{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T04:24:34Z","timestamp":1741839874846,"version":"3.38.0"},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/resc.2011.6046716","type":"proceedings-article","created":{"date-parts":[[2011,10,18]],"date-time":"2011-10-18T15:31:20Z","timestamp":1318951880000},"page":"22-25","source":"Crossref","is-referenced-by-count":4,"title":["Social threats and the new challenges for Requirements Engineering"],"prefix":"10.1109","author":[{"given":"Fabiano","family":"Dalpiaz","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2007.41"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/175222.175223"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1007\/978-3-642-04840-1_35","article-title":"Designing Law-Compliant Software Requirements","volume":"5829","author":"siena","year":"2009","journal-title":"Proceedings of the 28th International Conference on Conceptual Modeling (ER 2009) ser LNCS"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.159"},{"key":"ref5","first-page":"113","article-title":"Modeling and Reasoning about Service-Oriented Applications via Goals and Commitments","volume":"6051","author":"chopra","year":"2010","journal-title":"Proceedings of 22nd International Conference on Advanced Information Systems Engineering (CAiSE'10) Ser LNCS"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/978-3-642-16373-9_3","article-title":"Adaptation in Open Systems: Giving Interaction its Rightful Place","volume":"6412","author":"dalpiaz","year":"2010","journal-title":"Proceedings of the 29th International Conference on Conceptual Modeling (ER 2010) ser LNCS"},{"key":"ref7","first-page":"171","article-title":"Why Isn't Trust Transitive?","author":"christianson","year":"1996","journal-title":"Proceedings of the International Workshop on Security Protocols"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14843-9_2"},{"key":"ref9","first-page":"467","article-title":"Commitments with Regulations: Reasoning about Safety and Control in REGULA","author":"marengo","year":"2011","journal-title":"Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2011)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/2.735849"}],"event":{"name":"2011 First International Workshop on Requirements Engineering for Social Computing (RESC)","start":{"date-parts":[[2011,8,29]]},"location":"Trento, Italy","end":{"date-parts":[[2011,8,29]]}},"container-title":["2011 First International Workshop on Requirements Engineering for Social Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6035841\/6046707\/06046716.pdf?arnumber=6046716","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,13]],"date-time":"2025-03-13T00:49:12Z","timestamp":1741826952000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6046716\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/resc.2011.6046716","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}