{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,10]],"date-time":"2025-12-10T12:24:01Z","timestamp":1765369441494,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,4,8]],"date-time":"2019-04-08T00:00:00Z","timestamp":1554681600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Baden-Wurttemberg Stiftung gGmbH"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,4,8]]},"DOI":"10.1145\/3297280.3297432","type":"proceedings-article","created":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T12:18:47Z","timestamp":1556713127000},"page":"1500-1507","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["Recommender-based privacy requirements elicitation - EPICUREAN"],"prefix":"10.1145","author":[{"given":"Christoph","family":"Stach","sequence":"first","affiliation":[{"name":"University of Stuttgart, IPVS \/ AS, Stuttgart, Germany"}]},{"given":"Frank","family":"Steimle","sequence":"additional","affiliation":[{"name":"University of Stuttgart, IPVS \/ AS, Stuttgart, Germany"}]}],"member":"320","published-online":{"date-parts":[[2019,4,8]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","unstructured":"Yuvraj Agarwal and Malcolm Hall. 2013. ProtectMyPrivacy: Detecting and Mitigating Privacy Leaks on iOS Devices Using Crowdsourcing. In Proceeding of the 11<sup>th<\/sup> Annual International Conference on Mobile Systems Applications and Services. 97--110. 10.1145\/2462456.2464460","DOI":"10.1145\/2462456.2464460"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-010-0006-4"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1717171"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1177\/1460458216641480"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2077546.2077568"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335358"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-010-0115-7"},{"key":"e_1_3_2_1_8_1","volume-title":"Adrienne Porter Felt, and David Wagner","author":"Egelman Serge","year":"2013","unstructured":"Serge Egelman, Adrienne Porter Felt, and David Wagner. 2013. Choice Architecture and Smartphone Privacy: There's a Price for That. In The Economics of Information Security and Privacy, Rainer B\u00f6hme (Ed.). Springer, Chapter 10, 211--236."},{"key":"e_1_3_2_1_9_1","unstructured":"European Parliament and Council of the European Union. 2016. Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (Data Protection Directive). Legislative acts L119. Official Journal of the European Union."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2335356.2335360"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2381934.2381943"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2012.12.003"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2457317.2457344"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.protcy.2013.12.183"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijmedinf.2010.10.001"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699108"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162081.2162084"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2011.31"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370216.2370290"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2017.289"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1177\/1460458208096559"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2008.263"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2015.2463313"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3210284.3210296"},{"key":"e_1_3_2_1_25_1","first-page":"1","article-title":"Automatic Keyword Extraction from Individual Documents. In Text Mining. John Wiley & Sons, Ltd","volume":"1","author":"Stuart Rose","year":"2010","unstructured":"Stuart Rose et al. 2010. Automatic Keyword Extraction from Individual Documents. In Text Mining. John Wiley & Sons, Ltd., Chapter 1, 1--20.","journal-title":"Chapter"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1177\/0165551506070706"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2016.15"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-72389-1_42"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2012.6281134"},{"volume-title":"Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops. 238--243","author":"Christoph","key":"e_1_3_2_1_30_1","unstructured":"Christoph Stach et al. 2018. How a Pattern-based Privacy System Contributes to Improve Context Recognition. In Proceedings of the 2018 IEEE International Conference on Pervasive Computing and Communications Workshops. 238--243."},{"volume-title":"Proceedings of the 15<sup>th<\/sup> International Joint Conference on e-Business and Telecommunications. 372--379","author":"Christoph","key":"e_1_3_2_1_31_1","unstructured":"Christoph Stach et al. 2018. The AVARE PATRON: A Holistic Privacy Approach for the Internet of Things. In Proceedings of the 15<sup>th<\/sup> International Joint Conference on e-Business and Telecommunications. 372--379."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006572100300040"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006537300270038"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00607-016-0523-8"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568240"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.2471\/BLT.11.099788"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3077286.3077563"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0991-94"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2015.2480064"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2875475.2875483"}],"event":{"name":"SAC '19: The 34th ACM\/SIGAPP Symposium on Applied Computing","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Limassol Cyprus","acronym":"SAC '19"},"container-title":["Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297280.3297432","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3297280.3297432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:16Z","timestamp":1750208536000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3297280.3297432"}},"subtitle":["an approach to simplify privacy settings in IoT applications with respect to the GDPR"],"short-title":[],"issued":{"date-parts":[[2019,4,8]]},"references-count":40,"alternative-id":["10.1145\/3297280.3297432","10.1145\/3297280"],"URL":"https:\/\/doi.org\/10.1145\/3297280.3297432","relation":{},"subject":[],"published":{"date-parts":[[2019,4,8]]},"assertion":[{"value":"2019-04-08","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}