{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:23:05Z","timestamp":1725740585863},"publisher-location":"Berlin, Heidelberg","reference-count":47,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642399947"},{"type":"electronic","value":"9783642399954"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39995-4_5","type":"book-chapter","created":{"date-parts":[[2013,7,15]],"date-time":"2013-07-15T01:44:49Z","timestamp":1373852689000},"page":"87-112","source":"Crossref","is-referenced-by-count":1,"title":["A Privacy Framework for the Personal Web"],"prefix":"10.1007","author":[{"given":"Reza","family":"Samavi","sequence":"first","affiliation":[]},{"given":"Mariano P.","family":"Consens","sequence":"additional","affiliation":[]},{"given":"Thodoros","family":"Topaloglou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","series-title":"Lecture Notes in Computer Science","volume-title":"The smart internet: current research and future applications","year":"2010","unstructured":"Chignell, M., Cordy, J., Ng, J., Yesha, Y. (eds.): The Smart Internet. LNCS, vol.\u00a06400. Springer, Heidelberg (2010)"},{"issue":"13","key":"5_CR2","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1056\/NEJMp0900411","volume":"360","author":"K.D. Mandl","year":"2009","unstructured":"Mandl, K.D., Kohane, I.S.: No Small Change for the Health Information Economy. N. Engl. J. Med.\u00a0360(13), 1278\u20131281 (2009)","journal-title":"N. Engl. J. Med."},{"key":"5_CR3","unstructured":"Chechik, M., Simmonds, J., Ben-David, S., Nejati, S., Sabetzadeh, M., Salay, R.: Modeling and analysis of personal web applications: A vision. In: Proc. of CASCON, vol.\u00a010 (2010)"},{"key":"5_CR4","unstructured":"Eytan, T.: Coming to Social Media in Care Deliver Tech Demo Day: Lininkg Social Networks and PHRs (2011), http:\/\/www.tedeytan.com\/2011\/07\/28\/8708"},{"issue":"1","key":"5_CR5","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1186\/1472-6947-7-25","volume":"7","author":"K. Mandl","year":"2007","unstructured":"Mandl, K., Simons, W., Crawford, W., Abbett, J.: Indivo: a personally controlled health record for health information exchange and communication. BMC Medical Informatics and Decision Making\u00a07(1), 25 (2007)","journal-title":"BMC Medical Informatics and Decision Making"},{"key":"5_CR6","unstructured":"Markle Foundation: Knowledge network: Survey on public opinions on the potential and privacy considerations of individually controlled electronic personal health records. Knowledge Network, Connection for Health (2008)"},{"issue":"9","key":"5_CR7","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1145\/1284621.1284627","volume":"50","author":"I. Pollach","year":"2007","unstructured":"Pollach, I.: What\u2019s wrong with online privacy policies? Commun. ACM\u00a050(9), 103\u2013108 (2007)","journal-title":"Commun. ACM"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Yu, E., Giorgini, P., Maiden, N., Mylopoulos, J.: Social Modeling for Requirements Engineering. MIT Press (2011)","DOI":"10.7551\/mitpress\/7549.001.0001"},{"issue":"1","key":"5_CR9","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/0306-4379(86)90020-7","volume":"11","author":"S. Greenspan","year":"1986","unstructured":"Greenspan, S., Borgida, A., Mylopoulos, J.: A requirements modeling language and its logic. Information Systems\u00a011(1), 9\u201323 (1986)","journal-title":"Information Systems"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Nuseibeh, B., Easterbrook, S.: Requirements engineering: a roadmap. In: The Future of Software Engineering, pp. 35\u201346. ACM (2000)","DOI":"10.1145\/336512.336523"},{"key":"5_CR11","unstructured":"OpenOME: An open-source Organization Modeling Environement (OME) (2010), https:\/\/se.cs.toronto.edu\/trac\/ome\/wiki"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Samavi, R., Consens, M.P., Topaloglou, T.: Privacy goals and settings mediator model for PHRs. In: SocialCom\/PASSAT, pp. 1141\u20131146 (2011)","DOI":"10.1109\/PASSAT\/SocialCom.2011.81"},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Cranor, L., Langheinrich, M., Marchiori, M., Reagle, J.: The platform for privacy preferences (P3P)1.0 specification. W3C Recommendation (2002), http:\/\/www.w3c.org\/TR\/P3P\/","DOI":"10.1007\/978-3-642-27739-9_759-2"},{"key":"5_CR14","unstructured":"OASIS: OASIS eXtensible Access Control Markup Language v2.0 (XACML) (February 2005)"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Backes, M., Pfitzmann, B., Schunter, M.: A toolkit for managing