{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T15:40:39Z","timestamp":1726414839421},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,10,20]],"date-time":"2022-10-20T00:00:00Z","timestamp":1666224000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2022,10,20]],"date-time":"2022-10-20T00:00:00Z","timestamp":1666224000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100001659","name":"German Research Foundation","doi-asserted-by":"crossref","award":["348084924"],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100012687","name":"Universit\u00e4t Kassel","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100012687","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Electron Markets"],"published-print":{"date-parts":[[2022,12]]},"abstract":"Abstract\n<\/jats:title>Novel technologies such as smart personal assistants integrate digital services into everyday life. These services use personal data to offer personalized services. While they are subject to special data protection regulations at the time of development, there are few guidelines describing the transition from legal requirements to implementation. To reduce risks, services depend on external legal assessments. With developers and legal experts often missing either legal or technical knowledge, the challenge lies in bridging this gap. We observe that design patterns support both developers and legal experts, and we present an approach in which design patterns are leveraged to provide twofold value for both developers and legal experts when dealing with novel technologies. We conducted a revelatory case study for smart personal assistants and scaffolded the case interpretation through cognitive fit theory. On the basis of the findings, we develop a theoretical model to explain and predict the twofold value of design patterns to develop and assess lawful technologies.<\/jats:p>","DOI":"10.1007\/s12525-022-00597-1","type":"journal-article","created":{"date-parts":[[2022,10,20]],"date-time":"2022-10-20T13:03:57Z","timestamp":1666271037000},"page":"2311-2331","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["The role of design patterns in the development and legal assessment of lawful technologies"],"prefix":"10.1007","volume":"32","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-1946-4038","authenticated-orcid":false,"given":"Ernestine","family":"Dickhaut","sequence":"first","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-7171-9130","authenticated-orcid":false,"given":"Mahei Manhai","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3149-0340","authenticated-orcid":false,"given":"Andreas","family":"Janson","sequence":"additional","affiliation":[]},{"ORCID":"http:\/\/orcid.org\/0000-0002-1990-2894","authenticated-orcid":false,"given":"Jan Marco","family":"Leimeister","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,20]]},"reference":[{"issue":"2","key":"597_CR1","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1080\/07421222.1996.11518126","volume":"13","author":"R Agarwal","year":"1996","unstructured":"Agarwal, R., Sinha, A. P., & Tanniru, M. (1996). Cognitive fit in requirements modeling: A study of object and process methodologies. Journal of Management Information Systems, 13(2), 137\u2013162. https:\/\/doi.org\/10.1080\/07421222.1996.11518126","journal-title":"Journal of Management Information Systems"},{"key":"597_CR2","volume-title":"A pattern language: Towns, buildings, construction","author":"C Alexander","year":"1977","unstructured":"Alexander, C. (1977). A pattern language: Towns, buildings, construction. Oxford University Press."},{"key":"597_CR3","volume-title":"The timeless way of building (24. print) Center for Environmental Structure series","author":"C Alexander","year":"1979","unstructured":"Alexander, C. (1979). The timeless way of building (24. print) Center for Environmental Structure series. Oxford University Press."