{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T14:50:00Z","timestamp":1762008600269,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,9,17]],"date-time":"2018-09-17T00:00:00Z","timestamp":1537142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,9,17]]},"DOI":"10.1145\/3266237.3266270","type":"proceedings-article","created":{"date-parts":[[2018,9,28]],"date-time":"2018-09-28T20:59:18Z","timestamp":1538168358000},"page":"112-121","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Specifying privacy requirements with goal-oriented modeling languages"],"prefix":"10.1145","author":[{"given":"Mariana Maia","family":"Peixoto","sequence":"first","affiliation":[{"name":"Universidade Federal de Pernambuco, Recife, PE, Brazil"}]},{"given":"Carla","family":"Silva","sequence":"additional","affiliation":[{"name":"Universidade Federal de Pernambuco, Recife, PE, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2018,9,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.03.011"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486872"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2012.6345797"},{"key":"e_1_3_2_1_4_1","first-page":"3","article-title":"Legacy of Warren and Brandeis Article: The Emerging Unencumbered Constitutional Right to Information Privacy","volume":"10","author":"Turkington Richard C.","year":"1990","unstructured":"Richard C. Turkington . 1990 . Legacy of Warren and Brandeis Article: The Emerging Unencumbered Constitutional Right to Information Privacy . Northern Illinois University Law Review 10 , 3 (Summer 1990): 479. Richard C. Turkington.1990. Legacy of Warren and Brandeis Article: The Emerging Unencumbered Constitutional Right to Information Privacy. Northern Illinois University Law Review 10, 3 (Summer 1990): 479.","journal-title":"Northern Illinois University Law Review"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-008-0067-3"},{"volume-title":"Paolo Giorgini and John Mylopoulos","year":"2017","key":"e_1_3_2_1_6_1","unstructured":"Gharib, Mohamad , Paolo Giorgini and John Mylopoulos . 2017 . Towards an Ontology for Privacy Requirements via a Systematic Literature Review. In : Mayr H., Guizzardi G., Ma H., Pastor O. (eds) Conceptual Modeling. ER 2017. LNCS, vol 10650. Springer , Cham. Gharib, Mohamad, Paolo Giorgini and John Mylopoulos. 2017. Towards an Ontology for Privacy Requirements via a Systematic Literature Review. In: Mayr H., Guizzardi G., Ma H., Pastor O. (eds) Conceptual Modeling. ER 2017. LNCS, vol 10650. Springer, Cham."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the Workshop Requirements Engineering (WER)","author":"Webster Ilca","year":"2005","unstructured":"Ilca Webster , Vera Ivanova and Luiz Marcio Cysneiros 2005 . Reusable Knowledge for Achieving Privacy: A Canadian Health Information Technologies Perspective . In Proceedings of the Workshop Requirements Engineering (WER) . Porto, Portugal, 112--122. Ilca Webster, Vera Ivanova and Luiz Marcio Cysneiros 2005. Reusable Knowledge for Achieving Privacy: A Canadian Health Information Technologies Perspective. In Proceedings of the Workshop Requirements Engineering (WER). Porto, Portugal, 112--122."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2012.29"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/PCI.2009.45"},{"volume-title":"Software Engineering. (9<sup>th<\/sup> ed.)","author":"Sommerville Ian","key":"e_1_3_2_1_10_1","unstructured":"Ian Sommerville . 2011. Software Engineering. (9<sup>th<\/sup> ed.) . S\u00e3o Paulo : Pearson -Addison Wesley . Ian Sommerville. 2011. Software Engineering. (9<sup>th<\/sup> ed.). S\u00e3o Paulo: Pearson -Addison Wesley."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/827255.827807"},{"key":"e_1_3_2_1_12_1","unstructured":"Fabiano Dalpiaz Xavier Franch and Jennifer Horkoff 2016. istar 2.0 language guide. arXiv preprint arXiv: 1605.07767.  Fabiano Dalpiaz Xavier Franch and Jennifer Horkoff 2016. istar 2.0 language guide. arXiv preprint arXiv: 1605.07767."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5269-7"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194007003240"},{"key":"e_1_3_2_1_15_1","volume-title":"Retrieved","author":"Peixoto Mariana","year":"2018","unstructured":"Mariana Peixoto and Carla Silva . 2018 . Privacy in Requirements Engineering . Retrieved July 12, 2018 from https:\/\/sites.google.com\/cin.ufpe.br\/privacyconcepts\/home. Mariana Peixoto and Carla Silva. 2018. Privacy in Requirements Engineering. Retrieved July 12, 2018 from https:\/\/sites.google.com\/cin.ufpe.br\/privacyconcepts\/home."},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the ISCA 24th International Conference on Computer Applications in Industry and Engineering (CAINE)","author":"Bano Jameela","year":"2011","unstructured":"Aljahdali, Sultan, Jameela Bano , and Nisar Hundewale . 2011 . Goal Oriented Requirements Engineering - A Review . In Proceedings of the ISCA 24th International Conference on Computer Applications in Industry and Engineering (CAINE) . Honolulu, Hawaii, USA. Aljahdali, Sultan, Jameela Bano, and Nisar Hundewale. 2011. Goal Oriented Requirements Engineering - A Review. In Proceedings of the ISCA 24th International Conference on Computer Applications in Industry and Engineering (CAINE). Honolulu, Hawaii, USA."