{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,5]],"date-time":"2024-12-05T05:26:54Z","timestamp":1733376414433,"version":"3.30.1"},"reference-count":57,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T00:00:00Z","timestamp":1733270400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Hellenic Foundation for Research and Innovation,Greece","award":["Project Number: 2550","Project Number: 2550","Project Number: 2550","Project Number: 2550","Project Number: 2550","Project Number: 2550","Project Number: 2550","Project Number: 2550"]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10207-024-00943-8","type":"journal-article","created":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T13:53:11Z","timestamp":1733320391000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Developers\u2019 mindset on self-adaptive privacy and its requirements for cloud computing environments"],"prefix":"10.1007","volume":"24","author":[{"given":"Angeliki","family":"Kitsiou","sequence":"first","affiliation":[]},{"given":"Maria","family":"Sideri","sequence":"additional","affiliation":[]},{"given":"Michail","family":"Pantelelis","sequence":"additional","affiliation":[]},{"given":"Stavros","family":"Simou","sequence":"additional","affiliation":[]},{"given":"Aikaterini\u2013Georgia","family":"Mavroeidi","sequence":"additional","affiliation":[]},{"given":"Katerina","family":"Vgena","sequence":"additional","affiliation":[]},{"given":"Eleni","family":"Tzortzaki","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Kalloniatis","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,4]]},"reference":[{"issue":"6","key":"943_CR1","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/msp.2010.186","volume":"8","author":"H Takabi","year":"2010","unstructured":"Takabi, H., Joshi, J.B., Ahn, G.J.: Security and privacy challenges in cloud computing environments. IEEE Security Privacy Magazine 8(6), 24 (2010). https:\/\/doi.org\/10.1109\/msp.2010.186","journal-title":"IEEE Security Privacy Magazine"},{"key":"943_CR2","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-3-319-73676-1_11","volume-title":"Internet of cloud: security and privacy issues","author":"A Cook","year":"2018","unstructured":"Cook, A., Robinson, M., Ferrag, M.A., Maglaras, L.A., He, Y., Jones, K., Janicke, H.: Internet of cloud: security and privacy issues, pp. 271\u2013301. Springer, Berlin (2018). https:\/\/doi.org\/10.1007\/978-3-319-73676-1_11"},{"key":"943_CR3","doi-asserted-by":"publisher","unstructured":"Kaiser, C., Stocker, A., Festl, A., Petrovic, M., Papatheocharous, E., Wallberg, A., Ezquerro, G., Orbe, J., Szilagyi, T., Fellmann, M.: A vehicle telematics service for driving style detection: Implementation and privacy challenges. In: Proceedings of the 6th International Conference on Vehicle Technology and Intelligent Transport Systems (SCITEPRESS - Science and Technology Publications, 2020).https:\/\/doi.org\/10.5220\/0009329400290036","DOI":"10.5220\/0009329400290036"},{"key":"943_CR4","doi-asserted-by":"publisher","unstructured":"Islam, S., Mouratidis, H., Weippl, E.R.: A Goal-Driven Risk Management Approach to Support Security and Privacy Analysis of Cloud-Based System (IGI Global, 2013), pp. 97\u2013122. https:\/\/doi.org\/10.4018\/978-1-4666-2125-1.ch006","DOI":"10.4018\/978-1-4666-2125-1.ch006"},{"key":"943_CR5","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1007\/978-3-642-32498-7_45","volume-title":"Discussion on the challenges and opportunities of cloud forensics","author":"R Poisel","year":"2012","unstructured":"Poisel, R., Tjoa, S.: Discussion on the challenges and opportunities of cloud forensics, pp. 593\u2013608. Springer, Berlin Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32498-7_45"},{"key":"943_CR6","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1016\/j.cose.2016.08.006","volume":"62","author":"A Razaque","year":"2016","unstructured":"Razaque, A., Rizvi, S.S.: Triangular data privacy - preserving model for authenticating all key stakeholders in a cloud environment. Comput. Security 62, 328 (2016). https:\/\/doi.org\/10.1016\/j.cose.2016.08.006","journal-title":"Comput. Security"},{"key":"943_CR7","doi-asserted-by":"publisher","unstructured":"Omoronyia, I.: Reasoning with imprecise privacy preferences. In: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering (ACM, 2016), FSE\u201916. https:\/\/doi.org\/10.1145\/2950290.2983982","DOI":"10.1145\/2950290.2983982"},{"issue":"5","key":"943_CR8","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1108\/ics-06-2016-0044","volume":"25","author":"C Kalloniatis","year":"2017","unstructured":"Kalloniatis, C.: Incorporating privacy in the design of cloud-based systems: a conceptual meta-model. Information Comput. Security 25(5), 614 (2017). https:\/\/doi.org\/10.1108\/ics-06-2016-0044","journal-title":"Information Comput. Security"},{"key":"943_CR9","doi-asserted-by":"publisher","unstructured":"Bennaceur, A., McCormick, C., Gal\u00c3in, J.G., Perera, C., Smith, A., Zisman, A., Nuseibeh, B.: Feed me, feed me: an exemplar for engineering adaptive software. In: Proceedings of the 11th International Symposium on Software Engineering for Adaptive and Self-Managing Systems (ACM, 2016), ICSE\u201916. https:\/\/doi.org\/10.1145\/2897053.2897071","DOI":"10.1145\/2897053.2897071"},{"key":"943_CR10","doi-asserted-by":"publisher","unstructured":"Pearson, S.: Taking account of privacy when designing cloud computing services. In: 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing (IEEE, 2009). https:\/\/doi.org\/10.1109\/cloud.2009.5071532","DOI":"10.1109\/cloud.2009.5071532"},{"issue":"4","key":"943_CR11","doi-asserted-by":"publisher","first-page":"759","DOI":"10.1016\/j.csi.2013.12.010","volume":"36","author":"C Kalloniatis","year":"2014","unstructured":"Kalloniatis, C., Mouratidis, H., Vassilis, M., Islam, S., Gritzalis, S., Kavakli, E.: Towards the design of secure and privacy-oriented information systems in the cloud: Identifying the major concepts. Comput. Standards Interfaces 36(4), 759 (2014). https:\/\/doi.org\/10.1016\/j.csi.2013.12.010","journal-title":"Comput. Standards Interfaces"},{"key":"943_CR12","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1016\/j.cose.2018.12.014","volume":"82","author":"FAM Ibrahim","year":"2019","unstructured":"Ibrahim, F.A.M., Hemayed, E.E.: Trusted cloud computing architectures for infrastructure as a service: Survey and systematic literature review. Comput. Security 82, 196 (2019). https:\/\/doi.org\/10.1016\/j.cose.2018.12.014","journal-title":"Comput. Security"},{"key":"943_CR13","doi-asserted-by":"publisher","DOI":"10.4172\/2165-7912.1000306","author":"C Kalloniatis","year":"2016","unstructured":"Kalloniatis, C.: Increasing internet users trust in the cloud computing era: The role of privacy. J. Mass Commun. J. (2016). https:\/\/doi.org\/10.4172\/2165-7912.1000306","journal-title":"J. Mass Commun. J."},{"key":"943_CR14","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1016\/j.infsof.2018.09.004","volume":"106","author":"J Zubcoff","year":"2019","unstructured":"Zubcoff, J., Garrig\u00f3s, I., Casteleyn, S., Maz\u00f3n, J.N., Aguilar, J.A., Gomariz-Castillo, F.: Evaluating different i*-based approaches for selecting functional requirements while balancing and optimizing non-functional requirements: A controlled experiment. Information Softw. Technol. 106, 68 (2019). https:\/\/doi.org\/10.1016\/j.infsof.2018.09.004","journal-title":"Information Softw. Technol."