{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T01:46:18Z","timestamp":1761961578744,"version":"build-2065373602"},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642141911"},{"type":"electronic","value":"9783642141928"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14192-8_23","type":"book-chapter","created":{"date-parts":[[2010,6,15]],"date-time":"2010-06-15T13:34:08Z","timestamp":1276608848000},"page":"255-261","source":"Crossref","is-referenced-by-count":26,"title":["Towards a Framework to Elicit and Manage Security and Privacy Requirements from Laws and Regulations"],"prefix":"10.1007","author":[{"given":"Shareeful","family":"Islam","sequence":"first","affiliation":[]},{"given":"Haralambos","family":"Mouratidis","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Wagner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Ant\u00f3n, A., Earp, J., Reese, A.: Analyzing website privacy requirements using privacy goal taxonomy. In: Proc. of the IEEE Joint International Conference on RE, pp. 23\u201331 (2002)","DOI":"10.1109\/ICRE.2002.1048502"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Siena, J., Mylopoulos, A., Susi, A.: Towards a framework for law-compliant software requirements. In: Proc. of the 31st International Conference on Software Engineering (ICSE 2009), Vancouver, Canada (2009)","DOI":"10.1109\/ICSE-COMPANION.2009.5070994"},{"key":"23_CR3","unstructured":"Bundesdatenschutzgesetz - Federal Data Protection Act (as of November 15, 2006)"},{"key":"23_CR4","unstructured":"Mouratidis, H., Giorgini, P.: Secure Tropos: A Security-Oriented Extension of the Tropos Methodology. International Journal of Software Engineering and Knowledge Engineering. \u00a9 World Scientific Publishing Company"},{"issue":"8","key":"23_CR5","doi-asserted-by":"publisher","first-page":"1166","DOI":"10.1016\/j.is.2007.03.002","volume":"32","author":"H. Mouratidis","year":"2007","unstructured":"Mouratidis, H., Giorgini, P.: Security Attack Testing (SAT) - testing the security of information systems at design time. Inf. Syst.\u00a032(8), 1166\u20131183 (2007)","journal-title":"Inf. Syst."},{"key":"23_CR6","unstructured":"Information society, Summary of legislation, European Commission"},{"key":"23_CR7","unstructured":"Ghanavati, S., Amyot, D., Peyton, L.: A Requirements Management Framework for Privacy Compliance. In: Workshop on Requirements Engineering (WER 2007), Toronto, Canada (2007)"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Islam, S.: Software development risk management model: a goal driven approach. In: Proceedings of the Doctoral Symposium for ESEC\/FSE on Doctoral Symposium, Amsterdam, The Netherlands (2009)","DOI":"10.1145\/1595782.1595785"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Islam, S., Mouratidis, H., J\u00fcrjens, J.: A Framework to Support Alignment of Secure Software Engineering with Legal Regulations. Journal of Software and Systems Modeling (SoSyM) Theme Section NFPinDSML (to appear 2010), doi:10.1007\/s10270-010-0154-z","DOI":"10.1007\/s10270-010-0154-z"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Breaux, T.D., Ant\u00f3n, A.I.: Analyzing Regulator Rules for privacy and Security Requirements. IEEE Transactions on Software Engineering\u00a034(1) (January-February 2008)","DOI":"10.1109\/TSE.2007.70746"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Hohfeld, W.N.: Fundamental Legal Conceptions as Applied in Judicial Reasoning. Yale Law of Journal\u00a023(1) (1913)","DOI":"10.2307\/785533"}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14192-8_23.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T23:59:26Z","timestamp":1740182366000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14192-8_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642141911","9783642141928"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14192-8_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}