{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:17:22Z","timestamp":1725790642687},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319058429"},{"type":"electronic","value":"9783319058436"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-05843-6_12","type":"book-chapter","created":{"date-parts":[[2014,3,17]],"date-time":"2014-03-17T21:05:28Z","timestamp":1395090328000},"page":"152-167","source":"Crossref","is-referenced-by-count":10,"title":["Systematic Elaboration of Compliance Requirements Using Compliance Debt and Portfolio Theory"],"prefix":"10.1007","author":[{"given":"Bendra","family":"Ojameruaye","sequence":"first","affiliation":[]},{"given":"Rami","family":"Bahsoon","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Jansen, W., Grance, T.: Guidelines on Security and Privacy in Public Cloud Computing. In: National Institute of Standards and Technology (2011)","DOI":"10.6028\/NIST.SP.800-144"},{"key":"12_CR2","unstructured":"Lubars, M., Potts, C., Richter, C.: A Review of the State of the Practice in Requirements Modelling. In: IEEE International Symposium on Requirements Engineering, pp. 2\u201314 (1993)"},{"key":"12_CR3","doi-asserted-by":"crossref","unstructured":"Nuseibeh, B., Easterbrook, S.: Requirements Engineering: A Roadmap. In: Proceedings of the Conference on the Future of Software Engineering, pp. 4\u201311 (2000)","DOI":"10.1145\/336512.336523"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Saaty, L.: The Analytical Hierarchy Process. McGraw-Hill (1980)","DOI":"10.21236\/ADA214804"},{"issue":"1","key":"12_CR5","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/BF02802897","volume":"2","author":"J. Karlsson","year":"1997","unstructured":"Karlsson, J., Olsson, S., Ryan, K.: Improved Practical Support for Large-scale Requirements Prioritising. Requirements Engineering\u00a02(1), 51\u201360 (1997)","journal-title":"Requirements Engineering"},{"key":"12_CR6","unstructured":"Sivzattian, S., Nuseibe, B.: Linking the Selection of Requirements to Market Value: A Portfolio-Based Approach. In: Proceedings of 7th International Workshop on Requirements Engineering: Foundation for Software Quality (2001)"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Seaman, C., Guo, Y., Izurieta, C., Cai, Y., Zazworka, N., Shull, F., Vetro, A.: Using technical debt data in decision making: Potential decision approaches. In: 2012 Third International Workshop on Managing Technical Debt (MTD), pp. 45\u201348 (2012)","DOI":"10.1109\/MTD.2012.6225999"},{"key":"12_CR8","doi-asserted-by":"crossref","unstructured":"Benbasat, I., Cavusoglu, H., Bulgurcu, B.: Information Security compliance: An empirical study of rationality-based beliefs and information security awareness. MIS Quarterly, 523\u2013548 (2010)","DOI":"10.2307\/25750690"},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1287\/isre.1080.0174","volume":"20","author":"S. Ransbotham","year":"2009","unstructured":"Ransbotham, S., Mitra, S.: Choice and Chance: A Conceptual Model of Paths to Information Security Compromise. Information Systems Research\u00a020, 121\u2013139 (2009)","journal-title":"Information Systems Research"},{"key":"12_CR10","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1109\/TSE.2007.70754","volume":"34","author":"C. Haley","year":"2008","unstructured":"Haley, C., Laney, R., Moffett, J., Nuseibeh: Security Requirements Engineering: A Framework for Representation and Analysis. IEEE Transactions on Software Engineering\u00a034, 133\u2013151 (2008)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1109\/TSE.2012.12","volume":"39","author":"L. Duboc","year":"2013","unstructured":"Duboc, L., Letier, E., Rosenblum, D.: Systematic Elaboration of Scalability Requirements through Goal-Obstacle Analysis. IEEE Transactions on Software Engineering\u00a039, 119\u2013140 (2013)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"12_CR12","unstructured":"van Lamsweerde, A.: Goal-Oriented Requirements Engineering: A Guided Tour. In: Proceedings of 5th