{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T07:01:58Z","timestamp":1775199718561,"version":"3.50.1"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319161006","type":"print"},{"value":"9783319161013","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-16101-3_23","type":"book-chapter","created":{"date-parts":[[2015,3,13]],"date-time":"2015-03-13T06:52:36Z","timestamp":1426229556000},"page":"318-332","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Embedding Stakeholder Values in the Requirements Engineering Process"],"prefix":"10.1007","author":[{"given":"Maaike","family":"Harbers","sequence":"first","affiliation":[]},{"given":"Christian","family":"Detweiler","sequence":"additional","affiliation":[]},{"given":"Mark A.","family":"Neerincx","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,3,14]]},"reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Buglione, L., Abran, A.: Improving the user story agile technique using the invest criteria. In: Proceedings of IWSM, pp. 49\u201353. IEEE (2013)","DOI":"10.1109\/IWSM-Mensura.2013.18"},{"key":"23_CR2","unstructured":"Cockburn, A.: Writing effective use cases. Pearson Education (2001)"},{"key":"23_CR3","doi-asserted-by":"crossref","unstructured":"Cockton, G.: Designing worth is worth designing. In: Proceedings of the 4th Nordic Conference on Human-Computer Interaction: Changing Roles, NordiCHI 2006, pp. 165\u2013174. ACM, New York (2006)","DOI":"10.1145\/1182475.1182493"},{"key":"23_CR4","unstructured":"Cohn, M.: User stories applied: For agile software development. Addison-Wesley Professional (2004)"},{"key":"23_CR5","unstructured":"COMPEIT: (2014). http:\/\/www.compeit.eu\/"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Czeskis, A., Dermendjieva, I., Yapit, H., Borning, A., Friedman, B., Gill, B., Kohno, T.: Parenting from the pocket: value tensions and technical directions for secure and private parent-teen mobile safety. In: Usable Privacy and Security, pp. 15:1\u201315:15. ACM (2010)","DOI":"10.1145\/1837110.1837130"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"de Greef, T., Mohabir, A., van der Poel, I., Neerincx, M: sCEthics: embedding ethical values in cognitive engineering. In: Proceedings of the 31st European Conference on Cognitive Ergonomics, p. 4. ACM (2013)","DOI":"10.1145\/2501907.2501935"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Denning, T., Borning, A., Friedman, B., Gill, B.T., Kohno, T., Maisel, W.H.: Patients, pacemakers, and implantable defibrillators: human values and security for wireless implantable medical devices. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 917\u2013926. ACM (2010)","DOI":"10.1145\/1753326.1753462"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Detweiler, C., Hindriks, K.: Value-sensitive design patterns for pervasive health care. In: 2012 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops), pp. 908\u2013913. IEEE (2012)","DOI":"10.1109\/PerComW.2012.6197643"},{"key":"23_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-22636-6_1","volume-title":"Agent-Oriented Software Engineering XI","author":"C Detweiler","year":"2011","unstructured":"Detweiler, C., Hindriks, K., Jonker, C.: Principles for value-sensitive agent-oriented software engineering. In: Weyns, D., Gleizes, M.-P. (eds.) AOSE 2010. LNCS, vol. 6788, pp. 1\u201316. Springer, Heidelberg (2011)"},{"key":"23_CR11","unstructured":"Detweiler, C.A., Harbers, M., Hindriks, K.: Value stories: putting values into requirements engineering. In: Proceedings of CREARE (2014)"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Dobson, J., Strens, R.: Organisational requirements definition for information technology systems. In: Proceedings of the First International Conference on Requirements Engineering, pp. 158\u2013165, April 1994","DOI":"10.1109\/ICRE.1994.292390"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Flanagan, M., Howe, D.C., Nissenbaum, H.: Embodying Values in Technology: Theory and Practice, pp. 322\u2013353. Cambridge University Press (2008)","DOI":"10.1017\/CBO9780511498725.017"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Flanagan, M., Nissenbaum, H.: A game design methodology to incorporate social activist themes. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 181\u2013190. ACM (2007)","DOI":"10.1145\/1240624.1240654"},{"key":"23_CR15","doi-asserted-by":"crossref","unstructured":"Friedman, B., Hendry, D.: The envisioning cards: a toolkit for catalyzing humanistic and technical imaginations. In: Proceedings of the 2012 ACM Annual Conference on Human Factors in Computing Systems, pp. 1145\u20131148. ACM (2012)","DOI":"10.1145\/2207676.2208562"},{"key":"23_CR16","doi-asserted-by":"crossref","unstructured":"Friedman, B., Kahn Jr., P.H., Borning, A., Huldtgren, A.: Value sensitive design and information systems. In: Early Engagement and New Technologies: Opening up the Laboratory, pp. 55\u201395. Springer (2013)","DOI":"10.1007\/978-94-007-7844-3_4"},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Harbers, M., Neerincx, M.A.: Value sensitive design of automated workload distribution support for traffic control teams. In: Proceedings of HCII (2014)","DOI":"10.1007\/978-3-319-07515-0_2"},{"key":"23_CR18","unstructured":"IQmulus: (2014). https:\/\/www.iqmulus.eu\/"},{"issue":"1","key":"23_CR19","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1007\/s10676-012-9309-7","volume":"15","author":"SH Koch","year":"2013","unstructured":"Koch, S.H., Proynova, R., Paech, B., Wetter, T.: How to approximate users\u2019 values while preserving privacy: experiences with using attitudes towards work