{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T05:15:19Z","timestamp":1769750119280,"version":"3.49.0"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,4,27]],"date-time":"2010-04-27T00:00:00Z","timestamp":1272326400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Bus Inf Syst Eng"],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1007\/s12599-010-0102-z","type":"journal-article","created":{"date-parts":[[2010,4,26]],"date-time":"2010-04-26T13:34:08Z","timestamp":1272288848000},"page":"127-139","source":"Crossref","is-referenced-by-count":98,"title":["Software Transparency"],"prefix":"10.1007","volume":"2","author":[{"given":"Julio Cesar Sampaio do Prado","family":"Leite","sequence":"first","affiliation":[]},{"given":"Claudia","family":"Cappelli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,4,27]]},"reference":[{"key":"102_CR1","unstructured":"Biolchini J, Mian PG, Natali AC, Travassos GH (2005) Systematic review in software engineering: relevance and utility. Technical report ES67905, PESC \u2013 COPPE\/UFRJ, 2005. http:\/\/cronos.cos.ufrj.br\/publicacoes\/reltec\/es67905.pdf"},{"issue":"11","key":"102_CR2","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1145\/1297797.1297827","volume":"50","author":"M Bishop","year":"2007","unstructured":"Bishop M, Wagner D (2007) Risks of e-voting. Communications of the ACM 50(11):120\u2013120. doi: 10.1145\/1297797.1297827","journal-title":"Communications of the ACM"},{"key":"102_CR3","volume-title":"Requirements engineering: from system goals to UML models to software specifications","author":"A Lamsweerde van","year":"2009","unstructured":"Lamsweerde A van (2009) Requirements engineering: from system goals to UML models to software specifications. Wiley, New York"},{"key":"102_CR4","first-page":"309","volume-title":"11th IEEE international conference on requirements engineering","author":"K Breitman","year":"2003","unstructured":"Breitman K, Leite JCSP (2003) Ontology as a requirements engineering product. In: 11th IEEE international conference on requirements engineering. IEEE Comp Soc Press, Los Alamitos, pp 309\u2013319"},{"key":"102_CR5","doi-asserted-by":"crossref","unstructured":"Camp LJ (2006) Varieties of software and their implications for effective democratic government. In: Proceedings of the British academy, vol\u00a0135, pp\u00a0183\u2013185","DOI":"10.5871\/bacad\/9780197263839.003.0011"},{"key":"102_CR6","unstructured":"Cappelli C (2009) An approach for business processes transparency using aspects. Dissertation, Departamento de Inform\u00e1tica, PUC-Rio, Ago (in Portuguese)"},{"key":"102_CR7","first-page":"389","volume-title":"Exploring business process transparency concepts","author":"C Cappelli","year":"2007","unstructured":"Cappelli C, Oliveira AP, Leite JCSP (2007) Exploring business process transparency concepts. IEEE Comp Soc Press, Los Alamitos, pp 389\u2013390"},{"key":"102_CR8","doi-asserted-by":"crossref","unstructured":"Cappelli C, Cunha H, Gonzalez-Baixauli B, Leite JCSP (2010) 25th transparency versus security: early analysis of antagonistic requirements. In: ACM symposium on applied computing, requirements engineering track. Sierre (accepted)","DOI":"10.1145\/1774088.1774151"},{"key":"102_CR9","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1007\/978-3-642-02463-4_18","volume-title":"Conceptual modeling: foundations and applications","author":"J Castro","year":"2009","unstructured":"Castro J, Kolp M, Liu L, Perini A (2009) Dealing with complexity using conceptual models based on tropos. In: Conceptual modeling: foundations and applications. Springer, Berlin, pp\u00a0335\u2013362"},{"key":"102_CR10","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1007\/978-3-642-02463-4_19","volume-title":"Conceptual modeling: foundations and applications","author":"L Chung","year":"2009","unstructured":"Chung L, Leite JCSP (2009) On non-functional requirements in software engineering. In: Borgida A, Chaudhri V, Giorgini P, Yu E (eds) Conceptual modeling: foundations and applications. Springer, Heidelberg, pp 363\u2013379"},{"key":"102_CR11","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-5269-7","volume-title":"Non-functional requirements in software engineering","author":"L Chung","year":"2000","unstructured":"Chung L, Nixon B, Yu E, Mylopoulos J (2000) Non-functional requirements in software engineering. Kluwer, Norwell"},{"key":"102_CR12","unstructured":"Cysneiros LM, Yu E, Leite JCSP (2003) Cataloguing non-functional requirements as softgoal networks. In: Proc. of requirements engineering for adaptable architectures. 