{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T18:43:40Z","timestamp":1742928220989,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642287138"},{"type":"electronic","value":"9783642287145"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28714-5_23","type":"book-chapter","created":{"date-parts":[[2012,3,5]],"date-time":"2012-03-05T21:08:08Z","timestamp":1330981688000},"page":"256-262","source":"Crossref","is-referenced-by-count":16,"title":["A Pattern-Based Method for Identifying and Analyzing Laws"],"prefix":"10.1007","author":[{"given":"Kristian","family":"Beckers","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Stephan","family":"Fa\u00dfbender","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jan-Christoph","family":"K\u00fcster","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Holger","family":"Schmidt","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"23_CR1","doi-asserted-by":"crossref","unstructured":"Biagioli, C., Mariani, P., Tiscornia, D.: Esplex: A rule and conceptual model for representing statutes. In: Proceedings of the 1st International Conference on Artificial Intelligence and Law, ICAIL 1987, pp. 240\u2013251. ACM (1987)","DOI":"10.1145\/41735.41762"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Otto, P.N., Ant\u00f3n, A.I.: Addressing legal requirements in requirements engineering. In: Proceedings of the International Conference on Requirements Engineering (RE), pp. 5\u201314. IEEE Computer Society (2007)","DOI":"10.1109\/RE.2007.65"},{"key":"23_CR3","volume-title":"Juristische Methodik mit Technik der Fallbearbeitung","author":"P. Schwacke","year":"2003","unstructured":"Schwacke, P.: Juristische Methodik mit Technik der Fallbearbeitung, 4th edn. Kohlhammer Deutscher, Gemeindeverlag (2003)","edition":"4"},{"key":"23_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-08713-8","volume-title":"Methodenlehre der Rechtswissenschaft","author":"K. Larenz","year":"1983","unstructured":"Larenz, K.: Methodenlehre der Rechtswissenschaft, 5th edn. Springer, Heidelberg (1983)","edition":"5"},{"key":"23_CR5","unstructured":"Beaucamp, G., Treder, L.: Methoden und Techniken der Rechtsanwendung, 2nd edn. C.F.M\u00fcller (2011)"},{"issue":"1","key":"23_CR6","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1109\/TSE.2007.70746","volume":"34","author":"T.D. Breaux","year":"2008","unstructured":"Breaux, T.D., Ant\u00f3n, A.I.: Analyzing regulatory rules for privacy and security requirements. IEEE Transactions on Software Engineering\u00a034(1), 5\u201320 (2008)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Siena, A., Perini, A., Susi, A.: From laws to requirements. In: Proceedings of the International Workshop on Requirements Engineering and Law (RELAW), pp. 6\u201310. IEEE Computer Society (2008)","DOI":"10.1109\/RELAW.2008.6"},{"key":"23_CR8","unstructured":"\u00c1lvarez, J.A.T., Olmos, A., Piattini, M.: Legal requirements reuse: A critical success factor for requirements quality and personal data protection. In: Proceedings of the International Conference on Requirements Engineering (RE), pp. 95\u2013103. IEEE Computer Society (2002)"}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28714-5_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T16:05:32Z","timestamp":1676131532000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-642-28714-5_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642287138","9783642287145"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28714-5_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}