{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:54:15Z","timestamp":1750308855483,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,17]],"date-time":"2018-09-17T00:00:00Z","timestamp":1537142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,17]]},"DOI":"10.1145\/3266237.3266239","type":"proceedings-article","created":{"date-parts":[[2018,9,28]],"date-time":"2018-09-28T20:59:18Z","timestamp":1538168358000},"page":"178-183","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Method for privacy requirements elicitation in ubiquitous computing"],"prefix":"10.1145","author":[{"given":"De\u00f3genes P.","family":"da Silva Junior","sequence":"first","affiliation":[{"name":"Instituto de Computa\u00e7\u00e3o, Cuiab\u00e1, Mato Grosso, Brasil"}]},{"given":"Patricia Cristiane","family":"de Souza","sequence":"additional","affiliation":[{"name":"Instituto de Computa\u00e7\u00e3o, Cuiab\u00e1, Mato Grosso, Brasil"}]},{"given":"Cristiano","family":"Maciel","sequence":"additional","affiliation":[{"name":"Instituto de Computa\u00e7\u00e3o, Cuiab\u00e1, Mato Grosso, Brasil"}]}],"member":"320","published-online":{"date-parts":[[2018,9,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/344949.344988"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3054926"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2005.50"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2014.70"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Edward C Banfield. 1957. The decision-making schema.  Edward C Banfield. 1957. The decision-making schema.","DOI":"10.2307\/973419"},{"volume-title":"Intera\u00e7\u00e3o humano-computador","author":"Barbosa Simone","key":"e_1_3_2_1_6_1","unstructured":"Simone Barbosa and Bruno Silva . 2010. Intera\u00e7\u00e3o humano-computador . Elsevier Brasil . Simone Barbosa and Bruno Silva. 2010. Intera\u00e7\u00e3o humano-computador. Elsevier Brasil."},{"key":"e_1_3_2_1_7_1","volume-title":"Design science: filosofia da pesquisa em ci\u00eancia da informa\u00e7\u00e3o e tecnologia. Ci\u00eancia da informa\u00e7\u00e3o 42, 2","author":"Bax Marcello Peixoto","year":"2015","unstructured":"Marcello Peixoto Bax . 2015. Design science: filosofia da pesquisa em ci\u00eancia da informa\u00e7\u00e3o e tecnologia. Ci\u00eancia da informa\u00e7\u00e3o 42, 2 ( 2015 ). Marcello Peixoto Bax. 2015. Design science: filosofia da pesquisa em ci\u00eancia da informa\u00e7\u00e3o e tecnologia. Ci\u00eancia da informa\u00e7\u00e3o 42, 2 (2015)."},{"key":"e_1_3_2_1_8_1","unstructured":"Clodis Boscarioli Renata M. Araujo and Rita Suzana P. Maciel. 2017. \"I GranDSI-BR - Grand Research Challenges in Information Systems in Brazil 2016-2026. Brazilian Computer Society.  Clodis Boscarioli Renata M. Araujo and Rita Suzana P. Maciel. 2017. \" I GranDSI - BR - Grand Research Challenges in Information Systems in Brazil 2016-2026. Brazilian Computer Society."},{"key":"e_1_3_2_1_9_1","volume-title":"Five reasons for scenario-based design. Interacting with computers 13, 1","author":"Carroll John M","year":"2000","unstructured":"John M Carroll . 2000. Five reasons for scenario-based design. Interacting with computers 13, 1 ( 2000 ), 43--60. John M Carroll. 2000. Five reasons for scenario-based design. Interacting with computers 13, 1 (2000), 43--60."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-20376-8_40"},{"key":"e_1_3_2_1_12_1","volume-title":"Daniel Pacheco Lacerda, and Jos\u00e9 Antonio Valle Antunes J\u00fanior","author":"Dresch Aline","year":"2015","unstructured":"Aline Dresch , Daniel Pacheco Lacerda, and Jos\u00e9 Antonio Valle Antunes J\u00fanior . 2015 . Design science research: m\u00e9todo de pesquisa para avan\u00e7o da ci\u00eancia e tecnologia. Bookman Editora . Aline Dresch, Daniel Pacheco Lacerda, and Jos\u00e9 Antonio Valle Antunes J\u00fanior. 2015. Design science research: m\u00e9todo de pesquisa para avan\u00e7o da ci\u00eancia e tecnologia. Bookman Editora."