},{"issue":"5","key":"597_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3450965","volume":"54","author":"A Aljeraisy","year":"2021","unstructured":"Aljeraisy, A., Barati, M., Rana, O., & Perera, C. (2021). Privacy laws and privacy by design schemes for the Internet of Things. ACM Computing Surveys, 54(5), 1\u201338. https:\/\/doi.org\/10.1145\/3450965","journal-title":"ACM Computing Surveys"},{"issue":"4","key":"597_CR5","doi-asserted-by":"publisher","first-page":"496","DOI":"10.5465\/amr.1989.4308374","volume":"14","author":"SB Bacharach","year":"1989","unstructured":"Bacharach, S. B. (1989). Organizational theories: Some criteria for evaluation. Academy of Management Review, 14(4), 496\u2013515. https:\/\/doi.org\/10.5465\/amr.1989.4308374","journal-title":"Academy of Management Review"},{"key":"597_CR6","unstructured":"Bartolini, C., Giurgiu, A., Lenzini, G., & Robaldo, L. (2016). A framework to reason about the legal compliance of security standards. In\u00a0Proceedings of the 10th International Workshop on Juris-Informatics (JURISIN). https:\/\/orbilu.uni.lu\/handle\/10993\/28786"},{"issue":"1","key":"597_CR7","doi-asserted-by":"publisher","first-page":"26","DOI":"10.1111\/jcom.12276","volume":"67","author":"L Baruh","year":"2017","unstructured":"Baruh, L., Secinti, E., & Cemalcilar, Z. (2017). Online privacy concerns and privacy management: A meta-analytical review. Journal of Communication, 67(1), 26\u201353. https:\/\/doi.org\/10.1111\/jcom.12276","journal-title":"Journal of Communication"},{"key":"597_CR8","unstructured":"Becker, J., Heddier, M., Braeuer, S., & Knackstedt, R. (2014). Integrating regulatory requirements into information systems design and implementation. In\u00a035th International Conference on Information Systems, Auckland 2014."},{"key":"597_CR9","unstructured":"Bellucci, E., & Zeleznikow, J. (2005). Managing negotiation knowledge with the goal of developing negotiation decision support system. In\u00a0ACIS 2005 Proceedings. https:\/\/aisel.aisnet.org\/acis2005\/58"},{"issue":"6","key":"597_CR10","doi-asserted-by":"publisher","first-page":"664","DOI":"10.1057\/ejis.2014.31","volume":"24","author":"A Burton-Jones","year":"2015","unstructured":"Burton-Jones, A., McLean, E. R., & Monod, E. (2015). Theoretical perspectives in IS research: From variance and process to conceptual latitude and conceptual fit. European Journal of Information Systems, 24(6), 664\u2013679. https:\/\/doi.org\/10.1057\/ejis.2014.31","journal-title":"European Journal of Information Systems"},{"issue":"6","key":"597_CR11","doi-asserted-by":"publisher","first-page":"1401","DOI":"10.1007\/s10796-015-9585-y","volume":"17","author":"J Claes","year":"2015","unstructured":"Claes, J., Vanderfeesten, I., Gailly, F., Grefen, P., & Poels, G. (2015). The Structured Process Modeling Theory (SPMT) a cognitive view on why and how modelers benefit from structuring the process of process modeling. Information Systems Frontiers, 17(6), 1401\u20131425. https:\/\/doi.org\/10.1007\/s10796-015-9585-y","journal-title":"Information Systems Frontiers"},{"key":"597_CR12","doi-asserted-by":"publisher","unstructured":"Davern, M., Shaft, T., & Te\u2019eni, D. (2012). Cognition matters: Enduring questions in cognitive IS research. Journal of the Association for Information Systems, 13(4), 273\u2013314. https:\/\/doi.org\/10.17705\/1jais.00290","DOI":"10.17705\/1jais.00290"},{"issue":"1","key":"597_CR13","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1207\/s15327051hci2101_3","volume":"21","author":"A Dearden","year":"2006","unstructured":"Dearden, A., & Finlay, J. (2006). Pattern languages in HCI: A critical review. Human-Computer Interaction, 21(1), 49\u2013102. https:\/\/doi.org\/10.1207\/s15327051hci2101_3","journal-title":"Human-Computer Interaction"},{"key":"597_CR14","doi-asserted-by":"crossref","unstructured":"Dickhaut, E., Janson, A., & Leimeister, J. M. 2020. Codifying interdisciplinary design knowledge through patterns \u2010 The case of smart personal assistants. In S. Hofmann, O. M\u00fcller & M. Rossi (Eds.), Designing for digital transformation. Co-creating services with citizens and industry (pp. 114-125). Springer International Publishing.","DOI":"10.1007\/978-3-030-64823-7_12"},{"key":"597_CR15","unstructured":"European Data Protection Board. (2021). Guidelines 02\/2021 on virtual voice assistants. https:\/\/edpb.europa.eu\/our-work-tools\/public-consultations-art-704\/2021\/guidelines-022021-virtual-voice-assistants_de"},{"key":"597_CR16","unstructured":"General Data Protection Regulation (2018). Regulation (EU) 2016\/679 (General Data Protection Regulation) of the European Parliament and of the Council of 27 April 2016. Retrieved from https:\/\/gdprinfo.eu."