{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:45:34Z","timestamp":1730292334587,"version":"3.28.0"},"reference-count":56,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,9,1]],"date-time":"2021-09-01T00:00:00Z","timestamp":1630454400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1109\/re51729.2021.00016","type":"proceedings-article","created":{"date-parts":[[2021,11,18]],"date-time":"2021-11-18T17:22:25Z","timestamp":1637256145000},"page":"94-105","source":"Crossref","is-referenced-by-count":1,"title":["TEM: A Transparency Engineering Methodology Enabling Users\u2019 Trust Judgement"],"prefix":"10.1109","author":[{"given":"Baraa","family":"Zieni","sequence":"first","affiliation":[]},{"given":"Reiko","family":"Heckel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1007\/s12599-010-0102-z","article-title":"Software transparency","volume":"2","author":"cappelli","year":"2010","journal-title":"Business and Information Systems Engineering"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.clsr.2020.105402"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2017.12.008"},{"key":"ref32","first-page":"60","article-title":"Definition and use of software requirement patterns in requirements engineering activities","author":"palomares bonache","year":"2014","journal-title":"Proceedings of the REFSQ 2011 Workshops the REFSQ 2011 Empirical Track and the REFSQ 2014 Doctoral Symposium"},{"key":"ref31","first-page":"513","article-title":"Article 67 Data protection by design and by default","author":"herrnfeld","year":"2020","journal-title":"European Public Prosecutor's Office"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2011.42"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.2753\/MIS0742-1222240302"},{"journal-title":"The Sciences of the Artificial","year":"1996","author":"simon","key":"ref36"},{"key":"ref35","article-title":"Personal data: The emergence of a new asset class","author":"schwab","year":"2011","journal-title":"An Initiative of the World Economic Forum"},{"journal-title":"Engineering of transparency requirements in business information systems","year":"2016","author":"moghaddam","key":"ref34"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.4337\/9780857931382"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22906-5_15"},{"year":"0","key":"ref29","article-title":"Stakeholders not satisfied with probability assessments"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-008-9066-7"},{"key":"ref1","article-title":"Trust as a sustainability requirement","volume":"5","author":"zieni","year":"2017","journal-title":"Proceedings of the 6th International Workshop on Requirements Engineering for Sustainable Systems (RE4SuSy 2017)"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-008-9051-3"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2765539"},{"article-title":"Usable transparency enhancing tools: A literature review","year":"2017","author":"murmann","key":"ref21"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SESS.1997.595963"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/s10676-009-9187-9"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-39696-5_15"},{"key":"ref25","article-title":"An Initial Analysis on How Software Transparency and Trust Influence each other","author":"cysneiros","year":"2009","journal-title":"WER"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.7748\/nr.4.1.81.s9"},{"journal-title":"A concise introduction to mixed methods research","year":"2014","author":"creswell","key":"ref51"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-1446-6"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3442188.3445925"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-019-09905-1"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.01.058"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1080\/13645570600655282"},{"key":"ref10","article-title":"Transparency in software engineering","author":"tu","year":"2014","journal-title":"ResearchSpace Auckland"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5220\/0007366501140125"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.25300\/MISQ\/2013\/37.2.01"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1177\/2053951719860542"},{"key":"ref13","first-page":"51","article-title":"Exploring i* Characteristics that Support Software Transparency","author":"do prado leite","year":"2008","journal-title":"ISTA"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30282-9_15"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858402"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-4666-6150-9.ch007"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639765"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2007.07.001"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2196\/jmir.2981"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/RePa.2012.6359968"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2212776.2223696"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1080\/14639220500337708"},{"key":"ref5","first-page":"113","article-title":"Building trust and reputation in: A development framework for trust models implementation","author":"moyano","year":"2012","journal-title":"International Workshop on Security and Trust Management"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2005.193"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0209071"},{"key":"ref49","first-page":"20","article-title":"Construction of design science research questions","volume":"44","author":"thuan","year":"2019","journal-title":"Communications of The Association for Information Systems"},{"key":"ref9","first-page":"19","article-title":"Using i* to Elicit and Model Transparency in the Presence of Other Non-Functional Requirements: A Position Paper","author":"cysneiros","year":"2013","journal-title":"ISTA"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/Agile.2008.94"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-86611-2_7"},{"key":"ref48","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1007\/978-1-4419-5653-8_2","article-title":"Design science research in information systems","author":"hevner","year":"2010","journal-title":"Design Research in Information Systems"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2010.02.008"},{"journal-title":"Human Computer Interaction and Emerging Technologies Workshop Proceedings from the INTERACT 2019 Workshops","year":"2020","author":"loizides","key":"ref42"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2019.2931755"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1080\/10447318.2021.1913859"},{"journal-title":"Software Requirement Patterns","year":"2007","author":"withall","key":"ref43"}],"event":{"name":"2021 IEEE 29th International Requirements Engineering Conference (RE)","start":{"date-parts":[[2021,9,20]]},"location":"Notre Dame, IN, USA","end":{"date-parts":[[2021,9,24]]}},"container-title":["2021 IEEE 29th International Requirements Engineering Conference (RE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9604522\/9604523\/09604694.pdf?arnumber=9604694","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,8]],"date-time":"2022-07-08T22:21:06Z","timestamp":1657318866000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9604694\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9]]},"references-count":56,"URL":"https:\/\/doi.org\/10.1109\/re51729.2021.00016","relation":{},"subject":[],"published":{"date-parts":[[2021,9]]}}}