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11424826_108"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2838739.2838807"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466466"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/WONS.2011.5720177"},{"key":"e_1_3_2_1_17_1","first-page":"39","article-title":"Disagreeable privacy policies: Mismatches between meaning and users' understanding","volume":"30","author":"Reidenberg Joel R","year":"2015","unstructured":"Joel R Reidenberg , Travis Breaux , Lorrie Faith Cranor , Brian French , Amanda Grannis , James T Graves , Fei Liu , Aleecia McDonald , Thomas B Norton , and Rohan Ramanath . 2015 . Disagreeable privacy policies: Mismatches between meaning and users' understanding . Berkeley Tech. LJ 30 (2015), 39 . Joel R Reidenberg, Travis Breaux, Lorrie Faith Cranor, Brian French, Amanda Grannis, James T Graves, Fei Liu, Aleecia McDonald, Thomas B Norton, and Rohan Ramanath. 2015. Disagreeable privacy policies: Mismatches between meaning and users' understanding. Berkeley Tech. LJ 30 (2015), 39.","journal-title":"Berkeley Tech. LJ"},{"key":"e_1_3_2_1_18_1","volume-title":"Eleventh Symposium On Usable Privacy and Security (SOUPS","author":"Schaub Florian","year":"2015","unstructured":"Florian Schaub , Rebecca Balebako , Adam L Durity , and Lorrie Faith Cranor . 2015 . A design space for effective privacy notices . In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). 1--17. Florian Schaub, Rebecca Balebako, Adam L Durity, and Lorrie Faith Cranor. 2015. A design space for effective privacy notices. In Eleventh Symposium On Usable Privacy and Security (SOUPS 2015). 1--17."},{"key":"e_1_3_2_1_19_1","volume-title":"Crowdsourcing privacy policy analysis: Potential, challenges and best practices. it-Information Technology 58, 5","author":"Schaub Florian","year":"2016","unstructured":"Florian Schaub , Travis D Breaux , and Norman Sadeh . 2016. Crowdsourcing privacy policy analysis: Potential, challenges and best practices. it-Information Technology 58, 5 ( 2016 ), 229--236. Florian Schaub, Travis D Breaux, and Norman Sadeh. 2016. Crowdsourcing privacy policy analysis: Potential, challenges and best practices. it-Information Technology 58, 5 (2016), 229--236."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1111\/jcc4.12052"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/159544.159617"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/329124.329126"},{"key":"e_1_3_2_1_24_1","first-page":"166","article-title":"Privacy and freedom","volume":"25","author":"Westin Alan F","year":"1968","unstructured":"Alan F Westin . 1968 . Privacy and freedom . Washington and Lee Law Review 25 , 1 (1968), 166 . Alan F Westin. 1968. Privacy and freedom. Washington and Lee Law Review 25, 1 (1968), 166.","journal-title":"Washington and Lee Law Review"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P16-1126"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3033701.3033727"}],"event":{"name":"SBES '18: XXXII BRAZILIAN SYMPOSIUM ON SOFTWARE ENGINEERING","acronym":"SBES '18","location":"Sao Carlos Brazil"},"container-title":["Proceedings of the XXXII Brazilian Symposium on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3266237.3266239","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3266237.3266239","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:14:52Z","timestamp":1750281292000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3266237.3266239"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,17]]},"references-count":24,"alternative-id":["10.1145\/3266237.3266239","10.1145\/3266237"],"URL":"https:\/\/doi.org\/10.1145\/3266237.3266239","relation":{},"subject":[],"published":{"date-parts":[[2018,9,17]]},"assertion":[{"value":"2018-09-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}