},{"issue":"2","key":"597_CR17","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1086\/707731","volume":"5","author":"J Foehr","year":"2020","unstructured":"Foehr, J., & Germelmann, C. C. (2020). Alexa, can I trust you? Exploring consumer paths to trust in smart voice-interaction technologies. Journal of the Association for Consumer Research, 5(2), 181\u2013205. https:\/\/doi.org\/10.1086\/707731","journal-title":"Journal of the Association for Consumer Research"},{"key":"597_CR18","volume-title":"Design Patterns: Elements of Reusable Object Oriented Software","author":"E Gamma","year":"1994","unstructured":"Gamma, E., Helm, R., Johnson, R., & Vlissides, J. (1994). Design patterns: Elements of reusable object oriented software. AddisonWesley Professional."},{"issue":"4","key":"597_CR19","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1007\/s12525-018-0303-8","volume":"28","author":"H Gimpel","year":"2018","unstructured":"Gimpel, H., Kleindienst, D., & Waldmann, D. (2018). The disclosure of private data: Measuring the privacy paradox in digital services. Electronic Markets, 28(4), 475\u2013490. https:\/\/doi.org\/10.1007\/s12525-018-0303-8","journal-title":"Electronic Markets"},{"key":"597_CR20","doi-asserted-by":"publisher","unstructured":"Hafiz, M. (2006). A collection of privacy design patterns. Proceedings of the 2006 Conference on Pattern Languages of Programs. Advance online publication. https:\/\/doi.org\/10.1145\/1415472.1415481","DOI":"10.1145\/1415472.1415481"},{"issue":"4","key":"597_CR21","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/3025099.3025101","volume":"47","author":"NR Hassan","year":"2016","unstructured":"Hassan, N. R. (2016). Editorial: A brief history of the material in sociomateriality. ACM SIGMIS Database: The DATABASE for Advances in Information Systems, 47(4), 10\u201322. https:\/\/doi.org\/10.1145\/3025099.3025101","journal-title":"ACM SIGMIS Database: The DATABASE for Advances in Information Systems"},{"issue":"5","key":"597_CR22","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1016\/j.clsr.2013.07.004","volume":"29","author":"M Hildebrandt","year":"2013","unstructured":"Hildebrandt, M., & Tielemans, L. (2013). Data protection by design and technology neutral law. Computer Law & Security Review, 29(5), 509\u2013521. https:\/\/doi.org\/10.1016\/j.clsr.2013.07.004","journal-title":"Computer Law & Security Review"},{"issue":"2","key":"597_CR23","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/s12599-015-0373-5","volume":"57","author":"A Hoffmann","year":"2015","unstructured":"Hoffmann, A., Schulz, T., Zirfas, J., Hoffmann, H., Ro\u00dfnagel, A., & Leimeister, J. M. (2015). Legal compatibility as a characteristic of sociotechnical systems. Business & Information Systems Engineering, 57(2), 103\u2013113. https:\/\/doi.org\/10.1007\/s12599-015-0373-5","journal-title":"BISE"},{"issue":"3","key":"597_CR24","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1080\/07421222.2004.11045812","volume":"21","author":"W Hong","year":"2004","unstructured":"Hong, W., Tam, J. Y., & Tam, K. Y. (2004). The effects of information format and shopping task on consumers\u2019 online shopping behavior: A cognitive fit perspective. Journal of Management Information Systems, 21(3), 149\u2013184. https:\/\/doi.org\/10.1080\/07421222.2004.11045812","journal-title":"Journal of Management Information