{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:45:32Z","timestamp":1730292332571,"version":"3.28.0"},"reference-count":67,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1109\/re51729.2021.00013","type":"proceedings-article","created":{"date-parts":[[2021,11,18]],"date-time":"2021-11-18T22:22:25Z","timestamp":1637274145000},"page":"58-69","source":"Crossref","is-referenced-by-count":12,"title":["Agile Teams\u2019 Perception in Privacy Requirements Elicitation: LGPD\u2019s compliance in Brazil"],"prefix":"10.1109","author":[{"given":"Edna Dias","family":"Canedo","sequence":"first","affiliation":[]},{"given":"Angelica","family":"Toffano Seidel Calazans","sequence":"additional","affiliation":[]},{"given":"Anderson Jefferson","family":"Cerqueira","sequence":"additional","affiliation":[]},{"given":"Pedro Henrique","family":"Teixeira Costa","sequence":"additional","affiliation":[]},{"given":"Eloisa Toffano","family":"Seidel Masson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"An Introduction to Qualitative Research","year":"2018","author":"flick","key":"ref39"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.18438\/B8WW3X"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-010-0115-7"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.5753\/cbsoft_estendido.2019.7666"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-6356-2"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-008-0067-3"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-010-9134-8"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03638-6_29"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29238-6_1"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.4018\/jsse.2012070101"},{"key":"ref60","article-title":"Using the design thinking empathy phase as a facilitator in privacy requirements elicitation","author":"canedo","year":"2020","journal-title":"Association for Information Systems"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26766-7_53"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ISESE.2004.1334914"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297463"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2007.65"},{"key":"ref64","doi-asserted-by":"crossref","first-page":"179","DOI":"10.1007\/978-3-030-23570-3_14","article-title":"Design thinking and scrum in software requirements elicitation: A case study","volume":"11583","author":"dos santos braz","year":"2019","journal-title":"HCI (18) ser Lecture Notes in Computer Science"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.3390\/e22040429"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2019.06.008"},{"key":"ref66","first-page":"66","article-title":"Scrum-based methodology for distributed software development","author":"del nuevo","year":"2011","journal-title":"ICGSE IEEE Computer Society"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2019.1583296"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3022198.3026326"},{"article-title":"Lei geral de proteção de dados pessoais (lgpd)","year":"2018","author":"da rep\u00fablica","key":"ref2"},{"article-title":"Eu data protection rules","year":"2018","author":"regulation","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2016.08.011"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.3390\/info12040168"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2016.37"},{"key":"ref24","article-title":"Iec 29100, 2011. bs iso\/iec29100: Information technology—security techniques—privacy framework","author":"iso","year":"2011","journal-title":"Technical report British Standard and the International Organization for … Tech Rep"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5220\/0010398200190030"},{"key":"ref26","article-title":"Comparing privacy laws: Gdpr versus lgpd","author":"by onetrust","year":"2019","journal-title":"DataGuidance by OneTrust"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2018.00023"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2018.00018"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3234152.3234187"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2019.8885144"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-12-2018-0138"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-21297-1_12"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3339252.3340337"},{"key":"ref55","article-title":"Information security in agile software development projects: a critical success factor perspective","author":"newton","year":"2019","journal-title":"ECIS"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3350768.3352730"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3098954.3103171"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3239235.3267426"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3306607"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-84800-044-5_11"},{"key":"ref40","article-title":"Guidelines for performing systematic literature reviews in software engineering","author":"kitchenham","year":"2007","journal-title":"Department of Computer Science University of Durham Durham UK"},{"key":"ref12","article-title":"Swiss agile study – agile und hybride software-entwicklung in der schweiz","author":"meier","year":"2017","journal-title":"Tech Rep"},{"journal-title":"Tech Rep","article-title":"14th state of agile report, tech. rep","year":"2020","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/SYSCON.2017.7934765"},{"key":"ref15","article-title":"Manifesto for agile software development","author":"beck","year":"2001","journal-title":"Tech Rep"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16416-3_4"},{"journal-title":"Software Engineering 8th Edition","year":"2007","author":"sommerville","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/EmpiRE.2015.7431299"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2015.70"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568240"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/PCI.2009.45"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.14722\/usec.2014.23006"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9517-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1111\/j.1365-2575.2007.00259.x"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.4304\/jetwi.2.3.212-220"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2016.0055"},{"key":"ref9","first-page":"137","article-title":"Non-functional requirements elicitation guideline for agile methods","volume":"9","author":"younas","year":"2017","journal-title":"Journal of Telecommunication Electronic and Computer Engineering (JTEC)"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC47757.2020.9049681"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44208-1_21"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2016.59"},{"key":"ref47","article-title":"Empathy and criativity in privacy requirements elicitation: Systematic literature review","author":"calazans","year":"2020","journal-title":"WER"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.01.036"},{"key":"ref41","article-title":"Privacy requirements engineering in agile software development: a specification method","volume":"2584","author":"peixoto","year":"0"},{"key":"ref44","article-title":"Privacy by design in agile software development","author":"viitaniemi","year":"2017","journal-title":"Master’s thesis"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-62404-4_50"}],"event":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","start":{"date-parts":[[2021,9,20]]},"location":"Notre Dame, IN, USA","end":{"date-parts":[[2021,9,24]]}},"container-title":["2021 IEEE 29th International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9604522\/9604523\/09604706.pdf?arnumber=9604706","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T02:19:31Z","timestamp":1657333171000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9604706\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9]]},"references-count":67,"URL":"https:\/\/doi.org\/10.1109\/re51729.2021.00013","relation":{},"subject":[],"published":{"date-parts":[[2021,9]]}}}