tasks as proxies for personal value elicitation. Ethics and Information Technology 15(1), 45\u201361 (2013)","journal-title":"Ethics and Information Technology"},{"issue":"2","key":"23_CR20","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/MS.2008.54","volume":"25","author":"N Maiden","year":"2008","unstructured":"Maiden, N.: User requirements and system requirements. IEEE Software 25(2), 90\u201391 (2008)","journal-title":"IEEE Software"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Maiden, N., Robertson, S.: Developing use cases and scenarios in the requirements process. In: Proceedings of the 27th International Conference on Software Engineering, ICSE 2005, pp. 561\u2013570. ACM, New York (2005)","DOI":"10.1145\/1062455.1062555"},{"issue":"2","key":"23_CR22","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/s11948-010-9198-2","volume":"17","author":"N Manders-Huits","year":"2011","unstructured":"Manders-Huits, N.: What values in design? the challenge of incorporating moral values into design. Science and Engineering Ethics 17(2), 271\u2013287 (2011)","journal-title":"Science and Engineering Ethics"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Miller, J.K., Friedman, B., Jancke, G.: Value tensions in design: the value sensitive design, development, and appropriation of a corporation\u2019s groupware system. In: Proceedings of the 2007 International ACM Conference on Supporting Group Work, pp. 281\u2013290. ACM (2007)","DOI":"10.1145\/1316624.1316668"},{"key":"23_CR24","doi-asserted-by":"crossref","unstructured":"Nathan, L.P., Klasnja, P.V., Friedman, B.: Value scenarios: a technique for envisioning systemic effects of new technologies. In: CHI 2007 Extended Abstracts on Human Factors in Computing Systems, pp. 2585\u20132590. ACM (2007)","DOI":"10.1145\/1240866.1241046"},{"key":"23_CR25","unstructured":"Neerincx, M.A., Lindenberg, J.: Situated cognitive engineering for complex task environments. In: Naturalistic Decision Making and Macrocognition, pp. 373\u2013390 (2008)"},{"issue":"1","key":"23_CR26","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1145\/277351.277359","volume":"28","author":"H Nissenbaum","year":"1998","unstructured":"Nissenbaum, H.: Values in the design of computer systems. Computers and Society 28(1), 38\u201339 (1998)","journal-title":"Computers and Society"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Paetsch, F., Eberlein, A., Maurer, F.: Requirements engineering and agile software development. In: 2012 IEEE 21st International Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises, p. 308 (2003)","DOI":"10.1109\/ENABL.2003.1231428"},{"key":"23_CR28","series-title":"Philosophy of Engineering and Technology","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-94-007-7762-0_20","volume-title":"Philosophy and Engineering: Reflections on Practice, Principles and Process","author":"I Poel","year":"2013","unstructured":"Poel, I.: Translating values into design requirements. In: Michelfelder, D.P., McCarthy, N., Goldberg, D.E. (eds.) Philosophy and Engineering: Reflections on Practice, Principles and Process. Philosophy of Engineering and Technology, vol. 15, pp. 253\u2013266. Springer, Netherlands (2013)"},{"key":"23_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1007\/978-3-642-14192-8_3","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"R Proynova","year":"2010","unstructured":"Proynova, R., Paech, B., Wicht, A., Wetter, T.: Use of personal values in requirements engineering \u2013 a research preview. In: Wieringa, R., Persson, A. (eds.) REFSQ 2010. LNCS, vol. 6182, pp. 17\u201322. Springer, Heidelberg (2010)"},{"issue":"7","key":"23_CR30","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1016\/j.infsof.2004.09.014","volume":"47","author":"I Ramos","year":"2005","unstructured":"Ramos, I., Berry, D., Carvalho, J.: Requirements engineering for organizational transformation. Information and Software Technology 47(7), 479\u2013495 (2005)","journal-title":"Information and Software Technology"},{"key":"23_CR31","doi-asserted-by":"crossref","unstructured":"Savolainen, J., Kuusela, J., Vilavaara, A.: Transition to agile development - rediscovery of important requirements engineering practices. In: Requirements Engineering Conference (RE), pp. 289\u2013294. IEEE (2010)","DOI":"10.1109\/RE.2010.41"},{"key":"23_CR32","doi-asserted-by":"crossref","unstructured":"Sutcliffe, A.: Scenario-based requirements engineering. In: Requirements Engineering Conference, pp. 320\u2013329 (2003)","DOI":"10.1109\/ICRE.2003.1232776"},{"key":"23_CR33","doi-asserted-by":"crossref","unstructured":"Thew, S., Sutcliffe, A.: Investigating the role of \u2019soft issues\u2019 in the re process. In: International Conference on Requirements Engineering, pp. 63\u201366. IEEE (2008)","DOI":"10.1109\/RE.2008.35"},{"key":"23_CR34","doi-asserted-by":"crossref","unstructured":"Waldmann, B.: There\u2019s never enough time: doing requirements under resource constraints, and what requirements engineering can learn from agile development. In: Requirements Engineering Conference (RE), pp. 301\u2013305. IEEE (2011)","DOI":"10.1109\/RE.2011.6051626"}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-16101-3_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T23:19:29Z","timestamp":1747783169000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-16101-3_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319161006","9783319161013"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-16101-3_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"14 March 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}