Systems"},{"key":"597_CR25","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1109\/EuroSPW54576.2021.00051","volume":"2021","author":"S Human","year":"2021","unstructured":"Human, S., & Kazzazi, M. (2021). Contextuality and intersectionality of e-consent: A human-centric reflection on digital consenting in the emerging genetic data markets. IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), 2021, 307\u2013311. https:\/\/doi.org\/10.1109\/EuroSPW54576.2021.00051","journal-title":"IEEE European Symposium on Security and Privacy Workshops (EuroS&PW)"},{"key":"597_CR26","unstructured":"Huth, D. (2017). A pattern catalog for GDPR Compliant Data Protection. In\u00a0PoEM Doctoral Consortium (pp. 34\u201340). https:\/\/pdfs.semanticscholar.org\/8516\/123f68307638c6c95f202e43624afe9ab74d.pdf"},{"key":"597_CR27","unstructured":"Huth, D., Both, A., Ahmad, J., Sauer, G., & Yilmaz, F., & Matthes, F. (2020). Process and tool support for integration of privacy aspects in agile software engineering. In\u00a0Proceedings of the 26th Americas Conference on Information Systems (AMCIS). https:\/\/aisel.aisnet.org\/amcis2020\/systems_analysis_design\/systems_analysis_design\/6"},{"key":"597_CR28","doi-asserted-by":"publisher","unstructured":"Janssen, A., Passlick, J., Rodr\u00edguez Cardona, D., & Breitner, M. H. (2020). Virtual assistance in any context. Business & Information Systems Engineering. https:\/\/doi.org\/10.1007\/s12599-020-00644-1","DOI":"10.1007\/s12599-020-00644-1"},{"issue":"1","key":"597_CR29","doi-asserted-by":"publisher","first-page":"180","DOI":"10.1080\/07421222.2018.1440772","volume":"35","author":"E Kazan","year":"2018","unstructured":"Kazan, E., Tan, C.-W., Lim, E. T. K., S\u00f8rensen, C., & Damsgaard, J. (2018). Disentangling digital platform competition: The case of UK mobile payment platforms. Journal of Management Information Systems, 35(1), 180\u2013219. https:\/\/doi.org\/10.1080\/07421222.2018.1440772","journal-title":"Journal of Management Information Systems"},{"issue":"1","key":"597_CR30","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1287\/isre.1060.0081","volume":"17","author":"V Khatri","year":"2006","unstructured":"Khatri, V., Vessey, I., Ramesh, V., Clay, P., & Park, S.-J. (2006). Understanding conceptual schemas: Exploring the role of application and IS domain knowledge. Information Systems Research, 17(1), 81\u201399. https:\/\/doi.org\/10.1287\/isre.1060.0081","journal-title":"Information Systems Research"},{"key":"597_CR31","doi-asserted-by":"publisher","unstructured":"Knackstedt, R., Heddier, M., & Becker, J. (2014). Conceptual modeling in law: An interdisciplinary research agenda. Communications of the Association for Information Systems, 34. https:\/\/doi.org\/10.17705\/1CAIS.03436","DOI":"10.17705\/1CAIS.03436"},{"key":"597_CR32","doi-asserted-by":"publisher","unstructured":"Knote, R., Janson, A., S\u00f6llner, M., & Leimeister, J. M. (2021). Value co-creation in smart services: a functional affordances perspective on smart personal assistants. Journal of the Association for Information Systems (JAIS), 418\u2013458. https:\/\/doi.org\/10.2139\/ssrn.3923706","DOI":"10.2139\/ssrn.3923706"},{"key":"597_CR33","unstructured":"K\u00fchling, J., & Martini, M. (2016). Die Datenschutz-Grundverordnung: Revolution oder Evolution im europ\u00e4ischen und deutschen Datenschutzrecht. https:\/\/dopus.uni-speyer.de\/frontdoor\/index\/index\/docId\/3763"},{"issue":"5","key":"597_CR34","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1007\/s12599-016-0444-2","volume":"58","author":"A Maedche","year":"2016","unstructured":"Maedche, A., Morana, S., Schacht, S., Werth, D., & Krumeich, J. (2016). Advanced user assistance systems. Business & Information Systems Engineering, 58(5), 367\u2013370. https:\/\/doi.org\/10.1007\/s12599-016-0444-2","journal-title":"Business & Information Systems Engineering"},{"key":"597_CR35","doi-asserted-by":"crossref","unstructured":"Mayring, P. (2014). Qualitative content analysis: theoretical foundation, basic procedures and software solution. https:\/\/www.ssoar.info\/ssoar\/bitstream\/handle\/document\/39517\/ssoar-2014-mayring-qualitative_content_analysis_theoretical_foundation.pdf","DOI":"10.1007\/978-94-017-9181-6_13"},{"key":"597_CR36","unstructured":"Morc\u00f3n, C. R., Garc\u00eda, J. P., & Pizarro, J. A. S. (2000). Knowledge management in a law firm. The Guest Editors, 51."