},{"issue":"1","key":"943_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3437537","volume":"2","author":"N Alhirabi","year":"2021","unstructured":"Alhirabi, N., Rana, O., Perera, C.: Security and privacy requirements for the internet of things: a survey. ACM Trans. Internet Things 2(1), 1 (2021). https:\/\/doi.org\/10.1145\/3437537","journal-title":"ACM Trans. Internet Things"},{"key":"943_CR16","unstructured":"Shanaa, W., Spier, S., Tenbergen, B.: A case study into the development process of cyber physical systems. In: REFSQ Workshops (2017). https:\/\/api.semanticscholar.org\/CorpusID:18845104"},{"key":"943_CR17","doi-asserted-by":"publisher","unstructured":"Mbanaso, U.M., Chukwudebe, G.A.: Requirement analysis of iot security in distributed systems. In: 2017 IEEE 3rd International Conference on Electro-Technology for National Development (NIGERCON) (IEEE, 2017). https:\/\/doi.org\/10.1109\/nigercon.2017.8281945","DOI":"10.1109\/nigercon.2017.8281945"},{"key":"943_CR18","unstructured":"Li, T.: Privacy annotations: Designing privacy support for developers. In: Ph.D. thesis, Human-Computer Interaction Institute, Carnegie Mellon University (2023). http:\/\/reports-archive.adm.cs.cmu.edu\/anon\/hcii\/CMU-HCII-22-107.pdf"},{"issue":"1","key":"943_CR19","doi-asserted-by":"publisher","first-page":"629","DOI":"10.2478\/popets-2022-0031","volume":"2022","author":"M Namara","year":"2021","unstructured":"Namara, M., Sloan, H., Knijnenburg, B.P.: The effectiveness of adaptation methods in improving user engagement and privacy protection on social network sites. Proc. Privacy Enhancing Technol. 2022(1), 629 (2021). https:\/\/doi.org\/10.2478\/popets-2022-0031","journal-title":"Proc. Privacy Enhancing Technol."},{"issue":"3","key":"943_CR20","doi-asserted-by":"publisher","first-page":"513","DOI":"10.1007\/s11257-019-09246-3","volume":"30","author":"OR Sanchez","year":"2019","unstructured":"Sanchez, O.R., Torre, I., He, Y., Knijnenburg, B.P.: A recommendation approach for user privacy preferences in the fitness domain. User Modeli. User-Adapted Interaction 30(3), 513 (2019). https:\/\/doi.org\/10.1007\/s11257-019-09246-3","journal-title":"User Modeli. User-Adapted Interaction"},{"key":"943_CR21","doi-asserted-by":"publisher","unstructured":"Kitsiou, A., Pantelelis, M., Mavroeidi, A.G., Sideri, M., Simou, S., Vgena, A., Tzortzaki, E., Kalloniatis, C.: Self-adaptive privacy in cloud computing: An overview under an interdisciplinary spectrum. In: Proceedings of the 26th Pan-Hellenic Conference on Informatics (ACM, 2022), PCI 2022. https:\/\/doi.org\/10.1145\/3575879.3575968","DOI":"10.1145\/3575879.3575968"},{"issue":"2","key":"943_CR22","doi-asserted-by":"publisher","first-page":"23","DOI":"10.3390\/fi13020023","volume":"13","author":"A Kitsiou","year":"2021","unstructured":"Kitsiou, A., Tzortzaki, E., Kalloniatis, C., Gritzalis, S.: Identifying privacy related requirements for the design of self-adaptive privacy protections schemes in social networks. Future Internet 13(2), 23 (2021). https:\/\/doi.org\/10.3390\/fi13020023","journal-title":"Future Internet"},{"key":"943_CR23","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-031-23793-5_14","volume-title":"Self-adaptive Privacy Concern Detection for User-Generated Content","author":"XS Vu","year":"2023","unstructured":"Vu, X.S., Jiang, L.: Self-adaptive Privacy Concern Detection for User-Generated Content, pp. 153\u2013167. Springer, Berlin (2023). https:\/\/doi.org\/10.1007\/978-3-031-23793-5_14"},{"key":"943_CR24","doi-asserted-by":"publisher","unstructured":"Wong, R.Y., Mulligan, D.K., Van\u00a0Wyk, E., Pierce, J., Chuang, J.: Eliciting values reflections by engaging privacy futures using design workbooks. In: Proceedings of the ACM on Human-Computer Interaction 1(CSCW), 1 (2017). https:\/\/doi.org\/10.1145\/3134746","DOI":"10.1145\/3134746"},{"issue":"5","key":"943_CR25","doi-asserted-by":"publisher","first-page":"910","DOI":"10.1177\/01622439211039019","volume":"47","author":"B Collier","year":"2021","unstructured":"Collier, B., Stewart, J.: Privacy worlds: exploring values and design in the development of the tor anonymity network. Sci. Technol. Human Values 47(5), 910 (2021). https:\/\/doi.org\/10.1177\/01622439211039019","journal-title":"Sci. Technol. Human Values"},{"issue":"2","key":"943_CR26","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1109\/tts.2023.3257303","volume":"4","author":"C Sanderson","year":"2023","unstructured":"Sanderson, C., Douglas, D., Lu, Q., Schleiger, E., Whittle, J., Lacey, J., Newnham, G., Hajkowicz, S., Robinson, C., Hansen, D.: Ai ethics principles in practice: Perspectives of designers and developers. IEEE Trans. Technol. Soc. 4(2), 171 (2023). https:\/\/doi.org\/10.1109\/tts.2023.3257303","journal-title":"IEEE Trans. Technol. Soc."