11th international requirements engineering conference, pp 13\u201320"},{"key":"102_CR13","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1109\/ASE.2002.1115010","volume-title":"Proc. 17th IEEE international conference on automated software engineering","author":"A Egyed","year":"2002","unstructured":"Egyed A, Gr\u00fcnbacher P (2002) Automating requirements traceability: beyond the record & replay paradigm. In: Proc. 17th IEEE international conference on automated software engineering. IEEE Comp Soc, Washington, p 163"},{"key":"102_CR14","unstructured":"European Commission (1995) Directive 95\/46\/EC of the European parliament \u2013 data protection. http:\/\/ec.europa.eu\/justice_home\/fsj\/privacy\/index_en.htm"},{"issue":"1","key":"102_CR15","first-page":"23","volume":"12","author":"L Fernandes","year":"2005","unstructured":"Fernandes L, Leite JCSP, Breitman K (2005) C&L uma ferramenta de apoio \u00e0 engenharia de requisitos. Revista de Inform\u00e1tica Te\u00f3rica e Aplicada 12(1):23\u201345","journal-title":"Revista de Inform\u00e1tica Te\u00f3rica e Aplicada"},{"key":"102_CR16","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511510533","volume-title":"Full disclosure, the perils and promise of transparency","author":"A Fung","year":"2007","unstructured":"Fung A, Graham M, Weil D (2007) Full disclosure, the perils and promise of transparency. Cambridge University Press, Cambridge"},{"key":"102_CR17","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1007\/3-540-45816-6_22","volume-title":"Proc. ER 2002. 21st international conference on conceptual modeling","author":"P Giorgini","year":"2002","unstructured":"Giorgini P, Mylopoulos J, Nicchiarelli E, Sebasti\u00e1n R (2002) Reasoning with goal models. In: Proc. ER 2002. 21st international conference on conceptual modeling. Springer, Berlin, pp 167\u2013181"},{"issue":"7","key":"102_CR18","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1145\/1364782.1364798","volume":"51","author":"J Hendler","year":"2008","unstructured":"Hendler J, Shadbolt N, Hall W, Berners-Lee T, Weitzner D (2008) Web science: an interdisciplinary approach to understanding the web. Communication of the ACM 51(7):60\u201369 doi: 10.1145\/1364782.1364798","journal-title":"Communication of the ACM"},{"key":"102_CR19","volume-title":"Corporate truth the limits to transparency","author":"A Henriques","year":"2006","unstructured":"Henriques A (2006) Corporate truth the limits to transparency. Earthscan, London"},{"key":"102_CR20","doi-asserted-by":"crossref","DOI":"10.2307\/jj.11374757","volume-title":"Transparency in global change: the vanguard of the open society","author":"B Holzner","year":"2006","unstructured":"Holzner B, Holzner L (2006) Transparency in global change: the vanguard of the open society. University of Pittsburgh Press, Pittsburgh"},{"key":"102_CR21","unstructured":"IOCCC (2009) International Obfuscated C Code Contest. http:\/\/ioccc.org\/main.html"},{"key":"102_CR22","unstructured":"Jackson D, Thomas M, Millett L (2007) Software for dependable systems: sufficient evidence? The National Academies Press, http:\/\/www.nap.edu\/catalog.php?record_id=11923#toc"},{"key":"102_CR23","unstructured":"Jarke M, Loucopoulos P, Lyytinen K, Mylopoulos J, Robinson W (2009) Manifesto \u2013 high-impact requirements for software-intensive systems In: Dagstuhl seminar proceedings \u2013 08412, 1862\u20134405. http:\/\/drops.dagstuhl.de\/opus\/volltexte\/2009\/2028\/pdf\/08412.SWM.Paper.2028.pdf"},{"issue":"4","key":"102_CR24","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/1232743.1232745","volume":"50","author":"J Kramer","year":"2007","unstructured":"Kramer J (2007) Is abstraction the key to computing? Communications of the ACM 50(4):36\u201342","journal-title":"Communications of the ACM"},{"key":"102_CR25","doi-asserted-by":"crossref","unstructured":"Leite JCSP, Yu Y, Liu L, Yu E, Mylopoulos J (2005) Quality-based software reuse. In: CAiSE, pp 535\u2013550","DOI":"10.1007\/11431855_37"},{"issue":"4","key":"102_CR26","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1007\/BF02745371","volume":"2","author":"JCSP Leite","year":"1997","unstructured":"Leite JCSP, Rossi G, Balaguer F, Maiorana V, Kaplan G, Hadad G, Oliveros A (1997) Enhancing a requirements baseline with scenarios. Requirements Engineering 2(4):184\u2013198","journal-title":"Requirements Engineering"},{"key":"102_CR27","unstructured":"Leite JCSP, Cappelli C (2008) Exploring\u00a0i* characteristics that support\u00a0software transparency In: Proc 3rd international i* workshop, CEUR workshop proceedings, vol\u00a0322, pp\u00a051\u201354. http:\/\/CEUR-WS.org\/Vol-322\/"},{"key":"102_CR28","volume-title":"The perils and promise of global transparency","author":"KM Lord","year":"2006","unstructured":"Lord KM (2006) The perils and promise of global transparency. State University of New York Press, New York"},{"issue":"2","key":"102_CR29","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1145\/1314215.1314232","volume":"51","author":"P Meunier","year":"2008","unstructured":"Meunier P (2008) Software transparency and purity. Communications of the ACM 51(2):104. doi: 