enterprise privacy policies. In: Proc. ESORICS, pp. 162\u2013180 (2003)","DOI":"10.1007\/978-3-540-39650-5_10"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Gruninger, M.: Ontology of the process specification language. In: Handbook on Ontologies, pp. 575\u2013592 (2004)","DOI":"10.1007\/978-3-540-24750-0_29"},{"key":"5_CR17","unstructured":"Cavoukian, A.: Privacy By Design, Take The Challeneg. Office of Information and Privacy Commissioner of Ontario (2009)"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Barth, A., Datta, A., Mitchell, J.C., Nissenbaum, H.: Privacy and contextual integrity: Framework and applications. In: Proc. SP, pp. 184\u2013198 (2006)","DOI":"10.1109\/SP.2006.32"},{"key":"5_CR19","unstructured":"May, M.J., Gunter, C.A., Lee, I.: Privacy APIs: Access Control Techniques to Analyze and Verify Legal Privacy Policies. In: CSFW, pp. 85\u201397. IEEE Computer Society (2006)"},{"issue":"1","key":"5_CR20","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1111\/j.1467-8608.2010.01611.x","volume":"20","author":"I. Pollach","year":"2011","unstructured":"Pollach, I.: Online privacy as a corporate social responsibility: an empirical study. Business Ethics: A European Review\u00a020(1), 88\u2013102 (2011)","journal-title":"Business Ethics: A European Review"},{"key":"5_CR21","unstructured":"HL7 International: Consent directive use cases. online by Community-Based Collaborative Care (2008), http:\/\/wiki.hl7.org\/index.php?title=Consent_Directive_Use_Cases"},{"key":"5_CR22","unstructured":"Van Lamsweerde, A.: Goal-oriented requirements engineering: A guided tour. In: RE, pp. 249\u2013262. IEEE (2001)"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Giorgini, P., Mylopoulos, J., Nicchiarelli, E., Sebastiani, R.: Reasoning with goal models. In: Conceptual Modeling-ER 2002, pp. 167\u2013181 (2003)","DOI":"10.1007\/3-540-45816-6_22"},{"key":"5_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1007\/978-3-540-25975-6_4","volume-title":"Advanced Information Systems Engineering","author":"R. Sebastiani","year":"2004","unstructured":"Sebastiani, R., Giorgini, P., Mylopoulos, J.: Simple and minimum-cost satisfiability for goal models. In: Persson, A., Stirna, J. (eds.) CAiSE 2004. LNCS, vol.\u00a03084, pp. 20\u201335. Springer, Heidelberg (2004)"},{"key":"5_CR25","unstructured":"Kvale, S., Brinkmann, S.: Interviews: Learning the craft of qualitative research interviewing. Sage Publications (2008)"},{"key":"5_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-3-642-16373-9_5","volume-title":"Conceptual Modeling \u2013 ER 2010","author":"J. Horkoff","year":"2010","unstructured":"Horkoff, J., Yu, E.: Finding solutions in goal models: an interactive backward reasoning approach. In: Parsons, J., Saeki, M., Shoval, P., Woo, C., Wand, Y. (eds.) ER 2010. LNCS, vol.\u00a06412, pp. 59\u201375. Springer, Heidelberg (2010)"},{"key":"5_CR27","unstructured":"Grau, G., Horkoff, J., Yu, E., Abdulhadi, S.: I star guide (2010), http:\/\/istar.rwth-aachen.de\/tiki-view_articles.php"},{"key":"5_CR28","unstructured":"Horkoff, J.: Iterative, Interactive Analysis of Agent-goal Models for Early Requirements Engineering. PhD thesis, University of Toronto (2012)"},{"issue":"1-2","key":"5_CR29","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1016\/j.infsof.2007.10.006","volume":"50","author":"G. Grau","year":"2008","unstructured":"Grau, G., Franch, X., Maiden, N.A.M.: Prim: An i*-based process reengineering method for information systems specification. Information & Software Technology\u00a050(1-2), 76\u2013100 (2008)","journal-title":"Information & Software Technology"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Strohmaier, M., Horkoff, J., Yu, E., Aranda, J., Easterbrook, S.: Can patterns improve i* modeling? two exploratory studies. Requirements Engineering: Foundation for Software Quality, 153\u2013167 (2008)","DOI":"10.1007\/978-3-540-69062-7_16"},{"key":"5_CR31","doi-asserted-by":"crossref","unstructured":"Nissenbaum, H.: Privacy in Context: Technology, Policy, and the Integrity of Social Life. Stanford Law Books (2009)","DOI":"10.1515\/9780804772891"},{"key":"5_CR32","doi-asserted-by":"crossref","unstructured":"Liaskos, S., Lapouchnian, A., Wang, Y., Yu, Y., Easterbrook, S.: Configuring common personal software: a requirements-driven approach. In: RE, pp. 9\u201318. IEEE (2005)","DOI":"10.1109\/RE.2005.19"},{"key":"5_CR33","unstructured":"Liu, L., Yu, E., Mylopoulos, J.: Security and privacy requirements analysis within a social setting. In: RE, pp. 151\u2013161. IEEE (2003)"},{"key":"5_CR34","unstructured":"Yu, E., Cysneiros, L.: Designing for privacy in a multi-agent world. Trust, Reputation, and Security: Theories and Practice (2003) 259\u2013269"},{"key":"5_CR35","doi-asserted-by":"crossref","unstructured":"Samavi, R., Topaloglou, T.: Designing privacy-aware personal health record systems. In: Song, I.