},{"issue":"3","key":"597_CR37","doi-asserted-by":"publisher","first-page":"382","DOI":"10.2307\/3172751","volume":"29","author":"JL Ozanne","year":"1992","unstructured":"Ozanne, J. L., Strauss, A., & Corbin, J. (1992). Basics of Qualitative Research. Journal of Marketing Research, 29(3), 382. https:\/\/doi.org\/10.2307\/3172751","journal-title":"Journal of Marketing Research"},{"issue":"3","key":"597_CR38","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/1851175.1851177","volume":"41","author":"S Petter","year":"2010","unstructured":"Petter, S., Khazanchi, D., & Murphy, J. D. (2010). A design science based evaluation framework for patterns. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 41(3), 9\u201326. https:\/\/doi.org\/10.1145\/1851175.1851177","journal-title":"ACM SIGMIS Database: the DATABASE for Advances in Information Systems"},{"key":"597_CR39","doi-asserted-by":"publisher","unstructured":"Peukert, C., Bechtold, S., Batikas, M., & Kretschmer, T. (2022). Regulatory spillovers and data governance: Evidence from the GDPR. Marketing Science, 41(4). https:\/\/doi.org\/10.1287\/mksc.2021.1339","DOI":"10.1287\/mksc.2021.1339"},{"key":"597_CR40","doi-asserted-by":"publisher","unstructured":"Politou, E., Alepis, E., & Patsakis, C. (2018). Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions. Journal of Cybersecurity, 4(1). https:\/\/doi.org\/10.1093\/cybsec\/tyy001","DOI":"10.1093\/cybsec\/tyy001"},{"key":"597_CR41","first-page":"76","volume":"23","author":"V Pordesch","year":"1999","unstructured":"Pordesch, V., Ro\u00dfnagel, A., & Schneider, M. (1999). Simulation study mobile and secure communication in healthcare. DuD, 23, 76\u201380.","journal-title":"DuD"},{"key":"597_CR42","doi-asserted-by":"publisher","unstructured":"Purington, A., Taft, J. G., Sannon, S., Bazarova, N. N., & Taylor, S. H. (2017). \"Alexa is my new BFF\". CHI 2017: Late-Breaking Work, 2853\u20132859. https:\/\/doi.org\/10.1145\/3027063.3053246","DOI":"10.1145\/3027063.3053246"},{"key":"597_CR43","unstructured":"Rossi, A., Ducato, R., Haapio, H., Passera, S., & Palmirani, M. (2019). Legal design patterns: Towards a new language for legal information design. In\u00a022nd International Legal Infomatics Symposium (IRIS).\u00a0http:\/\/hdl.handle.net\/10993\/39921"},{"key":"597_CR44","doi-asserted-by":"publisher","unstructured":"Schoonderwoerd, T. A.J., van Zoelen, E. M., van den Bosch, K., & Neerincx, M. A. (2022). Design patterns for human-ai co-learning: A wizard-of-oz evaluation in an urban-search-and-rescue task. International Journal of Human-Computer Studies, 102831. https:\/\/doi.org\/10.1016\/j.ijhcs.2022.102831","DOI":"10.1016\/j.ijhcs.2022.102831"},{"key":"597_CR45","unstructured":"Security Week (2020). Zoom\u2019s security and privacy woes violated GDPR, expert says. Retrieved from\nhttps:\/\/www.Securityweek.Com"},{"key":"597_CR46","doi-asserted-by":"publisher","unstructured":"Sedig, K., & Parsons, P. (2013). Interaction design for complex cognitive activities with visual representations: A pattern-based approach. AIS Transactions on Human-Computer Interaction, 5(2), 84\u2013133. https:\/\/doi.org\/10.17705\/1thci.00055","DOI":"10.17705\/1thci.00055"},{"issue":"1","key":"597_CR47","doi-asserted-by":"publisher","first-page":"29","DOI":"10.2307\/25148716","volume":"30","author":"TM Shaft","year":"2006","unstructured":"Shaft, T. M., & Vessey, I. (2006). The role of cognitive fit in the relationship between software comprehension and modification. MIS Quarterly, 30(1), 29\u201355. https:\/\/doi.org\/10.2307\/25148716","journal-title":"MIS Quarterly"},{"key":"597_CR48","doi-asserted-by":"publisher","first-page":"102601","DOI":"10.1016\/j.ijhcs.2021.102601","volume":"149","author":"M