{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,28]],"date-time":"2025-12-28T02:28:27Z","timestamp":1766888907662,"version":"3.40.3"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030444280"},{"type":"electronic","value":"9783030444297"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-44429-7_8","type":"book-chapter","created":{"date-parts":[[2020,3,18]],"date-time":"2020-03-18T12:23:03Z","timestamp":1584534183000},"page":"116-123","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["On Understanding How Developers Perceive and Interpret Privacy Requirements Research Preview"],"prefix":"10.1007","author":[{"given":"Mariana","family":"Peixoto","sequence":"first","affiliation":[]},{"given":"Dayse","family":"Ferreira","sequence":"additional","affiliation":[]},{"given":"Mateus","family":"Cavalcanti","sequence":"additional","affiliation":[]},{"given":"Carla","family":"Silva","sequence":"additional","affiliation":[]},{"given":"J\u00e9ssyka","family":"Vilela","sequence":"additional","affiliation":[]},{"given":"Jo\u00e3o","family":"Ara\u00fajo","sequence":"additional","affiliation":[]},{"given":"Tony","family":"Gorschek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,18]]},"reference":[{"key":"8_CR1","unstructured":"Bandura, A.: Social Foundations of Thought and Action. Prentice-Hall, Inc., Englewood Cliffs (1986)"},{"key":"8_CR2","unstructured":"Cavoukian, A.: Privacy by design: the 7 foundational principles. Inf. Priv. Commissioner Ontario Canada 5 (2009)"},{"key":"8_CR3","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-319-92925-5_2","volume-title":"Privacy and Identity Management. The Smart Revolution","author":"JM del Alamo","year":"2018","unstructured":"del Alamo, J.M., Mart\u00edn, Y.-S., Caiza, J.C.: Towards organizing the growing knowledge on privacy engineering. In: Hansen, M., Kosta, E., Nai-Fovino, I., Fischer-H\u00fcbner, S. (eds.) Privacy and Identity 2017. IAICT, vol. 526, pp. 15\u201324. Springer, Cham (2018). \nhttps:\/\/doi.org\/10.1007\/978-3-319-92925-5_2"},{"key":"8_CR4","unstructured":"GDPR: General data protection regulation (2018). \nhttps:\/\/eugdpr.org\/"},{"issue":"1","key":"8_CR5","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s10664-017-9517-1","volume":"23","author":"I Hadar","year":"2018","unstructured":"Hadar, I., et al.: Privacy by designers: software developers\u2019 privacy mindset. Empir. Softw. Eng. 23(1), 259\u2013289 (2018)","journal-title":"Empir. Softw. Eng."},{"issue":"3","key":"8_CR6","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s00766-008-0067-3","volume":"13","author":"C Kalloniatis","year":"2008","unstructured":"Kalloniatis, C., Kavakli, E., Gritzalis, S.: Addressing privacy requirements in system design: the pris method. Requir. Eng. 13(3), 241\u2013255 (2008)","journal-title":"Requir. Eng."},{"key":"8_CR7","unstructured":"LGPD: General Law on Personal Data Protection\/Lei Geral de Protecao de Dados n. 13.709 (2018). \nhttp:\/\/www.planalto.gov.br\/ccivil_03\/_ato2015-2018\/2018\/lei\/L13709.htm"},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"Peixoto, M., Silva, C., Lima, R., Ara\u00fajo, J., Gorschek, T., Silva, J.: PCM tool: privacy requirements specification in agile software development. In: 10th Brazilian Software Conference: Theory and Practice (CBSoft 2019), pp. 108\u2013113. SBC (2019)","DOI":"10.5753\/cbsoft_estendido.2019.7666"},{"issue":"2","key":"8_CR9","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s10664-008-9102-8","volume":"14","author":"P Runeson","year":"2009","unstructured":"Runeson, P., H\u00f6st, M.: Guidelines for conducting and reporting case study research in software engineering. Empir. Softw. Eng. 14(2), 131 (2009)","journal-title":"Empir. Softw. Eng."},{"issue":"1","key":"8_CR10","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/TSE.2008.88","volume":"35","author":"S Spiekermann","year":"2008","unstructured":"Spiekermann, S., Cranor, L.F.: Engineering privacy. IEEE Trans. Software Eng. 35(1), 67\u201382 (2008)","journal-title":"IEEE Trans. Software Eng."},{"key":"8_CR11","volume-title":"Basics of Qualitative Research Techniques","author":"A Strauss","year":"1998","unstructured":"Strauss, A., Corbin, J.: Basics of Qualitative Research Techniques. Sage Publications, Thousand Oaks (1998)"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Van Der Sype, Y.S., Maalej, W.: On lawful disclosure of personal user data: what should app developers do? In: International Workshop on Requirements Engineering and Law (RELAW), pp. 25\u201334. IEEE (2014)","DOI":"10.1109\/RELAW.2014.6893479"}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-44429-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,30]],"date-time":"2020-04-30T23:09:14Z","timestamp":1588288154000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-44429-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030444280","9783030444297"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-44429-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"18 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"REFSQ","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Working Conference on Requirements Engineering: Foundation for Software Quality","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pisa","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 March 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 March 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"refsq2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/refsq.org\/welcome","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"84","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3-4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}