},{"key":"943_CR27","unstructured":"Hasson, T.: Examining Information Systems Developers\u2019 Perceptions of Privacy (University of Haifa (Israel), 2014)"},{"key":"943_CR28","unstructured":"Adams, D., Bah, A., Barwulor, C., Musaby, N., Pitkin, K., Redmiles, E.M.: Ethics emerging: the story of privacy and security perceptions in virtual reality. In: Fourteenth Symposium on Usable Privacy and Security (SOUPS 2018) (2018), pp. 427\u2013442"},{"issue":"1","key":"943_CR29","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1007\/s10664-017-9517-1","volume":"23","author":"I Hadar","year":"2017","unstructured":"Hadar, I., Hasson, T., Ayalon, O., Toch, E., Birnhack, M., Sherman, S., Balissa, A.: Privacy by designers: software developers\u2019 privacy mindset. Empirical Software Eng. 23(1), 259 (2017). https:\/\/doi.org\/10.1007\/s10664-017-9517-1","journal-title":"Empirical Software Eng."},{"issue":"3","key":"943_CR30","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1080\/01972243.2019.1583296","volume":"35","author":"K Bednar","year":"2019","unstructured":"Bednar, K., Spiekermann, S., Langheinrich, M.: Engineering privacy by design: Are engineers ready to live up to the challenge? Information Soc. 35(3), 122 (2019). https:\/\/doi.org\/10.1080\/01972243.2019.1583296","journal-title":"Information Soc."},{"key":"943_CR31","doi-asserted-by":"publisher","unstructured":"Ervik, S.: Privacy by design applied in practice and the consequences for system developers (2019). https:\/\/doi.org\/10.7275\/z6fm-2e34","DOI":"10.7275\/z6fm-2e34"},{"key":"943_CR32","doi-asserted-by":"publisher","unstructured":"Horstmann, S.A., Domiks, S., Gutfleisch, M., Tran, M., Acar, Y., Moonsamy, V., Naiakshina, A.: \u201cthose things are written by lawyers, and programmers are reading that.\u201d mapping the communication gap between software developers and privacy experts. In: Proceedings on Privacy Enhancing Technologies 2024(1), 151 (2024). https:\/\/doi.org\/10.56553\/popets-2024-0010","DOI":"10.56553\/popets-2024-0010"},{"key":"943_CR33","doi-asserted-by":"publisher","unstructured":"Ayalon, O., Toch, E., Hadar, I., Birnhack, M.: How developers make design decisions about users\u2019 privacy: The place of professional communities and organizational climate. In: Companion of the 2017 ACM Conference on Computer Supported Cooperative Work and Social Computing (ACM, 2017), CSCW \u201917. https:\/\/doi.org\/10.1145\/3022198.3026326","DOI":"10.1145\/3022198.3026326"},{"key":"943_CR34","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/978-3-030-44429-7_8","volume-title":"On understanding how developers perceive and interpret privacy requirements research preview","author":"P Mariana","year":"2020","unstructured":"Mariana, P., Dayse, F., Mateus, C., Carla, S., J\u00e9ssyka, V., Jo\u00e3o, A., Tony, G.: On understanding how developers perceive and interpret privacy requirements research preview, pp. 116\u2013123. Springer, Berlin (2020). https:\/\/doi.org\/10.1007\/978-3-030-44429-7_8"},{"key":"943_CR35","doi-asserted-by":"publisher","unstructured":"Tahaei, M., Frik, A., Vaniea, K.: Privacy champions in software teams: Understanding their motivations, strategies, and challenges. In: Proceedings of the 2021 CHI Conference on Human Factors in Computing Systems (ACM, 2021), CHI \u201921. https:\/\/doi.org\/10.1145\/3411764.3445768","DOI":"10.1145\/3411764.3445768"},{"issue":"9","key":"943_CR36","doi-asserted-by":"publisher","first-page":"4324","DOI":"10.1109\/tse.2023.3290237","volume":"49","author":"LH Iwaya","year":"2023","unstructured":"Iwaya, L.H., Babar, M.A., Rashid, A.: Privacy engineering in the wild: understanding the practitioners\u2019 mindset, organizational aspects, and current practices. IEEE Trans. Software Eng. 49(9), 4324 (2023). https:\/\/doi.org\/10.1109\/tse.2023.3290237","journal-title":"IEEE Trans. Software Eng."