Skjuve","year":"2021","unstructured":"Skjuve, M., F\u00f8lstad, A., Fostervold, K. I., & Brandtzaeg, P. B. (2021). My chatbot companion - A study of human-chatbot relationships. International Journal of Human-Computer Studies, 149, 102601. https:\/\/doi.org\/10.1016\/j.ijhcs.2021.102601","journal-title":"International Journal of Human-Computer Studies"},{"key":"597_CR49","unstructured":"Taylor, P. R. (2001). Patterns as software design canon. In\u00a0Proceedings of the 12th Australasian Conference on Information Systems (ACIS). Retrieved from http:\/\/aisel.aisnet.org\/acis2001"},{"issue":"3","key":"597_CR50","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1177\/1094670516680033","volume":"20","author":"JG Teixeira","year":"2017","unstructured":"Teixeira, J. G., Patr\u00edcio, L., Huang, K.-H., Fisk, R. P., N\u00f3brega, L., & Constantine, L. (2017). The MINDS method. Journal of Service Research, 20(3), 240\u2013258. https:\/\/doi.org\/10.1177\/1094670516680033","journal-title":"Journal of Service Research"},{"key":"597_CR51","doi-asserted-by":"publisher","unstructured":"van der Sype, Y. S., & Maalej, W. (2014). On lawful disclosure of personal user data: What should app developers do? RELAW, 25\u201334. https:\/\/doi.org\/10.1109\/relaw.2014.6893479","DOI":"10.1109\/relaw.2014.6893479"},{"issue":"1","key":"597_CR52","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1287\/isre.2.1.63","volume":"2","author":"I Vessey","year":"1991","unstructured":"Vessey, I., & Galletta, D. (1991). Cognitive fit: An empirical study of information acquisition. Information Systems Research, 2(1), 63\u201384. https:\/\/doi.org\/10.1287\/isre.2.1.63","journal-title":"Information Systems Research"},{"key":"597_CR53","doi-asserted-by":"publisher","unstructured":"vom Brocke, J., Winter, R., Hevner, A., & Maedche, A. (2020). Accumulation and evolution of design knowledge in design science research \u2013 A journey through time and space. Journal of the Association for Information Systems (JAIS), 23(3), 9\u201349.\u00a0https:\/\/doi.org\/10.17705\/1jais.00611","DOI":"10.17705\/1jais.00611"},{"key":"597_CR54","unstructured":"Wania, C. (2019). Exploring design patterns as evaluation tools in human computer interaction education. In Proceedings of the 14th Midwest Association for Information Systems Conference (MWAIS), Oshkosh, Wisconsin."},{"key":"597_CR55","volume-title":"Case study research and applications: Design and methods","author":"RK Yin","year":"2018","unstructured":"Yin, R. K. (2018). Case study research and applications: Design and methods (6th ed.). SAGE.","edition":"6"},{"key":"597_CR56","doi-asserted-by":"publisher","unstructured":"Yskout, K., Scandariato, R., & Joosen, W. (2015). Do security patterns really help designers? In\u00a037th IEEE International Conference on Software Engineering\u00a0(Vol. 1, pp. 292\u2013302). https:\/\/doi.org\/10.1109\/ICSE.2015.49","DOI":"10.1109\/ICSE.2015.49"}],"container-title":["Electronic Markets"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-022-00597-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12525-022-00597-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12525-022-00597-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,4]],"date-time":"2023-02-04T03:39:01Z","timestamp":1675481941000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12525-022-00597-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,20]]},"references-count":56,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,12]]}},"alternative-id":["597"],"URL":"https:\/\/doi.org\/10.1007\/s12525-022-00597-1","relation":{},"ISSN":["1019-6781","1422-8890"],"issn-type":[{"type":"print","value":"1019-6781"},{"type":"electronic","value":"1422-8890"}],"subject":[],"published":{"date-parts":[[2022,10,20]]},"assertion":[{"value":"15 April 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 September 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 October 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}