{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:14:30Z","timestamp":1759961670184,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,4,13]],"date-time":"2015-04-13T00:00:00Z","timestamp":1428883200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,4,13]]},"DOI":"10.1145\/2695664.2695788","type":"proceedings-article","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T19:10:09Z","timestamp":1437419409000},"page":"1370-1375","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["An approach to early evaluation of informational privacy requirements"],"prefix":"10.1145","author":[{"given":"Balbir S.","family":"Barn","sequence":"first","affiliation":[{"name":"Middlesex University, London, UK"}]},{"given":"Giuseppe","family":"Primiero","sequence":"additional","affiliation":[{"name":"Middlesex University, London, UK"}]},{"given":"Ravinder","family":"Barn","sequence":"additional","affiliation":[{"name":"University of London, Egham, UK"}]}],"member":"320","published-online":{"date-parts":[[2015,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1939212.1939219"},{"issue":"4","key":"e_1_3_2_1_2_1","first-page":"7","article-title":"Rethinking enterprise architecture using systems and complexity approaches","volume":"6","author":"Bean Sally","year":"2010","unstructured":"Sally Bean . Rethinking enterprise architecture using systems and complexity approaches . Journal of Enterprise Architecture , 6 ( 4 ): 7 -- 13 , 2010 . Sally Bean. Rethinking enterprise architecture using systems and complexity approaches. Journal of Enterprise Architecture, 6(4):7--13, 2010.","journal-title":"Journal of Enterprise Architecture"},{"key":"e_1_3_2_1_3_1","volume-title":"Gower Pub Co","author":"Bjerknes G.","year":"1987","unstructured":"G. Bjerknes , P. Ehn , M. Kyng , and K. Nygaard . Computers and democracy: A Scandinavian challenge . Gower Pub Co , 1987 . G. Bjerknes, P. Ehn, M. Kyng, and K. Nygaard. Computers and democracy: A Scandinavian challenge. Gower Pub Co, 1987."},{"key":"e_1_3_2_1_4_1","volume-title":"Annual report and accounts 2013\/14","author":"Board Youth Justice","year":"2014","unstructured":"Youth Justice Board . Annual report and accounts 2013\/14 , 2014 . http:\/\/tinyurl.com\/ozxtrz6. Youth Justice Board. Annual report and accounts 2013\/14, 2014. http:\/\/tinyurl.com\/ozxtrz6."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/638750.638775"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9973.2004.00336.x"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-006-0001-7"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-006-9121-3"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/242485.242493"},{"key":"e_1_3_2_1_10_1","first-page":"348","article-title":"Value sensitive design and information systems. Human-computer interaction in management information systems","volume":"5","author":"Friedman Batya","year":"2006","unstructured":"Batya Friedman , Peter H Kahn Jr , and Alan Borning . Value sensitive design and information systems. Human-computer interaction in management information systems : Foundations , 5 : 348 -- 372 , 2006 . Batya Friedman, Peter H Kahn Jr, and Alan Borning. Value sensitive design and information systems. Human-computer interaction in management information systems: Foundations, 5:348--372, 2006.","journal-title":"Foundations"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/230538.230561"},{"key":"e_1_3_2_1_12_1","first-page":"27","volume-title":"Towards a social, ethical theory of information. Social science, technical systems and cooperative work: beyond the great divide","author":"Goguen Joseph","year":"1997","unstructured":"Joseph Goguen . Towards a social, ethical theory of information. Social science, technical systems and cooperative work: beyond the great divide , pages 27 -- 56 , 1997 . Joseph Goguen. Towards a social, ethical theory of information. Social science, technical systems and cooperative work: beyond the great divide, pages 27--56, 1997."},{"key":"e_1_3_2_1_13_1","volume-title":"Distributed and Flexible Organisations: Studies in Organisational Semiotics","author":"Goguen Joseph A","year":"2003","unstructured":"Joseph A Goguen . Semiotics, compassion and value-centered design. Virtual , Distributed and Flexible Organisations: Studies in Organisational Semiotics , Reading, UK, pages 11--12 , 2003 . Joseph A Goguen. Semiotics, compassion and value-centered design. Virtual, Distributed and Flexible Organisations: Studies in Organisational Semiotics, Reading, UK, pages 11--12, 2003."},{"key":"e_1_3_2_1_14_1","volume-title":"Lost in Translation: A Handbook for Information Systems in the 21st Century","author":"Green Nigel","year":"2007","unstructured":"Nigel Green and Carl Bate . Lost in Translation: A Handbook for Information Systems in the 21st Century . Evolved Technologist Press , New York , 2007 . Nigel Green and Carl Bate. Lost in Translation: A Handbook for Information Systems in the 21st Century. Evolved Technologist Press, New York, 2007."},{"key":"e_1_3_2_1_15_1","volume-title":"Unified Modeling Language","author":"Object Management Group","year":"2010","unstructured":"Object Management Group . Unified Modeling Language , 2010 . http:\/\/www.uml.org\/. Object Management Group. Unified Modeling Language, 2010. http:\/\/www.uml.org\/."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9973.00055"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/546868"},{"key":"e_1_3_2_1_18_1","first-page":"165","volume-title":"Participatory design: the third space in hci. Human-computer interaction: Development process","author":"Muller Michael J","year":"2003","unstructured":"Michael J Muller . Participatory design: the third space in hci. Human-computer interaction: Development process , pages 165 -- 185 , 2003 . Michael J Muller. Participatory design: the third space in hci. Human-computer interaction: Development process, pages 165--185, 2003."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0779-8_1"},{"key":"e_1_3_2_1_20_1","volume-title":"Youth crime and justice: research, evaluation and 'evidence'. Youth, crime and justice: critical issues, page 78","author":"Smith D.","year":"2006","unstructured":"D. Smith , B. Goldson , and J. Muncie . Youth crime and justice: research, evaluation and 'evidence'. Youth, crime and justice: critical issues, page 78 , 2006 . D. Smith, B. Goldson, and J. Muncie. Youth crime and justice: research, evaluation and 'evidence'. Youth, crime and justice: critical issues, page 78, 2006."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/278213.278218"},{"key":"e_1_3_2_1_22_1","first-page":"673","article-title":"The machine as threat and promise","volume":"4","author":"Wiener Norbert","year":"1985","unstructured":"Norbert Wiener . The machine as threat and promise . Norbert Wiener: Collected Works and Commentaries , 4 : 673 -- 678 , 1985 . Norbert Wiener. The machine as threat and promise. Norbert Wiener: Collected Works and Commentaries, 4:673--678, 1985.","journal-title":"Norbert Wiener: Collected Works and Commentaries"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2470715"}],"event":{"name":"SAC 2015: Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Salamanca Spain","acronym":"SAC 2015"},"container-title":["Proceedings of the 30th Annual ACM Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2695664.2695788","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2695664.2695788","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:12:32Z","timestamp":1750227152000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2695664.2695788"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,13]]},"references-count":23,"alternative-id":["10.1145\/2695664.2695788","10.1145\/2695664"],"URL":"https:\/\/doi.org\/10.1145\/2695664.2695788","relation":{},"subject":[],"published":{"date-parts":[[2015,4,13]]},"assertion":[{"value":"2015-04-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}