{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:46:05Z","timestamp":1740102365374,"version":"3.37.3"},"reference-count":20,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T00:00:00Z","timestamp":1698278400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100003593","name":"CNPq","doi-asserted-by":"publisher","award":["465614\/2014-0,306000\/2022-9"],"id":[{"id":"10.13039\/501100003593","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100006162","name":"FACEPE","doi-asserted-by":"publisher","award":["APQ-0399-1.03\/17,APQ\/0388-1.03\/14"],"id":[{"id":"10.13039\/501100006162","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002322","name":"CAPES","doi-asserted-by":"publisher","award":["88887.136410\/2017-00"],"id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,26]]},"DOI":"10.1109\/esem56168.2023.10304806","type":"proceedings-article","created":{"date-parts":[[2023,11,8]],"date-time":"2023-11-08T18:50:15Z","timestamp":1699469415000},"page":"1-9","source":"Crossref","is-referenced-by-count":5,"title":["Privacy and Security Documents for Agile Software Engineering: An Experiment of LGPD Inventory Adoption"],"prefix":"10.1109","author":[{"given":"Juliana","family":"Saraiva","sequence":"first","affiliation":[{"name":"Federal University of Pernambuco,Informatics Center,Recife,Brazil"}]},{"given":"S\u00e9rgio","family":"Soares","sequence":"additional","affiliation":[{"name":"Federal University of Pernambuco,Informatics Center,Recife,Brazil"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111523"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111523"},{"key":"ref15","first-page":"28","article-title":"Adequação da LGPD via “Projetos Ageis Scrum","volume":"35","author":"cardoso","year":"2023","journal-title":"Boletim do Gerenciamento"},{"key":"ref14","first-page":"e22712441189","volume":"12","author":"de melo filho","year":"2023","journal-title":"Metodologia Scrum Uma aliada na implementação da LGPD"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1213\/ANE.0b013e31827f53d7"},{"journal-title":"Desmistificando a LGPD entenda como a Lei Geral de Proteção de Dados Pessoais pode ser aplicada no dia a dia das empresas e das pessoas","year":"2023","author":"morais","key":"ref11"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-22057-9_3"},{"journal-title":"General Data Protection Regulation (GDPR)","year":"2016","key":"ref2"},{"journal-title":"Lei","article-title":"Lei Geral de Proteção de Dados (LGPD)","year":"0","key":"ref1"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2007.66"},{"key":"ref16","first-page":"2","article-title":"G-Priv: Um Guia para Apoiar a Especificação de Requisitos de Privacidade em Conformidade com a LGPD","volume":"16","author":"cam\u00ealo","year":"2023","journal-title":"iSys-Brazilian Journal of Information Systems"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/sim.4780040112"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/BF01891203"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/su15010801"},{"journal-title":"Guia de Elaboração de Inventário de Dados Pessoais","year":"2023","key":"ref7"},{"key":"ref9","first-page":"31","article-title":"Guiding feature models synthesis from user-stories: an exploratory approach","volume":"30","author":"georges","year":"2023","journal-title":"Synthesis"},{"key":"ref4","first-page":"67","article-title":"A framework for privacy and security requirements analysis and conflict resolution for supporting GDPR compliance through privacy-by-design","volume":"1556","author":"alkubaisy","year":"2021","journal-title":"Evaluation of novel approaches to software engineering revised selected papers from 16th International conference on Evaluation of novel approaches to software engineering 2021 (ENASE 2021)"},{"key":"ref3","first-page":"120","article-title":"Emerging Privacy Legislation in the International Landscape: Strategy and Analysis for Compliance","volume":"15","author":"mcgruer","year":"2020","journal-title":"Washington Journal of Law Technology and Arts"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3364224"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.tele.2018.05.012"}],"event":{"name":"2023 ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)","start":{"date-parts":[[2023,10,26]]},"location":"New Orleans, LA, USA","end":{"date-parts":[[2023,10,27]]}},"container-title":["2023 ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10304838\/10304789\/10304806.pdf?arnumber=10304806","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T19:19:09Z","timestamp":1702322349000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10304806\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,26]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/esem56168.2023.10304806","relation":{},"subject":[],"published":{"date-parts":[[2023,10,26]]}}}