},{"key":"943_CR37","unstructured":"Issari, P., Pourkos, M.: in Qualitative research methodology (Kallipos, Open Academic Publications, 2015), pp. 96\u2013114. https:\/\/hdl.handle.net\/11419\/5821. (in Greek)"},{"key":"943_CR38","unstructured":"Creswell, J.: Educational Research: Planning, Conducting, and Evaluating Quantitative and Qualitative Research. Educational Research: Planning, Conducting, and Evaluating Quantitative and Qualitative Research (Pearson, 2012). https:\/\/books.google.gr\/books?id=1bk3YgEACAAJ"},{"key":"943_CR39","volume-title":"Real-world research: a means for social scientists and professional researchers","author":"C Robson","year":"2010","unstructured":"Robson, C.: Real-world research: a means for social scientists and professional researchers. Gutenberg, Athens (2010)"},{"key":"943_CR40","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1016\/b978-008043972-3\/50022-0","volume-title":"Qualitative research: experiences in using semi-structured interviews","author":"J Horton","year":"2004","unstructured":"Horton, J., Macve, R., Struyven, G.: Qualitative research: experiences in using semi-structured interviews, pp. 339\u2013357. Elsevier, Amsterdam (2004). https:\/\/doi.org\/10.1016\/b978-008043972-3\/50022-0"},{"key":"943_CR41","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1007\/978-3-030-64330-0_8","volume-title":"Self adaptive privacy in cloud computing environments: identifying the major socio-technical concepts","author":"A Kitsiou","year":"2020","unstructured":"Kitsiou, A., Tzortzaki, E., Kalloniatis, C., Gritzalis, S.: Self adaptive privacy in cloud computing environments: identifying the major socio-technical concepts, pp. 117\u2013132. Springer, Berlin (2020). https:\/\/doi.org\/10.1007\/978-3-030-64330-0_8"},{"key":"943_CR42","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1016\/b978-0-12-819204-7.00002-6","volume-title":"Towards an integrated socio-technical approach for designing adaptive privacy aware services in cloud computing","author":"A Kitsiou","year":"2020","unstructured":"Kitsiou, A., Tzortzaki, E., Kalloniatis, C., Gritzalis, S.: Towards an integrated socio-technical approach for designing adaptive privacy aware services in cloud computing, pp. 9\u201332. Elsevier, Amsterdam (2020). https:\/\/doi.org\/10.1016\/b978-0-12-819204-7.00002-6"},{"key":"943_CR43","unstructured":"Babbie, E.R.: The practice of social research (Cengage AU, 2020)"},{"key":"943_CR44","doi-asserted-by":"publisher","unstructured":"Delbru, R., Campinas, S., Tummarello, G.: Searching web data: An entity retrieval and high-performance indexing model. J. Web Semantics 10, 33 (2012). https:\/\/doi.org\/10.1016\/j.websem.2011.04.004","DOI":"10.1016\/j.websem.2011.04.004"},{"issue":"2","key":"943_CR45","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1191\/1478088706qp063oa","volume":"3","author":"V Braun","year":"2006","unstructured":"Braun, V., Clarke, V.: Using thematic analysis in psychology. Qualitative Res. Psychol. 3(2), 77 (2006). https:\/\/doi.org\/10.1191\/1478088706qp063oa","journal-title":"Qualitative Res. Psychol."