IEEE International Symposium on Requirements Engineering, pp. 249\u2013263 (2001)"},{"issue":"10","key":"12_CR13","first-page":"978","volume":"26","author":"E. Letier","year":"2000","unstructured":"Letier, E., Lamsweerde, A.: Handling Obstacles in Goal-Oriented Requirements Engineering. IEEE Transactions on Software Engineering, Special Issue on Exception Handling\u00a026(10), 978\u20131005 (2000)","journal-title":"IEEE Transactions on Software Engineering, Special Issue on Exception Handling"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Breaux, T., Anton, A., Vail, M.: Towards Compliance: Extracting Rights and Obligations to Align Requirements with Regulations. In: 14th IEEE International Conference on Requirements Engineering, pp. 49\u201358, 11\u201315 (2006)","DOI":"10.1109\/RE.2006.68"},{"key":"12_CR15","doi-asserted-by":"crossref","unstructured":"Giorgini, P., Mylopoulos, J., Massacci, F.: Modelling Security Requirements through Ownership, Permission and Delegation. In: Proceedings of the 13th IEEE International Conference on Requirements Engineering, pp. 167\u2013176 (2005)","DOI":"10.1109\/RE.2005.43"},{"key":"12_CR16","unstructured":"Van Lamsweerde, A.: Elaborating security requirements by construction of intentional anti-models. In: Proceedings of 26th International Conference on Software Engineering, pp. 148\u2013157 (2004)"},{"key":"12_CR17","unstructured":"May, M., Gunter, C., Lee, I.: Privacy APIs: Access Control Techniques to Analyse and Verify Legal Privacy Policies. In: 19th IEEE Computer Security Foundations Workshop, pp. 13\u201397 (2006)"},{"key":"12_CR18","doi-asserted-by":"crossref","unstructured":"Burgemeestre, B., Hulstijn, J., Tan, Y.: Value-Based Argumentation for Justifying Compliance. In: Governatori, G., Sartor, G. (eds.) Deontic Logic in Computer Science, pp. 214\u2013228. Guido Governatori (2010)","DOI":"10.1007\/978-3-642-14183-6_16"},{"key":"12_CR19","volume-title":"Portfolio Selection: Efficient Diversification of Investments","author":"H.M. Markowitz","year":"1957","unstructured":"Markowitz, H.M.: Portfolio Selection: Efficient Diversification of Investments. John Wiley & Sons, New York (1957)"},{"key":"12_CR20","doi-asserted-by":"crossref","unstructured":"Guo, Y., Seaman, C.: A Portfolio Approach to Technical Debt Management. In: Proceedings of the 2nd Workshop on Managing Technical Debt, MTD 2011, pp. 31\u201334 (2011)","DOI":"10.1145\/1985362.1985370"},{"key":"12_CR21","doi-asserted-by":"crossref","unstructured":"ALRebeish, F., Bahsoon, R.: Risk-Aware Web Service Allocation in the Cloud Using Portfolio Theory. In: Proceedings of the 2013 IEEE International Conference on Services Computing, pp. 675\u2013682 (2013)","DOI":"10.1109\/SCC.2013.40"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Brown, N., Cai, Y., Guo, Y., Kazman, R., Kim, M., Kruchten, P., Lim, E., MacCormack, A., Nord, R., Ozkaya, I., Sangwan, R., Seaman, C., Sullivan, K.: Zazworka. N.: Managing technical debt in software-reliant systems. In: Proceedings of the FSE\/SDP Workshop on Future of Software Engineering Research, FoSER 2010, pp. 47\u201352 (2010)","DOI":"10.1145\/1882362.1882373"},{"key":"12_CR23","doi-asserted-by":"crossref","unstructured":"Zardari, S., Faniyi, F., Bahsoon, R.: Using Obstacles for Systematically Modelling, Analysing and Mitigating Risks in Cloud Adoption. In: Aligning Enterprise, System and Software Architectures, pp. 275\u2013296. IGI Global (2013)","DOI":"10.4018\/978-1-4666-2199-2.ch014"}],"container-title":["Lecture Notes in Computer Science","Requirements Engineering: Foundation for Software Quality"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-05843-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T07:50:43Z","timestamp":1558857043000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-05843-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319058429","9783319058436"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-05843-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}