58135-0_9"},{"key":"16_CR24","doi-asserted-by":"crossref","unstructured":"Negishi, Y., Hayashi, S., Saeki, M.: Establishing regulatory compliance in goal-oriented requirements analysis. In: IEEE 19th Conference on Business Informatics (CBI), vol.\u00a001, pp. 434\u2013443 (2017)","DOI":"10.1109\/CBI.2017.49"},{"key":"16_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109230","volume":"216","author":"G Oligeri","year":"2022","unstructured":"Oligeri, G., Sciancalepore, S., Ibrahim, O.A., Di Pietro, R.: GPS spoofing detection via crowd-sourced information for connected vehicles. Comput. Netw. 216, 109230 (2022)","journal-title":"Comput. Netw."},{"key":"16_CR26","doi-asserted-by":"publisher","first-page":"S93","DOI":"10.1016\/j.diin.2018.01.012","volume":"24","author":"S Park","year":"2018","unstructured":"Park, S., et al.: A comparative study on data protection legislations and government standards to implement digital forensic readiness as mandatory requirement. Digit. Inv. 24, S93\u2013S100 (2018)","journal-title":"Digit. Inv."},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Pasquale, L., Alrajeh, D., Peersman, C., Tun, T., Nuseibeh, B., Rashid, A.: Towards forensic-ready software systems. In: Proceedings of the 40th International Conference on Software Engineering: NIER, pp. 9\u201312. ACM (2018)","DOI":"10.1145\/3183399.3183426"},{"key":"16_CR28","doi-asserted-by":"crossref","unstructured":"Rabinia, A., Ghanavati, S.: The FOL-based legal-GRL (FLG) framework: towards an automated goal modeling approach for regulations. In: IEEE 8th International Model-Driven Requirements Engineering Workshop (MoDRE), pp. 58\u201367 (2018)","DOI":"10.1109\/MoDRE.2018.00014"},{"key":"16_CR29","doi-asserted-by":"crossref","unstructured":"Rao, A., Pfeffer, J.: Types of privacy expectations. Front. Big Data (2020)","DOI":"10.3389\/fdata.2020.00007"},{"key":"16_CR30","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1007\/978-3-319-70241-4_16","volume-title":"The Practice of Enterprise Modeling: 10th IFIP WG 8.1. Working Conference, PoEM 2017, Leuven, Belgium, November 22-24, 2017, Proceedings","author":"M Robol","year":"2017","unstructured":"Robol, M., Salnitri, M., Giorgini, P.: Toward GDPR-compliant socio-technical systems: modeling language and reasoning framework. In: Poels, G., Gailly, F., Serral Asensio, E., Snoeck, M. (eds.) The Practice of Enterprise Modeling: 10th IFIP WG 8.1. Working Conference, PoEM 2017, Leuven, Belgium, November 22-24, 2017, Proceedings, pp. 236\u2013250. Springer International Publishing, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70241-4_16"},{"key":"16_CR31","unstructured":"Rowlingson, R.: A ten step process for forensic readiness. Int. J. Digit. Evid. 2 (2004)"},{"key":"16_CR32","doi-asserted-by":"crossref","unstructured":"Sachowski, J.: Implementing digital forensic readiness: from reactive to proactive process. CRC Press (2019)","DOI":"10.4324\/9780429441363"},{"issue":"3","key":"16_CR33","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1007\/s00766-018-0289-y","volume":"24","author":"S Simou","year":"2019","unstructured":"Simou, S., Kalloniatis, C., Gritzalis, S., Katos, V.: A framework for designing cloud forensic-enabled services (CFeS). Requirements Eng. 24(3), 403\u2013430 (2019)","journal-title":"Requirements Eng."},{"key":"16_CR34","doi-asserted-by":"crossref","unstructured":"Stahlberg, P., Miklau, G., Levine, B.N.: Threats to privacy in the forensic analysis of database systems. In: Proceedings of the 2007 ACM SIGMOD International Conference on Management of Data, pp. 91\u2013102. ACM (2007)","DOI":"10.1145\/1247480.1247492"},{"key":"16_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/978-3-319-66399-9_26","volume-title":"Computer Security \u2013 ESORICS 2017","author":"I Symeonidis","year":"2017","unstructured":"Symeonidis, I., Aly, A., Mustafa, M.A., Mennink, B., Dhooghe, S., Preneel, B.: SePCAR: a secure and privacy-enhancing protocol for car access provision. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 475\u2013493. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66399-9_26"},{"key":"16_CR36","doi-asserted-by":"crossref","unstructured":"Torre, D., Soltana, G., Sabetzadeh, M., Briand, L.C., Auffinger, Y., Goes, P.: Using models to enable compliance checking against the GDPR: an experience report. In: ACM\/IEEE 22nd International Conference on Model Driven Engineering Languages and Systems, pp. 1\u201311 (2019)","DOI":"10.1109\/MODELS.2019.00-20"}],"container-title":["Lecture Notes in Business Information Processing","Enterprise, Business-Process and Information Systems Modeling"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-95397-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,13]],"date-time":"2025-06-13T04:23:59Z","timestamp":1749788639000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-95397-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031953965","9783031953972"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-95397-2_16","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"value":"1865-1348","type":"print"},{"value":"1865-1356","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"14 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"EMMSAD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Evaluation and Modeling Methods for Systems Analysis and Development","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vienna","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"emmsad2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.emmsad.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}