},{"key":"e_1_3_2_1_17_1","volume-title":"Retrieved","author":"Pimentel Jo\u00e3o","year":"2018","unstructured":"Jo\u00e3o Pimentel . 2018 . piStar tool . Retrieved July 12, 2018 from www.cin.ufpe.br\/~jhcp\/pistar\/#. Jo\u00e3o Pimentel. 2018. piStar tool. Retrieved July 12, 2018 from www.cin.ufpe.br\/~jhcp\/pistar\/#."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69534-9_40"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3131151.3131175"},{"volume-title":"Based on Secure Tropos. In Forum at the Conference on Advanced Information Systems Engineering","author":"Pavlidis Michalis","key":"e_1_3_2_1_20_1","unstructured":"Michalis Pavlidis , Shareeful Islam , and Haralambos Mouratidis . 2011. A CASE Tool to Support Automated Modelling and Analysis of Security Requirements , Based on Secure Tropos. In Forum at the Conference on Advanced Information Systems Engineering . Springer , Berlin, Heidelberg , 95--109. Michalis Pavlidis, Shareeful Islam, and Haralambos Mouratidis. 2011. A CASE Tool to Support Automated Modelling and Analysis of Security Requirements, Based on Secure Tropos. In Forum at the Conference on Advanced Information Systems Engineering. Springer, Berlin, Heidelberg, 95--109."},{"key":"e_1_3_2_1_21_1","unstructured":"ISO International Organization for Standardization. 29100 Information technology --- Security techniques --- Privacy framework International Electrotechnical Commission.  ISO International Organization for Standardization. 29100 Information technology --- Security techniques --- Privacy framework International Electrotechnical Commission."},{"key":"e_1_3_2_1_22_1","unstructured":"GDPR General Data Protection Regulation. 2018. Retrieved April 21 2018 from https:\/\/gdpr-info.eu\/.  GDPR General Data Protection Regulation. 2018. Retrieved April 21 2018 from https:\/\/gdpr-info.eu\/."},{"key":"e_1_3_2_1_23_1","volume-title":"Retrieved","author":"OECD","year":"2018","unstructured":"OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. 2013 . Retrieved July 12, 2018 from http:\/\/www.oecd.org\/sti\/ieconomy\/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm. OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data. 2013. Retrieved July 12, 2018 from http:\/\/www.oecd.org\/sti\/ieconomy\/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm."},{"key":"e_1_3_2_1_24_1","volume-title":"Ant\u00f3n","author":"He Qingfeng","year":"2003","unstructured":"Qingfeng He and Annie I . Ant\u00f3n . 2003 . A Framework for Privacy-Enhanced Access Control Analysis in Requirements Engineering. Dept. of Computer Science Technical Report TR-2004-22. North Carolina State University . Qingfeng He and Annie I. Ant\u00f3n. 2003. A Framework for Privacy-Enhanced Access Control Analysis in Requirements Engineering. Dept. of Computer Science Technical Report TR-2004-22. North Carolina State University."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.22"},{"key":"e_1_3_2_1_26_1","volume-title":"Bj\u00f6rn Regnell and Anders Wessl\u00e9n","author":"Wohlin Claes","year":"2012","unstructured":"Claes Wohlin , Per Runeson , Martin H\u00f6st , Magnus C. Ohlsson , Bj\u00f6rn Regnell and Anders Wessl\u00e9n . 2012 . Experimentation in Software Engineering. Springer Publishing Company , Incorporated. Claes Wohlin, Per Runeson, Martin H\u00f6st, Magnus C. Ohlsson, Bj\u00f6rn Regnell and Anders Wessl\u00e9n. 2012. Experimentation in Software Engineering. Springer Publishing Company, Incorporated."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568240"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87991-6_3"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.05.075"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/RePa.2014.6894841"},{"key":"e_1_3_2_1_31_1","unstructured":"Lillian R\u00f8stad. 2008. An extended misuse case notation: Including vulnerabilities and the insider threat. Access Control in Healthcare Information Systems 67.  Lillian R\u00f8stad. 2008. An extended misuse case notation: Including vulnerabilities and the insider threat. Access Control in Healthcare Information Systems 67."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2011.01.018"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2835417.2835422"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2555014"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2016.41"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9517-1"}],"event":{"name":"SBES '18: XXXII BRAZILIAN SYMPOSIUM ON SOFTWARE ENGINEERING","acronym":"SBES '18","location":"Sao Carlos Brazil"},"container-title":["Proceedings of the XXXII Brazilian Symposium on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3266237.3266270","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3266237.3266270","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:26:51Z","timestamp":1750278411000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3266237.3266270"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9,17]]},"references-count":36,"alternative-id":["10.1145\/3266237.3266270","10.1145\/3266237"],"URL":"https:\/\/doi.org\/10.1145\/3266237.3266270","relation":{},"subject":[],"published":{"date-parts":[[2018,9,17]]},"assertion":[{"value":"2018-09-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}