},{"key":"943_CR46","volume-title":"Qualitative Researching","author":"J Mason","year":"2002","unstructured":"Mason, J.: Qualitative Researching. Sage Publications, London, Thousand Oaks and New Delhi (2002)"},{"key":"943_CR47","volume-title":"Introduction to pshycopaidagogic research and methodology","author":"M Vamvoukas","year":"2010","unstructured":"Vamvoukas, M.: Introduction to pshycopaidagogic research and methodology. Grigoris, Athens (2010). ((in Greek))"},{"key":"943_CR48","volume-title":"Methods and techniques of analysis in qualitative social research","author":"G Tsiolis","year":"2014","unstructured":"Tsiolis, G.: Methods and techniques of analysis in qualitative social research. Kritiki, Athens (2014). ((in Greek))"},{"key":"943_CR49","doi-asserted-by":"publisher","unstructured":"Stemler, S.: An overview of content analysis (University of Massachusetts Amherst, 2000). https:\/\/doi.org\/10.7275\/Z6FM-2E34","DOI":"10.7275\/Z6FM-2E34"},{"key":"943_CR50","volume-title":"Critical discourse analysis. The critical study of language","author":"N Fairclough","year":"1995","unstructured":"Fairclough, N.: Critical discourse analysis. The critical study of language. Longman, London (1995)"},{"key":"943_CR51","unstructured":"Van\u00a0Dijk, T.A.: Ideology: A multidisciplinary approach, Ideology pp. 1\u2013384 (1998)"},{"key":"943_CR52","doi-asserted-by":"publisher","first-page":"259","DOI":"10.3233\/AO-150157","volume":"10","author":"G Guizzardi","year":"2015","unstructured":"Guizzardi, G., Wagner, G., Almeida, J.P.A., Guizzardi, R.: Towards ontological foundations for conceptual modeling: The unified foundational ontology (ufo) story. Appl. Ontol. 10, 259 (2015)","journal-title":"Appl. Ontol."},{"key":"943_CR53","unstructured":"Kutzner, K., Schoormann, T., Knackstedt, R.: Digital transformation in information systems research: a taxonomy-based approach to structure the field. In: European Conference on Information Systems (2018). https:\/\/api.semanticscholar.org\/CorpusID:56149011"},{"key":"943_CR54","unstructured":"Oberl\u00e4nder, A.M., L\u00f6sser, B., Rau, D.: Taxonomy research in information systems: a systematic assessment. In: 27th European Conference on Information Systems - Information Systems for a Sharing Society, ECIS 2019, Stockholm and Uppsala, Sweden, June 8-14, 2019, ed. by J.\u00a0vom Brocke, S.\u00a0Gregor, O.M. 0001 (2019). https:\/\/aisel.aisnet.org\/ecis2019_rp\/144"},{"key":"943_CR55","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1057\/ejis.2012.26","volume":"22","author":"RC Nickerson","year":"2013","unstructured":"Nickerson, R.C., Varshney, U., Muntermann, J.: A method for taxonomy development and its application in information systems. Eur. J. Information Syst. 22, 336 (2013)","journal-title":"Eur. J. Information Syst."},{"key":"943_CR56","doi-asserted-by":"publisher","unstructured":"Boteju, M., Ranbaduge, T., Vatsalan, D., Arachchilage, N.A.G.: Sok: Demystifying privacy enhancing technologies through the lens of software developers (2024). https:\/\/doi.org\/10.48550\/ARXIV.2401.00879","DOI":"10.48550\/ARXIV.2401.00879"},{"key":"943_CR57","doi-asserted-by":"publisher","unstructured":"Runeson, P., H\u00f6st, M.: Guidelines for conducting and reporting case study research in software engineering. Empirical Software Eng. 14(2), 131 (2008). https:\/\/doi.org\/10.1007\/s10664-008-9102-8","DOI":"10.1007\/s10664-008-9102-8"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00943-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00943-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00943-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,4]],"date-time":"2024-12-04T14:04:17Z","timestamp":1733321057000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00943-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,4]]},"references-count":57,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["943"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00943-8","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,12,4]]},"assertion":[{"value":"4 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"All procedures performed in studies involving human participants were in accordance with the ethical standards of the University of the Aegean institutional research committee. Informed consent was obtained from all individual participants involved in the study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with Ethical Standards"}}],"article-number":"38"}}