{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,8]],"date-time":"2024-07-08T21:22:09Z","timestamp":1720473729510},"reference-count":10,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,2,1]],"date-time":"2023-02-01T00:00:00Z","timestamp":1675209600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Information and Software Technology"],"published-print":{"date-parts":[[2023,2]]},"DOI":"10.1016\/j.infsof.2022.107090","type":"journal-article","created":{"date-parts":[[2022,10,17]],"date-time":"2022-10-17T17:36:19Z","timestamp":1666028179000},"page":"107090","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":1,"special_numbering":"C","title":["Exploring privacy requirements gap between developers and end users"],"prefix":"10.1016","volume":"154","author":[{"given":"Jianzhang","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jinping","family":"Hua","sequence":"additional","affiliation":[]},{"given":"Nan","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Sisi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Juha","family":"Savolainen","sequence":"additional","affiliation":[]},{"given":"Chuang","family":"Liu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/j.infsof.2022.107090_b1","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MS.2015.153","article-title":"Toward data-driven requirements engineering","volume":"33","author":"Maalej","year":"2016","journal-title":"IEEE Software"},{"key":"10.1016\/j.infsof.2022.107090_b2","series-title":"2019 IEEE Symposium on Security and Privacy","first-page":"555","article-title":"Short text, large effect: Measuring the impact of user reviews on android app security & privacy","author":"Nguyen","year":"2019"},{"key":"10.1016\/j.infsof.2022.107090_b3","doi-asserted-by":"crossref","first-page":"332","DOI":"10.1016\/j.cose.2019.02.010","article-title":"Revealing the unrevealed: Mining smartphone users privacy perception on app markets","volume":"83","author":"Hatamian","year":"2019","journal-title":"Comput. Secur."},{"issue":"1","key":"10.1016\/j.infsof.2022.107090_b4","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s00766-018-0305-2","article-title":"RSL-IL4privacy: A domain-specific language for the rigorous specification of privacy policies","volume":"24","author":"Caramujo","year":"2019","journal-title":"Requir. Eng."},{"key":"10.1016\/j.infsof.2022.107090_b5","first-page":"1","article-title":"A systematic mapping study on automated analysis of privacy policies","author":"Del\u00a0Alamo","year":"2022","journal-title":"Computing"},{"key":"10.1016\/j.infsof.2022.107090_b6","doi-asserted-by":"crossref","unstructured":"M. R\u00f6der, A. Both, A. Hinneburg, Exploring the space of topic coherence measures, in: WSDM, 2015, pp. 399\u2013408.","DOI":"10.1145\/2684822.2685324"},{"key":"10.1016\/j.infsof.2022.107090_b7","doi-asserted-by":"crossref","unstructured":"N. Reimers, I. Gurevych, Sentence-BERT: Sentence Embeddings using Siamese BERT-Networks, in: EMNLP-IJCNLP, 2019, pp. 3982\u20133992.","DOI":"10.18653\/v1\/D19-1410"},{"key":"10.1016\/j.infsof.2022.107090_b8","series-title":"2017 IEEE International Conference on Software Maintenance and Evolution","first-page":"399","article-title":"Continuous, evolutionary and large-scale: A new perspective for automated mobile app testing","author":"Linares-V\u00e1squez","year":"2017"},{"issue":"6","key":"10.1016\/j.infsof.2022.107090_b9","doi-asserted-by":"crossref","first-page":"3316","DOI":"10.1007\/s10664-019-09706-9","article-title":"Towards understanding and detecting fake reviews in app stores","volume":"24","author":"Martens","year":"2019","journal-title":"Empir. Softw. Eng."},{"key":"10.1016\/j.infsof.2022.107090_b10","doi-asserted-by":"crossref","unstructured":"S. Liao, C. Wilson, L. Cheng, H. Hu, H. Deng, Measuring the effectiveness of privacy policies for voice assistant applications, in: Annual Computer Security Applications Conference, 2020, pp. 856\u2013869.","DOI":"10.1145\/3427228.3427250"}],"container-title":["Information and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584922001999?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950584922001999?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T06:03:52Z","timestamp":1714197832000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950584922001999"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2]]},"references-count":10,"alternative-id":["S0950584922001999"],"URL":"https:\/\/doi.org\/10.1016\/j.infsof.2022.107090","relation":{},"ISSN":["0950-5849"],"issn-type":[{"value":"0950-5849","type":"print"}],"subject":[],"published":{"date-parts":[[2023,2]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Exploring privacy requirements gap between developers and end users","name":"articletitle","label":"Article Title"},{"value":"Information and Software Technology","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.infsof.2022.107090","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Published by Elsevier B.V.","name":"copyright","label":"Copyright"}],"article-number":"107090"}}