10.1145\/1314215.1314232","journal-title":"Communications of the ACM"},{"issue":"6","key":"102_CR30","doi-asserted-by":"crossref","first-page":"483","DOI":"10.1109\/32.142871","volume":"18","author":"J Mylopoulos","year":"1992","unstructured":"Mylopoulos J, Chung L, Nixon B (1992) Representing and using nonfunctional requirements: a process-oriented approach. IEEE Transactions on Software Engineering 18(6):483\u2013497","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"5","key":"102_CR31","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1109\/MC.2009.169","volume":"42","author":"N Paul","year":"2009","unstructured":"Paul N, Tanenbaum AS (2009) Trustworthy voting: from machine to system. Computer 42(5):23\u201329. http:\/\/dx.doi.org\/10.1109\/MC.2009.169","journal-title":"Computer"},{"key":"102_CR32","unstructured":"Republic of Brazil (1997) Lei N\u00b0 9.507, de 12 de Novembro de 1997. http:\/\/www.planalto.gov.br\/ccivil\/Leis\/L9507.htm"},{"issue":"2","key":"102_CR33","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1145\/857076.857079","volume":"35","author":"WN Robinson","year":"2003","unstructured":"Robinson WN, Pawlowski SD, Volkov V (2003) Requirements interaction management. ACM Computing Surveys 35(2):132\u2013190. doi: 10.1145\/857076.857079","journal-title":"ACM Computing Surveys"},{"key":"102_CR34","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1007\/978-3-642-02463-4_21","volume-title":"Conceptual modeling: foundations and applications","author":"C Rolland","year":"2009","unstructured":"Rolland C, Salinesi C (2009) Supporting requirements elicitation through goal\/scenario coupling. In: Conceptual modeling: foundations and applications. Springer, Berlin, pp 398\u2013416"},{"key":"102_CR35","volume-title":"The sciences of the artificial","author":"HA Simon","year":"1969","unstructured":"Simon HA (1969) The sciences of the artificial. MIT Press, Cambridge"},{"key":"102_CR36","first-page":"53","volume-title":"Open codes: voices from the open code revolution","author":"R Stallman","year":"1999","unstructured":"Stallman R (1999) The GNU Manifesto. Originally written in 1984; later version available. In: DeBona C, Ockman S, Stone M (eds) Open codes: voices from the open code revolution. O\u2019Reilly, Cambridge, pp 53\u201370. http:\/\/www.gnu.org\/gnu\/manifesto.htmlv"},{"issue":"6","key":"102_CR37","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1145\/1516046.1516058","volume":"52","author":"R Stallman","year":"2009","unstructured":"Stallman R (2009) Why \u2018Open Source\u2019 misses the point of free software. Communications of the ACM 52(6):31\u201333. doi: 10.1145\/1516046.1516058","journal-title":"Communications of the ACM"},{"key":"102_CR38","unstructured":"United States Department of Justice (nd) Freedom of Information Act (FOIA). http:\/\/www.usdoj.gov\/oip\/index.html"},{"key":"102_CR39","unstructured":"US Government Printing Office (2002) Public law 107\u2013204 \u2013 Sarbanes-Oxley Act of 2002. http:\/\/www.gpo.gov\/fdsys\/pkg\/PLAW-107publ204\/content-detail.html"},{"issue":"4","key":"102_CR40","doi-asserted-by":"crossref","first-page":"342","DOI":"10.1016\/j.clsr.2008.05.003","volume":"24","author":"RH Weber","year":"2008","unstructured":"Weber RH (2008) Transparency and the governance of the internet. Computer Law & Security Report 24(4):342\u2013348","journal-title":"Computer Law & Security Report"},{"issue":"6","key":"102_CR41","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1145\/1349026.1349043","volume":"51","author":"DJ Weitzner","year":"2008","unstructured":"Weitzner DJ, Abelson H, Berners-Lee T, Feigenbaum J, Hendler J, Sussman GJ (2008) Information accountability. Communications of the ACM 51(6):82\u201387. doi: 10.1145\/1349026.1349043","journal-title":"Communications of the ACM"},{"key":"102_CR42","unstructured":"Wikipedia (2009) Transparency (social). http:\/\/en.wikipedia.org\/wiki\/Transparency_(social)"},{"key":"102_CR43","unstructured":"Yu E (1994) Modeling strategic relationships for process reengineering. Dissertation, University of Toronto, Graduate Department of Computer Science, pp\u00a0124\u00a0ff"}],"container-title":["Business &amp; Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-010-0102-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12599-010-0102-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12599-010-0102-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T02:16:13Z","timestamp":1711419373000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12599-010-0102-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4,27]]},"references-count":43,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,6]]}},"alternative-id":["102"],"URL":"https:\/\/doi.org\/10.1007\/s12599-010-0102-z","relation":{},"ISSN":["1867-0202"],"issn-type":[{"value":"1867-0202","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,4,27]]}}}