{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T23:47:31Z","timestamp":1729640851147,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/relaw.2011.6050270","type":"proceedings-article","created":{"date-parts":[[2011,10,21]],"date-time":"2011-10-21T15:03:25Z","timestamp":1319209405000},"page":"25-34","source":"Crossref","is-referenced-by-count":47,"title":["A systematic review of goal-oriented requirements management frameworks for business process compliance"],"prefix":"10.1109","author":[{"given":"Sepideh","family":"Ghanavati","sequence":"first","affiliation":[]},{"given":"Daniel","family":"Amyot","sequence":"additional","affiliation":[]},{"given":"Liam","family":"Peyton","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Making business processes law-compliant","author":"ghanavati","year":"0","journal-title":"1st Workshop on Law Compliancy Issues in Organisational Systems and Strategies (iComply'10)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/RELAW.2008.6"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/RELAW.2009.6"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2010.17"},{"year":"2010","key":"ref36"},{"key":"ref35","first-page":"119","article-title":"Eval-uating existing security and privacy requirements for legal compliance","volume":"15","author":"massey","year":"2010","journal-title":"Special Issue on RE'09 Security Requirements Engineering REJ"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/RELAW.2009.9"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/RELAW.2009.3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2009.21"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72988-4_16"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2009.42"},{"year":"2008","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/RELAW.2009.1"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1007\/978-3-642-04840-1_35","article-title":"Designing law-compliant software requirements","author":"siena","year":"2009","journal-title":"Conceptual Modeling-ER 2009 SE"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2008.44"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/RELAW.2009.8"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2005.12"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/RELAW.2009.4"},{"key":"ref4","article-title":"Guidelines for performing systematic literature reviews in software engineering, version 2.3","author":"kitchenham","year":"2007","journal-title":"Technical Report Keele University and University of Durham"},{"key":"ref27","first-page":"114","article-title":"Compliant business process design using refinement layers","author":"schleicher","year":"0","journal-title":"Confederated Int Conf On the Move to Meaningful Internet Systems (OTM'10)"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-01862-6_15"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.001"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2006.68"},{"key":"ref5","first-page":"31","article-title":"Towards a compliance support framework for global software companies","author":"hamou-lhadj","year":"0","journal-title":"Proc of the 11 th lASTED Int Conf on Software Engineering and Applications"},{"key":"ref8","article-title":"Validating compliance with privacy legislation","author":"hassan","year":"2008","journal-title":"Journal of Information Systems Frontiers"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-COMPANION.2009.5070994"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.65"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/RELAW.2008.8"},{"key":"ref1","first-page":"213","article-title":"A systematic review of the use of requirements engineering techniques in model-driven development","author":"loniewski","year":"0","journal-title":"Proceedings of the 13th International Conference on Model Driven Engineering Languages and Systems (Models)"},{"key":"ref20","first-page":"939","article-title":"Orga-nizational aspect of trusted legally valid long-term electronic archive solution","volume":"5","author":"halas","year":"2008","journal-title":"WSEAS Trans Info Sci and App"},{"key":"ref22","first-page":"120","article-title":"Compliance aware business process design","author":"lu","year":"0","journal-title":"2007 Int con! on Business process management"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/RELAW.2009.7"},{"key":"ref24","first-page":"1","article-title":"To-wards a framework for semantic business process compliance management","author":"kharbili","year":"0","journal-title":"GRCIS"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/11837862_2","article-title":"Designing compliant business processes with obligations and permissions","volume":"4103","author":"goedertier","year":"0","journal-title":"Business Process Management Workshops Ser Lecture Notes in Computer Science"},{"key":"ref26","first-page":"60","article-title":"A semantic framework for compliance management in business process manage-ment","author":"kharbili","year":"0","journal-title":"Business Processes Services Computing and Intelligent Service Management"},{"key":"ref25","article-title":"A business process-based modelling extension for regulatory compliance","author":"karagiannis","year":"0","journal-title":"Munchen"}],"event":{"name":"2011 Fourth International Workshop on Requirements Engineering and Law (RELAW)","start":{"date-parts":[[2011,8,30]]},"location":"Trento, Italy","end":{"date-parts":[[2011,8,30]]}},"container-title":["2011 Fourth International Workshop on Requirements Engineering and Law"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6041392\/6050260\/06050270.pdf?arnumber=6050270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T08:25:41Z","timestamp":1497947141000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6050270\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/relaw.2011.6050270","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}