{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T06:49:00Z","timestamp":1725518940394},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540879909"},{"type":"electronic","value":"9783540879916"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-87991-6_3","type":"book-chapter","created":{"date-parts":[[2008,10,9]],"date-time":"2008-10-09T01:41:06Z","timestamp":1223516466000},"page":"12-21","source":"Crossref","is-referenced-by-count":8,"title":["Designing Privacy-Aware Personal Health Record Systems"],"prefix":"10.1007","author":[{"given":"Reza","family":"Samavi","sequence":"first","affiliation":[]},{"given":"Thodoros","family":"Topaloglou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"1290","DOI":"10.1377\/hlthaff.24.5.1290","volume":"24","author":"P.C. Tang","year":"2005","unstructured":"Tang, P.C., Lansky, D.: The missing link: bridging the patient-provider health information gap. Health Aff.\u00a024, 1290\u20131295 (2005)","journal-title":"Health Aff."},{"issue":"1","key":"3_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1197\/jamia.M2562","volume":"15","author":"J.D. Halamka","year":"2008","unstructured":"Halamka, J.D., Mandl, K.D., Tang, P.C.: Early Experiences with Personal Health Records. J. Am. Med. Inform. Assoc.\u00a015(1), 1\u20137 (2008)","journal-title":"J. Am. Med. Inform. Assoc."},{"key":"3_CR3","unstructured":"HIPAA., Act of 1996 (accessed, May 2008), http:\/\/aspe.hhs.gov\/admnsimp\/pl104191.htm"},{"key":"3_CR4","unstructured":"PIPEDA., (accessed, May 2008), http:\/\/www.privcom.gc.ca\/legislation\/02_06_01_e.asp"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Bresciani, P., Giorgini, P., Giunchiglia, F., Mylopoulos, J., Perini, A.: Tropos: An Agent-Oriented Software Development Methodology, vol.\u00a08(3), pp. 203\u2013236 (2004)","DOI":"10.1023\/B:AGNT.0000018806.20944.ef"},{"key":"3_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1007\/978-3-540-24747-0_14","volume-title":"Proc. of iTrust 2004","author":"P. Giorgini","year":"2004","unstructured":"Giorgini, P., Massacci, F., Mylopoulous, J., Zannone, N.: Requirements Engineering meets Trust Management. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol.\u00a02995, pp. 176\u2013190. Springer, Heidelberg (2004)"},{"key":"3_CR7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5269-7","volume-title":"Non-Functional Requirements in Software Engineering","author":"L. Chung","year":"2000","unstructured":"Chung, L., Nixon, B., Yu, E., Mylopoulos, J.: Non-Functional Requirements in Software Engineering. Kluwer Academic Publishers, Dordrecht (2000)"},{"key":"3_CR8","unstructured":"Markle Foundation: Connecting for Health. Connecting Americans to their healthcare. Final rep. of the wg on policies for electronic information sharing. NY Markle Found (2004)"},{"key":"3_CR9","unstructured":"Jones, C.: Patterns of software failure and Success. Thomson (1996)"},{"key":"3_CR10","unstructured":"Hickey, A., Davis, A.: The role of Requirement Elicitation technique in Achieving Software Quality. In: Req. Eng. WS: Foundation for Software Quality (REFSQ) (2002)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Yu, E.: Towards Modelling and reasoning Support for Early-Phase Requirements Engineering. In: Proc. RE 1997-3rd Int. Symp. on RE, Annapolis, pp. 226\u2013235 (1997)","DOI":"10.1109\/ISRE.1997.566873"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Samavi, R., Yu, E., Topaloglou, T.: Strategic Reasoning about Business Models: a Conceptual Modelling approach. J. Info. Sys. & E-Business Manag. (2008)","DOI":"10.1007\/s10257-008-0079-z"},{"issue":"2","key":"3_CR13","doi-asserted-by":"publisher","first-page":"187","DOI":"10.1016\/S0306-4379(03)00052-8","volume":"29","author":"L. Liu","year":"2002","unstructured":"Liu, L., Yu, E.: Designing Information Systems in Social Context: A Goal and Scenario Modelling Approach. J. Information Systems\u00a029(2), 187\u2013203 (2002)","journal-title":"J. Information Systems"},{"key":"3_CR14","first-page":"249","volume-title":"Proc. RE 2001, Int. Joint Conf. on RE","author":"A. Lamsweerde van","year":"2001","unstructured":"van Lamsweerde, A.: Goal-Oriented Requirements Engineering: A Guided Tour. Invited minitutorial. In: Proc. RE 2001, Int. Joint Conf. on RE, Toronto, pp. 249\u2013263. IEEE, Los Alamitos (2001)"},{"key":"3_CR15","unstructured":"PRIME: Privacy and Identity Management for Europe (accessed, May 2008), https:\/\/www.prime-project.eu\/"},{"key":"3_CR16","first-page":"271","volume-title":"Proc. Of CSFW 2002","author":"G. Karjoth","year":"2002","unstructured":"Karjoth, G., Schunter, M.: A Privacy Policy Model for Enterprises. In: Proc. Of CSFW 2002, pp. 271\u2013281. IEEE Press, Los Alamitos (2002)"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/11554578_8","volume-title":"Foundations of Security Analysis and Design III","author":"P. Giorgini","year":"2005","unstructured":"Giorgini, P., Massacci, F., Zannone, N.: Security and Trust Requirements Engineering. In: Aldini, A., Gorrieri, R., Martinelli, F. (eds.) FOSAD 2005. LNCS, vol.\u00a03655, pp. 237\u2013272. Springer, Heidelberg (2005)"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Giorgini, P., Massacci, F., Mylopoulous, J., Zannone, N.: Modelling Security Requirements Through Ownership, Permission and Delegation. In: Proc. of the 13th IEEE Requirements Engineering Conference (RE 2005) (2005)","DOI":"10.1109\/RE.2005.43"}],"container-title":["Lecture Notes in Computer Science","Advances in Conceptual Modeling \u2013 Challenges and Opportunities"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87991-6_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T10:09:26Z","timestamp":1557828566000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87991-6_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540879909","9783540879916"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87991-6_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}