-Y., et al (eds.) ER Workshops 2008. LNCS, vol.\u00a05232, pp. 12\u201321. Springer, Heidelberg (2008)","DOI":"10.1007\/978-3-540-87991-6_3"},{"issue":"8","key":"5_CR36","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1016\/j.is.2004.06.002","volume":"30","author":"H. Mouratidis","year":"2005","unstructured":"Mouratidis, H., Giorgini, P., Manson, G.: When security meets software engineering: a case of modelling secure information systems. Information Systems\u00a030(8), 609\u2013629 (2005)","journal-title":"Information Systems"},{"key":"5_CR37","doi-asserted-by":"crossref","unstructured":"Giorgini, P., Massacci, F., Mylopoulos, J., Zannone, N.: Modeling security requirements through ownership, permission and delegation. In: RE, pp. 167\u2013176. IEEE (2005)","DOI":"10.1109\/RE.2005.43"},{"key":"5_CR38","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/11555827_7","volume-title":"Computer Security \u2013 ESORICS 2005","author":"M. Hilty","year":"2005","unstructured":"Hilty, M., Basin, D., Pretschner, A.: On obligations. In: di Vimercati, S.d.C., Syverson, P., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.\u00a03679, pp. 98\u2013117. Springer, Heidelberg (2005)"},{"issue":"1","key":"5_CR39","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1197\/jamia.M2562","volume":"15","author":"J. Halamka","year":"2008","unstructured":"Halamka, J., Mandl, K., Tang, P.: Early experiences with personal health records. Journal of the American Medical Informatics Association\u00a015(1), 1\u20137 (2008)","journal-title":"Journal of the American Medical Informatics Association"},{"issue":"6","key":"5_CR40","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1197\/jamia.M2547","volume":"15","author":"D. Kaelber","year":"2008","unstructured":"Kaelber, D., Jha, A., Johnston, D., Middleton, B., Bates, D.: A research agenda for personal health records (phrs). Journal of the American Medical Informatics Association\u00a015(6), 729\u2013736 (2008)","journal-title":"Journal of the American Medical Informatics Association"},{"key":"5_CR41","unstructured":"Gellman, R.: Personal health records: Why many phrs threaten privacy. Technical report, World Privacy Forum (2008)"},{"issue":"1","key":"5_CR42","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1111\/j.1748-720X.2010.00467.x","volume":"38","author":"M. Wynia","year":"2010","unstructured":"Wynia, M., Dunn, K.: Dreams and nightmares: practical and ethical issues for patients and physicians using personal health records. The Journal of Law, Medicine & Ethics\u00a038(1), 64\u201373 (2010)","journal-title":"The Journal of Law, Medicine & Ethics"},{"key":"5_CR43","unstructured":"He, Q., Ant\u00f3n, A., et al.: A framework for modeling privacy requirements in role engineering. In: Proc. of REFSQ, vol.\u00a03, pp. 137\u2013146 (2003)"},{"key":"5_CR44","unstructured":"Cranor, L., Langheinrich, M., Marchiori, M.: A P3P preference exchange language 1.0 (APPEL1.0). W3C Working Draft (2002)"},{"key":"5_CR45","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: An xpath-based preference language for P3P. In: WWW, pp. 629\u2013639 (2003)","DOI":"10.1145\/775240.775241"},{"key":"5_CR46","unstructured":"Becker, M., Malkis, A., Bussard, L.: S4p: A generic language for specifying privacy preferences and policies. Technical report, Technical Report MSR-TR-2010-32, Microsoft Research (2010)"},{"key":"5_CR47","doi-asserted-by":"crossref","unstructured":"Ni, Q., Bertino, E., Lobo, J.: An obligation model bridging access control policies and privacy policies. In: Proc. SACMAT, pp. 133\u2013142 (2008)","DOI":"10.1145\/1377836.1377857"}],"container-title":["Lecture Notes in Computer Science","The Personal Web"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39995-4_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,3]],"date-time":"2023-07-03T04:57:46Z","timestamp":1688360266000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39995-4_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642399947","9783642399954"],"references-count":47,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39995-4_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}